Skip to content

carlcastanas/Cybersecurity-Roadmap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 

Repository files navigation

🛡️ Cybersecurity Roadmap (2026 Edition)

Welcome to the Cybersecurity Roadmap! 🎉 This guide is designed to help you navigate your journey into the exciting and ever-evolving field of cybersecurity, covering everything from foundational knowledge to practical experience and career tips. Whether you're a complete beginner, a career switcher, or an IT professional pivoting into security, this roadmap will help you build a structured path forward. Let's dive in and build a secure world together! 🌐🔐

GitHub Stars GitHub Forks Visitor Badge

What's new in 2026: AI-driven attacks and defenses, Zero Trust Architecture, identity-first security, post-quantum cryptography readiness, and cloud-native security are reshaping the field. This roadmap reflects those shifts.


🗂️ Table of Contents

  1. 🚀 Foundation
  2. 🔎 Fundamentals
  3. 💻 Programming & Scripting
  4. 🌐 Specialization Tracks
  5. 🤖 Emerging Areas (2026 Focus)
  6. 🧪 Practical Experience & Labs
  7. 📚 Continuous Learning
  8. 📺 YouTube Channels
  9. 💼 Job Roles & Salaries
  10. 🔐 Improving Your Skills
  11. 💼 Finding a Job
  12. 📜 Certifications
  13. 📅 6-Month Roadmap
  14. 📈 Tips for Success
  15. 📚 Recommended Books
  16. 🤝 Communities

🚀 Foundation

Before you can defend systems, you need to understand how they work. These foundational skills — networking, operating systems, and core IT concepts — are non-negotiable. Hiring managers consistently cite weak fundamentals as the biggest gap in entry-level candidates.


🔎 Fundamentals

With the basics in place, dive into core security concepts and the tools security teams use every day.


💻 Programming & Scripting

You don't need to be a software engineer, but you do need to read and write code. Automation, tooling, and analysis all live here.


🌐 Specialization Tracks

After fundamentals, pick a track. Specialists out-earn generalists significantly, and most roles in 2026 expect depth, not just breadth. Below are the major tracks with the certifications that signal expertise in each.

1. Security Operations / SOC Analyst (Blue Team) 🛡️

You'll do: Monitor SIEM alerts, investigate incidents, respond to threats.

2. Penetration Testing / Red Team 💻

You'll do: Simulate attacks to find weaknesses before real adversaries do.

3. Incident Response & Digital Forensics 🔍

You'll do: Investigate breaches, recover evidence, write up what happened.

4. Governance, Risk & Compliance (GRC) 📝

You'll do: Map controls to frameworks, manage audits, translate security to business.

5. Security Architecture & Leadership 🏛️

You'll do: Design enterprise security, make build-vs-buy calls, run programs.

6. Cloud Security ☁️

The fastest-growing specialization. Almost every org runs hybrid/multi-cloud now.

7. Application Security (AppSec) / DevSecOps 📱

8. Identity & Access Management (IAM) 🪪

Identity is the new perimeter in 2026.


🤖 Emerging Areas (2026 Focus)

These aren't fringe topics anymore — they're now in mainstream job descriptions. Building familiarity here will set you apart.


🧪 Practical Experience & Labs

Certifications open doors; hands-on skills get you hired. Hiring managers consistently say practical experience matters more than credentials alone.

Build a Home Lab

A home lab is one of the best portfolio builders. Common setups:

  • Active Directory lab — domain controller + a couple of Windows clients + a Kali attacker
  • Detection lab (DetectionLab project) — pre-built Splunk + Velociraptor + Sysmon environment
  • SOC-in-a-box — Security Onion, ELK Stack, or Wazuh

📚 Continuous Learning

Cybersecurity changes faster than any other IT discipline. Staying current is part of the job.

Reddit Communities

People to Follow (on X / Mastodon / LinkedIn)

  • Brian Krebs (@briankrebs)
  • Bruce Schneier (@schneierblog)
  • SwiftOnSecurity
  • Marcus Hutchins (@MalwareTechBlog)
  • Katie Nickels (@likethecoins) — threat intel
  • John Hammond (@_JohnHammond)

📺 YouTube Channels


💼 Job Roles & Salaries

The salary ranges below are 2025–2026 estimates and vary widely by experience, location, industry, and certifications held. Always cross-check with current sources.

