45 Days Learning Series

Your structured path to becoming a cybersecurity expert. Complete daily modules to build your knowledge from the ground up.

Your Progress

45 of 45 modules completed.

Day 1: Introduction to Cybersecurity

Define CIA Triad, watch an intro video, take notes

Blog Video

Day 2: Networking Basics

Learn about IP, TCP/UDP, ports. Use Wireshark to analyze packets

Blog Video

Day 3: OSI & TCP/IP Models

Draw both models, map protocols to layers

Blog Video

Day 4: Subnetting & IP Addressing

Solve 5 subnetting problems

Blog Video

Day 5: Operating Systems (Linux & Windows)

Complete levels 0-5 in Bandit

Blog Video

Day 6: Virtualization & Labs

Install Kali Linux in a VM

Blog Video

Day 7: Command Line Essentials

Practice 15 basic Linux/Windows commands

Blog Video

Day 8: Firewalls & VPNs

Set up a VPN (e.g., ProtonVPN free)

Blog Video

Day 9: Cybersecurity Roles & Certifications

Research 3 cybersecurity roles and career paths

Blog Video

Day 10: Review + Quiz

Make flashcards and test yourself

Blog Video

Day 11: Introduction to Ethical Hacking

Complete "What is Hacking?" module

Blog Video

Day 12: Footprinting & Reconnaissance

Use `whois`, `nslookup`, `theHarvester`

Blog Video

Day 13: Scanning & Enumeration

Scan a local network with `nmap`

Blog Video

Day 14: Vulnerability Assessment

Run Nessus on a sample machine

Blog Video

Day 15: Exploitation Basics

Use Metasploit to exploit a known vuln

Blog Video

Day 16: Brute Forcing

Try `hydra` on a login page

Blog Video

Day 17: Password Cracking

Crack a weak hash using `john` or `hashcat`

Blog Video

Day 18: Web App Security Intro

Read XSS, SQLi tutorials

Blog Video

Day 19: XSS & Injection Attacks

Complete XSS labs

Blog Video

Day 20: Broken Authentication

Practice labs on login bypass

Blog Video

Day 21: Capture The Flag (CTF) Basics

Solve 5 easy challenges

Blog Video

Day 22: Malware Types & Delivery

Classify types of malware from samples

Blog Video

Day 23: Reverse Engineering Basics

Try Ghidra to open a small binary

Blog Video

Day 24: Social Engineering

Simulate a phishing email (safe environment)

Blog Video

Day 25: Review + Mini-CTF

Complete "Intro to Pentesting" room

Blog Video

Day 26: Security Monitoring

Set up Wazuh or Splunk in lab

Blog Video

Day 27: Incident Response

Map out IR process (Preparation → Lessons Learned)

Blog Video

Day 28: Digital Forensics

Extract metadata from files using `exiftool`

Blog Video

Day 29: Email Security & Phishing

Create a phishing awareness plan

Blog Video

Day 30: DNS Security

Test `dig`, `host`, DNS poisoning lab

Blog Video

Day 31: Wireless Security

Capture WPA handshake in lab

Blog Video

Day 32: Cloud Security Fundamentals

Review IAM, S3 bucket permissions

Blog Video

Day 33: Container & DevSecOps

Secure a basic Docker container

Blog Video

Day 34: Zero Trust Architecture

Read and summarize Zero Trust principles

Blog Video

Day 35: Threat Intelligence

Explore Indicators of Compromise (IOCs)

Blog Video

Day 36: Advanced Malware Analysis

Analyze static/dynamic behavior

Blog Video

Day 37: Bug Bounty Basics

Create an account on Bugcrowd/HackerOne

Blog Video

Day 38: Blue Team vs Red Team

Choose and explore one challenge

Blog Video

Day 39: Security Policies & Compliance

Draft a simple security policy

Blog Video

Day 40: Privacy, GDPR, HIPAA

Learn the basics of GDPR, CCPA

Blog Video

Day 41: Career Planning

Make a cybersecurity resume

Blog Video

Day 42: Certifications Deep Dive

Compare Security+, CEH, OSCP, CISSP

Blog Video

Day 43: Create a Portfolio

Upload CTF writeups or labs

Blog Video

Day 44: Mock Interview + Resume Review

Do a mock interview with a friend or mentor

Blog Video

Day 45: Final Review & Goal Setting

Write your future plan, reflect on your 45-day journey

Blog Video