Study Path Agent
Copy link
X / Twitter
Facebook
LinkedIn
WhatsApp
Generate Your Own
Cybersecurity
79 topics across 6 chapters
Chapter 1
Foundations: systems, networking, and threat landscape
1
Operating systems essentials (Linux/Windows) for security work
2 subtopics
2
Linux permissions, processes, services, and logs
3
Windows fundamentals: registry, services, event logs, PowerShell
4
Identity basics: users, groups, authentication, authorization
2 subtopics
5
AuthN vs AuthZ, sessions, tokens, and MFA basics
6
Directory services basics (AD/LDAP concepts)
7
Threats & adversary behavior (malware, phishing, APT, ransomware)
3 subtopics
8
Malware basics (delivery, persistence, C2 concepts)
9
Phishing & social engineering mechanics and defenses
10
Ransomware lifecycle and key defensive controls
11
Core security concepts: CIA triad, least privilege, defense-in-depth
1 subtopics
12
Security control types: preventive/detective/corrective
Chapter 2
Security engineering: secure design and architecture
13
Security architecture & reference models (zero trust, layered design)
14
Cryptography fundamentals & applied crypto
4 subtopics
15
Symmetric vs asymmetric crypto; hashing and MACs
16
Key management basics (rotation, storage, HSM concepts)
17
Certificates, PKI, and common TLS failure modes
18
Applied crypto mistakes to avoid (nonce reuse, weak randomness)
19
Application security fundamentals (web, APIs, secure coding)
2 subtopics
20
Web vulnerabilities (OWASP Top 10)
21
Secure coding patterns (input validation, output encoding, secrets)
22
Cloud & container security fundamentals
2 subtopics
23
Cloud shared responsibility model and core services
24
Container security basics (images, registries, runtime)
25
Endpoint hardening & configuration management
1 subtopics
26
Endpoint protection basics (EDR concepts, allowlisting)
Chapter 3
Offensive security: finding and validating weaknesses
27
Reconnaissance and enumeration (legal/authorized)
1 subtopics
28
OSINT fundamentals and operational security (OPSEC)
29
Vulnerability analysis & exploit fundamentals
1 subtopics
30
Exploit concepts: memory safety, mitigations (DEP/ASLR)
↗
Web vulnerabilities (OWASP Top 10)
(see Chapter 2)
31
Wireless and network attack techniques (authorized)
1 subtopics
32
Wi‑Fi security basics (WPA2/WPA3, common misconfigurations)
33
Reporting, remediation guidance, and ethics
2 subtopics
34
Rules of engagement, legal constraints, and responsible disclosure
35
Write a clear technical report (steps, impact, evidence, fixes)
Chapter 4
Defensive security: monitoring, detection, and response
36
Logging & telemetry fundamentals
1 subtopics
37
Log parsing and normalization basics (timestamps, fields, schemas)
38
SIEM basics and detection engineering
3 subtopics
39
SIEM concepts (data onboarding, correlation, alerts)
40
Detection logic basics: IOCs vs behaviors; false positives/negatives
41
Write detections (Sigma/KQL/SPL basics)
42
Incident response lifecycle & playbooks
2 subtopics
43
Triage: scope, contain, eradicate, recover
44
Evidence handling and chain of custody basics
45
Threat hunting & purple teaming
46
Digital forensics fundamentals
2 subtopics
47
Disk and file system forensics basics
48
Memory forensics basics (what it can reveal, high-level workflow)
Chapter 5
Governance, risk, compliance, and privacy (GRC)
49
Risk management and security program basics
2 subtopics
50
Security roadmaps and prioritization (quick wins vs long-term)
51
Business continuity & disaster recovery basics
52
Security policies, standards, and frameworks
3 subtopics
53
Control frameworks overview (CIS Controls, NIST CSF concepts)
54
Policy writing basics (acceptable use, password, access, logging)
55
Asset inventory and data classification
56
Compliance & audits (SOC 2, ISO 27001, PCI DSS)
57
Privacy fundamentals and data protection
2 subtopics
58
PII and data lifecycle (collect, use, share, retain, delete)
59
Privacy-by-design and data minimization
60
Vendor, third-party, and supply-chain risk
1 subtopics
61
Secure procurement and vendor monitoring
Chapter 6
Career, practice labs, and specialization tracks
62
Build a safe home lab and practice environment
1 subtopics
63
Set up virtualization: VirtualBox/VMware, networks, snapshots
64
Portfolio projects (defensive + offensive, documented)
65
Interview readiness and security communication
1 subtopics
66
Role expectations: SOC analyst, pentester, security engineer, GRC
67
Certifications map and study strategy
4 subtopics
68
Entry-level: Security+ style fundamentals plan
69
Blue team: SOC/IR cert path (e.g., CySA+/GCIA-style domains)
70
Red team: pentest cert path (e.g., eJPT/PNPT/OSCP-style domains)
71
GRC: audit/risk cert path (e.g., CISA/ISO 27001)
72
Choose a specialization track