└── README.md /README.md: -------------------------------------------------------------------------------- 1 | # Hacker Roadmap 2 | 3 | Are you ready to embark on an electrifying journey into the depths of cybersecurity? Whether you're eyeing a prestigious certification, gearing up for a Bachelor's degree, or simply indulging your insatiable curiosity, this roadmap is your ultimate guide to becoming a true hacking virtuoso. But before we dive into the nitty-gritty, let's set the stage. Are you in it for the thrill, the challenge, or perhaps envisioning a career at the cutting edge of cyber defense? Your motivations will shape the path ahead, so let's chart a course tailored precisely to your aspirations. 4 | 5 | | Roadmap Type | Path Information | 6 | | ------------ | --------------------- | 7 | | [Hobbyist Hackers](#Hobbyist-Hackers) | Ideal for dipping your toe into the cybersecurity world, mastering basics and honing skills | 8 | | [Cyber Expressway](#Cyber-Expressway) | Begin cybersecurity journey as quickly as possible, join cybersecurity role in under 10 months | 9 | | [Bug Bounty Hunter](#Bug-Bounty-Hunter) | Discover the steps to become a bug bounty hunter and secure your first bounty. | 10 | | [Certification Seekers](#Certification-Seekers) | Gain knowledge, invest time for deeper understanding, ideal for advancement in cybersecurity | 11 | | [Degree Pursuers](#Degree-Pursuers) | Refine skills for optimal cybersecurity training, explore paths & more ---> (GAIN CYBERSECURITY DEGREE) | 12 | 13 |
14 | 15 |

16 | 17 | 18 | 19 | 20 |

21 | 22 |
23 | 24 | 25 | 26 |
27 | 28 | 29 | PS: While I offer this content for free, I include some referral links. They let you support the project without any downside for you. Enjoy the content and feel free to share it with your friends! 30 | 31 | ## Access My Additional Hacking Resources 32 | 33 | https://hacking-notes.com 34 | 35 | - Explore my Red Team hacking notes, your go-to resource for defending against cyber threats with steadfast determination and state-of-the-art strategies. ---> RedTeam Notes 36 | 37 | - Explore my Blue Team hacking notes, your go-to resource for defending against cyber threats with steadfast determination and state-of-the-art strategies. ---> BlueTeam Notes 38 | 39 | - Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features for an improved browsing experience. ---> Chrome Extension 40 | 41 | - Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delivers customized features for a seamless browsing journey. ---> Bookmarks 42 | 43 | 44 | 45 | ## Roadmap for Hobbyist Hackers 46 | 47 | ![bigh](https://github.com/Hacking-Notes/Hacker-Roadmap/assets/118412415/f6398210-e36e-492c-95be-2a138069f05f) 48 | 49 | Are you someone who's delving into the realm of hacking as a hobby, eager to explore and gain expertise for the sheer thrill of it? If so, then the journey from being a mere novice, often referred to as a "script kiddie," to evolving into a proficient hacker can be facilitated by following the steps outlined below. These steps will direct you towards the necessary resources and knowledge that will help you hone your skills and transform you into a knowledgeable practitioner in the field of hacking. 50 | 51 | #### Step 1: Learn the Basics on [TryHackMe](https://tryhackme.com/signup?referrer=630a8d48aa25650060a8f62d) 52 | - **Objective:** Build a foundational understanding of hacking concepts and techniques in a guided environment. 53 | - **Actions:** 54 | - [ ] Sign up for a [TryHackMe account](https://tryhackme.com/signup?referrer=630a8d48aa25650060a8f62d). 55 | - Complete introductory rooms and pathways to learn about topics such as: 56 | - [ ] [The complete beginner path](https://tryhackme.com/path/outline/beginner?referrer=630a8d48aa25650060a8f62d) 57 | - [ ] [Introduction to Cyber Security](https://tryhackme.com/path/outline/introtocyber?referrer=630a8d48aa25650060a8f62d) 58 | - [ ] [Webs Fondamentals](https://tryhackme.com/path/outline/web?referrer=630a8d48aa25650060a8f62d) 59 | - [ ] [Red Teaming](https://tryhackme.com/path/outline/redteaming?referrer=630a8d48aa25650060a8f62d) 60 | - [ ] [Jr Penetration Tester](https://tryhackme.com/path/outline/jrpenetrationtester?referrer=630a8d48aa25650060a8f62d) 61 | - **Explanation:** TryHackMe offers beginner-friendly content that covers essential topics, making it an ideal starting point for those new to hacking. 