πŸ“ Course Map

The whole journey, one page. Use this as your map.

Legend: βœ… written and ready to read Β· πŸ“ in progress Β· ⬜ planned Β· πŸ§ͺ hands-on lab


The big picture

graph TD
  CG[πŸ‰ CyberGym] --> P0[Phase 0<br/>Foundation]
  CG --> P1[Phase 1<br/>Security+]
  CG --> P2[Phase 2<br/>AWS Sec Specialty]
  CG --> P3[Phase 3<br/>GIAC GAIA]
  CG --> P4[Phase 4<br/>Practitioner]

  P0 --> P0_0[0.0 Start Here]
  P0 --> P0_1[0.1 Physical Machine]
  P0 --> P0_2[0.2 Operating System]
  P0 --> P0_3[0.3 Networking]
  P0 --> P0_4[0.4 Programming Literacy]
  P0 --> P0_5[0.5 Security Foundations]
  P0 --> P0_6[0.6 Cloud Intro]
  P0 --> P0_7[0.7 AI/ML Security Intro]
  P0 --> P0_8[0.8 Capstone]

  style P0 fill:#ffcc66,stroke:#333,stroke-width:2px
  style P1 fill:#eee,stroke:#999
  style P2 fill:#eee,stroke:#999
  style P3 fill:#eee,stroke:#999
  style P4 fill:#eee,stroke:#999

Phase 0 is active. Phases 1-4 are planned β€” they’ll be designed in detail later.


🟧 Phase 0 β€” Foundation (active)

Goal: Kindergarten β†’ masters-level practical understanding across all six topic areas. From β€œwhat is a computer” to β€œI can navigate AWS, read code in three languages, and explain prompt injection.”

Chapter 0.0 β€” Start Here

Set up your tools, learn how to read the vault, meet the six topic areas.

Chapter 0.1 β€” Physical Machine

What a computer actually is. Hardware, boot process, the magic of pressing the power button.

Chapter 0.2 β€” Operating System ⬜

Skeleton only β€” full notes coming after Chapter 0.1 is reviewed.

  • ⬜ What software actually is
  • ⬜ Compiled vs interpreted
  • ⬜ What an OS does (3 jobs)
  • ⬜ Kernel vs userland
  • ⬜ Processes and threads
  • ⬜ Memory management
  • ⬜ File systems
  • ⬜ Users, groups, permissions
  • ⬜ Windows daily-user view
  • ⬜ Windows internals 1 β€” Registry, services, scheduled tasks
  • ⬜ Windows internals 2 β€” Event Viewer, Task Manager (security lens)
  • ⬜ Linux β€” what and why
  • ⬜ Linux filesystem hierarchy
  • ⬜ Linux users, sudo, permissions
  • ⬜ Linux services, systemd, /var/log
  • ⬜ macOS quick orientation
  • ⬜ The terminal β€” your real keyboard
  • ⬜ Bash basics
  • ⬜ PowerShell basics
  • πŸ§ͺ Lab A β€” Install Ubuntu in VirtualBox
  • πŸ§ͺ Lab B β€” Live in the Linux terminal for a week

πŸ“‚ See chapter index β†’

Chapter 0.3 β€” Networking ⬜

Skeleton only.

  • ⬜ The postal-system analogy
  • ⬜ What a network actually is
  • ⬜ IP addresses (v4 / v6)
  • ⬜ Subnets and CIDR
  • ⬜ MAC addresses and Ethernet
  • ⬜ Switches, hubs, routers
  • ⬜ The OSI model in 7 layers
  • ⬜ TCP vs UDP
  • ⬜ Ports and sockets
  • ⬜ DNS
  • ⬜ DHCP
  • ⬜ HTTP
  • ⬜ HTTPS and TLS
  • ⬜ TLS handshake step by step
  • ⬜ Certificates and PKI
  • ⬜ Wi-Fi (WPA2 / WPA3)
  • ⬜ Firewalls
  • ⬜ VPNs
  • πŸ§ͺ Lab A β€” Wireshark a TLS handshake
  • πŸ§ͺ Lab B β€” dig, nslookup, traceroute real packet journey

πŸ“‚ See chapter index β†’

Chapter 0.4 β€” Programming Literacy ⬜

Skeleton only. You don’t need to write all these β€” you need to read them.

  • ⬜ What β€œcode” really is
  • ⬜ Compiled vs interpreted (revisited)
  • ⬜ Python refresher (security lens)
  • ⬜ Bash refresher
  • ⬜ PowerShell refresher
  • ⬜ Reading C β€” pointers, memory, why malware lives here
  • ⬜ Reading JavaScript
  • ⬜ Reading SQL β€” and where injection happens
  • ⬜ Regex literacy
  • ⬜ YAML and JSON β€” the cloud config languages
  • ⬜ Reading HTTP requests/responses

πŸ“‚ See chapter index β†’

Chapter 0.5 β€” Security Foundations ⬜

Skeleton only. The heart of Phase 0.

