[
  {
    "path": ".all-contributorsrc",
    "content": "{\n  \"files\": [\n    \"README.md\"\n  ],\n  \"imageSize\": 100,\n  \"commit\": false,\n  \"commitType\": \"docs\",\n  \"commitConvention\": \"angular\",\n  \"contributors\": [\n    {\n      \"login\": \"farhanashrafdev\",\n      \"name\": \"Farhan Ashraf\",\n      \"avatar_url\": \"https://avatars.githubusercontent.com/u/53370109?v=4\",\n      \"profile\": \"https://github.com/farhanashrafdev\",\n      \"contributions\": [\n        \"doc\"\n      ]\n    },\n    {\n      \"login\": \"Wanderer479\",\n      \"name\": \"Wanderer479\",\n      \"avatar_url\": \"https://avatars.githubusercontent.com/u/189002484?v=4\",\n      \"profile\": \"https://github.com/Wanderer479\",\n      \"contributions\": [\n        \"doc\"\n      ]\n    },\n    {\n      \"login\": \"MahadMuhammad\",\n      \"name\": \"Muhammad Mahad\",\n      \"avatar_url\": \"https://avatars.githubusercontent.com/u/95980383?v=4\",\n      \"profile\": \"https://github.com/MahadMuhammad\",\n      \"contributions\": [\n        \"doc\"\n      ]\n    },\n    {\n      \"login\": \"andreluis-oliveira\",\n      \"name\": \"André Oliveira\",\n      \"avatar_url\": \"https://avatars.githubusercontent.com/u/53203742?v=4\",\n      \"profile\": \"https://github.com/andreluis-oliveira\",\n      \"contributions\": [\n        \"doc\"\n      ]\n    },\n    {\n      \"login\": \"ArbenP\",\n      \"name\": \"arbenp\",\n      \"avatar_url\": \"https://avatars.githubusercontent.com/u/62248907?v=4\",\n      \"profile\": \"https://github.com/ArbenP\",\n      \"contributions\": [\n        \"doc\",\n        \"bug\"\n      ]\n    },\n    {\n      \"login\": \"paduh\",\n      \"name\": \"paduh\",\n      \"avatar_url\": \"https://avatars.githubusercontent.com/u/20698595?v=4\",\n      \"profile\": \"https://github.com/paduh\",\n      \"contributions\": [\n        \"doc\"\n      ]\n    },\n    {\n      \"login\": \"emmanuel-ferdman\",\n      \"name\": \"Emmanuel Ferdman\",\n      \"avatar_url\": \"https://avatars.githubusercontent.com/u/35470921?v=4\",\n      \"profile\": \"https://github.com/emmanuel-ferdman\",\n      \"contributions\": [\n        \"bug\",\n        \"doc\"\n      ]\n    }\n  ],\n  \"contributorsPerLine\": 7,\n  \"skipCi\": true,\n  \"repoType\": \"github\",\n  \"repoHost\": \"https://github.com\",\n  \"projectName\": \"90DaysOfCyberSecurity\",\n  \"projectOwner\": \"farhanashrafdev\"\n}\n"
  },
  {
    "path": "License.md",
    "content": "Copyright (c) [2023] [farhanashrafdev]\n\nPermission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the \"Software\"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.\n"
  },
  {
    "path": "README.md",
    "content": "# 90-Day Cybersecurity Study Plan\n<!-- ALL-CONTRIBUTORS-BADGE:START - Do not remove or modify this section -->\n[![All Contributors](https://img.shields.io/badge/all_contributors-7-orange.svg?style=flat-square)](#contributors-)\n<!-- ALL-CONTRIBUTORS-BADGE:END -->\n\n<a href=\"https://trendshift.io/repositories/1948\" target=\"_blank\"><img src=\"https://trendshift.io/api/badge/repositories/1948\" alt=\"farhanashrafdev%2F90DaysOfCyberSecurity | Trendshift\" style=\"width: 250px; height: 55px;\" width=\"250\" height=\"55\"/></a>\n\n## 📚 Table of Contents\n\n- [Introduction](#introduction)\n- [Goals and Audience](#goals-and-audience)\n- [Daily Breakdown](#daily-breakdown)\n  - [Day 1-7: Network+ Concepts](#network+-concepts)\n  - [Day 8-14: Security+ Concepts](#Security+-concepts)\n  - [Day 15-28: Linux Tutorials](#linux-tutorials)\n  - [Day 29-42: Python](#python)\n  - [Day 43-56: Traffic Analysis](#traffic-analysis)\n  - [Day 57-63: Git](#git)\n  - [Day 64-70: ELK](#elk)\n  - [Day 71-77: GCP or AWS or Azure ](#gcp-or-aws-or-azure)\n  - [Day 85-90: Hacking](#hacking)\n  - [Day 91-92: One Page Resume](#one-page-resume)\n  - [Day 93-95: Where and How to Apply](#where-and-how-to-apply)\n- [Contributing](#contributing)\n\n## 📘 Introduction\n\nWelcome to the **90 Days of Cybersecurity** challenge!  \nThis repository provides a structured, 90-day self-paced study plan designed to help learners build a strong foundation in cybersecurity. Whether you're a beginner looking to break into the field or a professional aiming to sharpen your skills, this roadmap offers a wide range of curated resources, hands-on tasks, and learning materials.\n\nThe daily modules cover essential and advanced topics, including:\n\n- Networking fundamentals (Network+)\n- Security principles (Security+)\n- Linux basics and shell scripting\n- Python programming for security tasks\n- Traffic analysis and packet inspection\n- Version control with Git\n- SIEM tools and log analysis using the ELK stack\n- Cloud security with GCP, AWS and Azure\n- Penetration testing and ethical hacking\n\nEach day is designed with actionable tasks, tutorials, and reading materials to help you stay on track. For a full list of resources, refer to [`learn.md`](./learn.md).\n\n## 🎯 Goals and Audience\n\n### 📌 Goals\n\nThe primary goal of this 90-day plan is to help learners:\n\n- Build a solid foundation in core cybersecurity concepts and practices.\n- Gain hands-on experience through daily exercises and real-world tools.\n- Develop the technical skills necessary for certifications such as CompTIA Network+ and Security+.\n- Explore key domains including network security, system hardening, cloud security, scripting, and ethical hacking.\n- Cultivate a consistent learning habit over 90 days to support long-term retention and growth.\n\nBy the end of this journey, you should feel confident navigating a variety of cybersecurity tools, concepts, and techniques.\n\n### 👥 Intended Audience\n\nThis repository is ideal for:\n\n- **Aspiring cybersecurity professionals** preparing for entry-level roles or certifications.\n- **IT professionals** transitioning into a security-focused career.\n- **Students** studying computer science, information systems, or network engineering.\n- **Self-learners** seeking a structured and comprehensive study plan.\n- **Developers and DevOps engineers** looking to better understand secure infrastructure and threat detection.\n- **Anyone curious** about how cybersecurity works in real-world environments.\n\nNo prior experience is required, though basic familiarity with computers, networks, or programming will be helpful.\n\n## Day 1-7: Network+\n- Watch videos from Professor Messer's [N10-009 Playlist](https://youtube.com/playlist?list=PLG49S3nxzAnl_tQe3kvnmeMid0mjF8Le8&si=3rUsqmrdsNK3izh6)\n- Complete any related practice questions or exercises.\n\n## Day 8-14: Security+  \n\n### Strongly Recommend Professor Messer's:  \n- Watch the videos from Professor Messer's [SY0-701 Playlist](https://www.youtube.com/watch?v=KiEptGbnEBc&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv)  \n\n### Another Alternative You Can Use:  \n- Watch Pete Zerger's [SY0-701 Playlist](https://www.youtube.com/watch?v=1E7pI7PB4KI&list=PL7XJSuT7Dq_UDJgYoQGIW9viwM5hc4C7n)  \n\n### Additional Practice:  \n- Complete any related practice questions or exercises. \n\n## Day 15-28: Linux\n- Browse through the Linux Journey tutorials: https://linuxjourney.com/\n- Complete Linux Unhatched on Cisco NetAcad: https://www.netacad.com/courses/linux-unhatched\n- Complete all Linux Hands-on Labs on LabEx: https://labex.io/free-labs/linux\n\n\n## Day 29-42: Python\n- Complete Codecademy's Learn Python Track: https://codecademy.com/learn/learn-python\n- Python.org: https://www.python.org/\n- Real Python: https://realpython.com/\n- Talk Python to Me: https://talkpython.fm/\n- Read \"Learn Python the Hard Way\": https://learnpythonthehardway.org\n- HackerRank Python: https://www.hackerrank.com/domains/python\n- LabEx Learn Python by Labs: https://labex.io/free-labs/python\n\n### Youtube Course:\n- https://www.youtube.com/watch?v=egg-GoT5iVk&ab_channel=TheCyberMentor\n\n\n## Day 43-56: Traffic Analysis\n- Take the Wireshark University course: https://www.wireshark.org/#educationalContent\n- Follow the Wireshark Tutorial on guru99: https://guru99.com/wireshark-tutorial.html\n- Read through the TCPdump Tutorial on DanielMiessler: https://danielmiessler.com/study/tcpdump/\n- Read through the Suricata on pfSense guide: https://doc.pfsense.org/index.php/Suricata\n  ### Youtube:\n- Wireshark Tutorial for Beginners series https://www.youtube.com/watch?v=NjvR4LmwcMU&list=PLBf0hzazHTGPgyxeEj_9LBHiqjtNEjsgt&pp=iAQB\n- Suricata Network IDS/IPS https://www.youtube.com/watch?v=S0-vsjhPDN0&pp=ygUhIFN1cmljYXRhIElEUy9JUFMgU3lzdGVtIFR1dG9yaWFs\n\n## Day 57-63: Git\n- Complete Codecademy's Git for Beginners course: https://codecademy.com/learn/learn-git\n- Follow the Git Immersion tutorial: http://gitimmersion.com\n- Try Git: https://try.github.io\n- Use [Learn Git Branching](https://learngitbranching.js.org/) for an interactive Git CLI simulator.\n\n## Day 64-70: ELK\n- Follow the ELK Stack Tutorial on Logz.io: [https://logz.io/learn/complete-elk-stack-tutorial/](https://logz.io/learn/complete-guide-elk-stack/)\n- Browse through the ELK Stack tutorials on Elastic: [https://elastic.co/learn/elastic-stack](https://www.elastic.co/elastic-stack/features)\n\n## Day 71-77: Cloud Platforms\n\n## Any one of them works fine.\n\n### GCP:\n-  Explore the GCP Getting Started Resource : https://cloud.google.com/getting-started/\n-  Google Cloud Platform Documentation: https://cloud.google.com/docs/\n-  Google Cloud Platform Blog: https://cloud.google.com/blog/\n-  Google Cloud Platform Community: https://cloud.google.com/community/\n-   Try hands-on challenges with [Google Cloud Skills Boost](https://www.cloudskillsboost.google)\n\n### AWS\n- Explore the AWS Getting Started Resource Center: https://aws.amazon.com/getting-started/\n- Browse through the AWS Tutorials: https://aws.amazon.com/tutorials/\n- Learn through gamified labs on [AWS Cloud Quest](https://aws.amazon.com/training/digital/aws-cloud-quest/)\n\n\n###  Azure\n- Go through Azure Fundamentals: https://learn.microsoft.com/en-us/training/azure/\n- Complete the [Microsoft Learn Azure labs](https://learn.microsoft.com/en-us/training/paths/azure-fundamentals/) with sandbox environments\n\n## Day 85-90: Hacking\n\n- Try to hack the challenges on Hack the Box: https://hackthebox.com\n- Practice on vulnerable machines on Vulnhub: https://vulnhub.com\n### Youtube:\n- Ethical Hacking Part 1: https://www.youtube.com/watch?v=3FNYvj2U0HM&ab_channel=TheCyberMentor\n- Ethical Hacking Part 2: https://www.youtube.com/watch?v=sH4JCwjybGs&ab_channel=TheCyberMentor\n\n## Day 91-92: One Page Resume\n- Use the provided resume template: https://bowtiedcyber.substack.com/p/killer-cyber-resume-part-ii\n- Cybersecurity Resume Template: https://www.indeed.com/career-advice/resumes-cover-letters/cybersecurity-resume\n- Cybersecurity Resume from Resume-Now: [https://www.resume-now.com/templates/cyber-security-resume](https://www.resume-now.com/cv/templates/data-systems-administration/cyber-security-specialist)\n This template also has sections for skills, certifications, and experience, along with a summary, and a section for education. It also includes a section for technical   skills.