62 | 63 | --- --- 64 | 65 | #### Step 2: Enroll in [Port Swigger Academy](https://portswigger.net/web-security/dashboard) 66 | - **Objective:** Deepen your understanding of web pentesting techniques and tools. 67 | - **Actions:** 68 | - [ ] Explore the courses available on Burp Suite Academy. 69 | - [ ] Complete courses covering topics such as: 70 | - [ ] Web application security fundamentals 71 | - [ ] Using Burp Suite for web pentesting 72 | - [ ] Advanced web exploitation techniques 73 | - **Explanation:** Burp Suite Academy offers comprehensive courses specifically focused on web pentesting, including both theoretical knowledge and practical exercises. This will enhance your ability to identify and exploit vulnerabilities in web applications. 74 | 75 | --- --- 76 | 77 | #### Step 3: Practice Hands-On Challenges on Hack The Box (More Advance) 78 | - **Objective:** Gain practical experience by solving real-world hacking challenges in an unguided environment. 79 | - **Actions:** 80 | - [ ] Register on [Hack The Box platform](https://app.hackthebox.com/invite). 81 | - [ ] Attempt beginner-friendly machines to apply the knowledge gained from TryHackMe. 82 | - [ ] Progress to more challenging machines as skills improve. 83 | - **Explanation:** Hack The Box provides a platform for honing your skills through hands-on experience with realistic scenarios. Unlike TryHackMe, it doesn't offer guided pathways, which encourages independent problem-solving and critical thinking. 84 | 85 | --- --- 86 | 87 | #### Step 4: Continuously Expand Knowledge and Skills 88 | - **Objective:** Stay updated with the latest trends, techniques, and tools in the field of hacking. 89 | - **Actions:** 90 | - Participate in online forums and communities (e.g., Reddit's r/hacking, Hack Forums) to engage with other hackers and learn from their experiences. 91 | - Follow security blogs, podcasts, and YouTube channels to keep abreast of new developments and insights. 92 | - Regularly challenge yourself with new hacking tasks, puzzles, and CTF (Capture The Flag) competitions. 93 | - **Explanation:** Hacking is a dynamic field, and continuous learning is essential to stay relevant and proficient. By actively engaging with the hacking community and exploring new challenges, you'll continue to refine your skills and expand your knowledge base. 94 | 95 | --- --- 96 | 97 | #### Step 5: CTF / Bug Bounty 98 | - **Capture The Flag (CTF) Competitions:** 99 | - Join online CTF platforms such as Hack The Box, OverTheWire, or picoCTF. 100 | - Participate in both beginner and advanced CTF challenges to apply your knowledge and problem-solving skills. 101 | - Collaborate with other participants or teams to tackle more complex challenges and learn from each other's approaches. 102 | - Analyze the solutions and write-ups of challenges you couldn't solve to understand different techniques and strategies. 103 | 104 | --- --- 105 | 106 | - **Bug Bounty Programs:** 107 | - [ ] Register on bug bounty platforms like HackerOne, Bugcrowd, or Synack. 108 | - Browse available programs and identify those aligned with your expertise and interests, such as web application testing, mobile application testing, or network penetration testing. 109 | - Ethically report security vulnerabilities you discover in the targets specified by bug bounty programs. 110 | - Follow the guidelines provided by each program regarding vulnerability disclosure, severity assessment, and reward eligibility. 111 | - Continuously monitor the platforms for new programs and updates, as well as feedback on your submissions. 112 | 113 | 114 | ## Roadmap for Cyber Expressway 115 | 116 | ![bige](https://github.com/Hacking-Notes/Hacker-Roadmap/assets/118412415/6b058744-7c4c-47ee-b1de-ce7a261d67d5) 117 | 118 | Are you seeking to quickly establish yourself in the world of Cybersecurity/Pentesting? I've crafted a rapid roadmap, inspired by Tyler Rambser, to guide you toward a job in this field within the next 10 months. Keep in mind, while there are no guarantees, these steps offer the best available information to position you at the forefront of pentesting roles. 