Week 1: Cybersecurity Foundations
Theme: Understand the basics & real-world importance
Day 1: What is cybersecurity & why it matters
Day 2: CIA Triad & Zero Trust explained with examples
Day 3: Threat landscape (malware, phishing, ransomware, DDoS)
Day 4: Cybersecurity domains (Network, Web, Cloud, SOC)
Day 5: Famous breaches (WannaCry, SolarWinds, Equifax)
Day 6 (Project 1): Research & present a real-world cyberattack (cause, effect, prevention)
Week 2: Networking for Security
Theme: Learn networking essentials before hacking
Day 7: OSI & TCP/IP models simplified
Day 8: IP, MAC, DNS, DHCP explained practically
Day 9: Common protocols (HTTP, HTTPS, FTP, SSH, SMTP)
Day 10: Tools: ping, traceroute, netstat, ip, arp
Day 11: Intro to Wireshark (packet sniffing basics)
Day 12 (Project 2): Capture network traffic & identify 3 protocols using Wireshark
Week 3: System & Network Security Tools
Theme: Build hands-on skills with security tools
Day 13: Passwords & authentication basics
Day 14: Malware & social engineering explained
Day 15: Tool: nmap scanning basics
Day 16: Tool: netcat for connections & transfers
Day 17: Tool: tcpdump for packet capture
Day 18 (Project 3): Run a nmap scan, map open ports & create a vulnerability map
Week 4: Cryptography in Action
Theme: Protecting & verifying data
Day 19: Symmetric vs Asymmetric encryption
Day 20: Hashing & password cracking concepts
Day 21: Digital signatures & certificates
Day 22: SSL/TLS explained with demo
Day 23: Tools: GPG & OpenSSL basics
Day 24 (Project 4): Encrypt files, sign them digitally & verify integrity with hashes
Week 5: Web & Application Security
Theme: Breaking & defending websites
Day 25: OWASP Top 10 overview
Day 26: SQL Injection explained & tested
Day 27: Cross-Site Scripting (XSS) basics
Day 28: CSRF & authentication flaws
Day 29: Secure coding principles (overview)
Day 30 (Project 5): Exploit SQL Injection on a demo app & write an exploit report
Week 6: Ethical Hacking & Pen Testing
Theme: Learn hacker tools & testing approach
Day 31: Phases of penetration testing (Recon → Exploit → Report)
Day 32: Kali Linux toolkit overview
Day 33: Reconnaissance & footprinting
Day 34: Metasploit framework basics
Day 35: Password cracking with Hydra & John the Ripper
Day 36 (Project 6): Perform a penetration test on a sandbox system & prepare a pentest report
Week 7: Security Monitoring & Incident Response
Theme: Detecting & responding to attacks
Day 37: What is a SOC? Roles & responsibilities
Day 38: Logs: Windows vs Linux event logs
Day 39: IDS/IPS basics (Snort, Suricata)
Day 40: SIEM overview (Splunk/ELK basics)
Day 41: Threat intelligence: IOCs & attack indicators
Day 42 (Project 7): Analyze suspicious logs & create an incident response summary
Week 8: Advanced Security Practices
Theme: Strengthening infrastructure security
Day 43: Firewalls explained (conceptual deep dive)
Day 44: Intrusion prevention & honeypots
Day 45: Secure network design (DMZ, segmentation, VPNs)
Day 46: Endpoint security & patching
Day 47: Cloud security basics (AWS/Azure security measures)
Day 48 (Project 8): Design a secure enterprise network diagram with defense layers
Week 9: Linux for Cybersecurity
Theme: Using Linux for defense & monitoring
Day 49: Linux basics: file system & navigation (ls, cd, pwd)
Day 50: File operations & permissions (chmod, chown)
Day 51: Users, groups, sudo, root privileges
Day 52: Processes & services (ps, top, systemctl)
Day 53: Secure SSH access & key authentication
Day 54 (Project 9): Harden a Linux server (user policies, SSH keys, firewall setup)
Week 10: Linux Security & Capstone Project
Theme: Apply everything in a final project
Day 55: Shell scripting for security automation
Day 56: Log monitoring & auditing (journalctl, /var/log/)
Day 57: Detecting suspicious activity on Linux
Day 58: Capstone Project – Setup & Planning
Day 59: Capstone Project – Execution (Secure Linux server OR Vulnerability Scan & Report)
Day 60: Capstone Project – Final presentation + career roadmap