Skip to content

This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md

License

Notifications You must be signed in to change notification settings

farhanashrafdev/90DaysOfCyberSecurity

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

55 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

90-Day Cybersecurity Study Plan

All Contributors

πŸ“š Table of Contents

πŸ“˜ Introduction

Welcome to the 90 Days of Cybersecurity challenge!
This repository provides a structured, 90-day self-paced study plan designed to help learners build a strong foundation in cybersecurity. Whether you're a beginner looking to break into the field or a professional aiming to sharpen your skills, this roadmap offers a wide range of curated resources, hands-on tasks, and learning materials.

The daily modules cover essential and advanced topics, including:

  • Networking fundamentals (Network+)
  • Security principles (Security+)
  • Linux basics and shell scripting
  • Python programming for security tasks
  • Traffic analysis and packet inspection
  • Version control with Git
  • SIEM tools and log analysis using the ELK stack
  • Cloud security with GCP, AWS and Azure
  • Penetration testing and ethical hacking

Each day is designed with actionable tasks, tutorials, and reading materials to help you stay on track. For a full list of resources, refer to LEARN.md.

🎯 Goals and Audience

πŸ“Œ Goals

The primary goal of this 90-day plan is to help learners:

  • Build a solid foundation in core cybersecurity concepts and practices.
  • Gain hands-on experience through daily exercises and real-world tools.
  • Develop the technical skills necessary for certifications such as CompTIA Network+ and Security+.
  • Explore key domains including network security, system hardening, cloud security, scripting, and ethical hacking.
  • Cultivate a consistent learning habit over 90 days to support long-term retention and growth.

By the end of this journey, you should feel confident navigating a variety of cybersecurity tools, concepts, and techniques.

πŸ‘₯ Intended Audience

This repository is ideal for:

  • Aspiring cybersecurity professionals preparing for entry-level roles or certifications.
  • IT professionals transitioning into a security-focused career.
  • Students studying computer science, information systems, or network engineering.
  • Self-learners seeking a structured and comprehensive study plan.
  • Developers and DevOps engineers looking to better understand secure infrastructure and threat detection.
  • Anyone curious about how cybersecurity works in real-world environments.

No prior experience is required, though basic familiarity with computers, networks, or programming will be helpful.

Day 1-7: Network+

  • Watch videos from Professor Messer's N10-009 Playlist
  • Complete any related practice questions or exercises.

Day 8-14: Security+

Strongly Recommend Professor Messer's:

Another Alternative You Can Use:

Additional Practice:

  • Complete any related practice questions or exercises.

Day 15-28: Linux

Day 29-42: Python

Youtube Course:

Day 43-56: Traffic Analysis

Day 57-63: Git

Day 64-70: ELK

Day 71-77: Cloud Platforms

Any one of them works fine.

GCP:

AWS

Azure

Day 85-90: Hacking

Youtube:

Day 91-92: One Page Resume

Day 93-95: Where and How to Apply

Search for jobs on Indeed: https://indeed.com Look for opportunities on LinkedIn: https://linkedin.com

πŸŽ‰ Contributors

Thank you for being a part of the 90DaysOfCyberSecurity community! We appreciate everyone who helps improve our content.

Contribution Categories:

  • Documentation: Improve or add to the study material and guides.
  • Tutorials & Guides: Create or enhance tutorials explaining complex concepts.
  • Suggested Resources: Recommend useful tools, articles, books, or other resources.
  • Ideas / Topics: Suggest new topics to be added to the learning materials.
  • Review & Feedback: Provide feedback on existing materials and suggest improvements.
  • Community Support: Answer questions and help others in discussions or issues.
  • Tests & Quizzes: Add quizzes, challenges, or tests to check learning progress.
  • Real-World Applications: Share real-life examples or case studies of cybersecurity practices.
  • Mentoring: Help others with study advice, tips, or hosting study sessions.

Thank you to all contributors for your amazing work! πŸŽ‰

Contributors ✨

Thanks goes to these wonderful people (emoji key):

Farhan Ashraf
Farhan Ashraf

πŸ“–
Wanderer479
Wanderer479

πŸ“–
Muhammad Mahad
Muhammad Mahad

πŸ“–
AndrΓ© Oliveira
AndrΓ© Oliveira

πŸ“–
arbenp
arbenp

πŸ“– πŸ›
paduh
paduh

πŸ“–

This project follows the all-contributors specification. Contributions of any kind welcome!

About

This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md

Topics

Resources

License

Stars

Watchers

Forks

Contributors 7

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy