Back to roadmap
Network security

Network Security Study Plan

Milestone-based roadmap for network fundamentals, defensive controls, attack analysis, wireless security, and practical lab work.

Network security includes defensive and offensive methods used to protect networks and keep them functional. This plan assumes basic computer skills such as Linux basics, everyday OS usage, internet research, and file editing.

Expected pace

8 weeks

Assuming basic computer science comfort.

Focus areas

Understand networks and how traffic moves.
Learn common vulnerabilities and how to detect them.
Practice defensive controls for resilient networks.
Build hands-on skill with packet analysis and labs.

In short

Start with OSI, TCP/IP, protocols, addressing, routing, and switching.
Learn firewall, IDS/IPS, VPN, hardening, and segmentation basics.
Use Nmap, Wireshark, tcpdump, Netcat, and Metasploit basics responsibly.
Explore wireless security and traffic anomaly analysis.
Practice on platforms such as TryHackMe and Root-Me.
Network FundamentalsNetwork DefenseNetwork Attacks and AnalysisWireless and Advanced TopicsResources

Section 1

Network Fundamentals

2 weeks

Learn the core concepts of networks: architecture, protocols, OSI model, addressing, and traffic flow.

Week 1-2: Core Concepts

Build the network vocabulary and mental model needed before defense or attack analysis.

OSI and TCP/IP models: layers, encapsulation, and where common protocols fit.
Core protocols: IP, TCP, UDP, ICMP, DNS, DHCP, HTTP/HTTPS, and SSH.
Addressing: IPv4, IPv6, subnetting, MAC addresses, and ARP basics.
Routing and switching: how data moves between local and remote networks.
Practice: read packet captures and identify protocol layers.
Practice: subnet small networks by hand before using calculators.
Networking for Ethical HackersThe Cyber MentorYou Suck at SubnettingNetworkChuckTryHackMe Pre-Security Path

Section 2

Network Defense

2 weeks

Learn how to protect and maintain a functional network using layered defensive technologies.

Week 3-4: Defensive Technologies

Firewalls: stateful vs stateless filtering.
WAF basics and where web-layer controls differ from network firewalls.
IDS/IPS basics with tools such as Snort and Suricata.
VPNs: tunneling, IPsec, and SSL VPN concepts.
Hardening: disable unused services and close unnecessary ports.
Segmentation: VLANs, trust zones, and limiting lateral movement.
Port security and device access control basics.
Practice: design a simple segmented home or lab network.
Blue Teaming and Network Defense SeriesLoiLiangYangTryHackMe Network Security Module

Section 3

Network Attacks and Analysis

2 weeks

Understand common weaknesses, offensive techniques, and packet-level analysis methods used to detect problems.

Week 5-6: Offensive Concepts and Analysis

Scanning with Nmap and Masscan: host discovery and port scanning.
Service enumeration and interpreting scan output.
Sniffing with Wireshark and tcpdump.
Packet analysis: filters, conversations, streams, and protocol details.
Common attacks: MITM, ARP spoofing, DoS/DDoS, and DNS poisoning.
Tool basics: Netcat for connectivity testing and simple data transfer.
Metasploit basics for understanding exploit workflow in lab environments.
Practice: compare normal traffic with suspicious traffic in packet captures.
TryHackMe Wireshark ModuleHakTip: Netcat

Section 4

Wireless and Advanced Topics

2 weeks

Expand into wireless security, resilient network architecture, and anomaly-focused traffic analysis.

Week 7-8: Wireless and Beyond

Wireless security: WEP, WPA2, WPA3, and why older standards fail.
Wireless handshakes and safe lab analysis.
Aircrack-ng basics in controlled environments.
Network architecture: DMZ, bastion hosts, and management networks.
Zero Trust basics for network access decisions.
Traffic analysis: identify anomalies and malware-like communication patterns.
Practice: document risks in a sample office network diagram.
Root-Me Network Challenges

Section 5

Resources

Use labs, public learning platforms, and personal projects to turn concepts into visible skill.

Create free accounts on TryHackMe and Root-Me for hands-on cybersecurity practice.
Create a GitHub account and publish cybersecurity notes, scripts, diagrams, or lab writeups.
TryHackMe Scripting for Pentesters
Use YouTube and labs to go deeper into programming for cybersecurity.
Use X/Twitter or similar channels to follow cybersecurity news and build professional reputation.
After Network Security, go deeper with Blue Team, Detection and Response.