\n## Day 93-95: Where and How to Apply\nSearch for jobs on Indeed: https://indeed.com\nLook for opportunities on LinkedIn: https://linkedin.com\n\n\n\n## 🎉 Contributors\n\nThank you for being a part of the 90DaysOfCyberSecurity community! We appreciate everyone who helps improve our content.\n\n### Contribution Categories:\n- **Documentation**: Improve or add to the study material and guides.\n- **Tutorials & Guides**: Create or enhance tutorials explaining complex concepts.\n- **Suggested Resources**: Recommend useful tools, articles, books, or other resources.\n- **Ideas / Topics**: Suggest new topics to be added to the learning materials.\n- **Review & Feedback**: Provide feedback on existing materials and suggest improvements.\n- **Community Support**: Answer questions and help others in discussions or issues.\n- **Tests & Quizzes**: Add quizzes, challenges, or tests to check learning progress.\n- **Real-World Applications**: Share real-life examples or case studies of cybersecurity practices.\n- **Mentoring**: Help others with study advice, tips, or hosting study sessions.\n\nThank you to all contributors for your amazing work! 🎉\n\n\n\n## Contributors ✨\n\nThanks goes to these wonderful people ([emoji key](https://allcontributors.org/docs/en/emoji-key)):\n\n<!-- ALL-CONTRIBUTORS-LIST:START - Do not remove or modify this section -->\n<!-- prettier-ignore-start -->\n<!-- markdownlint-disable -->\n<table>\n  <tbody>\n    <tr>\n      <td align=\"center\" valign=\"top\" width=\"14.28%\"><a href=\"https://github.com/farhanashrafdev\"><img src=\"https://avatars.githubusercontent.com/u/53370109?v=4?s=100\" width=\"100px;\" alt=\"Farhan Ashraf\"/><br /><sub><b>Farhan Ashraf</b></sub></a><br /><a href=\"https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=farhanashrafdev\" title=\"Documentation\">📖</a></td>\n      <td align=\"center\" valign=\"top\" width=\"14.28%\"><a href=\"https://github.com/Wanderer479\"><img src=\"https://avatars.githubusercontent.com/u/189002484?v=4?s=100\" width=\"100px;\" alt=\"Wanderer479\"/><br /><sub><b>Wanderer479</b></sub></a><br /><a href=\"https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=Wanderer479\" title=\"Documentation\">📖</a></td>\n      <td align=\"center\" valign=\"top\" width=\"14.28%\"><a href=\"https://github.com/MahadMuhammad\"><img src=\"https://avatars.githubusercontent.com/u/95980383?v=4?s=100\" width=\"100px;\" alt=\"Muhammad Mahad\"/><br /><sub><b>Muhammad Mahad</b></sub></a><br /><a href=\"https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=MahadMuhammad\" title=\"Documentation\">📖</a></td>\n      <td align=\"center\" valign=\"top\" width=\"14.28%\"><a href=\"https://github.com/andreluis-oliveira\"><img src=\"https://avatars.githubusercontent.com/u/53203742?v=4?s=100\" width=\"100px;\" alt=\"André Oliveira\"/><br /><sub><b>André Oliveira</b></sub></a><br /><a href=\"https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=andreluis-oliveira\" title=\"Documentation\">📖</a></td>\n      <td align=\"center\" valign=\"top\" width=\"14.28%\"><a href=\"https://github.com/ArbenP\"><img src=\"https://avatars.githubusercontent.com/u/62248907?v=4?s=100\" width=\"100px;\" alt=\"arbenp\"/><br /><sub><b>arbenp</b></sub></a><br /><a href=\"https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=ArbenP\" title=\"Documentation\">📖</a> <a href=\"https://github.com/farhanashrafdev/90DaysOfCyberSecurity/issues?q=author%3AArbenP\" title=\"Bug reports\">🐛</a></td>\n      <td