90-Day Cybersecurity Study Plan
Overview:
This 90-day plan covers essential cybersecurity concepts, hands-on labs, and professional development, guiding you from foundational knowledge to job-readiness. Each week features specific objectives, resources, practical exercises, and optional challenges to reinforce both theory and real-world skills.
📆 Timeline Overview
  
    
      | Phase | 
      Topic | 
      Days | 
    
  
  
    
      | 1 | 
      Network+ & Security+ | 
      1-14 | 
    
    
      | 2 | 
      Linux & Python | 
      15-42 | 
    
    
      | 3 | 
      Tools & Traffic Analysis | 
      43-84 | 
    
    
      | 4 | 
      Career Readiness | 
      85-95 | 
    
    
      | 5 | 
      Daily Habits & Industry Awareness | 
      Ongoing | 
    
  
  Prerequisites: No prior cybersecurity experience required, but basic computer literacy is recommended.
Day 1-7: Network+ Certification Prep
  - Objective: Gain a strong foundation in networking concepts essential for cybersecurity.
 
  - Resources:
    
  
 
  - Activities:
    
      - Set up a virtual network and practice subnetting, working with protocols, and the OSI model.
 
      - Challenge: Diagram a mock corporate network using draw.io.
 
    
   
  - Outcome:
    
      - ✅ Understand key networking terms, OSI layers, and subnetting basics
 
    
   
Day 8-14: Security+ Certification Prep
  - Objective: Understand core cybersecurity principles including threats, risks, and defenses.
 
  - Resources:
    
  
 
  - Activities:
    
      - Take quizzes on security principles and threat categories.
 
      - Configure basic firewall rules and access control in a virtual lab.
 
      - Challenge: Write a 500-word blog explaining 5 common attack types.
 
    
   
  - Outcome:
    
      - ✅ Describe threat types, risk management, and basic defense mechanisms
 
    
   
Day 15-28: Linux Fundamentals
  - Objective: Develop practical Linux skills crucial for cybersecurity tasks.
 
  - Resources:
    
  
 
  - Activities:
    
      - Practice essential commands in a VM (VirtualBox or cloud instance)
 
      - Perform lab tasks involving file permissions, navigation, and shell scripting
 
      - Set up a basic Linux web server
 
      - Stretch Goal: Automate user account creation with a Bash script
 
    
   
  - Outcome:
    
      - ✅ Confidently navigate and operate a Linux system from the command line
 
    
   
Day 29-42: Python for Cybersecurity
  - Objective: Learn scripting for automation and security tasks.
 
  - Resources:
    
  
 
  - Activities:
    
      - Build a password generator and a log parser script
 
      - Complete HackerRank exercises
 
      - Challenge: Write a script to automate directory scanning
 
    
   
  - Outcome:
    
      - ✅ Use Python to solve basic cybersecurity and automation tasks
 
    
   
Day 43-56: Traffic Analysis and Packet Inspection
  - Objective: Analyze network traffic to detect potential threats.
 
  - Resources:
    
  
 
  - Activities:
    
      - Capture and analyze packets using Wireshark & TCPdump
 
      - Project: Document suspicious traffic indicators
 
      - Challenge: Identify plaintext login credentials in captured traffic
 
    
   
  - Outcome:
    
      - ✅ Understand how to inspect, interpret, and extract data from network traffic
 
    
   
Day 57-63: Version Control with Git
  - Objective: Learn Git for tracking and collaborating on code.
 
  - Resources:
    
  
 
  - Activities:
    
      - Practice clone, commit, branch, push, pull workflows
 
      - Host a project on GitHub
 
      - Challenge: Resolve a simulated merge conflict
 
    
   
  - Outcome:
    
      - ✅ Confidently use Git and GitHub for managing security scripts and tools
 
    
   
Day 64-70: ELK Stack for Log Analysis
  - Objective: Use Elasticsearch, Logstash, and Kibana to analyze logs.
 
  - Resources:
    
  
 
  - Activities:
    
      - Install and configure a local ELK environment
 
      - Create dashboards in Kibana
 
      - Challenge: Visualize brute force attempts from SSH logs
 
    
   
  - Outcome:
    
      - ✅ Create visualizations from logs and gain insights from raw data
 
    
   
Day 71-77: Cloud Security Basics
  - Objective: Learn core cloud services and security practices.
 
  - Resources:
    
  
 
  - Activities:
    
      - Set up IAM roles and security groups
 
      - Compare access control models across providers
 
      - Challenge: Secure a basic cloud instance using least privilege
 
    
   
  - Outcome:
    
      - ✅ Understand IAM, VPC, and core cloud security mechanisms
 
    
   
Day 78-84: Vulnerability Scanning & Management
  - Objective: Identify and remediate system vulnerabilities.
 
  - Resources:
    
  
 
  - Activities:
    
      - Conduct scans on a test network
 
      - Prioritize and document vulnerabilities
 
      - Challenge: Write a remediation report for top 5 findings
 
    
   
  - Outcome:
    
      - ✅ Conduct and interpret vulnerability scans responsibly
 
    
   
Day 85-90: Ethical Hacking Practice & Capstone Project
  - Objective: Apply offensive security skills in a safe environment.
 
  - Resources:
    
  
 
  - Activities:
    
      - Complete 2-3 CTFs
 
      - Capstone: Exploit a VM, document findings, and present in a 3-min video or blog
 
    
   
  - Outcome:
    
      - ✅ Demonstrate end-to-end attack simulation and write-ups
 
    
   
Day 91-95: Career Prep: Resume, Portfolio, Job Search
  - Objective: Build a standout cybersecurity profile.
 
  - Resources:
    
  
 
  - Activities:
    
      - Draft and refine resume & GitHub profile
 
      - Practice interviews and elevator pitches
 
      - Apply to 5+ jobs and track applications
 
      - Join LinkedIn cybersecurity groups and engage
 
    
   
  - Outcome:
    
      - ✅ Strong portfolio, resume, and active job-hunting strategy
 
    
   
Ongoing Daily: Stay Updated with Industry News
  - Objective: Maintain awareness of cybersecurity trends and threats.
 
  - Resources:
    
  
 
  - Tasks:
    
      - Spend 10-15 minutes daily reading headlines or summaries
 
      - Share key takeaways in a personal blog or learning journal
 
    
   
  - Badge: Threat Tracker — consistency matters!
 
  🔁 Next Steps: Consider enrolling in a mentor-led program, pursuing bug bounties, or continuing with certifications like eJPT, PNPT, or OSCP.
Ready to take your cybersecurity skills to the next level? Let’s hack it together 🚀