# 90-Day Cybersecurity Study Plan [![All Contributors](https://img.shields.io/badge/all_contributors-7-orange.svg?style=flat-square)](#contributors-) farhanashrafdev%2F90DaysOfCyberSecurity | Trendshift ## πŸ“š Table of Contents - [Introduction](#introduction) - [Goals and Audience](#goals-and-audience) - [Daily Breakdown](#daily-breakdown) - [Day 1-7: Network+ Concepts](#network+-concepts) - [Day 8-14: Security+ Concepts](#Security+-concepts) - [Day 15-28: Linux Tutorials](#linux-tutorials) - [Day 29-42: Python](#python) - [Day 43-56: Traffic Analysis](#traffic-analysis) - [Day 57-63: Git](#git) - [Day 64-70: ELK](#elk) - [Day 71-77: GCP or AWS or Azure ](#gcp-or-aws-or-azure) - [Day 85-90: Hacking](#hacking) - [Day 91-92: One Page Resume](#one-page-resume) - [Day 93-95: Where and How to Apply](#where-and-how-to-apply) - [Contributing](#contributing) ## πŸ“˜ Introduction Welcome to the **90 Days of Cybersecurity** challenge! This repository provides a structured, 90-day self-paced study plan designed to help learners build a strong foundation in cybersecurity. Whether you're a beginner looking to break into the field or a professional aiming to sharpen your skills, this roadmap offers a wide range of curated resources, hands-on tasks, and learning materials. The daily modules cover essential and advanced topics, including: - Networking fundamentals (Network+) - Security principles (Security+) - Linux basics and shell scripting - Python programming for security tasks - Traffic analysis and packet inspection - Version control with Git - SIEM tools and log analysis using the ELK stack - Cloud security with GCP, AWS and Azure - Penetration testing and ethical hacking Each day is designed with actionable tasks, tutorials, and reading materials to help you stay on track. For a full list of resources, refer to [`learn.md`](./learn.md). ## 🎯 Goals and Audience ### πŸ“Œ Goals The primary goal of this 90-day plan is to help learners: - Build a solid foundation in core cybersecurity concepts and practices. - Gain hands-on experience through daily exercises and real-world tools. - Develop the technical skills necessary for certifications such as CompTIA Network+ and Security+. - Explore key domains including network security, system hardening, cloud security, scripting, and ethical hacking. - Cultivate a consistent learning habit over 90 days to support long-term retention and growth. By the end of this journey, you should feel confident navigating a variety of cybersecurity tools, concepts, and techniques. ### πŸ‘₯ Intended Audience This repository is ideal for: - **Aspiring cybersecurity professionals** preparing for entry-level roles or certifications. - **IT professionals** transitioning into a security-focused career. - **Students** studying computer science, information systems, or network engineering. - **Self-learners** seeking a structured and comprehensive study plan. - **Developers and DevOps engineers** looking to better understand secure infrastructure and threat detection. - **Anyone curious** about how cybersecurity works in real-world environments. No prior experience is required, though basic familiarity with computers, networks, or programming will be helpful. ## Day 1-7: Network+ - Watch videos from Professor Messer's [N10-009 Playlist](https://youtube.com/playlist?list=PLG49S3nxzAnl_tQe3kvnmeMid0mjF8Le8&si=3rUsqmrdsNK3izh6) - Complete any related practice questions or exercises. ## Day 8-14: Security+ ### Strongly Recommend Professor Messer's: - Watch the videos from Professor Messer's [SY0-701 Playlist](https://www.youtube.com/watch?v=KiEptGbnEBc&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv) ### Another Alternative You Can Use: - Watch Pete Zerger's [SY0-701 Playlist](https://www.youtube.com/watch?v=1E7pI7PB4KI&list=PL7XJSuT7Dq_UDJgYoQGIW9viwM5hc4C7n) ### Additional Practice: - Complete any related practice questions or exercises. ## Day 15-28: Linux - Browse through the Linux Journey tutorials: https://linuxjourney.com/ - Complete Linux Unhatched on Cisco NetAcad: https://www.netacad.com/courses/linux-unhatched - Complete all Linux Hands-on Labs on LabEx: https://labex.io/free-labs/linux ## Day 29-42: Python - Complete Codecademy's Learn Python Track: https://codecademy.com/learn/learn-python - Python.org: https://www.python.org/ - Real Python: https://realpython.com/ - Talk Python to Me: https://talkpython.fm/ - Read "Learn Python the Hard Way": https://learnpythonthehardway.org - HackerRank Python: https://www.hackerrank.com/domains/python - LabEx Learn Python by Labs: https://labex.io/free-labs/python ### Youtube Course: - https://www.youtube.com/watch?v=egg-GoT5iVk&ab_channel=TheCyberMentor ## Day 43-56: Traffic Analysis - Take the Wireshark University