Welcome to our comprehensive guide! In this section, we provide a well-structured walkthrough for TryHackMe rooms. Our resources include a detailed learning roadmap, recommended learning paths, modules, rooms, and network rooms to help you progress through your cybersecurity journey. Additionally, we will share our unique roadmap designed to take you from a beginner to an advanced level in cybersecurity using TryHackMe.
Learning Roadmaps
Learning Roadmap for Penetration Tester
Pre Security
- Introduction to Cyber Security
- Offensive Security Intro
- Defensive Security Intro
- Career in Cyber
- Network Fundamentals
- What is Networking ?
- Intro to LAN
- OSI Model
- Packets & Frames
- Extending Your Network
- How The Web Works
- DNS in detail
- HTTP in Detail
- How Websites Work
- Putting it all together
- Linux Fundamentals
- Linux Fundamentals Part 1
- Linux Fundamentals Part 2
- Linux Fundamentals Part 3
- Windows Fundamentals
- Windows Fundamentals 1
- Windows Fundamentals 2
- Windows Fundamentals 3
Cyber Securtity 101
- Start Your Cyber Security Journey
- Offensive Security Intro
- Defensive Security Intro
- Search Skills
- Linux Fundamentals
- Linux Fundamentals Part 1
- Linux Fundamentals Part 2
- Linux Fundamentals Part 3
- Windows and AD Fundamentals
- Windows Fundamentals 1
- Windows Fundamentals 2
- Windows Fundamentals 3
- Active Directory Basics
- Command Line
- Windows Command Line
- Windows PowerShell
- Linux Shells
- Networking
- Networking Concepts
- Networking Essentials
- Networking Core Protocols
- Networking Secure Protocols
- Wireshark: The Basics
- Tcpdump: The Basics
- Nmap: The Basics
- Cryptography
- Cryptography Basics
- Public Key Cryptography Basics
- Hashing Basics
- John the Ripper: The Basics
- Exploitation Basics
- Moniker Link (CVE-2024-21413)
- Metasploit: Introduction
- Metasploit: Exploitation
- Metasploit: Meterpreter
- Blue
- Web Hacking
- Web Application Basics
- JavaScript Essentials
- SQL Fundamentals
- Burp Suite: The Basics
- OWASP Top 10 – 2021
- Offensive Security Tooling
- Hydra
- Gobuster: The Basics
- Shells Overview
- SQLMap: The Basics
- Defensive Security
- Defensive Security Intro
- SOC Fundamentals
- Digital Forensics Fundamentals
- Incident Response Fundamentals
- Logs Fundamentals
- Security Solutions
- Introduction to SIEM
- Firewall Fundamentals
- IDS Fundamentals
- Vulnerability Scanner Overview
- Defensive Security Tooling
- CyberChef: The Basics
- CAPA: The Basics
- REMnux: Getting Started
- FlareVM: Arsenal of Tools
- Build Your Cyber Security Career
- Security Principles
- Careers in Cyber
- Training Impact on Teams
Junior Penetration Tester
- Introduction to Cyber Security
- Offensive Security Intro
- Defensive Security Intro
- Careers in Cyber
- Introduction to Pentesting
- Pentesting Fundamentals
- Priciples of Security
- Introduction to Web Hacking
- Walking An Application
- Content Discovery
- Subdomain Enumeration
- Authentication Bypass
- IDOR
- File Inclusion
- Intro to SSRF
- Intro to Cross-site Scripting
- Command Injection
- SQL Injection
- Burp Suite
- Burp Suite: The Basics
- Buro Suite: Repeater
- Burp Suite: Intruder
- Burp Suite: Other Modules
- Burp Suite: Extensions
- Network Security
- Passive Reconnaissance
- Active Reconnaissance
- Nmap Live Host Discovery
- Nmap Basic Port Scans
- Nmap Advanced Port Scans
- Nmap Post Port Scans
- Protocols and Servers
- Protols and Servers 2
- Net Sec Challenge
- Vulnerability Research
- Vulnerabilities 101
- Exploit Vulnerabilities
- Vulnerability Capstone
- Metasploit
- Metasploit: Introduction
- Metsaploit: Exploitation
- Metsaploit: Meterpreter
- Privilege Escalation
- What the Shell?
