Home/Roadmaps/Cybersecurity Analyst
SecurityFuture-Proof: 9.5/10

Cybersecurity Analyst Roadmap 2025

Learn how to become a cybersecurity analyst in 2025. Understand networking, ethical hacking, incident response, and security fundamentals. Step-by-step free roadmap with courses from TryHackMe, Professor Messer, and more.

6-9 months
6 Learning Steps
8 Key Terms

Overview

Cybersecurity is protecting systems, networks, and data from attacks. Cybersecurity analysts are the defenders—monitoring for threats, investigating incidents, implementing protections, and keeping bad actors out. Think of it as being a digital security guard: Cybersecurity is one of the most AI-resistant fields.

As AI creates new attack vectors, the need for human defenders grows. With increasing regulations (GDPR, DORA, SOC2) and rising cyber threats, demand consistently outpaces supply. Certifications like Security+ still matter here.

This is one of the safest career bets in tech for the next decade.

Expected Salaries (2025)

USA$90K-$150K
Europe€50K-€95K
India₹8L-₹20L
UK€45K-€85K

Key Terms You Should Know

CIA Triad

The three pillars of security: Confidentiality (only authorized people access data), Integrity (data isn't tampered with), Availability (systems are accessible when needed). Every security decision balances these three.

Vulnerability

A weakness in a system that could be exploited. Outdated software, misconfigured settings, weak passwords—all are vulnerabilities waiting to be found.

Exploit

Code or technique that takes advantage of a vulnerability. Finding a vulnerability is step one; an exploit is how attackers actually break in.

Penetration Testing (Pentesting)

Legally attempting to break into systems to find vulnerabilities before bad actors do. Pentesters think like attackers to help organizations improve defenses.

Red Team / Blue Team

Red team: Offensive security—attacking to find weaknesses. Blue team: Defensive security—monitoring, detecting, responding to attacks. Many analysts start blue team.

SIEM (Security Information & Event Management)

A tool that collects and analyzes logs from across the organization. When something suspicious happens, the SIEM helps you find it. Splunk, Elastic SIEM, and Microsoft Sentinel are popular examples.

OWASP Top 10

A list of the 10 most critical web application security risks. Includes SQL injection, cross-site scripting (XSS), broken authentication. Essential knowledge for any security professional.

CTF (Capture The Flag)

Security competitions where you solve challenges to find hidden "flags." Great way to practice skills in a legal, game-like environment. TryHackMe and HackTheBox host popular CTFs.

The Complete Learning Path

Follow these steps in order. Each builds on the previous. All resources are 100% free.

1

Learn Networking Fundamentals

Duration: 4-6 weeks

What you'll learn: How computers communicate. You can't secure networks you don't understand. Learn IP addresses, ports, protocols (TCP/IP, HTTP, DNS), and how data flows.

Why it's essential: Every attack travels over a network. Understanding networking helps you spot anomalies, analyze traffic, and configure firewalls.

  • OSI and TCP/IP models
  • IP addresses, subnets, and routing
  • Common protocols (HTTP, HTTPS, DNS, SSH, FTP)
  • Ports and services
  • Firewalls and VPNs
TCP/IPDNSFirewallsWireshark
2

Learn Linux & Command Line

Duration: 4-6 weeks

What you'll learn: Most security tools run on Linux. You'll learn command line navigation, file permissions, process management, and basic scripting.

Security-specific skills:

  • Navigating file systems and finding files
  • Understanding permissions and ownership
  • Reading and searching logs
  • Running security tools from terminal
  • Basic bash scripting for automation
Linux CLIBash scripting
3

Learn Security Fundamentals

Duration: 6-8 weeks

What you'll learn: Core security concepts—CIA triad, authentication, encryption, common attacks and defenses. This is the conceptual foundation for everything else.

Topics to cover:

  • Authentication and authorization
  • Encryption basics (symmetric, asymmetric, hashing)
  • Common attacks: phishing, SQL injection, XSS, CSRF
  • OWASP Top 10 web vulnerabilities
  • Security policies and frameworks
CIA triadOWASP Top 10Risk assessment
4

Learn Ethical Hacking (Hands-On)

Duration: 8-12 weeks

What you'll learn: Practical offensive security skills in legal environments. Reconnaissance, scanning, exploitation, and post-exploitation. Learning to attack helps you defend.

Key tools to learn:

Practice legally on platforms like TryHackMe and HackTheBox.

  • Nmap: Network scanning and discovery
  • Burp Suite: Web application testing
  • Metasploit: Exploitation framework
  • John the Ripper/Hashcat: Password cracking
NmapBurp SuitePassword cracking
5

Learn Incident Response & SIEM

Duration: 4-6 weeks

What you'll learn: What happens when there's a breach? Detection, investigation, containment, eradication, and recovery. Plus using SIEM tools to monitor and analyze security events.

Blue team skills:

  • Understanding attack indicators (IOCs)
  • Log analysis and correlation
  • Incident response procedures
  • Basic digital forensics
  • Writing incident reports
Incident responseSIEMThreat hunting
6

Get Certified & Build Portfolio

Duration: 4-8 weeks

Certifications matter in security more than most fields. CompTIA Security+ is the standard entry-level certification.

Build your portfolio:

  • Write-ups from CTF challenges
  • Home lab documentation
  • Blog posts explaining security concepts
  • Contributions to security tools or research
Security+Home labTechnical blog

Save This Roadmap

Download a PDF version to track your progress offline.

Vetted Education Vision
Vetted Education. Zero Tuition.

The Gateway is Open.

Enter SpacesRead Our Mission