  • ⬜ Why we need security β€” three breach stories
  • ⬜ The CIA triad
  • ⬜ Threats, vulnerabilities, exploits, risk
  • ⬜ AAA β€” Authentication, Authorization, Accounting
  • ⬜ Defense in depth
  • ⬜ Zero trust
  • ⬜ Threat actor types
  • ⬜ Hashing β€” one-way math
  • ⬜ Symmetric crypto (AES)
  • ⬜ Asymmetric crypto (RSA, ECC)
  • ⬜ Digital signatures
  • ⬜ Certificates and PKI revisited
  • ⬜ Common attacks 1 β€” phishing, social engineering
  • ⬜ Common attacks 2 β€” malware families
  • ⬜ Common attacks 3 β€” MITM, replay, brute force
  • ⬜ Web attacks intro β€” SQLi, XSS, CSRF
  • ⬜ MITRE ATT&CK as a map
  • ⬜ OWASP Top 10 walkthrough
  • πŸ§ͺ Lab A β€” Crack a hash with Hashcat
  • πŸ§ͺ Lab B β€” DVWA / PortSwigger Academy basics

πŸ“‚ See chapter index β†’

Chapter 0.6 β€” Cloud, Intro ⬜

Skeleton only.

  • ⬜ The cloud demystified
  • ⬜ Why companies moved to the cloud
  • ⬜ IaaS / PaaS / SaaS
  • ⬜ The big 3 β€” AWS, Azure, GCP
  • ⬜ Regions, AZs, edge
  • ⬜ Sign up for AWS Free Tier safely
  • ⬜ Your first EC2
  • ⬜ Your first S3 bucket (and the famous β€œS3 leak” pattern)
  • ⬜ IAM intro
  • ⬜ The Shared Responsibility Model
  • ⬜ Real cloud horror story (Capital One / Accenture)
  • ⬜ Cloud cost discipline

πŸ“‚ See chapter index β†’

Chapter 0.7 β€” AI/ML Security, Intro ⬜

Skeleton only.

  • ⬜ What an ML model actually is β€” security reframe
  • ⬜ Training vs inference attack surface
  • ⬜ LLMs from the inside
  • ⬜ RAG, agents, fine-tuning vocabulary
  • ⬜ Where the AI attack surface lives
  • ⬜ Prompt injection β€” the headline attack
  • ⬜ OWASP LLM Top 10 β€” name and one-liners
  • ⬜ Why AI Security is a new field

πŸ“‚ See chapter index β†’

Chapter 0.8 β€” Phase 0 Capstone ⬜

  • ⬜ Phase 0 review β€” six topics in one summary
  • ⬜ 50-term glossary self-quiz
  • πŸ§ͺ Capstone β€” walk through a real (small) breach report and identify which Phase 0 concepts each step involves. Becomes a public blog post in your portfolio.

🟦 Phase 1 β€” Security+ (planned)

Will be designed in detail after Phase 0 is complete. The same six topic areas, deeper. Capstone: pass CompTIA Security+.

Topics revisited:

  • Machine β€” processes, memory, registers at the level where buffer overflows make sense
  • OS β€” Windows + Linux internals at defender level
  • Networking β€” comfortable with Wireshark and packet analysis
  • Security β€” full Sec+ syllabus
  • Cloud β€” AWS hands-on basics (EC2, S3, IAM, VPC)
  • AI Security β€” OWASP LLM Top 10 read properly

🟦 Phase 2 β€” AWS Security Specialty (planned)

The Cloud Security niche. The cert that gets you hired in Sydney.

Topics revisited:

  • Machine β€” virtualization, hypervisors, containers
  • OS β€” production Linux, container internals (namespaces, cgroups)
  • Networking β€” VPC peering, transit gateway, private endpoints
  • Security β€” SIEM / EDR / IR practitioner
  • Cloud β€” IAM deep dive, KMS, GuardDuty, Security Hub, CloudTrail, network security, secrets, container & K8s security, Essential Eight
  • AI Security β€” hands-on prompt injection lab, adversarial ML reading

🟦 Phase 3 β€” GIAC GAIA (planned)

The endgame. AI/ML Security expertise.

Topics revisited:

  • Machine β€” GPU architecture for ML
  • OS β€” ML runtimes, model-serving stacks
  • Networking β€” model APIs and inference traffic
  • Security β€” AI red teaming, threat modelling
  • Cloud β€” securing AI workloads (Bedrock, SageMaker, Azure OpenAI)
  • AI Security β€” full OWASP LLM Top 10 with labs, NIST AI RMF, MITRE ATLAS, hands-on red teaming, adversarial ML, supply chain attacks

🟦 Phase 4 β€” Practitioner / Portfolio (ongoing, no cert)

No more cert pressure. Real-world projects, blog posts, OSS contributions, conference talks.


Last updated: 2026-04-30. This map regenerates as each chapter completes.