align=\"center\" valign=\"top\" width=\"14.28%\"><a href=\"https://github.com/paduh\"><img src=\"https://avatars.githubusercontent.com/u/20698595?v=4?s=100\" width=\"100px;\" alt=\"paduh\"/><br /><sub><b>paduh</b></sub></a><br /><a href=\"https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=paduh\" title=\"Documentation\">📖</a></td>\n      <td align=\"center\" valign=\"top\" width=\"14.28%\"><a href=\"https://github.com/emmanuel-ferdman\"><img src=\"https://avatars.githubusercontent.com/u/35470921?v=4?s=100\" width=\"100px;\" alt=\"Emmanuel Ferdman\"/><br /><sub><b>Emmanuel Ferdman</b></sub></a><br /><a href=\"https://github.com/farhanashrafdev/90DaysOfCyberSecurity/issues?q=author%3Aemmanuel-ferdman\" title=\"Bug reports\">🐛</a> <a href=\"https://github.com/farhanashrafdev/90DaysOfCyberSecurity/commits?author=emmanuel-ferdman\" title=\"Documentation\">📖</a></td>\n    </tr>\n  </tbody>\n</table>\n\n<!-- markdownlint-restore -->\n<!-- prettier-ignore-end -->\n\n<!-- ALL-CONTRIBUTORS-LIST:END -->\n\nThis project follows the [all-contributors](https://github.com/all-contributors/all-contributors) specification. Contributions of any kind welcome!\n\n"
  },
  {
    "path": "learn.md",
    "content": "# Learning Resources\n\n## Network+\n- Professor Messer's N10-009 Playlist: https://www.youtube.com/watch?v=k7IOn3TiUc8&list=PLG49S3nxzAnl_tQe3kvnmeMid0mjF8Le8\n\n## Security+\n\n### Strongly recommend this:\n- Professor Messer's SY0-701 Playlist: https://www.youtube.com/watch?v=KiEptGbnEBc&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv\n\n### another alternative you can also use:\n- Pete Zerger's SY0-701 Playlist https://www.youtube.com/watch?v=1E7pI7PB4KI&list=PL7XJSuT7Dq_UDJgYoQGIW9viwM5hc4C7n\n\n## Linux\n- Linux Journey tutorials: https://linuxjourney.com/\n- Linux Unhatched course on Cisco NetAcad: https://www.netacad.com/courses/linux-unhatched\n\n## Python\n- Codecademy's Learn Python Track: https://codecademy.com/learn/learn-python\n- SoloLearn's Python Tutorial: https://sololearn.com/Course/Python/\n- Learn Python the Hard Way: https://learnpythonthehardway.org\n\n## Traffic Analysis\n- Wireshark University: https://wireshark.org/training/\n- Wireshark Tutorial on guru99: https://guru99.com/wireshark-tutorial.html\n- TCPdump Tutorial by DanielMiessler: https://danielmiessler.com/study/tcpdump/\n- Suricata IDS/IPS System Tutorial on YouTube: https://youtube.com/watch?v=DZl7mW8OvZg\n- Suricata on pfSense: https://doc.pfsense.org/index.php/Suricata\n\n## Git\n- Codecademy's Git for Beginners course: https://codecademy.com/learn/learn-git\n- Git Immersion tutorial: http://gitimmersion.com\n- Try Git: https://try.github.io\n\n## ELK\n- ELK Stack Tutorial on Logz.io: https://logz.io/learn/complete-elk-stack-tutorial/\n- ELK Stack tutorials on Elastic: https://elastic.co/learn/elastic-stack\n\n## AWS\n- AWS Getting Started Resource Center: https://aws.amazon.com/getting-started/\n- AWS Tutorials: https://aws.amazon.com/tutorials/\n\n## Azure\n- Azure Fundamentals: https://learn.microsoft.com/training/azure/\n\n## Hacking\n- Cyber Talents: https://cybertalents.com\n- Hack the Box: https://hackthebox.com\n- Vulnhub: https://vulnhub.com\n\n## WordPress Portfolio Creation\n- BowTiedCyber's guide to creating a cyber portfolio: https://bowtiedcyber.substack.com/p/how-to-make-a-killer-cyber-portfolio\n- DO WP Tutorial: https://digitalocean.com/community/tutorials/how-to-use-the-wordpress-one-click-install-on-digitalocean-2\n\n## One Page Resume\n- Resume Template: https://bowtiedcyber.substack.com/p/killer-cyber-resume-part-ii\n\n## Where and How to Apply\n- Indeed: https://indeed.com\n- LinkedIn: https://linkedin.com\n"
  }
]