119 | 120 | ▶️ Access identical information through an interactive video: [Tyler Ramsbey - Youtube](https://www.youtube.com/watch?v=IWx88uvfKbA) 121 | 122 | #### 1. **TCM Security | Practical Ethical Hacker course (About 2 months):** 123 | - [ ] Join TCM Security by completing the registration process. 124 | - [ ] Obtain access through a subscription plan. 125 | - Complete the following courses 126 | - [ ] [Practical Ethical Hacking](https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course) 127 | - [ ] [Practical-web-hacking](https://academy.tcm-sec.com/p/practical-web-hacking) **(OPTIONAL)** 128 | 129 | --- --- 130 | 131 | #### 2. **Hack the Box | Pentest pathway (About 2-3 months):** 132 | - [ ] Sign up via [Hack the Box Academy](https://referral.hackthebox.com/mz8mcbX) platform. 133 | - [ ] Acquire credits for course enrollment and procure a voucher. 134 | - Complete the following courses 135 | - [ ] [Penetration Tester](https://academy.hackthebox.com/paths/jobrole) 136 | 137 | --- --- 138 | 139 | #### 3. **OSCP | PEN-200: Penetration Testing with Kali Linux(About 3 months):** 140 | This certification serves as a gold standard in cybersecurity and often bypasses many HR screening processes. 141 | - [ ] Enroll in the Offensive Security website for the [PEN-200 course](https://www.offsec.com/courses/pen-200/). 142 | - [ ] Purchase the 90-day lab access package. 143 | - [ ] Study course materials and Kali Linux documentation. 144 | - [ ] Practice in the lab environment, exploiting vulnerabilities. 145 | - [ ] Prepare for the exam with thorough review and practice. 146 | - [ ] Schedule and take the exam. 147 | - [ ] Successfully complete the exam. 148 | 149 | --- --- 150 | 151 | #### 4. **Search and Find CVE's:** 152 | Uncovering vulnerabilities within diverse open-source projects is a rewarding endeavor, and it's not as daunting as one might expect. Including CVE discoveries in your curriculum distinguishes you from peers with similar certifications, demonstrating to future employers your ability to apply learned skills effectively. 153 | - [ ] View the following video [Tyler Ramsbey - Youtube](https://www.youtube.com/watch?v=2VB4Zd5C8N8) 154 | 155 | --- --- 156 | 157 | Additional perk: Receive assistance with your resume and engage in a conversation with an ethical hacker at no cost or contribute as you wish and donate to a charity of your choosing. Just join the [Discord server](https://discord.gg/r68ameNHrD) and arrange your appointment. 158 | 159 | 160 | 161 | ## Roadmap for Bug Bounty Hunter 162 | 163 | ![326617819-6b058744-7c4c-47ee-b1de-ce7a261d67d5 (1) (1)](https://github.com/user-attachments/assets/908694d7-1a2c-4f0c-a614-17d9e48c2301) 164 | 165 | Bug bounty hunting is a constantly evolving field where participants are continuously learning and adapting as they progress. There isn’t a specific milestone or achievement that indicates you’re ready to start finding bugs, which can make it challenging for newcomers to navigate, especially without a clear path to follow. 166 | 167 | This roadmap is designed to help you build a strong foundation in bug bounty hunting and gradually move on to more profitable programs with higher payouts. 168 | 169 | ### 1. **The Mindset of a Bug Bounty Hunter and Continuous Learning** 170 | 171 | Before diving into the technical aspects, it's essential to adopt the right mindset. Bug bounty hunting requires perseverance, creativity, and a never-give-up attitude. The "hacker mindset" is all about approaching problems with curiosity and determination. You’ll face many challenges and failures, but each setback is an opportunity to learn and improve. 172 | 173 | **Understanding Code and Learning Continuously** 174 | 175 | Understanding how code works is crucial, though you don’t necessarily need to be an expert coder. What’s more important is knowing how to analyze and manipulate code to find vulnerabilities. While learning to code can enhance your ability to understand and exploit vulnerabilities effectively, the focus should be on understanding the application’s behavior and how to identify potential weaknesses. 