AI prompts
base on This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md # 90-Day Cybersecurity Study Plan
<!-- ALL-CONTRIBUTORS-BADGE:START - Do not remove or modify this section -->
[](#contributors-)
<!-- ALL-CONTRIBUTORS-BADGE:END -->
## π Table of Contents
- [Introduction](#introduction)
- [Goals and Audience](#goals-and-audience)
- [Daily Breakdown](#daily-breakdown)
- [Day 1-7: Network+ Concepts](#network+-concepts)
- [Day 8-14: Security+ Concepts](#Security+-concepts)
- [Day 15-28: Linux Tutorials](#linux-tutorials)
- [Day 29-42: Python](#python)
- [Day 43-56: Traffic Analysis](#traffic-analysis)
- [Day 57-63: Git](#git)
- [Day 64-70: ELK](#elk)
- [Day 71-77: GCP or AWS or Azure ](#gcp-or-aws-or-azure)
- [Day 85-90: Hacking](#hacking)
- [Day 91-92: One Page Resume](#one-page-resume)
- [Day 93-95: Where and How to Apply](#where-and-how-to-apply)
- [Contributing](#contributing)
## π Introduction
Welcome to the **90 Days of Cybersecurity** challenge!
This repository provides a structured, 90-day self-paced study plan designed to help learners build a strong foundation in cybersecurity. Whether you're a beginner looking to break into the field or a professional aiming to sharpen your skills, this roadmap offers a wide range of curated resources, hands-on tasks, and learning materials.
The daily modules cover essential and advanced topics, including:
- Networking fundamentals (Network+)
- Security principles (Security+)
- Linux basics and shell scripting
- Python programming for security tasks
- Traffic analysis and packet inspection
- Version control with Git
- SIEM tools and log analysis using the ELK stack
- Cloud security with GCP, AWS and Azure
- Penetration testing and ethical hacking
Each day is designed with actionable tasks, tutorials, and reading materials to help you stay on track. For a full list of resources, refer to [`LEARN.md`](./LEARN.md).
## π― Goals and Audience
### π Goals
The primary goal of this 90-day plan is to help learners:
- Build a solid foundation in core cybersecurity concepts and practices.
- Gain hands-on experience through daily exercises and real-world tools.
- Develop the technical skills necessary for certifications such as CompTIA Network+ and Security+.
- Explore key domains including network security, system hardening, cloud security, scripting, and ethical hacking.
- Cultivate a consistent learning habit over 90 days to support long-term retention and growth.
By the end of this journey, you should feel confident navigating a variety of cybersecurity tools, concepts, and techniques.
### π₯ Intended Audience
This repository is ideal for:
- **Aspiring cybersecurity professionals** preparing for entry-level roles or certifications.
- **IT professionals** transitioning into a security-focused career.
- **Students** studying computer science, information systems, or network engineering.
- **Self-learners** seeking a structured and comprehensive study plan.
- **Developers and DevOps engineers** looking to better understand secure infrastructure and threat detection.
- **Anyone curious** about how cybersecurity works in real-world environments.
No prior experience is required, though basic familiarity with computers, networks, or programming will be helpful.
## Day 1-7: Network+
- Watch videos from Professor Messer's [N10-009 Playlist](https://youtube.com/playlist?list=PLG49S3nxzAnl_tQe3kvnmeMid0mjF8Le8&si=3rUsqmrdsNK3izh6)
- Complete any related practice questions or exercises.
## Day 8-14: Security+
### Strongly Recommend Professor Messer's:
- Watch the videos from Professor Messer's [SY0-701 Playlist](https://www.youtube.com/watch?v=KiEptGbnEBc&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv)
### Another Alternative You Can Use:
- Watch Pete Zerger's [SY0-701 Playlist](https://www.youtube.com/watch?v=1E7pI7PB4KI&list=PL7XJSuT7Dq_UDJgYoQGIW9viwM5hc4C7n)
### Additional Practice:
- Complete any related practice questions or exercises.
## Day 15-28: Linux
- Browse through the Linux Journey tutorials: https://linuxjourney.com/
- Complete Linux Unhatched on Cisco NetAcad: https://www.netacad.com/courses/linux-unhatched
## Day 29-42: Python
- Complete Codecademy's Learn Python Track: https://codecademy.com/learn/learn-python
- Python.org: https://www.python.org/
- Real Python: https://realpython.com/
- Talk Python to Me: https://talkpython.fm/
- Read "Learn Python the Hard Way": https://learnpythonthehardway.org
- HackerRank Python: https://www.hackerrank.com/domains/python
### Youtube Course:
- https://www.youtube.com/watch?v=egg-GoT5iVk&ab_channel=TheCyberMentor
## Day 43-56: Traffic Analysis
- Take the Wireshark University course: https://www.wireshark.org/#educationalContent
- Follow the Wireshark Tutorial on guru99: https://guru99.com/wireshark-tutorial.html
- Read through the TCPdump Tutorial on DanielMiessler: https://danielmiessler.com/study/tcpdump/
- Read through the Suricata on pfSense guide: https://doc.pfsense.org/index.php/Suricata
### Youtube:
- Wireshark Tutorial for Beginners series https://www.youtube.com/watch?v=NjvR4LmwcMU&list=PLBf0hzazHTGPgyxeEj_9LBHiqjtNEjsgt&pp=iAQB
- Suricata Network IDS/IPS https://www.youtube.com/watch?v=S0-vsjhPDN0&pp=ygUhIFN1cmljYXRhIElEUy9JUFMgU3lzdGVtIFR1dG9yaWFs
## Day 57-63: Git
- Complete Codecademy's Git for Beginners course: https://codecademy.com/learn/learn-git
- Follow the Git Immersion tutorial: http://gitimmersion.com
- Try Git: https://try.github.io
- Use [Learn Git Branching](https://learngitbranching.js.org/) for an interactive Git CLI simulator.
