Security
+50% demand
Cybersecurity Analyst
Protect systems and networks from digital attacks and implement security measures.
12-24 months
4.8/5 rating
9 Phases
Start Learning Path

+50%
Network Security
Ethical Hacking
Penetration Testing
SIEM
Firewalls
Skills & Technologies
Network Security
Ethical Hacking
Penetration Testing
SIEM
Firewalls
IDS/IPS
Cryptography
OWASP
NIST
GDPR
SOC
Incident Response
Forensics
Kali Linux
Metasploit
Burp Suite
Wireshark
Cybersecurity Analyst Roadmap
Phase 1: Foundations of Cybersecurity
1.5 months
Topics Covered:
- Introduction to Cybersecurity
- Types of threats and attacks
- CIA Triad (Confidentiality, Integrity, Availability)
- Security terminology and concepts
- Security+ Certification Overview
Phase 2: Networking & Network Security
2 months
Topics Covered:
- Networking basics (OSI Model, TCP/IP)
- Ports, Protocols (HTTP, FTP, DNS, etc.)
- Network devices: routers, switches, firewalls
- Firewall configuration and rules
- VPNs and Proxy servers
- Intrusion Detection Systems (IDS) & IPS
Hands-on Projects:
- Simulate attack detection using Snort
Phase 3: Operating System & System Security
1.5 months
Topics Covered:
- Windows/Linux architecture and security
- System hardening techniques
- User permissions and authentication
- Patch management and updates
- Host-based firewalls and antivirus
Phase 4: Ethical Hacking & Penetration Testing
2.5 months
Topics Covered:
- phases of Ethical Hacking
- Reconnaissance, Scanning, Enumeration
- Vulnerability analysis
- Exploitation techniques
- Password attacks and privilege escalation
- Web app testing (OWASP Top 10)
Hands-on Projects:
- Penetration Test Lab using Metasploit and Burp Suite
Phase 5: Security Tools & Platforms
1.5 months
Topics Covered:
- Kali Linux essentials
- Wireshark for packet analysis
- Burp Suite for web application testing
- Metasploit Framework basics
- SIEM tools overview (Splunk/IBM QRadar)
Hands-on Projects:
- Network Packet Capture & Analysis
Phase 6: Security Frameworks & Compliance
1 month
Topics Covered:
- NIST Cybersecurity Framework
- ISO 27001 overview
- GDPR basics and compliance
- SOC (Security Operations Center) workflow
- Security policies and documentation
Phase 7: Incident Detection & Response
1.5 months
Topics Covered:
- Incident handling lifecycle
- Log analysis and correlation
- Use of SIEM for detection
- Response planning and containment
- Post-incident activities
Hands-on Projects:
- Build a mini SOC and simulate threat detection
Phase 8: Digital Forensics
1 month
Topics Covered:
- Forensics fundamentals
- Data acquisition and integrity
- File systems and recovery
- Memory analysis tools
- Report generation and evidence presentation
Hands-on Projects:
- Disk Imaging & Artifact Analysis
Phase 9: Capstone Cybersecurity Project
1 month
Topics Covered:
Hands-on Projects:
- Real-world incident response simulation
- Network Penetration Testing Report
- Security Assessment of a Web Application
- Compliance audit simulation
Tools & Resources
Wireshark
Metasploit
Kali Linux
Burp Suite
Nmap
Snort
Splunk
IBM QRadar
Nessus
VirtualBox/VMware