course: https://www.wireshark.org/#educationalContent - Follow the Wireshark Tutorial on guru99: https://guru99.com/wireshark-tutorial.html - Read through the TCPdump Tutorial on DanielMiessler: https://danielmiessler.com/study/tcpdump/ - Read through the Suricata on pfSense guide: https://doc.pfsense.org/index.php/Suricata ### Youtube: - Wireshark Tutorial for Beginners series https://www.youtube.com/watch?v=NjvR4LmwcMU&list=PLBf0hzazHTGPgyxeEj_9LBHiqjtNEjsgt&pp=iAQB - Suricata Network IDS/IPS https://www.youtube.com/watch?v=S0-vsjhPDN0&pp=ygUhIFN1cmljYXRhIElEUy9JUFMgU3lzdGVtIFR1dG9yaWFs ## Day 57-63: Git - Complete Codecademy's Git for Beginners course: https://codecademy.com/learn/learn-git - Follow the Git Immersion tutorial: http://gitimmersion.com - Try Git: https://try.github.io - Use [Learn Git Branching](https://learngitbranching.js.org/) for an interactive Git CLI simulator. ## Day 64-70: ELK - Follow the ELK Stack Tutorial on Logz.io: [https://logz.io/learn/complete-elk-stack-tutorial/](https://logz.io/learn/complete-guide-elk-stack/) - Browse through the ELK Stack tutorials on Elastic: [https://elastic.co/learn/elastic-stack](https://www.elastic.co/elastic-stack/features) ## Day 71-77: Cloud Platforms ## Any one of them works fine. ### GCP: - Explore the GCP Getting Started Resource : https://cloud.google.com/getting-started/ - Google Cloud Platform Documentation: https://cloud.google.com/docs/ - Google Cloud Platform Blog: https://cloud.google.com/blog/ - Google Cloud Platform Community: https://cloud.google.com/community/ - Try hands-on challenges with [Google Cloud Skills Boost](https://www.cloudskillsboost.google) ### AWS - Explore the AWS Getting Started Resource Center: https://aws.amazon.com/getting-started/ - Browse through the AWS Tutorials: https://aws.amazon.com/tutorials/ - Learn through gamified labs on [AWS Cloud Quest](https://aws.amazon.com/training/digital/aws-cloud-quest/) ### Azure - Go through Azure Fundamentals: https://learn.microsoft.com/en-us/training/azure/ - Complete the [Microsoft Learn Azure labs](https://learn.microsoft.com/en-us/training/paths/azure-fundamentals/) with sandbox environments ## Day 85-90: Hacking - Try to hack the challenges on Hack the Box: https://hackthebox.com - Practice on vulnerable machines on Vulnhub: https://vulnhub.com ### Youtube: - Ethical Hacking Part 1: https://www.youtube.com/watch?v=3FNYvj2U0HM&ab_channel=TheCyberMentor - Ethical Hacking Part 2: https://www.youtube.com/watch?v=sH4JCwjybGs&ab_channel=TheCyberMentor ## Day 91-92: One Page Resume - Use the provided resume template: https://bowtiedcyber.substack.com/p/killer-cyber-resume-part-ii - Cybersecurity Resume Template: https://www.indeed.com/career-advice/resumes-cover-letters/cybersecurity-resume - Cybersecurity Resume from Resume-Now: [https://www.resume-now.com/templates/cyber-security-resume](https://www.resume-now.com/cv/templates/data-systems-administration/cyber-security-specialist) This template also has sections for skills, certifications, and experience, along with a summary, and a section for education. It also includes a section for technical skills. ## Day 93-95: Where and How to Apply Search for jobs on Indeed: https://indeed.com Look for opportunities on LinkedIn: https://linkedin.com ## πŸŽ‰ Contributors Thank you for being a part of the 90DaysOfCyberSecurity community! We appreciate everyone who helps improve our content. ### Contribution Categories: - **Documentation**: Improve or add to the study material and guides. - **Tutorials & Guides**: Create or enhance tutorials explaining complex concepts. - **Suggested Resources**: Recommend useful tools, articles, books, or other resources. - **Ideas / Topics**: Suggest new topics to be added to the learning materials. - **Review & Feedback**: Provide feedback on existing materials and suggest improvements. - **Community Support**: Answer questions and help others in discussions or issues. - **Tests & Quizzes**: Add quizzes, challenges, or tests to check learning progress. - **Real-World Applications**: Share real-life examples or case studies of cybersecurity practices. - **Mentoring**: Help others with study advice, tips, or hosting study sessions. Thank you to all contributors for your amazing work! πŸŽ‰ ## Contributors ✨ Thanks goes to these wonderful people ([emoji key](https://allcontributors.org/docs/en/emoji-key)):
Farhan Ashraf
Farhan Ashraf

πŸ“–
Wanderer479
Wanderer479

πŸ“–
Muhammad Mahad
Muhammad Mahad

πŸ“–
AndrΓ© Oliveira
AndrΓ© Oliveira

πŸ“–
arbenp
arbenp

πŸ“– πŸ›
paduh
paduh

πŸ“–
Emmanuel Ferdman
Emmanuel Ferdman

πŸ› πŸ“–
This project follows the [all-contributors](https://github.com/all-contributors/all-contributors) specification. Contributions of any kind welcome!