- Linux Privilege Escalation
- Windows Privilege Escalation
Web Fundamentals
- How The Web Works
- DNS in detail
- HTTP in Detail
- How Websites Work
- Putting it all together
- Introduction to Web Hacking
- Walking An Application
- Content Discovery
- Subdomain Enumeration
- Authentication Bypass
- IDOR
- File Inclusion
- Intro to SSRF
- Intro to Cross-site Scripting
- Command Injection
- SQL Injection
- Burp Suite
- Burp Suite: The Basics
- Burp Suite: Repeater
- Burp Suite: Intruder
- Burp Suite: Other Modules
- Burp Suite: Extensions
- Web Hacking Fundamentals
- How Websites Work
- HTTP in Detail
- Burp Suite: The Basics
- OWASP Top 10 – 2021
- OWASP Juice Shop
- Upload Vulnerabilities
- Pickle Rick
Web Application Pentesting
- Authentication
- Enumeration & Brute Force
- Session Management
- JWT Security
- OAuth Vulnerabilities
- Multi-Factor Authentication
- Hammer
- Injection Attacks
- Advanced SQL Injection
- NoSQL Injection
- XXE Injection
- Server-side Template Injection
- LDAP Injection
- ORM Injection
- Injectics
- Advanced Server-Side Attacks
- Insecure Deserialisation
- SSRF
- File Inclusion, Path Traversal
- Race Conditions
- Prototype Pollution
- Include
- Advanced Client-Side Attacks
- XSS
- CSRF
- DOM-Based Attacks
- CORS & SOP
- Whats Your Name?
- HTTP Request Smuggling
- HTTP Request Smuggling
- HTTP/2 Request Smuggling
- Request Smuggling: WebSockets
- HTTP Browser Desync
- El Bandito
Red Teaming
- Red Team Fundamentals
- Red Team Fundamentals
- Red Team Engagements
- Red Team Threat Intel
- Red Team OPSEC
- Intro to C2
- Initial Access
- Red Team Recon
- Weaponization
- Password Attacks
- Phishing
- Post Compromise
- The Lay of the Land
- Enumeration
- Windows Privilege Escalation
- Windows Local Persistence
- Lateral Movement and Pivoting
- Data Exfiltration
- Host Evasions
- Windows Internals
- Introduction to Windows API
- Abusing Windows Internals
- Introduction to Antivirus
- AV Evasion: Shellcode
- Obfuscation Principles
- Signature Evasion
- Bypassing UAC
- Runtime Detection Evasion
- Evading Logging and Monitoring
- Living Off the Land
- Network Security Evasion
- Network Security Solutions
- Firewalls
- Sandbox Evasion
- Compromising Active Directory
- Active Directory Basics
- Breaching Active Directory
- Enumerating Active Directory
- Lateral Movement and Pivoting
- Exploiting Active Directory
- Persisting Active Directory
- Credentials Harvesting
Learning Roadmap for Security Analyst
Pre Security
- Introduction to Cyber Security
- Offensive Security Intro
- Defensive Security Intro
- Career in Cyber
- Network Fundamentals
- What is Networking ?
- Intro to LAN
- OSI Model
- Packets & Frames
- Extending Your Network
- How The Web Works
- DNS in detail
- HTTP in Detail
- How Websites Work
- Putting it all together
- Linux Fundamentals
- Linux Fundamentals Part 1
- Linux Fundamentals Part 2
- Linux Fundamentals Part 3
- Windows Fundamentals
- Windows Fundamentals 1
- Windows Fundamentals 2
- Windows Fundamentals 3
Cyber Securtity 101
- Start Your Cyber Security Journey
- Offensive Security Intro
- Defensive Security Intro
- Search Skills
- Linux Fundamentals
- Linux Fundamentals Part 1
- Linux Fundamentals Part 2
- Linux Fundamentals Part 3
- Windows and AD Fundamentals
- Windows Fundamentals 1
- Windows Fundamentals 2
- Windows Fundamentals 3
- Active Directory Basics
- Command Line
- Windows Command Line
- Windows PowerShell
- Linux Shells
- Networking
- Networking Concepts
- Networking Essentials
- Networking Core Protocols
- Networking Secure Protocols
- Wireshark: The Basics
- Tcpdump: The Basics
- Nmap: The Basics
- Cryptography
- Cryptography Basics
- Public Key Cryptography Basics
- Hashing Basics
- John the Ripper: The Basics
- Exploitation Basics
- Moniker Link (CVE-2024-21413)
- Metasploit: Introduction
- Metasploit: Exploitation
