Structured routes into cybersecurity.
Three paths built from real experience — pick one and follow the milestones. No paid course required.
Which path is right for me?
New to cybersecurity? Start with Beginner. Want a security career and love puzzles, logs, and alerts? Aim for SOC Analyst. Curious about hacking, labs, and breaking things legally? Try Red Team. Honest note — you can switch, combine, and revisit. The paths are a compass, not a cage.
Beginner Path
Start Here: Your First Steps into Cybersecurity
For people with zero background. We start from the very beginning — no jargon, no gatekeeping.
What Cybersecurity Actually Is
BeginnerDemystify the field. What do security professionals really do day-to-day?
- →Google Cybersecurity Certificate (intro module)
- →YouTube: Professor Messer intro videos
How the Internet Works
BeginnerYou cannot defend what you do not understand. A gentle tour of networking.
- →Cloudflare Learning Center
- →How DNS Works (comic)
The Big Four Threats
BeginnerPhishing, malware, social engineering, weak passwords — how most people actually get hacked.
- →StopThinkConnect.org
- →Have I Been Pwned
Staying Safe Online — The Practical Kit
BeginnerTurn theory into habits. The tools everyone should use.
- →Bitwarden
- →Authy / Aegis
- →Windows Defender basics
Your First Certification
BeginnerA roadmap to your first recognised credential — without spending a fortune.
- →Coursera (Google)
- →CompTIA SY0-701
- →TryHackMe Pre-Security path
SOC Analyst Path
Level Up: Becoming a Security Operations Analyst
For those who want to break into — or grow inside — a Security Operations Center. Practical, experience-driven.
Understand the SOC Environment
BeginnerShifts, tiers, escalation paths, and what a day in a SOC really looks like.
- →Blue Team Handbook
- →SANS SOC Survey (latest)
Log Analysis & SIEM Tools
IntermediateLive and breathe logs. Learn to query the tools used in real SOCs.
- →Splunk Fundamentals 1 (free)
- →KC7 Cyber
- →BOTSv3 dataset
Alert Triage & Incident Response
IntermediateTurn a noisy alert into a decision in under 10 minutes.
- →LetsDefend.io
- →CyberDefenders labs
Threat Intelligence Basics
IntermediateKnow your adversary. Use intel to prioritise what matters.
- →MISP
- →AlienVault OTX
- →MITRE ATT&CK Navigator
MITRE ATT&CK Framework
IntermediateThe shared language of modern defence. Map detections and gaps like a pro.
- →attack.mitre.org
- →ATT&CK Flow
Networking for Analysts
IntermediateEnough networking to debug an alert, not enough to build a router.
- →Practical Packet Analysis (book)
- →TryHackMe Networking
Certifications & Career Growth
AdvancedA realistic certification ladder for SOC roles — what helps and what does not.
- →BTL1
- →CySA+ CS0-003
- →SC-200 learning path
Red Team Path
Go Offensive: Introduction to Red Teaming & Ethical Hacking
For those curious about the offensive side. Technical but honest — including how hard it really is.
Red Team vs Pentest vs Bug Bounty
BeginnerClear the confusion. Each discipline has different goals, scopes, and skillsets.
- →Red Team Field Manual
- →Offensive Security blog
Build Your Lab
BeginnerYour playground. Break things legally and learn fast.
- →Kali Linux docs
- →VulnHub
- →HackTheBox Starting Point
Reconnaissance
IntermediateInformation is ammunition. Learn to map a target before touching it.
- →Amass
- →Subfinder
- →Shodan
Exploitation Basics
IntermediateFrom "I see a service" to "I have a shell" — the fundamentals.
- →PortSwigger Web Academy
- →Metasploit Unleashed
The Core Toolkit
IntermediateTools you will use every single engagement.
- →Official docs
- →HackTricks
- →PayloadsAllTheThings
CTFs as Deliberate Practice
IntermediateApply, fail, learn, repeat. The fastest way to grow.
- →HackTheBox Academy
- →TryHackMe Offensive path
Certification Roadmap
AdvancedAn honest take — eJPT is a great starting point, OSCP is no joke.
- →INE / eLearnSecurity
- →Offensive Security
- →TCM Security