base on This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md # 90-Day Cybersecurity Study Plan <!-- ALL-CONTRIBUTORS-BADGE:START - Do not remove or modify this section --> [![All Contributors](https://img.shields.io/badge/all_contributors-7-orange.svg?style=flat-square)](#contributors-) <!-- ALL-CONTRIBUTORS-BADGE:END --> <a href="https://trendshift.io/repositories/1948" target="_blank"><img src="https://trendshift.io/api/badge/repositories/1948" alt="farhanashrafdev%2F90DaysOfCyberSecurity | Trendshift" style="width: 250px; height: 55px;" width="250" height="55"/></a> ## πŸ“š Table of Contents - [Introduction](#introduction) - [Goals and Audience](#goals-and-audience) - [Daily Breakdown](#daily-breakdown) - [Day 1-7: Network+ Concepts](#network+-concepts) - [Day 8-14: Security+ Concepts](#Security+-concepts) - [Day 15-28: Linux Tutorials](#linux-tutorials) - [Day 29-42: Python](#python) - [Day 43-56: Traffic Analysis](#traffic-analysis) - [Day 57-63: Git](#git) - [Day 64-70: ELK](#elk) - [Day 71-77: GCP or AWS or Azure ](#gcp-or-aws-or-azure) - [Day 85-90: Hacking](#hacking) - [Day 91-92: One Page Resume](#one-page-resume) - [Day 93-95: Where and How to Apply](#where-and-how-to-apply) - [Contributing](#contributing) ## πŸ“˜ Introduction Welcome to the **90 Days of Cybersecurity** challenge! This repository provides a structured, 90-day self-paced study plan designed to help learners build a strong foundation in cybersecurity. Whether you're a beginner looking to break into the field or a professional aiming to sharpen your skills, this roadmap offers a wide range of curated resources, hands-on tasks, and learning materials. The daily modules cover essential and advanced topics, including: - Networking fundamentals (Network+) - Security principles (Security+) - Linux basics and shell scripting - Python programming for security tasks - Traffic analysis and packet inspection - Version control with Git - SIEM tools and log analysis using the ELK stack - Cloud security with GCP, AWS and Azure - Penetration testing and ethical hacking Each day is designed with actionable tasks, tutorials, and reading materials to help you stay on track. For a full list of resources, refer to [`learn.md`](./learn.md). ## 🎯 Goals and Audience ### πŸ“Œ Goals The primary goal of this 90-day plan is to help learners: - Build a solid foundation in core cybersecurity concepts and practices. - Gain hands-on experience through daily exercises and real-world tools. - Develop the technical skills necessary for certifications such as CompTIA Network+ and Security+. - Explore key domains including network security, system hardening, cloud security, scripting, and ethical hacking. - Cultivate a consistent learning habit over 90 days to support long-term retention and growth. By the end of this journey, you should feel confident navigating a variety of cybersecurity tools, concepts, and techniques. ### πŸ‘₯ Intended Audience This repository is ideal for: - **Aspiring cybersecurity professionals** preparing for entry-level roles or certifications. - **IT professionals** transitioning into a security-focused career. - **Students** studying computer science, information systems, or network engineering. - **Self-learners** seeking a structured and comprehensive study plan. - **Developers and DevOps engineers** looking to better understand secure infrastructure and threat detection. - **Anyone curious** about how cybersecurity works in real-world environments. No prior experience is required, though basic familiarity with computers, networks, or programming will be helpful. ## Day 1-7: Network+ - Watch videos from Professor Messer's [N10-009 