- Metasploit: Meterpreter
- Blue
- Web Hacking
- Web Application Basics
- JavaScript Essentials
- SQL Fundamentals
- Burp Suite: The Basics
- OWASP Top 10 – 2021
- Offensive Security Tooling
- Hydra
- Gobuster: The Basics
- Shells Overview
- SQLMap: The Basics
- Defensive Security
- Defensive Security Intro
- SOC Fundamentals
- Digital Forensics Fundamentals
- Incident Response Fundamentals
- Logs Fundamentals
- Security Solutions
- Introduction to SIEM
- Firewall Fundamentals
- IDS Fundamentals
- Vulnerability Scanner Overview
- Defensive Security Tooling
- CyberChef: The Basics
- CAPA: The Basics
- REMnux: Getting Started
- FlareVM: Arsenal of Tools
- Build Your Cyber Security Career
- Security Principles
- Careers in Cyber
- Training Impact on Teams
SOC Level 1
- Cyber Defence Frameworks
- Junior Security Analyst Intro
- Pyramid Of Pain
- Cyber Kill Chain
- Unified Kill Chain
- Diamond Model
- MITRE
- Summit
- Eviction
- Cyber Threat Intelligence
- Intro to Cyber Threat Intel
- Threat Intelligence Tools
- Yara
- OpenCTI
- MISP
- Friday Overtime
- Trooper
- Network Security and Traffic Analysis
- Traffic Analysis Essentials
- Snort
- Snort Challenge – The Basics
- Snort Challenge – Live Attacks
- NetworkMiner
- Zeek
- Zeek Exercises
- Brim
- Wireshark: The Basics
- Wireshark: Packet Operations
- Wireshark: Traffic Analysis
- TShark: The Basics
- TShark: CLI Wireshark Features
- TShark Challenge I: Teamwork
- TShark Challenge II: Directory
- Endpoint Security Monitoring
- Intro to Endpoint Security
- Core Windows Processes
- Sysinternals
- Windows Event Logs
- Sysmon
- Osquery: The Basics
- Wazuh
- Monday Monitor
- Retracted
- Security Information and Event Management
- Introduction to SIEM
- Investigating with ELK 101
- ItsyBitsy
- Splunk: Basics
- Incident handling with Splunk
- Investigating with Splunk
- Benign
- Digital Forensics and Incident Response
- DFIR: An Introduction
- Windows Forensics 1
- Windows Forensics 2
- Linux Forensics
- Autopsy
- Redline
- KAPE
- Volatility
- Velociraptor
- TheHive Project
- Intro to Malware Analysis
- Unattended
- Disgruntled
- Critical
- Secret Recipe
- Phishing
- Phishing Analysis Fundamentals
- Phishing Emails in Action
- Phishing Analysis Tools
- Phishing Prevention
- The Greenholt Phish
- Snapped Phish-ing Line
- SOC Level 1 Capstone Challenges
- Tempest
- Boogeyman 1
- Boogeyman 2
- Boogeyman 3
SOC Level 2
- Log Analysis
- Intro to Logs
- Log Operations
- Intro to Log Analysis
- Advanced Splunk
- Splunk: Exploring SPL
- Splunk: Setting up a SOC Lab
- Splunk: Dashboards and Reports
- Splunk: Data Manipulation
- Fixit
- Advanced ELK
- Logstash: Data Processing Unit
- Custom Alert Rules in Wazuh
- Advanced ELK Queries
- Slingshot
- Detection Engineering
- Intro to Detection Engineering
- Tactical Detection
- Threat Intelligence for SOC
- Sigma
- SigHunt
- Aurora EDR
- SOAR
- Threat Hunting
- Threat Hunting: Introduction
- Threat Hunting: Foothold
- Threat Hunting: Pivoting
- Threat Hunting: Endgame
- Hunt Me I: Payment Collectors
- Hunt Me II: Typo Squatters
- Threat Emulation
- Intro to Threat Emulation
- Threat Modelling
- Atomic Red Team
- CALDERA
- Atomic Bird Goes Purple #1
- Atomic Bird Goes Purple #2
- Incident Response
- Preparation
- Identification & Scoping
- Threat Intel & Containment
- Eradication & Remediation
- Lessons Learned
- Tardigrade
- Malware Analysis
- x86 Architecture Overview
- x86 Assembly Crash Course
- Windows Internals
- Dissecting PE Headers
- Basic Static Analysis
- MalBuster
- Advanced Static Analysis
- Basic Dynamic Analysis
- Dynamic Analysis: Debugging
- Anti-Reverse Engineering
- MalDoc: Static Analysis
Learning Roadmap for Security Engineer
Pre Security
- Introduction to Cyber Security
- Offensive Security Intro
- Defensive Security Intro
- Career in Cyber
- Network Fundamentals
- What is Networking ?
