@InamullahKhalid

Cyber Security Road Map 
Basics:
● Software
● Hardware
● I/O Memory
● Physical ports
● Basic Troubleshooting
● OS installation
● Basic Networking Concepts
● Basic commands
_________________________________________________________________________________
Networking:
● OSI models
● IP
● Subnetting
● IP addressing
● Layer 3 - Layer 5
● Public IP
● Private IP
● Classes
● Layer 4 - TCP and UDP
● Common Ports
● How IPs are assigned
● DHCP
● DNS
● HTTP
● FTP
● SMTP
● Working of routers and switches
Security Protocols:
● SSL
● TLS
● HTTPS
Security Solutions:
● Firewalls
● VPN
● Proxies
● Web Proxies
_________________________________________________________________________________
OS Fundamentals:
● OS Architecture
● File Systems & Permissions
● User & Privilege Management
● Processes & System Calls
● Command Line & Scripting
● Kernel
● Networking in OS
● Memory Management
● OS Hardening
_________________________________________________________________________________
Virtualization:
● Setup VM
● Configure VM
● How to allocate resources
● Troubleshoot VM
● How to Set Up a Network on a VM and Types of Networks (e.g., NAT, Host-Only)
● How to assign IPs
_________________________________________________________________________________
Languages:
To excel in this field and develop strong logical thinking, start programming and focus on learning code-reading skills. Begin with high-level languages and avoid complex code initially.
● Python
● JavaScript
● Bash Scripting
_________________________________________________________________________________
Cyber Security Standards:
● ISO/IEC 27001
● NIST
● SANS
● PCI-DSS
● CIS Controls
_________________________________________________________________________________
International Cyber Laws:
● Cyber crime
● Intellectual property
● GDPR
● CCPA
● FISMA
● HIPAA
_________________________________________________________________________________
Pattern for Red Team Studies:

If you're interested in Red Teaming, start learning the methodologies of pen-testing:
● Reconnaissance (Reconn)
● Scanning
● Exploitation
● Post exploitation
● Privilege escalation
● Persistence
● Lateral movement

Active Directory (Red Teaming):
● Domain
● Organizational Units (OUs)
● Domain Controllers (DCs)
● Rules, Group Policies, and Group Policy Objects (GPOs)

Microsoft Network Authentication Protocols (Red Teaming):
● NTLM
● Kerberos
● LDAP
● EAP
● SAML
● SSO

Vulnerability Scoring System (Red Teaming):
● Vulnerability Scoring: Severity, Access Types, and Impact
Website link: https://www.first.org/cvss/

Key Cyber Security Concepts (Red Teaming):
● CIA TRIAD
● CVSS
● CVE
● CWE

Human Factor of Cyber Security (Red Teaming):
● Phishing
● Vishing
● Smishing
● Spamming
●  Shoulder surfing
● Dumpster diving
● Tailgating
● Impersonation
_________________________________________________________________________________
Pattern for Blue Team Studies:

Real-World Threats (Blue Teaming):
● Malware
● How malwares are made
● How malwares work
● How to find threats
● Insider threats
● Data Breaches
● Zero Trust Model

Open Source Intelligence (Blue Teaming):
● SOCMINT
● GEOINT
● HUMINT
● Web Intelligence
● Technical Intelligence
● Public Records

Software Solutions for Security (Blue Teaming):
● Firewall
● EDR
● Anti-virus
● IDS
● IPS
● DMZ
● Differences Between These Security Solutions
● How to Mitigate Threats in These Security Solutions
● Cyber Kill Chain

SIEM Tools (Blue Teaming):
● Splunk
● IBM QRadar
● LogRhythm
● AlienVault
● SolarWinds

Digital Forensics (Blue Teaming):
● Isolation
● Reverse Engineering
● Log Analysis
● Steganography
● Imaging
● Data Recovery
● Memory or Disk Analysis

Digital Forensic Tools (Blue Teaming):
● FTK Imager
● Autopsy
● Wireshark
● VirusTotal
● Cellebrite
● EnCase
_________________________________________________________________________________
Modern Studies:

Cryptography:
● Secure Communication
● Encryption
● Encoding
● Symmetric & Asymmetric Cryptography
● Modern Cryptography
● Key Management
● Digital Signatures

Learn Quantum Computing:
● Quantum Bits
● Quantum Algorithms
● Quantum Supremacy

Hashing:
● Bcrypt
● SHA
● Concept of Hashing
● Hashing vs Encryption
● Why Use Hashing
● PKI

Cloud Computing:
● IaaS
● PaaS
● SaaS
● Cloud Security
● Serverless Computing

Microservices:
● Research on it.

Containers:
● Docker
● Kubernetes
_________________________________________________________________________________
Practical / Hands-on:
Practical experience is essential for success in this field:
● Setup Windows Machines
● Setup Active Directory Labs
● Setup Windows Servers
 Set up the testing environment and perform testing/attacks using a Kali Linux machine.
● If you prefer online resources for practicals, consider using these platforms (note: they are paid):
● Hack the Box
● Try Hack Me
● VulnHub                                                                                     
● PicoCTF

Master Web Security and Bug Bounty:
For hands-on practice, explore PortSwigger Web Security Academy, which offers extensive labs for real-world web security, web testing, and attacks.

Pro Tip:
There will be a lot of errors while working because it's technical work and involves working with machines, so errors will occur. Learn to use Google for research, as you'll often need to find solutions. With daily practice and AI tools like ChatGPT, your work will become faster and more efficient. Master creating and using prompts for better results.

Common Tools:
● Burp Suite
● Nmap
● Wireshark
● Metasploit
● Autopsy
● Snort
● Nuclei
● John the Ripper
● Aircrack-ng
● OpenVAS
● Netcat
● Nikto

Common Websites:
● VirusTotal.com
● Exploit-DB.com
● URLScan.io
● Shodan.io
● CyberChef
● RevShell

Bug Bounty Platforms:
● HackerOne
● BugCrowd
● YesWeHack
● Intigriti
● Synack
_________________________________________________________________________________
Resume Tips:
● Include Bug Bounty achievements, such as rewards, Hall of Fame mentions, and swag.
● Add relevant projects to your resume.
● If possible, complete a 3-6 month internship in cybersecurity.
● Regularly participate in CTF challenges and showcase these achievements on your resume.
_________________________________________________________________________________
Certificates:

For Blue Teams:
● CompTIA Security+
● CEH
● GSEC

For Red Teams:
● OSCP
● CPENT
● CEH
● eJPT
● PenTest+
● GPEN

For Risk & Compliance:
● CISSP
● CISA
● CISM

@AltaBross

This roadmap is not for begineer it is for all the people and trust me some people don't even know the basic even me but after watching this video i will learn the basic things first.

@sat___anonymous143

Mai pahli baar inspired hua tha ANONYMOUS GROUPS se aur uske anonymous MASK se mujhe bachpan se hi technology subject bahut pasand mai jab 4-5th class pe tha to Mai kuchh na kuchh new invention kiya karta tha aur Mai khud se hi HACKING aur COMPUTER ke bahut saare module ko pura kar chuka hu aur mujhe ek ETHICAL HACKER Banana hai kyonki ye mujhe bahut pasand hai mai abhi isko padh Raha hu thanks this  provide video❤❤❤

@Makedeal-p2b

Brother main 34years kaa hoo aur ab se cyber security mein master banana chahta hoo kisi job ke liye nahi balki apni knowledge ke liye but ek cheej jo maine dekha apke jaisa koi bhi nahi pure youtube par.. agar mere paas itne paise hote to main apko khareed leta kewal apse gyaan lene ke liye apse personaly class leta lekin Haan main apko hi ana guru Maan kar aur apki hi ghar mein tasveer apne ghar par lga kar seekhna suru kar raha hoo.. ( Jai guru dev)

@crisistg7315

I am 26 this year I pursue my Engineering from civil but my love for cyber security and tech geek always attract toward me so i am trying to learn cybersecurity part time as well. Thankyou bro love your video. Consistency is way more important than motivation

@TrusTalor

Really solid video cybersecurity is getting so sneaky these days. I talk about stuff like this on my own cybersecurity channel too and it's wild how many people still get caught by these scams. The more we talk about it the better!

@whitedevil3075

1:30 I want to enter into the field of cybersecurity because I've watched a lot of movies on hacking from my childhood and from that a thought came into my mind that I've to protect those people from cyber threats who aren't aware of these things and secure the world of internet. Now I just passed out from 12th class and from now onwards I'm going to follow you and learn every knowledge you provide. Sir you're my role model.

@alamdarali6369

Start cyber security with these topics:

Network basics (not in depth as a beginner)

Kali Linux basic commands

Scanning

Vulnerability analysis etc

@proffesionalgamertacaz5856

Thank you bro .this can be my life changing video. This is so helpful for the beginner like me 😅.but i promise, i'll give 1000% to my studies . Because field is not easy and am a beginner too . again thank you brother .and wish me luck 🧿🤞🏽😊

@varunsharma2053

U r best...i got my answer after watching whole video..

@prasadadke

The last 3-4 minutes  inspired me to learn anything.........👏
Naw, let's see how long I persist.🙂

@anshsuman6987

Red team 😊 . I am ready to give my whole life in my passion of ethical hacking 😊😊

@sureboy3108

Jitna apne bataya kya apke pass koi course hai from starting

@CoderMehedi2023

This is one of the best video I have ever seen!!❤

@001-r1u

bro plz work on your website becouse of its literally tak 5-10 min for open plz i. give you my hard earn money its no essy for me:face-pink-tears:

@SubratoDas-u8i

I will START from TODAY. THANK YOU BHAIYA....

@RaviKharb-n4r

Mere nmap -sV version or service details nahi aa rahi hai in Kali linux

@ayushbatra1267

your website is not working bro whenever i open the courses its shows error 404 and even its show check your interent connection and i have already connected to my wifi

@anooprana9380

mujhe corce karna he kese contect karu

@H-acker.exe_2

Sir mai Kolkata Behala Government polytechnic se "Cyber Forensic and Information Security " ka couse kar raga hau, uske bad mai "Btech in Cyber Security " karne hai, so apka ea vedio mere liye bohot helpful tha, or mai  Red teaming ke domin mai jana chata hu☺.