176 | 177 | Bug bounty hunting is a field with no fixed endpoint of knowledge. New vulnerabilities and techniques are constantly emerging, so continuous learning is vital. Commit to exploring new research, following experts, and engaging with the community to stay updated. Join forums, [discords](https://discord.gg/bugbounty), watch YouTube channels, and participate in discussions to enhance your skills and knowledge regularly. 178 | 179 | ### 2. **Building a Strong Foundation** 180 | 181 | If you're new to IT, start by building a solid foundation in basic IT and web application concepts. This will make your journey much smoother. Understanding web technologies, how websites are structured, and how data flows between clients and servers is crucial. Familiarize yourself with HTML, JavaScript, HTTP, and other core web technologies. 182 | 183 | **Basic Knowledge You Should Acquire:** 184 | - **Networking:** Understanding TCP/IP, DNS, and HTTP protocols. 185 | - **Web Technologies:** Basics of HTML, JavaScript, CSS, and server-side languages. 186 | - **Common Vulnerabilities:** Familiarize yourself with the OWASP Top Ten, which covers the most critical security risks to web applications. 187 | 188 | You can acquire this knowledge for free on TryHackMe. (Skip this if you already have the foundational skills mentioned.) 189 | 190 | **Step 1:** Register on [Tryhackme](https://tryhackme.com/) 191 | - **Objective:** Get the initial IT and web app knowledge 192 | - **Actions:** Complete the following courses 193 | - [ ] [Complete Beginner](https://tryhackme.com/path/outline/beginner) 194 | - [ ] [Web Fundamentals](https://tryhackme.com/path/outline/web) 195 | - Feel free to explore additional topics if you wish. 196 | 197 | ### 3. **Selecting and Exploring a Bug Bounty Program** 198 | 199 | Choosing the right bug bounty program is crucial for your success. Instead of diving into high-profile programs like Facebook or Google right away, it's best to start with platforms that have a lower barrier to entry, such as OpenBugBounty. These platforms are less competitive and provide a better learning environment for beginners. 200 | 201 | When selecting a program, look for one that interests you and has a broad scope, including multiple URLs and functionalities like login features, purchasing options, or search capabilities. A well-chosen program will offer plenty of opportunities for exploration and learning. 202 | 203 | It's also important to thoroughly read and understand the program's policies before you begin. Knowing the rules will help you stay within legal boundaries and focus your efforts on areas that are most likely to yield results. 204 | 205 | **Step 1:** Register on [OpenBugBounty](https://www.openbugbounty.org/) 206 | - **Objective:** Research a program that you find interesting and have a decent scope (Multiples URLs, and functionalities) 207 | - **Actions:** 208 | - [ ] Explore the available programs inside OpenBugBounty. 209 | - [ ] Select a program. 210 | 211 | **Step 2:** Enroll in [PortSwigger Academy](https://portswigger.net/web-security/dashboard) 212 | - **Objective:** Enhance your web pentesting skills. 213 | - **Actions:** 214 | - [ ] Explore the courses available on Burp Suite Academy. 215 | - [ ] Explore the following [paths](https://portswigger.net/web-security/all-topics) and start with what seems to you the most interesting: 216 | - [ ] Server-side vulnerabilities 217 | - [ ] Cross-site scripting (XSS) 218 | - [ ] File upload vulnerabilities 219 | - [ ] Clickjacking (UI redressing) 220 | - [ ] Path traversal 221 | - [ ] Server-side request forgery (SSRF) attacks 222 | - [ ] Cross-site request forgery (CSRF) 223 | - [ ] Cross-origin resource sharing (CORS) 224 | - [ ] API testing 225 | - [ ] Web cache deception 226 | - [ ] SQL injection 227 | - [ ] NoSQL injection 228 | - [ ] Authentication vulnerabilities 229 | - [ ] WebSockets vulnerabilities 230 | - [ ] ... 231 | - Apply what you learn directly to your selected program. 232 | 233 | ### 4. **Phases of Bug Bounty Hunting** 234 | 235 | Bug bounty hunting involves several key phases, each requiring a different skill set: 236 | 237 | - **Reconnaissance:** Gathering information about your target. This phase involves mapping out the attack surface and identifying potential entry points. 