π Course Map
The whole journey, one page. Use this as your map.
Legend: β written and ready to read Β· π in progress Β· β¬ planned Β· π§ͺ hands-on lab
The big picture
graph TD CG[π CyberGym] --> P0[Phase 0<br/>Foundation] CG --> P1[Phase 1<br/>Security+] CG --> P2[Phase 2<br/>AWS Sec Specialty] CG --> P3[Phase 3<br/>GIAC GAIA] CG --> P4[Phase 4<br/>Practitioner] P0 --> P0_0[0.0 Start Here] P0 --> P0_1[0.1 Physical Machine] P0 --> P0_2[0.2 Operating System] P0 --> P0_3[0.3 Networking] P0 --> P0_4[0.4 Programming Literacy] P0 --> P0_5[0.5 Security Foundations] P0 --> P0_6[0.6 Cloud Intro] P0 --> P0_7[0.7 AI/ML Security Intro] P0 --> P0_8[0.8 Capstone] style P0 fill:#ffcc66,stroke:#333,stroke-width:2px style P1 fill:#eee,stroke:#999 style P2 fill:#eee,stroke:#999 style P3 fill:#eee,stroke:#999 style P4 fill:#eee,stroke:#999
Phase 0 is active. Phases 1-4 are planned β theyβll be designed in detail later.
π§ Phase 0 β Foundation (active)
Goal: Kindergarten β masters-level practical understanding across all six topic areas. From βwhat is a computerβ to βI can navigate AWS, read code in three languages, and explain prompt injection.β
Chapter 0.0 β Start Here
Set up your tools, learn how to read the vault, meet the six topic areas.
- β 0.0.1 Welcome
- β 0.0.2 The 6 topic areas
- β 0.0.3 Tools to set up
- β 0.0.4 How to take notes in this vault
- β 0.0.5 Glossary (lives forever)
Chapter 0.1 β Physical Machine
What a computer actually is. Hardware, boot process, the magic of pressing the power button.
- β 0.1.1 What a computer actually is
- β 0.1.2 Bits and bytes β how machines count
- β 0.1.3 Hexadecimal and why hackers love it
- β 0.1.4 Tour of a PC tower
- β 0.1.5 The CPU β the worker
- β 0.1.6 How a CPU runs one instruction
- β 0.1.7 Registers and cache
- β 0.1.8 RAM β the desk
- β 0.1.9 Storage β HDD vs SSD vs NVMe
- β 0.1.10 Motherboard, chipset, buses
- β 0.1.11 GPU β the artist and the parallel calculator
- β 0.1.12 Power, cooling, the case
- β O β keyboard, mouse, USB, monitor
- β UEFI β the pre-OS whisper
- β 0.1.15 The full boot sequence
- π§ͺ 0.1.L1 Lab β open the box
Chapter 0.2 β Operating System β¬
Skeleton only β full notes coming after Chapter 0.1 is reviewed.
- β¬ What software actually is
- β¬ Compiled vs interpreted
- β¬ What an OS does (3 jobs)
- β¬ Kernel vs userland
- β¬ Processes and threads
- β¬ Memory management
- β¬ File systems
- β¬ Users, groups, permissions
- β¬ Windows daily-user view
- β¬ Windows internals 1 β Registry, services, scheduled tasks
- β¬ Windows internals 2 β Event Viewer, Task Manager (security lens)
- β¬ Linux β what and why
- β¬ Linux filesystem hierarchy
- β¬ Linux users, sudo, permissions
- β¬ Linux services, systemd, /var/log
- β¬ macOS quick orientation
- β¬ The terminal β your real keyboard
- β¬ Bash basics
- β¬ PowerShell basics
- π§ͺ Lab A β Install Ubuntu in VirtualBox
- π§ͺ Lab B β Live in the Linux terminal for a week
Chapter 0.3 β Networking β¬
Skeleton only.
- β¬ The postal-system analogy
- β¬ What a network actually is
- β¬ IP addresses (v4 / v6)
- β¬ Subnets and CIDR
- β¬ MAC addresses and Ethernet
- β¬ Switches, hubs, routers
- β¬ The OSI model in 7 layers
- β¬ TCP vs UDP
- β¬ Ports and sockets
- β¬ DNS
- β¬ DHCP
- β¬ HTTP
- β¬ HTTPS and TLS
- β¬ TLS handshake step by step
- β¬ Certificates and PKI
- β¬ Wi-Fi (WPA2 / WPA3)
- β¬ Firewalls
- β¬ VPNs
- π§ͺ Lab A β Wireshark a TLS handshake
- π§ͺ Lab B β
dig,nslookup,traceroutereal packet journey
Chapter 0.4 β Programming Literacy β¬
Skeleton only. You donβt need to write all these β you need to read them.