Job Role Average Salary (PHP) Average Salary (USD) Average Salary (AUD)
SOC Analyst (Tier 1) ₱600,000 $55,000–$75,000 AU$70,000
Security Analyst ₱850,000 $75,000–$95,000 AU$95,000
Network Security Engineer ₱1,200,000 $95,000–$120,000 AU$110,000
Penetration Tester ₱1,100,000 $90,000–$130,000 AU$115,000
Incident Responder ₱1,300,000 $100,000–$140,000 AU$125,000
Forensic Analyst ₱1,150,000 $85,000–$115,000 AU$105,000
Malware Analyst ₱1,400,000 $100,000–$140,000 AU$120,000
Cloud Security Engineer ₱1,500,000 $120,000–$160,000 AU$140,000
Security Consultant ₱1,600,000 $110,000–$160,000 AU$130,000
GRC Analyst ₱1,000,000 $85,000–$115,000 AU$105,000
Security Architect ₱2,200,000 $140,000–$200,000 AU$170,000
CISO ₱4,000,000+ $200,000–$400,000+ AU$250,000+

Sources to verify current numbers:

Note: The global cybersecurity workforce gap is still around 4+ million unfilled positions. Demand is strong, but entry-level competition has tightened — hands-on skills and a visible portfolio matter more than ever.


🔐 Improving Your Skills

  1. Practice Secure Online Behavior 🕵️

    • Use unique passwords with a password manager (Bitwarden, 1Password)
    • Enable multi-factor authentication everywhere — prefer hardware keys (YubiKey) or authenticator apps over SMS
    • Be cautious about oversharing personal info online
  2. Regular Software Updates 🔄

    • Auto-update OS, browser, antivirus, and applications
    • Subscribe to vendor security advisories for tools you rely on
  3. Network Security at Home 🛡️

    • Use WPA3 where possible; change default router credentials
    • Segment IoT devices onto a guest network
    • Enable router firewall; consider pfSense / OPNsense for serious labs
  4. Educate Yourself Daily 📚

    • 15 minutes of news, one TryHackMe room per day adds up fast
  5. Use Security Tools 🔧

    • VPN on untrusted networks
    • Reputable EDR/antivirus
    • Password manager (mandatory, not optional)
    • DNS filtering (NextDNS, Cloudflare 1.1.1.1 for Families)
  6. Hands-On Practice 💻

    • CTFs, home labs, write-ups
    • Document everything in GitHub — your portfolio is your proof
  7. Join Communities 🌐

    • Discord servers, Reddit, local DEF CON groups, OWASP chapters, ISC2 chapters
  8. Regular Self-Audit 🔍


💼 Finding a Job

1. Build Your Portfolio

A resume tells; a portfolio shows. At minimum:

  • A clean GitHub with write-ups of labs and CTFs
  • A blog (Medium, Hashnode, or self-hosted) with technical posts
  • Documented home-lab projects

2. Tailor Your Resume

  • Use keywords from the job description (ATS systems screen aggressively)
  • Quantify wins ("Reduced false-positive alerts by 30%")
  • Include relevant certs prominently

3. Apply Broadly — Especially to Adjacent Roles

You won't land Senior Pentester as your first job. Realistic entry points:

  • SOC Analyst Tier 1
  • Junior Security Analyst
  • IT Support → Security pivot
  • Help Desk → SOC pivot
  • GRC Analyst (often easier entry for non-tech backgrounds)
  • Internships and apprenticeships

4. Job Boards

5. Network Aggressively

  • Attend conferences (DEF CON, BSides, RSA, ROOTCON in PH)
  • Local meetups and OWASP chapter events
  • Engage on LinkedIn — comment thoughtfully, don't just spam connect

6. Prepare for Interviews

  • Common technical topics: networking (OSI/TCP), the kill chain, MITRE ATT&CK, common attacks (XSS, SQLi, phishing), incident response basics
  • Behavioral: "Tell me about a time you handled a difficult problem"
  • Practical: many companies use scenario-based interviews or take-home labs

7. Stay Persistent

  • Track applications in a spreadsheet
  • Ask for feedback on rejections (you'll rarely get it, but sometimes you will)
  • Keep learning while applying — every week without a job is a week to upskill

📜 Certifications

Certifications can boost credibility, validate knowledge, and unlock job filters — but they don't replace experience. Be strategic about which ones you pursue.