238 | - **Scanning:** Using tools to automate the process of finding vulnerabilities. Tools like Nmap, Burp Suite, and others can help you identify weaknesses in the target application. 239 | - **Exploitation:** Once a vulnerability is found, the next step is to exploit it to understand its impact fully. This phase requires creativity and a deep understanding of the underlying technologies. 240 | - **Reporting:** The final phase involves documenting your findings and submitting a clear, concise report. A well-written report can make the difference between a successful submission and one that is rejected or deemed low priority. 241 | 242 | ### 5. **Starting Small and Progressing** 243 | 244 | **Starting with the Easiest Bugs** 245 | 246 | As a beginner, focus on finding the easiest bugs first. These are typically low-hanging fruit that are more common and easier to identify. Here are a few examples: 247 | 248 | - **Cross-Site Scripting (XSS):** Injecting malicious scripts into web pages viewed by others. 249 | - **Security Misconfigurations:** Issues like unnecessary services being enabled or default accounts being left active. 250 | - **Insecure Direct Object References (IDOR):** Accessing unauthorized data by manipulating the input in the URL. 251 | 252 | Starting with these easier bugs helps build confidence and hone your skills for tackling more complex vulnerabilities later on. 253 | 254 | **Progression Roadmap** 255 | 256 | Progression in bug bounty hunting should be gradual and deliberate. Here’s a suggested roadmap: 257 | 258 | 1. **Start Small:** Begin with simple vulnerabilities and smaller programs. Focus on platforms with less competition, like OpenBugBounty. 259 | 2. **Build Your Skills:** Use resources like PortSwigger Academy to deepen your understanding of web security. 260 | 3. **Increase Complexity:** As you gain experience, tackle more complex vulnerabilities and move to larger, more lucrative programs. 261 | 4. **Stay Updated:** Constantly learn and adapt to new security trends and techniques. 262 | 5. **Collaborate:** Partner with other hunters to expand your skill set and discover more bugs. 263 | 264 | ### 6. **The Importance of Collaboration** 265 | 266 | Collaborating with others in the bug bounty community can significantly boost your progress. Working with more experienced hunters allows you to learn new techniques, share tools, and even co-author reports. The collective knowledge of a team can uncover bugs that you might have missed working alone. 267 | 268 | Joining forums, participating in Capture the Flag (CTF) competitions, and engaging in community events are great ways to meet other hunters and start collaborating. 269 | 270 | ### 7. **Time Management and Setting Realistic Expectations** 271 | 272 | Effective time management is crucial in bug bounty hunting. The pursuit of finding vulnerabilities can be time-consuming and challenging, so it's essential to set realistic goals and manage your time wisely. Here are some tips to help you stay on track: 273 | 274 | - **Set Clear Goals:** Define specific objectives for each session, such as identifying a certain number of potential vulnerabilities or completing a particular phase of the reconnaissance. 275 | - **Establish Time Limits:** Allocate specific time blocks for tasks and stick to them. This helps prevent burnout and keeps you focused on the most critical aspects of your work. 276 | - **Track Your Progress:** Regularly review what you’ve accomplished and adjust your goals as needed. Keeping a record of your efforts helps maintain motivation and provides insights into your progress. 277 | 278 | **Setting Realistic Expectations** 279 | 280 | It’s important to understand that finding your first bug can take time, often weeks or even months. Persistence and patience are key. Here’s how to manage your expectations effectively: 281 | 282 | - **Accept the Learning Curve:** Understand that bug bounty hunting involves a significant learning curve. Each challenge you encounter is an opportunity to improve your skills and knowledge. 