- Intro to LAN
- OSI Model
- Packets & Frames
- Extending Your Network
- How The Web Works
- DNS in detail
- HTTP in Detail
- How Websites Work
- Putting it all together
- Linux Fundamentals
- Linux Fundamentals Part 1
- Linux Fundamentals Part 2
- Linux Fundamentals Part 3
- Windows Fundamentals
- Windows Fundamentals 1
- Windows Fundamentals 2
- Windows Fundamentals 3
Cyber Securtity 101
- Start Your Cyber Security Journey
- Offensive Security Intro
- Defensive Security Intro
- Search Skills
- Linux Fundamentals
- Linux Fundamentals Part 1
- Linux Fundamentals Part 2
- Linux Fundamentals Part 3
- Windows and AD Fundamentals
- Windows Fundamentals 1
- Windows Fundamentals 2
- Windows Fundamentals 3
- Active Directory Basics
- Command Line
- Windows Command Line
- Windows PowerShell
- Linux Shells
- Networking
- Networking Concepts
- Networking Essentials
- Networking Core Protocols
- Networking Secure Protocols
- Wireshark: The Basics
- Tcpdump: The Basics
- Nmap: The Basics
- Cryptography
- Cryptography Basics
- Public Key Cryptography Basics
- Hashing Basics
- John the Ripper: The Basics
- Exploitation Basics
- Moniker Link (CVE-2024-21413)
- Metasploit: Introduction
- Metasploit: Exploitation
- Metasploit: Meterpreter
- Blue
- Web Hacking
- Web Application Basics
- JavaScript Essentials
- SQL Fundamentals
- Burp Suite: The Basics
- OWASP Top 10 – 2021
- Offensive Security Tooling
- Hydra
- Gobuster: The Basics
- Shells Overview
- SQLMap: The Basics
- Defensive Security
- Defensive Security Intro
- SOC Fundamentals
- Digital Forensics Fundamentals
- Incident Response Fundamentals
- Logs Fundamentals
- Security Solutions
- Introduction to SIEM
- Firewall Fundamentals
- IDS Fundamentals
- Vulnerability Scanner Overview
- Defensive Security Tooling
- CyberChef: The Basics
- CAPA: The Basics
- REMnux: Getting Started
- FlareVM: Arsenal of Tools
- Build Your Cyber Security Career
- Security Principles
- Careers in Cyber
- Training Impact on Teams
SOC Level 1
- Introduction to Security Engineering
- Security Engineer Intro
- Security Principles
- Introduction to Cryptography
- Identity and Access Management
- Threats and Risks
- Governance & Regulation
- Threat Modelling
- Risk Management
- Vulnerability Management
- Network and System Security
- Secure Network Architecture
- Linux System Hardening
- Microsoft Windows Hardening
- Active Directory Hardening
- Network Device Hardening
- Network Security Protocols
- Virtualization and Containers
- Intro to Cloud Security
- Auditing and Monitoring
- Software Security
- OWASP Top 10 – 2021
- OWASP API Security Top 10 – 1
- OWASP API Security Top 10 – 2
- SSDLC
- SAST
- DAST
- Weaponizing Vulnerabilities
- Introduction to DevSecOps
- Mother’s Secret
- Traverse
- Managing Incidents
- Intro to IR and IM
- Logging for Accountability
- Becoming a First Responder
- Cyber Crisis Management
SOC Level 2
- Secure Software Development
- Introduction to DevSecOps
- SDLC
- SSDLC
- Security of the Pipeline
- Intro to Pipeline Automation
- Source Code Security
- CI/CD and Build Security
- Security in the Pipeline
- Dependency Management
- SAST
- DAST
- Mother’s Secret
- Container Security
- Intro to Containerisation
- Intro to Docker
- Intro to Kubernetes
- Container Vulnerabilities
- Container Hardening
- Infrastructure as Code
- Intro to IaC
- On-Premises IaC
- Cloud-based IaC