Wednesday, February 18, 2026

๐Ÿ“— PHASE 2: Web Security Core (Month 3–4)

 

๐Ÿ“— PHASE 2: Web Security Core (Month 3–4)


๐Ÿ”ฅ OWASP Top 10 (Very Important)

1️⃣ SQL Injection

Vulnerable code:

SELECT * FROM users WHERE username = '$user';

Attack:

' OR '1'='1

Fix:

  • Prepared statements

  • Parameterized queries


2️⃣ XSS (Cross-Site Scripting)

Stored XSS:

  • Malicious script saved in DB

Reflected XSS:

  • Injected via URL

Fix:

  • Escape output

  • Use Content Security Policy


3️⃣ CSRF

User logged in → attacker forces request.

Fix:

  • CSRF tokens


4️⃣ Broken Authentication

Fix:

  • Strong hashing (bcrypt)

  • Secure session handling

Tuesday, February 17, 2026

๐Ÿš€ CYBERSECURITY COMPLETE ROADMAP (Beginner → Advanced) ๐Ÿ“˜ PHASE 1: Foundations (Month 1–2)

 

๐Ÿš€ CYBERSECURITY COMPLETE ROADMAP (Beginner → Advanced)


๐Ÿ“˜ PHASE 1: Foundations (Month 1–2)


1️⃣ Networking Deep Dive (Core Backbone)

๐Ÿ”น What You Must Understand

OSI Model (7 Layers)

Layers:

  1. Physical

  2. Data Link

  3. Network

  4. Transport

  5. Session

  6. Presentation

  7. Application

๐Ÿ‘‰ Real understanding:

  • HTTP works at Application layer

  • TCP works at Transport layer

  • IP works at Network layer


TCP vs UDP

TCPUDP
ReliableFast
Connection orientedConnectionless
Used in HTTPSUsed in streaming

Important Concepts

  • IP Address (IPv4, IPv6)

  • Subnetting

  • DNS (How google.com becomes IP)

  • ARP

  • Ports (80, 443, 22, 21, 3306)

  • Three-way handshake (SYN → SYN-ACK → ACK)


Tools Practice

  • Wireshark → Capture packets

  • ping, traceroute

  • netstat

  • nslookup


2️⃣ Linux Mastery (Month 1–2)

Install:

  • Kali Linux (VirtualBox)

Learn:

File Structure

  • /etc

  • /var

  • /home

  • /bin

  • /root

Important Commands

ls cd chmod chown grep cat nano find ps kill apt install

Permissions

Example:

-rwxr-xr--

Meaning:

  • Owner: read write execute

  • Group: read execute

  • Others: read


3️⃣ Programming for Security

Since you're a developer, focus on:

Python

  • Variables

  • Loops

  • Functions

  • Requests library

  • Sockets

Example:

import socket print(socket.gethostbyname("google.com"))

Cybersecurity journey ๐Ÿ’ป Phase 3: Practical Hacking Practice (4–8 Months)

 

๐Ÿ’ป Phase 3: Practical Hacking Practice (4–8 Months)

Never hack real websites ❌
Practice legally on platforms:

  • TryHackMe

  • Hack The Box

  • PortSwigger Web Security Academy

Start with beginner rooms.


๐Ÿงช Phase 4: Tools You Must Learn

ToolPurpose
NmapNetwork scanning
Burp SuiteWeb app testing
MetasploitExploitation
WiresharkPacket analysis
John the RipperPassword cracking
HydraBrute force

๐ŸŽ“ Certifications (Optional but Powerful)

Start with:

  • CEH (Certified Ethical Hacker)

  • CompTIA Security+

  • eJPT (Beginner friendly)

Cybersecurity journey ๐Ÿ›ก Phase 2: Core Cybersecurity Concepts (2–4 Months)

 

๐Ÿ›ก Phase 2: Core Cybersecurity Concepts (2–4 Months)

๐Ÿ” 1. Types of Cybersecurity

Understand domains:

  • Ethical Hacking

  • Web Security

  • Network Security

  • Cloud Security

  • Digital Forensics

  • SOC Analyst

  • Malware Analysis


๐ŸŒ 2. Web Application Security (Very Important for You)

Since you build web apps like:

  • Student Management System

  • V-Connect

  • Jinni Shopping App

You should learn how they can be attacked.

Study:

  • SQL Injection

  • XSS (Cross Site Scripting)

  • CSRF

  • Authentication bypass

  • Session hijacking

Resource:
๐Ÿ‘‰ OWASP Top 10

Cybersecurity journey Phase 1: Build Strong Foundations (0–2 Months)

 

Phase 1: Build Strong Foundations (0–2 Months)

Before jumping into hacking tools, master the basics.

๐Ÿ–ฅ 1. Computer Networking (Very Important)

Learn:

  • OSI & TCP/IP model

  • IP, Subnetting

  • DNS, DHCP

  • HTTP / HTTPS

  • Ports & Protocols

Tools to explore:

  • Wireshark

  • Packet Tracer


๐Ÿง 2. Linux Fundamentals

Most cybersecurity tools run on Linux.

Learn:

  • File system structure

  • Commands (ls, grep, chmod, nano, etc.)

  • Users & permissions

  • Process management

Install:

  • Kali Linux (Virtual Machine using VirtualBox)


๐Ÿง  3. Basic Programming

Since you already work with PHP, Node.js, Firebase — that’s a big advantage.

Focus on:

  • Python (for automation & scripting)

  • Bash scripting

  • Basic understanding of JavaScript vulnerabilities

๐Ÿ“— PHASE 2: Web Security Core (Month 3–4)

  ๐Ÿ“— PHASE 2: Web Security Core (Month 3–4) ๐Ÿ”ฅ OWASP Top 10 (Very Important) 4 1️⃣ SQL Injection Vulnerable code: SELECT * FROM users WHERE ...