283 | - **Celebrate Small Victories:** Recognize and celebrate even minor successes. Each small find or lesson learned contributes to your overall growth as a bug bounty hunter. 284 | - **Be Prepared for Setbacks:** Not every attempt will result in a bug or reward. View setbacks as part of the learning process and a chance to refine your approach. 285 | 286 | By combining effective time management with realistic expectations, you’ll be better equipped to handle the ups and downs of bug bounty hunting, stay motivated, and continue making progress. 287 | 288 | 289 | ## Roadmap for Certification Seekers 290 | 291 | ![bigc](https://github.com/Hacking-Notes/Hacker-Roadmap/assets/118412415/cdd82e73-a86b-44c2-9cc6-c0e8ee3cfcda) 292 | 293 | Certifications in cybersecurity and hacking provide structured learning paths and validate skills, ranging from foundational IT knowledge to advanced penetration testing and defensive strategies. They offer credibility within the industry and demonstrate practical expertise, enhancing job opportunities and earning potential. However, they should be complemented by practical experience and continuous learning to stay updated in this rapidly evolving field. 294 | 295 | --- --- 296 | 297 | | Start with Basic IT Skills (A+) | Image | 298 | | ------------------------------------- | ----- | 299 | 300 | - CompTIA A+ Certification: This certification covers foundational IT skills, including hardware, software, networking, and troubleshooting. 301 | - [ ] Purchase Comptia A+ voucher (2X, core 1 & core 2) ---> [Discount Website](https://getcertified4less.com/search.php?search_query=a%2B) 302 | - [ ] Study for Comptia A+ core 1 303 | - Learning ressource 304 | - Studing: [Professor Messer](https://www.professormesser.com/free-a-plus-training/220-1101/220-1101-video/220-1101-training-course/) 305 | - [ ] Successfully complete the exam (A+ Core 1) 306 | 307 | - Learning ressource 308 | - Studing: [Professor Messer](https://www.professormesser.com/free-a-plus-training/220-1102/220-1102-video/220-1102-training-course/) 309 | - [ ] Successfully complete the exam (A+ Core 2) 310 | 311 | --- --- 312 | 313 | | Linux Fundamentals (Linux Essential) | Image | 314 | | ------------------------------------- | ----- | 315 | 316 | - Linux Essentials (LPI): Gain essential knowledge of Linux operating system fundamentals, commands, and basic administration. 317 | - [ ] Purchase LPI Linux Essential voucher ---> [LPI Linux Essential Website](https://us.lpimarketplace.com/shop/linux-essentials) 318 | - [ ] Study for LPI Linux Essential 319 | - Learning ressource 320 | - Studing: [Shawn Powers](https://www.youtube.com/watch?v=skTShEHyXfo&list=PL78ppT-_wOmvlYSfyiLvkrsZTdQJ7A24L) 321 | - [ ] Successfully complete the exam 322 | 323 | --- --- 324 | 325 | | Build Networking Knowledge (Network+) | Image | 326 | | ------------------------------------- | ----- | 327 | 328 | - CompTIA Network+ Certification: Focuses on networking concepts, infrastructure, operations, and security. 329 | - [ ] Purchase Comptia Network+ voucher ---> [Discount Website](https://getcertified4less.com/search.php?search_query=network%2B) 330 | - [ ] Study for Comptia Network+ 331 | - Learning ressource 332 | - Studing: [Professor Messer](https://www.professormesser.com/network-plus/n10-008/n10-008-video/n10-008-training-course/) 333 | - [ ] Successfully complete the exam 334 | 335 | --- --- 336 | 337 | | Learn Cybersecurity Fundamentals (Security+) | Image | 338 | | ------------------------------------- | ----- | 339 | 340 | - Attain CompTIA Security+ Certification: Provides essential knowledge in network security, compliance, threats, and vulnerabilities. 341 | - [ ] Purchase Comptia Security+ voucher ---> [Discount Website](https://getcertified4less.com/search.php?search_query=security%2B) 342 | - [ ] Study for Comptia Security+ 343 | - Learning ressource 344 | - Studing: [Professor Messer](https://www.professormesser.com/security-plus/sy0-701/sy0-701-video/sy0-701-comptia-security-plus-course/) 345 | - [ ] Successfully complete the exam 346 | 347 | --- --- 348 | 349 | | Specialize in Penetration Testing (Pentest+) | Image | 350 | | ------------------------------------- | ----- | 351 | 352 | - Pursue CompTIA PenTest+ Certification: Focuses on penetration testing and vulnerability assessment skills, essential for offensive security roles. 