Hacking, Computer and Networking Security are all difficult topics to discuss due to the vast nature of the industry. This Roadmap serves as loose guide on where to begin.  Eventually each of these will become links to tutorials, guides or learning products.

We recommend learning the following topics in order from top to bottom, as it is the way we learned.  If you feel you can, learn in whichever order you feel most comfortable. Keep in mind that as content is created our tutorials and lessons will all build upon one another.

  • Methodologies
  • Hardware
  • Operating Systems
    • File Structures
      • Windows
      • Mac OS X/MacOS
      • Linux
    • Linux Commands
      • System
      • Hardware
      • Users
      • File
      • Process Related
      • File Permissions
      • Network
      • Compression/Archives
      • Install Packages
      • Install Sources
      • Search
      • Login
      • File Transfer
      • Directory Traversal
    • Windows Commands
      • System
      • Hardware
      • Users
      • File
      • Process Related
      • File Permissions
      • Network
      • Compression/Archives
      • Install Packages
      • Install Sources
      • Search
      • Login
      • File Transfer
      • Directory Traversal
  • Networking Basics
    • OSI Model
      • Physical Layer
      • Data Link Layer
      • Network Layer
      • Transport Layer
      • Session Layer
      • Presentation Layer
      • Application Layer
    • Protocols
    • Subnetting
    • VLANS
    • Routing
  • Defense
    • Network Activity
      • Packet Analysis
      • Wireshark
      • IDS/IPS
    • Users
      • *Nix
      • Windows
    • Logging
      • *Nix
      • Windows
    • Firewall
      • iptables (Linux)
      • ufw (Ubuntu 8.04 LTS and up)
      • “Windows Firewall”
    • Network Design for Defense
    • The Strategy of Hunt
  • Attack
  • Tool/Malware Development
    • Programming
    • Scripting
    • Reverse Engineering
      • Portable Executable (Windows PE)
      • Extensive Linking Format (Linux ELF)
    • Malware Types
  • Web Security
    • Web Languages
    • Data Bases
    • Security User Input
    • Cross Site Scripting (XSS)
    • Cookies
    • Injection
  • Misc