## Day 64-70: ELK
- Follow the ELK Stack Tutorial on Logz.io: [https://logz.io/learn/complete-elk-stack-tutorial/](https://logz.io/learn/complete-guide-elk-stack/)
- Browse through the ELK Stack tutorials on Elastic: [https://elastic.co/learn/elastic-stack](https://www.elastic.co/elastic-stack/features)
## Day 71-77: Cloud Platforms
## Any one of them works fine.
### GCP:
- Explore the GCP Getting Started Resource : https://cloud.google.com/getting-started/
- Google Cloud Platform Documentation: https://cloud.google.com/docs/
- Google Cloud Platform Blog: https://cloud.google.com/blog/
- Google Cloud Platform Community: https://cloud.google.com/community/
- Try hands-on challenges with [Google Cloud Skills Boost](https://www.cloudskillsboost.google)
### AWS
- Explore the AWS Getting Started Resource Center: https://aws.amazon.com/getting-started/
- Browse through the AWS Tutorials: https://aws.amazon.com/tutorials/
- Learn through gamified labs on [AWS Cloud Quest](https://aws.amazon.com/training/digital/aws-cloud-quest/)
### Azure
- Go through Azure Fundamentals: https://learn.microsoft.com/en-us/training/azure/
- Complete the [Microsoft Learn Azure labs](https://learn.microsoft.com/en-us/training/paths/azure-fundamentals/) with sandbox environments
## Day 85-90: Hacking
- Try to hack the challenges on Hack the Box: https://hackthebox.com
- Practice on vulnerable machines on Vulnhub: https://vulnhub.com
### Youtube:
- Ethical Hacking Part 1: https://www.youtube.com/watch?v=3FNYvj2U0HM&ab_channel=TheCyberMentor
- Ethical Hacking Part 2: https://www.youtube.com/watch?v=sH4JCwjybGs&ab_channel=TheCyberMentor
## Day 91-92: One Page Resume
- Use the provided resume template: https://bowtiedcyber.substack.com/p/killer-cyber-resume-part-ii
- Cybersecurity Resume Template: https://www.indeed.com/career-advice/resumes-cover-letters/cybersecurity-resume
- Cybersecurity Resume from Resume-Now: [https://www.resume-now.com/templates/cyber-security-resume](https://www.resume-now.com/cv/templates/data-systems-administration/cyber-security-specialist)
This template also has sections for skills, certifications, and experience, along with a summary, and a section for education. It also includes a section for technical skills.
## Day 93-95: Where and How to Apply
Search for jobs on Indeed: https://indeed.com
Look for opportunities on LinkedIn: https://linkedin.com
## π Contributors
Thank you for being a part of the 90DaysOfCyberSecurity community! We appreciate everyone who helps improve our content.
### Contribution Categories:
- **Documentation**: Improve or add to the study material and guides.
- **Tutorials & Guides**: Create or enhance tutorials explaining complex concepts.
- **Suggested Resources**: Recommend useful tools, articles, books, or other resources.
- **Ideas / Topics**: Suggest new topics to be added to the learning materials.
- **Review & Feedback**: Provide feedback on existing materials and suggest improvements.
- **Community Support**: Answer questions and help others in discussions or issues.
- **Tests & Quizzes**: Add quizzes, challenges, or tests to check learning progress.
- **Real-World Applications**: Share real-life examples or case studies of cybersecurity practices.
- **Mentoring**: Help others with study advice, tips, or hosting study sessions.