353 | - [ ] Purchase Comptia Pentest+ voucher ---> [Discount Website](https://getcertified4less.com/search.php?search_query=pentest%2B) 354 | - [ ] Study for Comptia Pentest+ 355 | - Learning ressource 356 | - Studying: [ACI Learning](https://www.acilearning.com/products/itpro/) 357 | - [ ] Successfully complete the exam 358 | 359 | --- --- 360 | 361 | | Enhance Cyber Defense Skills (CySa+) | Image | 362 | | ------------------------------------- | ----- | 363 | 364 | - Obtain CompTIA Cybersecurity Analyst (CySA+) Certification: Develop skills in threat detection, analysis, and response. 365 | - [ ] Purchase Comptia CySa+ voucher ---> [Discount Website](https://getcertified4less.com/search.php?search_query=cysa%2B) 366 | - [ ] Study for Comptia CySa+ 367 | - Learning ressource 368 | - Studying: [Certify Breakfast (Youtube)](https://www.youtube.com/watch?v=IGihuL5clDs&list=PLMYSjEaGLw_vGxGsAIUgmkbEm52QR02tx) 369 | - Exam practice: [Google Play (Phone)](https://play.google.com/store/apps/details?id=com.sima.comptiacysa&hl=en&gl=US) 370 | - [ ] Successfully complete the exam 371 | - [ ] 372 | --- --- 373 | 374 | #### 7. **Hands-On Practical Experience (OSCP):** 375 | - Consider Offensive Security Certified Professional (OSCP): While not a traditional certification, OSCP provides practical penetration testing skills through real-world challenges and labs. 376 | 377 | 378 | ## Roadmap for Degree Pursuers 379 | 380 | ![bigd](https://github.com/Hacking-Notes/Hacker-Roadmap/assets/118412415/6a86723b-7940-42d8-9f0d-284d40214822) 381 | 382 | There are numerous strategies available for the degree path, and the one outlined below represents my personal roadmap. It's important to consider that the most efficient strategy for achieving the degree with minimal cost involves completing the majority of the coursework outside of WGU, obtaining credits from those courses, and then enrolling when you're between 50-65% done. Assuring you to finish the degree within one term. This approach minimizes expenses and is the optimal choice in terms of both time and money. 383 | 384 | #### 🎓 Bachelor of Science, Cybersecurity and Information Assurance (BSCSIA) 385 | - [ ] Copy the following Tracking [Google Sheet](https://docs.google.com/spreadsheets/d/11ohkoSAzkURpy3IcWtuVgH7CEjk_GePfavlB3g0RobA/edit?usp=sharing) 386 | 387 | --- BASE COURSES --- 388 | - Register at [Sophia Learning](https://app.sophia.org/users/new) and complete the following courses. 389 | - [ ] ENG1002 (SOPH-0030) 390 | - [ ] PHIL1005 (SOPH-0065) 391 | - [ ] COMM1002 (SOPH-0024) 392 | - [ ] CA1001 (SOPH-0001) 393 | - [ ] STAT1001 (SOPH-0005) 394 | - [ ] HLTH 1010 (SOPH-0063) 395 | - [ ] CS1011 (SOPH-0047) 396 | - [ ] CS1101 (SOPH-0062) 397 | - [ ] CS1100 (SOPH-0058) 398 | - [ ] PM1001 (SOPH-0013) 399 | - Register at [Study.com](https://study.com/academy/plans.html) and complete the following course. 400 | - [ ] Political Science 102 (SDCM-0042) 401 | - [ ] Biology 101L (SDCM-0188) 402 | - [ ] Computer Science 108 (SDCM-0213) 403 | - [ ] Computer Science 110 (SDCM-0215) 404 | - Other Course (Cheapest and most Effective) 405 | - [ ] CS1001 ---> Complete this course with [Google IT Support](https://www.coursera.org/professional-certificates/google-it-support) 406 | 407 | --- CERTIFICATIONS --- 408 | - Complete the following certifications (You can get more information on each certification by looking at the certification roadmap) 409 | - [ ] Comptia A+ 410 | - [ ] LPI Lunix Essential 411 | - [ ] Comptia Net+ 412 | - [ ] Comptia Sec+ 413 | - [ ] Comptia CySa+ 414 | - [ ] Comptia Pentest+ 415 | 416 | --- Western Governors University (WGU) --- 417 | 418 | WGU-Logo 419 | 420 | - Transfer your transcripts (High school diploma, Certifications and completed courses at WGU) 421 | - Need help? Join the unofficial [WGU discord](https://discord.com/invite/unwgu) 422 | 423 | - [ ] **Enroll in WGU and complete the remaining courses** 424 | --------------------------------------------------------------------------------