Playlist](https://youtube.com/playlist?list=PLG49S3nxzAnl_tQe3kvnmeMid0mjF8Le8&si=3rUsqmrdsNK3izh6) - Complete any related practice questions or exercises. ## Day 8-14: Security+ ### Strongly Recommend Professor Messer's: - Watch the videos from Professor Messer's [SY0-701 Playlist](https://www.youtube.com/watch?v=KiEptGbnEBc&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv) ### Another Alternative You Can Use: - Watch Pete Zerger's [SY0-701 Playlist](https://www.youtube.com/watch?v=1E7pI7PB4KI&list=PL7XJSuT7Dq_UDJgYoQGIW9viwM5hc4C7n) ### Additional Practice: - Complete any related practice questions or exercises. ## Day 15-28: Linux - Browse through the Linux Journey tutorials: https://linuxjourney.com/ - Complete Linux Unhatched on Cisco NetAcad: https://www.netacad.com/courses/linux-unhatched - Complete all Linux Hands-on Labs on LabEx: https://labex.io/free-labs/linux ## Day 29-42: Python - Complete Codecademy's Learn Python Track: https://codecademy.com/learn/learn-python - Python.org: https://www.python.org/ - Real Python: https://realpython.com/ - Talk Python to Me: https://talkpython.fm/ - Read "Learn Python the Hard Way": https://learnpythonthehardway.org - HackerRank Python: https://www.hackerrank.com/domains/python - LabEx Learn Python by Labs: https://labex.io/free-labs/python ### Youtube Course: - https://www.youtube.com/watch?v=egg-GoT5iVk&ab_channel=TheCyberMentor ## Day 43-56: Traffic Analysis - Take the Wireshark University course: https://www.wireshark.org/#educationalContent - Follow the Wireshark Tutorial on guru99: https://guru99.com/wireshark-tutorial.html - Read through the TCPdump Tutorial on DanielMiessler: https://danielmiessler.com/study/tcpdump/ - Read through the Suricata on pfSense guide: https://doc.pfsense.org/index.php/Suricata ### Youtube: - Wireshark Tutorial for Beginners series https://www.youtube.com/watch?v=NjvR4LmwcMU&list=PLBf0hzazHTGPgyxeEj_9LBHiqjtNEjsgt&pp=iAQB - Suricata Network IDS/IPS https://www.youtube.com/watch?v=S0-vsjhPDN0&pp=ygUhIFN1cmljYXRhIElEUy9JUFMgU3lzdGVtIFR1dG9yaWFs ## Day 57-63: Git - Complete Codecademy's Git for Beginners course: https://codecademy.com/learn/learn-git - Follow the Git Immersion tutorial: http://gitimmersion.com - Try Git: https://try.github.io - Use [Learn Git Branching](https://learngitbranching.js.org/) for an interactive Git CLI simulator. ## Day 64-70: ELK - Follow the ELK Stack Tutorial on Logz.io: [https://logz.io/learn/complete-elk-stack-tutorial/](https://logz.io/learn/complete-guide-elk-stack/) - Browse through the ELK Stack tutorials on Elastic: [https://elastic.co/learn/elastic-stack](https://www.elastic.co/elastic-stack/features) ## Day 71-77: Cloud Platforms ## Any one of them works fine. ### GCP: - Explore the GCP Getting Started Resource : https://cloud.google.com/getting-started/ - Google Cloud Platform Documentation: https://cloud.google.com/docs/ - Google Cloud Platform Blog: https://cloud.google.com/blog/ - Google Cloud Platform Community: https://cloud.google.com/community/ - Try hands-on challenges with [Google Cloud Skills Boost](https://www.cloudskillsboost.google) ### AWS - Explore the AWS Getting Started Resource Center: https://aws.amazon.com/getting-started/ - Browse through the AWS Tutorials: https://aws.amazon.com/tutorials/ - Learn through gamified labs on [AWS Cloud Quest](https://aws.amazon.com/training/digital/aws-cloud-quest/) ### Azure - Go through Azure Fundamentals: https://learn.microsoft.com/en-us/training/azure/ - Complete the [Microsoft Learn Azure labs](https://learn.microsoft.com/en-us/training/paths/azure-fundamentals/) with sandbox environments ## Day 85-90: Hacking - Try to hack the challenges on Hack the Box: https://hackthebox.com - Practice on