farhanashrafdev / 90DaysOfCyberSecurity
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md
AI Architecture Analysis
This repository is indexed by RepoMind. By analyzing farhanashrafdev/90DaysOfCyberSecurity in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.
Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.
Repository Summary (README)
Preview90-Day Cybersecurity Study Plan
<!-- ALL-CONTRIBUTORS-BADGE:START - Do not remove or modify this section --> <!-- ALL-CONTRIBUTORS-BADGE:END --><a href="https://trendshift.io/repositories/1948" target="_blank"><img src="https://trendshift.io/api/badge/repositories/1948" alt="farhanashrafdev%2F90DaysOfCyberSecurity | Trendshift" style="width: 250px; height: 55px;" width="250" height="55"/></a>
π Table of Contents
π Introduction
Welcome to the 90 Days of Cybersecurity challenge!
This repository provides a structured, 90-day self-paced study plan designed to help learners build a strong foundation in cybersecurity. Whether you're a beginner looking to break into the field or a professional aiming to sharpen your skills, this roadmap offers a wide range of curated resources, hands-on tasks, and learning materials.
The daily modules cover essential and advanced topics, including:
- Networking fundamentals (Network+)
- Security principles (Security+)
- Linux basics and shell scripting
- Python programming for security tasks
- Traffic analysis and packet inspection
- Version control with Git
- SIEM tools and log analysis using the ELK stack
- Cloud security with GCP, AWS and Azure
- Penetration testing and ethical hacking
Each day is designed with actionable tasks, tutorials, and reading materials to help you stay on track. For a full list of resources, refer to learn.md.
π― Goals and Audience
π Goals
The primary goal of this 90-day plan is to help learners:
- Build a solid foundation in core cybersecurity concepts and practices.
- Gain hands-on experience through daily exercises and real-world tools.
- Develop the technical skills necessary for certifications such as CompTIA Network+ and Security+.
- Explore key domains including network security, system hardening, cloud security, scripting, and ethical hacking.
- Cultivate a consistent learning habit over 90 days to support long-term retention and growth.
By the end of this journey, you should feel confident navigating a variety of cybersecurity tools, concepts, and techniques.
π₯ Intended Audience
This repository is ideal for:
- Aspiring cybersecurity professionals preparing for entry-level roles or certifications.
- IT professionals transitioning into a security-focused career.
- Students studying computer science, information systems, or network engineering.
- Self-learners seeking a structured and comprehensive study plan.
- Developers and DevOps engineers looking to better understand secure infrastructure and threat detection.
- Anyone curious about how cybersecurity works in real-world environments.
No prior experience is required, though basic familiarity with computers, networks, or programming will be helpful.
Day 1-7: Network+
- Watch videos from Professor Messer's N10-009 Playlist
- Complete any related practice questions or exercises.
Day 8-14: Security+
Strongly Recommend Professor Messer's:
- Watch the videos from Professor Messer's SY0-701 Playlist
Another Alternative You Can Use:
- Watch Pete Zerger's SY0-701 Playlist
Additional Practice:
- Complete any related practice questions or exercises.
Day 15-28: Linux
- Browse through the Linux Journey tutorials: https://linuxjourney.com/
- Complete Linux Unhatched on Cisco NetAcad: https://www.netacad.com/courses/linux-unhatched
- Complete all Linux Hands-on Labs on LabEx: https://labex.io/free-labs/linux
Day 29-42: Python
- Complete Codecademy's Learn Python Track: https://codecademy.com/learn/learn-python
- Python.org: https://www.python.org/
- Real Python: https://realpython.com/
- Talk Python to Me: https://talkpython.fm/
- Read "Learn Python the Hard Way": https://learnpythonthehardway.org
- HackerRank Python: https://www.hackerrank.com/domains/python
- LabEx Learn Python by Labs: https://labex.io/free-labs/python
Youtube Course:
Day 43-56: Traffic Analysis
- Take the Wireshark University course: https://www.wireshark.org/#educationalContent
- Follow the Wireshark Tutorial on guru99: https://guru99.com/wireshark-tutorial.html
- Read through the TCPdump Tutorial on DanielMiessler: https://danielmiessler.com/study/tcpdump/
- Read through the Suricata on pfSense guide: https://doc.pfsense.org/index.php/Suricata
Youtube:
- Wireshark Tutorial for Beginners series https://www.youtube.com/watch?v=NjvR4LmwcMU&list=PLBf0hzazHTGPgyxeEj_9LBHiqjtNEjsgt&pp=iAQB
- Suricata Network IDS/IPS https://www.youtube.com/watch?v=S0-vsjhPDN0&pp=ygUhIFN1cmljYXRhIElEUy9JUFMgU3lzdGVtIFR1dG9yaWFs
Day 57-63: Git
- Complete Codecademy's Git for Beginners course: https://codecademy.com/learn/learn-git
- Follow the Git Immersion tutorial: http://gitimmersion.com
- Try Git: https://try.github.io
- Use Learn Git Branching for an interactive Git CLI simulator.
Day 64-70: ELK
- Follow the ELK Stack Tutorial on Logz.io: https://logz.io/learn/complete-elk-stack-tutorial/
- Browse through the ELK Stack tutorials on Elastic: https://elastic.co/learn/elastic-stack
Day 71-77: Cloud Platforms
Any one of them works fine.