- β¬ What βcodeβ really is
- β¬ Compiled vs interpreted (revisited)
- β¬ Python refresher (security lens)
- β¬ Bash refresher
- β¬ PowerShell refresher
- β¬ Reading C β pointers, memory, why malware lives here
- β¬ Reading JavaScript
- β¬ Reading SQL β and where injection happens
- β¬ Regex literacy
- β¬ YAML and JSON β the cloud config languages
- β¬ Reading HTTP requests/responses
Chapter 0.5 β Security Foundations β¬
Skeleton only. The heart of Phase 0.
- β¬ Why we need security β three breach stories
- β¬ The CIA triad
- β¬ Threats, vulnerabilities, exploits, risk
- β¬ AAA β Authentication, Authorization, Accounting
- β¬ Defense in depth
- β¬ Zero trust
- β¬ Threat actor types
- β¬ Hashing β one-way math
- β¬ Symmetric crypto (AES)
- β¬ Asymmetric crypto (RSA, ECC)
- β¬ Digital signatures
- β¬ Certificates and PKI revisited
- β¬ Common attacks 1 β phishing, social engineering
- β¬ Common attacks 2 β malware families
- β¬ Common attacks 3 β MITM, replay, brute force
- β¬ Web attacks intro β SQLi, XSS, CSRF
- β¬ MITRE ATT&CK as a map
- β¬ OWASP Top 10 walkthrough
- π§ͺ Lab A β Crack a hash with Hashcat
- π§ͺ Lab B β DVWA / PortSwigger Academy basics
Chapter 0.6 β Cloud, Intro β¬
Skeleton only.
- β¬ The cloud demystified
- β¬ Why companies moved to the cloud
- β¬ IaaS / PaaS / SaaS
- β¬ The big 3 β AWS, Azure, GCP
- β¬ Regions, AZs, edge
- β¬ Sign up for AWS Free Tier safely
- β¬ Your first EC2
- β¬ Your first S3 bucket (and the famous βS3 leakβ pattern)
- β¬ IAM intro
- β¬ The Shared Responsibility Model
- β¬ Real cloud horror story (Capital One / Accenture)
- β¬ Cloud cost discipline
Chapter 0.7 β AI/ML Security, Intro β¬
Skeleton only.
- β¬ What an ML model actually is β security reframe
- β¬ Training vs inference attack surface
- β¬ LLMs from the inside
- β¬ RAG, agents, fine-tuning vocabulary
- β¬ Where the AI attack surface lives
- β¬ Prompt injection β the headline attack
- β¬ OWASP LLM Top 10 β name and one-liners
- β¬ Why AI Security is a new field
Chapter 0.8 β Phase 0 Capstone β¬
- β¬ Phase 0 review β six topics in one summary
- β¬ 50-term glossary self-quiz
- π§ͺ Capstone β walk through a real (small) breach report and identify which Phase 0 concepts each step involves. Becomes a public blog post in your portfolio.
π¦ Phase 1 β Security+ (planned)
Will be designed in detail after Phase 0 is complete. The same six topic areas, deeper. Capstone: pass CompTIA Security+.
Topics revisited:
- Machine β processes, memory, registers at the level where buffer overflows make sense
- OS β Windows + Linux internals at defender level
- Networking β comfortable with Wireshark and packet analysis
- Security β full Sec+ syllabus
- Cloud β AWS hands-on basics (EC2, S3, IAM, VPC)
- AI Security β OWASP LLM Top 10 read properly
π¦ Phase 2 β AWS Security Specialty (planned)
The Cloud Security niche. The cert that gets you hired in Sydney.
Topics revisited:
- Machine β virtualization, hypervisors, containers
- OS β production Linux, container internals (namespaces, cgroups)
- Networking β VPC peering, transit gateway, private endpoints
- Security β SIEM / EDR / IR practitioner
- Cloud β IAM deep dive, KMS, GuardDuty, Security Hub, CloudTrail, network security, secrets, container & K8s security, Essential Eight
- AI Security β hands-on prompt injection lab, adversarial ML reading
π¦ Phase 3 β GIAC GAIA (planned)
The endgame. AI/ML Security expertise.
Topics revisited:
- Machine β GPU architecture for ML
- OS β ML runtimes, model-serving stacks
- Networking β model APIs and inference traffic
- Security β AI red teaming, threat modelling
- Cloud β securing AI workloads (Bedrock, SageMaker, Azure OpenAI)
- AI Security β full OWASP LLM Top 10 with labs, NIST AI RMF, MITRE ATLAS, hands-on red teaming, adversarial ML, supply chain attacks
π¦ Phase 4 β Practitioner / Portfolio (ongoing, no cert)
No more cert pressure. Real-world projects, blog posts, OSS contributions, conference talks.
Last updated: 2026-04-30. This map regenerates as each chapter completes.