Thank you to all contributors for your amazing work! π
## Contributors β¨
Thanks goes to these wonderful people ([emoji key](https://allcontributors.org/docs/en/emoji-key)):
<!-- ALL-CONTRIBUTORS-LIST:START - Do not remove or modify this section -->
<!-- prettier-ignore-start -->
<!-- markdownlint-disable -->
<table>
<tbody>
<tr>
<td align="center" valign="top" width="14.28%"><a href="https://github.com/farhanashrafdev"><img src="https://avatars.githubusercontent.com/u/53370109?v=4?s=100" width="100px;" alt="Farhan Ashraf"/><br /><sub><b>Farhan Ashraf</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=farhanashrafdev" title="Documentation">π</a></td>
<td align="center" valign="top" width="14.28%"><a href="https://github.com/Wanderer479"><img src="https://avatars.githubusercontent.com/u/189002484?v=4?s=100" width="100px;" alt="Wanderer479"/><br /><sub><b>Wanderer479</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=Wanderer479" title="Documentation">π</a></td>
<td align="center" valign="top" width="14.28%"><a href="https://github.com/MahadMuhammad"><img src="https://avatars.githubusercontent.com/u/95980383?v=4?s=100" width="100px;" alt="Muhammad Mahad"/><br /><sub><b>Muhammad Mahad</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=MahadMuhammad" title="Documentation">π</a></td>
<td align="center" valign="top" width="14.28%"><a href="https://github.com/andreluis-oliveira"><img src="https://avatars.githubusercontent.com/u/53203742?v=4?s=100" width="100px;" alt="AndrΓ© Oliveira"/><br /><sub><b>AndrΓ© Oliveira</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=andreluis-oliveira" title="Documentation">π</a></td>
<td align="center" valign="top" width="14.28%"><a href="https://github.com/ArbenP"><img src="https://avatars.githubusercontent.com/u/62248907?v=4?s=100" width="100px;" alt="arbenp"/><br /><sub><b>arbenp</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=ArbenP" title="Documentation">π</a> <a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/issues?q=author%3AArbenP" title="Bug reports">π</a></td>
</tr>
</tbody>
</table>
<!-- markdownlint-restore -->
<!-- prettier-ignore-end -->
<!-- ALL-CONTRIBUTORS-LIST:END -->
This project follows the [all-contributors](https://github.com/all-contributors/all-contributors) specification. Contributions of any kind welcome!
", Assign "at most 3 tags" to the expected json: {"id":"1948","tags":[]} "only from the tags list I provide: [{"id":77,"name":"3d"},{"id":89,"name":"agent"},{"id":17,"name":"ai"},{"id":54,"name":"algorithm"},{"id":24,"name":"api"},{"id":44,"name":"authentication"},{"id":3,"name":"aws"},{"id":27,"name":"backend"},{"id":60,"name":"benchmark"},{"id":72,"name":"best-practices"},{"id":39,"name":"bitcoin"},{"id":37,"name":"blockchain"},{"id":1,"name":"blog"},{"id":45,"name":"bundler"},{"id":58,"name":"cache"},{"id":21,"name":"chat"},{"id":49,"name":"cicd"},{"id":4,"name":"cli"},{"id":64,"name":"cloud-native"},{"id":48,"name":"cms"},{"id":61,"name":"compiler"},{"id":68,"name":"containerization"},{"id":92,"name":"crm"},{"id":34,"name":"data"},{"id":47,"name":"database"},{"id":8,"name":"declarative-gui "},{"id":9,"name":"deploy-tool"},{"id":53,"name":"desktop-app"},{"id":6,"name":"dev-exp-lib"},{"id":59,"name":"dev-tool"},{"id":13,"name":"ecommerce"},{"id":26,"name":"editor"},{"id":66,"name":"emulator"},{"id":62,"name":"filesystem"},{"id":80,"name":"finance"},{"id":15,"name":"firmware"},{"id":73,"name":"for-fun"},{"id":2,"name":"framework"},{"id":11,"name":"frontend"},{"id":22,"name":"game"},{"id":81,"name":"game-engine "},{"id":23,"name":"graphql"},{"id":84,"name":"gui"},{"id":91,"name":"http"},{"id":5,"name":"http-client"},{"id":51,"name":"iac"},{"id":30,"name":"ide"},{"id":78,"name":"iot"},{"id":40,"name":"json"},{"id":83,"name":"julian"},{"id":38,"name":"k8s"},{"id":31,"name":"language"},{"id":10,"name":"learning-resource"},{"id":33,"name":"lib"},{"id":41,"name":"linter"},{"id":28,"name":"lms"},{"id":16,"name":"logging"},{"id":76,"name":"low-code"},{"id":90,"name":"message-queue"},{"id":42,"name":"mobile-app"},{"id":18,"name":"monitoring"},{"id":36,"name":"networking"},{"id":7,"name":"node-version"},{"id":55,"name":"nosql"},{"id":57,"name":"observability"},{"id":46,"name":"orm"},{"id":52,"name":"os"},{"id":14,"name":"parser"},{"id":74,"name":"react"},{"id":82,"name":"real-time"},{"id":56,"name":"robot"},{"id":65,"name":"runtime"},{"id":32,"name":"sdk"},{"id":71,"name":"search"},{"id":63,"name":"secrets"},{"id":25,"name":"security"},{"id":85,"name":"server"},{"id":86,"name":"serverless"},{"id":70,"name":"storage"},{"id":75,"name":"system-design"},{"id":79,"name":"terminal"},{"id":29,"name":"testing"},{"id":12,"name":"ui"},{"id":50,"name":"ux"},{"id":88,"name":"video"},{"id":20,"name":"web-app"},{"id":35,"name":"web-server"},{"id":43,"name":"webassembly"},{"id":69,"name":"workflow"},{"id":87,"name":"yaml"}]" returns me the "expected json"