Cybersecurity Roadmap - Map of Content (MOC)
Created: 2025-11-25 Tags: moc cybersecurity index roadmap
Overview
This knowledge base represents a comprehensive Zettelkasten structure for cybersecurity learning based on the roadmap.sh cybersecurity path. It follows atomic note principles with bidirectional linking and proper knowledge organization.
Navigation by Domain
1. Fundamentals
- Computer Hardware Components
- Connection Types and Functions
- OS-Independent Troubleshooting
- Popular Software Suites
- Wireless Technologies
- Cloud Services Overview
2. Operating Systems
- Windows Operating System
- Linux Operating System
- MacOS Operating System
- OS Installation and Configuration
- File CRUD Operations
- Permission Structures
- Command Line Interface
- Graphical User Interface
3. Networking
- OSI Model
- TCP-IP Protocol Suite
- Subnetting
- CIDR Notation
- Public vs Private IP Addresses
- Default Gateway
- VLAN
- DMZ
- VPN
- Network Topologies
- Router
- Switch
- DNS
- DHCP
- NAT
- ARP
- SSH
- RDP
- FTP and SFTP
- HTTP and HTTPS
- SSL-TLS
4. Security Concepts
- Defense in Depth
- Zero Trust Architecture
- Cyber Kill Chain
- Threat Hunting
- Vulnerability Management
- Penetration Testing
- Reverse Engineering
- Network Segmentation
- Perimeter Security
- Security Runbooks
- Common Hacking Tools
- Exploit Frameworks
5. Authentication & Access Control
- Kerberos
- LDAP
- Single Sign-On
- RADIUS
- Certificate-Based Authentication
- Multi-Factor Authentication
- Two-Factor Authentication
- Local Authentication
6. Security Tools
- Virtualization Technologies
- VMware
- VirtualBox
- nmap
- tcpdump
- Wireshark and Packet Sniffers
- nslookup
- dig
- iptables
- netstat
- ping
- traceroute
7. Incident Response & Forensics
8. Governance, Risk & Compliance
- Risk Assessment
- Compliance and Auditing
- Backup and Resiliency
- Business Continuity Planning
- Security Frameworks
9. Practice Platforms
10. Professional Certifications
Entry Level
Advanced Level
Learning Paths
Beginner Path
Phase 1: Fundamentals
- Computer Hardware Components
- Connection Types and Functions
- OS-Independent Troubleshooting
- Popular Software Suites
- Wireless Technologies
- Cloud Services Overview
Phase 2: Operating Systems
- Choose and master one OS (recommend Linux Operating System)
- OS Installation and Configuration
- Command Line Interface
- Graphical User Interface
- File CRUD Operations
- Permission Structures
Phase 3: Networking Basics
- OSI Model - Foundation of networking
- TCP-IP Protocol Suite - Core protocols
- Subnetting and CIDR Notation
- Public vs Private IP Addresses
- Default Gateway
- Router and Switch
- DNS and DHCP
- NAT and ARP
Phase 4: Basic Security Tools
- ping - Basic connectivity testing
- traceroute - Path analysis
- netstat - Network connections
- nslookup and dig - DNS queries
- tcpdump - Packet capture basics
- Wireshark and Packet Sniffers - Packet analysis
- nmap - Network scanning
- iptables - Basic firewall rules
Phase 5: Security Concepts
Phase 6: Practice & Certification
- Practice on TryHackMe and picoCTF
- Target certification: CompTIA Security+
Intermediate Path
Advanced Networking
- Network Segmentation
- VLAN implementation
- DMZ configuration
- VPN technologies
- SSH and RDP security
- FTP and SFTP
- HTTP and HTTPS
- SSL-TLS certificates
Authentication & Access Control
- Multi-Factor Authentication
- Two-Factor Authentication
- Kerberos
- LDAP
- Single Sign-On
- RADIUS
- Certificate-Based Authentication
- Local Authentication
Advanced Tools & Techniques
- Virtualization Technologies (VMware, VirtualBox)
- Advanced nmap scanning
- Wireshark and Packet Sniffers deep analysis
- Vulnerability Management
Security Architecture
- Zero Trust Architecture
- Security Runbooks
- Common Hacking Tools awareness
- Exploit Frameworks understanding
Practice & Certification
- Practice on HackTheBox and VulnHub
- Target certifications: CEH, CCNA
Advanced Path
Offensive Security
- Penetration Testing
- Reverse Engineering
- Common Hacking Tools mastery
- Exploit Frameworks expertise
Threat Detection & Hunting
- Threat Hunting methodologies
- Cyber Kill Chain analysis
- Advanced log analysis
- Behavioral threat detection
Incident Response & Forensics
Governance, Risk & Compliance
- Risk Assessment
- Compliance and Auditing
- Security Frameworks (NIST, ISO 27001, CIS)
- Backup and Resiliency
- Business Continuity Planning
Practice & Certification
- Practice on HackTheBox (Pro Labs), SANS Holiday Hack Challenge
- Target certifications: OSCP, CISSP, CEH, GIAC Certifications
Key Concepts by Category
Network Security: OSI Model, Network Segmentation, DMZ, VPN, VLAN
Access Control: Multi-Factor Authentication, Zero Trust Architecture, Kerberos, LDAP
Offensive Security: Penetration Testing, Common Hacking Tools, Exploit Frameworks
Defensive Security: Defense in Depth, Threat Hunting, Incident Response Process
Foundations: Computer Hardware Components, Command Line Interface, OSI Model, TCP-IP Protocol Suite
This MOC serves as the central navigation hub for the entire cybersecurity knowledge base. Use the links above to explore specific topics in depth.