GCP:
- Explore the GCP Getting Started Resource : https://cloud.google.com/getting-started/
- Google Cloud Platform Documentation: https://cloud.google.com/docs/
- Google Cloud Platform Blog: https://cloud.google.com/blog/
- Google Cloud Platform Community: https://cloud.google.com/community/
- Try hands-on challenges with Google Cloud Skills Boost
AWS
- Explore the AWS Getting Started Resource Center: https://aws.amazon.com/getting-started/
- Browse through the AWS Tutorials: https://aws.amazon.com/tutorials/
- Learn through gamified labs on AWS Cloud Quest
Azure
- Go through Azure Fundamentals: https://learn.microsoft.com/en-us/training/azure/
- Complete the Microsoft Learn Azure labs with sandbox environments
Day 85-90: Hacking
- Try to hack the challenges on Hack the Box: https://hackthebox.com
- Practice on vulnerable machines on Vulnhub: https://vulnhub.com
Youtube:
- Ethical Hacking Part 1: https://www.youtube.com/watch?v=3FNYvj2U0HM&ab_channel=TheCyberMentor
- Ethical Hacking Part 2: https://www.youtube.com/watch?v=sH4JCwjybGs&ab_channel=TheCyberMentor
Day 91-92: One Page Resume
- Use the provided resume template: https://bowtiedcyber.substack.com/p/killer-cyber-resume-part-ii
- Cybersecurity Resume Template: https://www.indeed.com/career-advice/resumes-cover-letters/cybersecurity-resume
- Cybersecurity Resume from Resume-Now: https://www.resume-now.com/templates/cyber-security-resume This template also has sections for skills, certifications, and experience, along with a summary, and a section for education. It also includes a section for technical skills.
Day 93-95: Where and How to Apply
Search for jobs on Indeed: https://indeed.com Look for opportunities on LinkedIn: https://linkedin.com
π Contributors
Thank you for being a part of the 90DaysOfCyberSecurity community! We appreciate everyone who helps improve our content.
Contribution Categories:
- Documentation: Improve or add to the study material and guides.
- Tutorials & Guides: Create or enhance tutorials explaining complex concepts.
- Suggested Resources: Recommend useful tools, articles, books, or other resources.
- Ideas / Topics: Suggest new topics to be added to the learning materials.
- Review & Feedback: Provide feedback on existing materials and suggest improvements.
- Community Support: Answer questions and help others in discussions or issues.
- Tests & Quizzes: Add quizzes, challenges, or tests to check learning progress.
- Real-World Applications: Share real-life examples or case studies of cybersecurity practices.
- Mentoring: Help others with study advice, tips, or hosting study sessions.
Thank you to all contributors for your amazing work! π
Contributors β¨
Thanks goes to these wonderful people (emoji key):
<!-- ALL-CONTRIBUTORS-LIST:START - Do not remove or modify this section --> <!-- prettier-ignore-start --> <!-- markdownlint-disable --> <table> <tbody> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/farhanashrafdev"><img src="https://avatars.githubusercontent.com/u/53370109?v=4?s=100" width="100px;" alt="Farhan Ashraf"/><br /><sub><b>Farhan Ashraf</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=farhanashrafdev" title="Documentation">π</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/Wanderer479"><img src="https://avatars.githubusercontent.com/u/189002484?v=4?s=100" width="100px;" alt="Wanderer479"/><br /><sub><b>Wanderer479</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=Wanderer479" title="Documentation">π</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/MahadMuhammad"><img src="https://avatars.githubusercontent.com/u/95980383?v=4?s=100" width="100px;" alt="Muhammad Mahad"/><br /><sub><b>Muhammad Mahad</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=MahadMuhammad" title="Documentation">π</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/andreluis-oliveira"><img src="https://avatars.githubusercontent.com/u/53203742?v=4?s=100" width="100px;" alt="AndrΓ© Oliveira"/><br /><sub><b>AndrΓ© Oliveira</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=andreluis-oliveira" title="Documentation">π</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/ArbenP"><img src="https://avatars.githubusercontent.com/u/62248907?v=4?s=100" width="100px;" alt="arbenp"/><br /><sub><b>arbenp</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=ArbenP" title="Documentation">π</a> <a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/issues?q=author%3AArbenP" title="Bug reports">π</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/paduh"><img src="https://avatars.githubusercontent.com/u/20698595?v=4?s=100" width="100px;" alt="paduh"/><br /><sub><b>paduh</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=paduh" title="Documentation">π</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/emmanuel-ferdman"><img src="https://avatars.githubusercontent.com/u/35470921?v=4?s=100" width="100px;" alt="Emmanuel Ferdman"/><br /><sub><b>Emmanuel Ferdman</b></sub></a><br /><a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/issues?q=author%3Aemmanuel-ferdman" title="Bug reports">π</a> <a href="https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=emmanuel-ferdman" title="Documentation">π</a></td> </tr> </tbody> </table> <!-- markdownlint-restore --> <!-- prettier-ignore-end --> <!-- ALL-CONTRIBUTORS-LIST:END -->This project follows the all-contributors specification. Contributions of any kind welcome!