Entry-Level (start here)

Intermediate (after a year or two)

Advanced / Specialist

Practical certification path for most beginners: Google Cybersecurity Cert → Security+ → CySA+ (or PenTest+) → CISSP (after 5 years exp.) or specialized cert in your chosen track


📅 6-Month Roadmap

A realistic plan. Adjust the pace to fit your schedule — full-time learners can compress this; people studying nights/weekends may stretch to 9–12 months.

Month Focus Area Activities Resources
Month 1 Networking + Linux Fundamentals Set up a home lab with VirtualBox; install Ubuntu and Kali; complete networking basics; practice Linux on the command line Cisco Networking Academy, Linux Journey, OverTheWire Bandit
Month 2 Security Fundamentals + CIA Triad Begin Security+ study; learn the CIA triad, AAA, common threats; start NIST CSF overview Professor Messer's Security+ course, NIST CSF
Month 3 Threats, Vulnerabilities & MITRE Study OWASP Top 10, MITRE ATT&CK; analyze recent breach case studies; learn about ransomware, phishing, supply-chain attacks OWASP Top 10, MITRE ATT&CK, Krebs on Security
Month 4 Hands-On Tools Wireshark, Nmap, Burp Suite, Metasploit, basic Splunk/ELK; start TryHackMe complete-beginner path TryHackMe, Wireshark, PortSwigger Academy
Month 5 Practical Skills + Mini-Projects Take Security+ exam; build out home lab (AD lab or SOC lab); complete first CTFs; document everything on GitHub Security+ exam, DetectionLab, PicoCTF, CTFtime
Month 6 Specialize + Network Pick a track (SOC, pentest, cloud, GRC); attend a virtual conference or local meetup; polish LinkedIn; start applying to entry-level roles BSides events, LinkedIn, r/cybersecurity

📈 Tips for Success

  • Build a Portfolio GitHub repo with documented labs, CTF write-ups, and tools you've written. This often beats certifications in technical interviews.

  • Stay Updated 🔄 Cybersecurity moves fast. Subscribe to 2–3 newsletters max (avoid information overload). Risky Business, TLDR Sec, and Bleeping Computer are great starts.

  • Master Core Tools 🔧 Get fluent in Wireshark, Nmap, Burp Suite, Metasploit, Splunk, Linux command line, basic SIEM querying. These appear in nearly every job description.

  • Develop Soft Skills Communication is what separates the senior people from the technicians. Practice writing clear reports and explaining technical concepts to non-technical stakeholders.

  • Find a Mentor ISC2 chapters, local meetups, LinkedIn outreach. Most professionals are happy to give 30 minutes to someone making genuine effort.

  • Engage in CTFs 🚩 Pick one CTF per month from CTFtime. Even failing teaches a lot.

  • Ethical Foundation Never use skills on systems you don't have permission to test. One unethical act can permanently end a security career.

  • Contribute to Open Source 🛠️ Open-source security tools always need help — bug reports, docs, small fixes. Great resume material.

  • Embrace the "Try Harder" Mindset Persistence over genius. Most senior security pros got there by being stubborn, not brilliant.


📚 Recommended Books

  • The Web Application Hacker's Handbook — Dafydd Stuttard & Marcus Pinto
  • Hacking: The Art of Exploitation — Jon Erickson
  • The Tangled Web — Michał Zalewski
  • Practical Malware Analysis — Sikorski & Honig
  • Cybersecurity Essentials — Charles J. Brooks et al. (great intro)
  • Sandworm — Andy Greenberg (narrative; understand nation-state threats)
  • Countdown to Zero Day — Kim Zetter (Stuxnet story)
  • The Cuckoo's Egg — Cliff Stoll (classic; how the field started)
  • Permanent Record — Edward Snowden
  • Click Here to Kill Everybody — Bruce Schneier
  • Blue Team Handbook — Don Murdoch
  • Red Team Field Manual (RTFM) and Blue Team Field Manual (BTFM) — Ben Clark / Alan White (cheat-sheet style)

🤝 Communities


Connect with Me


🕒 Last Updated

  • Timezone: Philippine Standard Time (PHT) — UTC+8
  • Last Updated: May 14, 2026
  • Version: 2.0 — 2026 Edition

Contributions welcome! If you spot a broken link or have suggestions, open a PR on GitHub.

Happy learning, and stay safe online! 🎉🔐

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors