Tuesday, February 17, 2026

🚀 CYBERSECURITY COMPLETE ROADMAP (Beginner → Advanced) 📘 PHASE 1: Foundations (Month 1–2)

 

🚀 CYBERSECURITY COMPLETE ROADMAP (Beginner → Advanced)


📘 PHASE 1: Foundations (Month 1–2)


1️⃣ Networking Deep Dive (Core Backbone)

🔹 What You Must Understand

OSI Model (7 Layers)

Layers:

  1. Physical

  2. Data Link

  3. Network

  4. Transport

  5. Session

  6. Presentation

  7. Application

👉 Real understanding:

  • HTTP works at Application layer

  • TCP works at Transport layer

  • IP works at Network layer


TCP vs UDP

TCPUDP
ReliableFast
Connection orientedConnectionless
Used in HTTPSUsed in streaming

Important Concepts

  • IP Address (IPv4, IPv6)

  • Subnetting

  • DNS (How google.com becomes IP)

  • ARP

  • Ports (80, 443, 22, 21, 3306)

  • Three-way handshake (SYN → SYN-ACK → ACK)


Tools Practice

  • Wireshark → Capture packets

  • ping, traceroute

  • netstat

  • nslookup


2️⃣ Linux Mastery (Month 1–2)

Install:

  • Kali Linux (VirtualBox)

Learn:

File Structure

  • /etc

  • /var

  • /home

  • /bin

  • /root

Important Commands

ls cd chmod chown grep cat nano find ps kill apt install

Permissions

Example:

-rwxr-xr--

Meaning:

  • Owner: read write execute

  • Group: read execute

  • Others: read


3️⃣ Programming for Security

Since you're a developer, focus on:

Python

  • Variables

  • Loops

  • Functions

  • Requests library

  • Sockets

Example:

import socket print(socket.gethostbyname("google.com"))

Cybersecurity journey 💻 Phase 3: Practical Hacking Practice (4–8 Months)

 

💻 Phase 3: Practical Hacking Practice (4–8 Months)

Never hack real websites ❌
Practice legally on platforms:

  • TryHackMe

  • Hack The Box

  • PortSwigger Web Security Academy

Start with beginner rooms.


🧪 Phase 4: Tools You Must Learn

ToolPurpose
NmapNetwork scanning
Burp SuiteWeb app testing
MetasploitExploitation
WiresharkPacket analysis
John the RipperPassword cracking
HydraBrute force

🎓 Certifications (Optional but Powerful)

Start with:

  • CEH (Certified Ethical Hacker)

  • CompTIA Security+

  • eJPT (Beginner friendly)

Cybersecurity journey 🛡 Phase 2: Core Cybersecurity Concepts (2–4 Months)

 

🛡 Phase 2: Core Cybersecurity Concepts (2–4 Months)

🔍 1. Types of Cybersecurity

Understand domains:

  • Ethical Hacking

  • Web Security

  • Network Security

  • Cloud Security

  • Digital Forensics

  • SOC Analyst

  • Malware Analysis


🌐 2. Web Application Security (Very Important for You)

Since you build web apps like:

  • Student Management System

  • V-Connect

  • Jinni Shopping App

You should learn how they can be attacked.

Study:

  • SQL Injection

  • XSS (Cross Site Scripting)

  • CSRF

  • Authentication bypass

  • Session hijacking

Resource:
👉 OWASP Top 10

Cybersecurity journey Phase 1: Build Strong Foundations (0–2 Months)

 

Phase 1: Build Strong Foundations (0–2 Months)

Before jumping into hacking tools, master the basics.

🖥 1. Computer Networking (Very Important)

Learn:

  • OSI & TCP/IP model

  • IP, Subnetting

  • DNS, DHCP

  • HTTP / HTTPS

  • Ports & Protocols

Tools to explore:

  • Wireshark

  • Packet Tracer


🐧 2. Linux Fundamentals

Most cybersecurity tools run on Linux.

Learn:

  • File system structure

  • Commands (ls, grep, chmod, nano, etc.)

  • Users & permissions

  • Process management

Install:

  • Kali Linux (Virtual Machine using VirtualBox)


🧠 3. Basic Programming

Since you already work with PHP, Node.js, Firebase — that’s a big advantage.

Focus on:

  • Python (for automation & scripting)

  • Bash scripting

  • Basic understanding of JavaScript vulnerabilities

Saturday, January 24, 2026

Day three of theory of computation

 1. Non-deterministic Finite Automata (NFA) 

Unlike a DFA, an NFA allows a machine to explore multiple paths simultaneously. 
  • Definition: For a given state and input symbol, an NFA can transition to zero, one, or multiple states.
  • Acceptance: A string is accepted if at least one possible path leads to a final state.
  • Flexibility: NFAs are generally easier to construct than DFAs because you don't need to define transitions for every possible input or worry about "dead states". 
2. NFA with Epsilon Transitions (
ϵepsilon
-NFA) 
An
ϵepsilon
-NFA introduces the epsilon (
ϵepsilon
) move
, which allows the machine to change states without consuming any input symbol. 
  • ϵepsilon
    -Closure:
    This is a critical Day Three concept. It is the set of all states reachable from a specific state using only
    ϵepsilon
    transitions (including the state itself).
  • Use Case:
    ϵepsilon
    -NFAs are highly useful for combining smaller machines (e.g., when implementing the "union" or "star" operations in Regular Expressions).
     
3. Equivalence of NFA and DFA (Subset Construction) 
The most important takeaway of Day Three is that NFAs and DFAs are equally powerful; they both recognize the same class of languages (Regular Languages). 
  • Conversion: Any NFA can be converted to an equivalent DFA using the Subset Construction (or Powerset Construction) algorithm.
  • State Explosion: While an NFA with
    nn
    states is simpler, its equivalent DFA may have up to
    2n2 to the n-th power
    states
    in the worst case.

How we can get higher marks in semester exam

 Here we talk about how to get higher marks in exams or test paper. Now we have to remember that the test and exams are follow the pattern b...