vulnerable machines on Vulnhub: https://vulnhub.com ### Youtube: - Ethical Hacking Part 1: https://www.youtube.com/watch?v=3FNYvj2U0HM&ab_channel=TheCyberMentor - Ethical Hacking Part 2: https://www.youtube.com/watch?v=sH4JCwjybGs&ab_channel=TheCyberMentor ## Day 91-92: One Page Resume - Use the provided resume template: https://bowtiedcyber.substack.com/p/killer-cyber-resume-part-ii - Cybersecurity Resume Template: https://www.indeed.com/career-advice/resumes-cover-letters/cybersecurity-resume - Cybersecurity Resume from Resume-Now: [https://www.resume-now.com/templates/cyber-security-resume](https://www.resume-now.com/cv/templates/data-systems-administration/cyber-security-specialist) This template also has sections for skills, certifications, and experience, along with a summary, and a section for education. It also includes a section for technical skills. ## Day 93-95: Where and How to Apply Search for jobs on Indeed: https://indeed.com Look for opportunities on LinkedIn: https://linkedin.com ## πŸŽ‰ Contributors Thank you for being a part of the 90DaysOfCyberSecurity community! We appreciate everyone who helps improve our content. ### Contribution Categories: - **Documentation**: Improve or add to the study material and guides. - **Tutorials & Guides**: Create or enhance tutorials explaining complex concepts. - **Suggested Resources**: Recommend useful tools, articles, books, or other resources. - **Ideas / Topics**: Suggest new topics to be added to the learning materials. - **Review & Feedback**: Provide feedback on existing materials and suggest improvements. - **Community Support**: Answer questions and help others in discussions or issues. - **Tests & Quizzes**: Add quizzes, challenges, or tests to check learning progress. - **Real-World Applications**: Share real-life examples or case studies of cybersecurity practices. - **Mentoring**: Help others with study advice, tips, or hosting study sessions. Thank you to all contributors for your amazing work! πŸŽ‰ ## Contributors ✨ Thanks goes to these wonderful people ([emoji key](https://allcontributors.org/docs/en/emoji-key)): <!-- ALL-CONTRIBUTORS-LIST:START - Do not remove or modify this section --> <!-- prettier-ignore-start --> <!-- markdownlint-disable --> <table> <tbody> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/farhanashrafdev"><img src="https://avatars.githubusercontent.com/u/53370109?v=4?s=100" width="100px;" alt="Farhan Ashraf"/><br /><sub><b>Farhan Ashraf</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=farhanashrafdev" title="Documentation">πŸ“–</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/Wanderer479"><img src="https://avatars.githubusercontent.com/u/189002484?v=4?s=100" width="100px;" alt="Wanderer479"/><br /><sub><b>Wanderer479</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=Wanderer479" title="Documentation">πŸ“–</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/MahadMuhammad"><img src="https://avatars.githubusercontent.com/u/95980383?v=4?s=100" width="100px;" alt="Muhammad Mahad"/><br /><sub><b>Muhammad Mahad</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=MahadMuhammad" title="Documentation">πŸ“–</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/andreluis-oliveira"><img src="https://avatars.githubusercontent.com/u/53203742?v=4?s=100" width="100px;" alt="AndrΓ© Oliveira"/><br /><sub><b>AndrΓ© Oliveira</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=andreluis-oliveira" title="Documentation">πŸ“–</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/ArbenP"><img src="https://avatars.githubusercontent.com/u/62248907?v=4?s=100" width="100px;" alt="arbenp"/><br /><sub><b>arbenp</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=ArbenP" title="Documentation">πŸ“–</a> <a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/issues?q=author%3AArbenP" title="Bug reports">πŸ›</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/paduh"><img src="https://avatars.githubusercontent.com/u/20698595?v=4?s=100" width="100px;" alt="paduh"/><br /><sub><b>paduh</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=paduh" title="Documentation">πŸ“–</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/emmanuel-ferdman"><img src="https://avatars.githubusercontent.com/u/35470921?v=4?s=100" width="100px;" alt="Emmanuel Ferdman"/><br /><sub><b>Emmanuel Ferdman</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/issues?q=author%3Aemmanuel-ferdman" title="Bug reports">πŸ›</a> <a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=emmanuel-ferdman" title="Documentation">πŸ“–</a></td> </tr> </tbody> </table> <!-- markdownlint-restore --> <!-- prettier-ignore-end --> <!-- ALL-CONTRIBUTORS-LIST:END --> This project follows the [all-contributors](https://github.com/all-contributors/all-contributors) specification. Contributions of any kind welcome! ", Assign "at most 3 tags" to the expected json: {"id":"1948","tags":[]} "only from the tags list I provide: [{"id":77,"name":"3d"},{"id":89,"name":"agent"},{"id":17,"name":"ai"},{"id":54,"name":"algorithm"},{"id":24,"name":"api"},{"id":44,"name":"authentication"},{"id":3,"name":"aws"},{"id":27,"name":"backend"},{"id":60,"name":"benchmark"},{"id":72,"name":"best-practices"},{"id":39,"name":"bitcoin"},{"id":37,"name":"blockchain"},{"id":1,"name":"blog"},{"id":45,"name":"bundler"},{"id":58,"name":"cache"},{"id":21,"name":"chat"},{"id":49,"name":"cicd"},{"id":4,"name":"cli"},{"id":64,"name":"cloud-native"},{"id":48,"name":"cms"},{"id":61,"name":"compiler"},{"id":68,"name":"containerization"},{"id":92,"name":"crm"},{"id":34,"name":"data"},{"id":47,"name":"database"},{"id":8,"name":"declarative-gui "},{"id":9,"name":"deploy-tool"},{"id":53,"name":"desktop-app"},{"id":6,"name":"dev-exp-lib"},{"id":59,"name":"dev-tool"},{"id":13,"name":"ecommerce"},{"id":26,"name":"editor"},{"id":66,"name":"emulator"},{"id":62,"name":"filesystem"},{"id":80,"name":"finance"},{"id":15,"name":"firmware"},{"id":73,"name":"for-fun"},{"id":2,"name":"framework"},{"id":11,"name":"frontend"},{"id":22,"name":"game"},{"id":81,"name":"game-engine "},{"id":23,"name":"graphql"},{"id":84,"name":"gui"},{"id":91,"name":"http"},{"id":5,"name":"http-client"},{"id":51,"name":"iac"},{"id":30,"name":"ide"},{"id":78,"name":"iot"},{"id":40,"name":"json"},{"id":83,"name":"julian"},{"id":38,"name":"k8s"},{"id":31,"name":"language"},{"id":10,"name":"learning-resource"},{"id":33,"name":"lib"},{"id":41,"name":"linter"},{"id":28,"name":"lms"},{"id":16,"name":"logging"},{"id":76,"name":"low-code"},{"id":90,"name":"message-queue"},{"id":42,"name":"mobile-app"},{"id":18,"name":"monitoring"},{"id":36,"name":"networking"},{"id":7,"name":"node-version"},{"id":55,"name":"nosql"},{"id":57,"name":"observability"},{"id":46,"name":"orm"},{"id":52,"name":"os"},{"id":14,"name":"parser"},{"id":74,"name":"react"},{"id":82,"name":"real-time"},{"id":56,"name":"robot"},{"id":65,"name":"runtime"},{"id":32,"name":"sdk"},{"id":71,"name":"search"},{"id":63,"name":"secrets"},{"id":25,"name":"security"},{"id":85,"name":"server"},{"id":86,"name":"serverless"},{"id":70,"name":"storage"},{"id":75,"name":"system-design"},{"id":79,"name":"terminal"},{"id":29,"name":"testing"},{"id":12,"name":"ui"},{"id":50,"name":"ux"},{"id":88,"name":"video"},{"id":20,"name":"web-app"},{"id":35,"name":"web-server"},{"id":43,"name":"webassembly"},{"id":69,"name":"workflow"},{"id":87,"name":"yaml"}]" returns me the "expected json"