Skip to main content

Welcome to 90 Days of Cybersecurity

Welcome to the 90 Days of Cybersecurity challenge! This repository provides a structured, 90-day self-paced study plan designed to help learners build a strong foundation in cybersecurity. Whether you’re a beginner looking to break into the field or a professional aiming to sharpen your skills, this roadmap offers a wide range of curated resources, hands-on tasks, and learning materials.
Each day is designed with actionable tasks, tutorials, and reading materials to help you stay on track and build consistent learning habits.

What This Learning Path Covers

The daily modules span essential and advanced cybersecurity topics, providing comprehensive coverage of the skills you need to succeed in the field.

Network Fundamentals

Master networking concepts with Network+ certification preparation

Security Principles

Build core security knowledge through Security+ concepts and best practices

Linux & Scripting

Learn Linux basics and shell scripting for security operations

Python Programming

Develop Python skills for automation and security tasks

Traffic Analysis

Master packet inspection and network traffic analysis tools

Version Control

Learn Git for collaboration and code management

SIEM & Log Analysis

Work with ELK stack for security information and event management

Cloud Security

Explore security in GCP, AWS, and Azure environments

Ethical Hacking

Practice penetration testing and ethical hacking techniques

Career Preparation

Build your resume and learn where to apply for cybersecurity roles

Learning Approach

This challenge follows a progressive learning structure:
The 90-day timeline is flexible. You can adjust the pace based on your schedule and prior experience. The key is consistency and hands-on practice.
Daily Structure:
  • Days 1-7: Network+ concepts and fundamentals
  • Days 8-14: Security+ principles and practices
  • Days 15-28: Linux tutorials and hands-on labs
  • Days 29-42: Python programming for security
  • Days 43-56: Traffic analysis with Wireshark and Suricata
  • Days 57-63: Git version control
  • Days 64-70: ELK stack for SIEM
  • Days 71-77: Cloud platforms (GCP, AWS, or Azure)
  • Days 85-90: Ethical hacking and penetration testing
  • Days 91-92: Resume building
  • Days 93-95: Job application strategies
By the end of this journey, you should feel confident navigating a variety of cybersecurity tools, concepts, and techniques - ready to pursue certifications or entry-level security positions.

Build docs developers (and LLMs) love