┌──────────────────────────────────────────────────────────────┐
│                          CYBERSECURITY                       │
│                       Bachelor's Degree                      │
│                                                              │
│              Draws knowledge from fields like:               │
└──────────────────────────────────────────────────────────────┘
                              ▲
                              │
┌──────────────────────────────────────────────────────────────┐
│  Cyber is something you have to go and learn separately.     │
│  You can have "security" elements in any engineering,        │
│  but that doesn't mean Cyber is included.                    │
└──────────────────────────────────────────────────────────────┘
                              ▲
                              │
        ┌────────────────────────────────────────────────┐
        │                COMPUTER SCIENCE                │
        │            (Computational Umbrella)            │
        ├──────────────────────────┬─────────────────────┤
        │                          │                     │
        │  • Algorithms, compilers │  • Energy, signals  │
        │  • Operating Systems     │  • Electronics      │
        │    (OS)                  │  • Logic, firmware  │
        │  • Programming           │    (Electronics     │
        │  • Embedded Engineering  │     Umbrella)       │
        │    (Software / Systems)  │                     │
        │                          │                     │
        └───────────────▲──────────┴──────────▲──────────┘
                        │                     │
        ┌───────────────┴────────────┐ ┌──────┴─────────────┐
        │     COMPUTER ENGINEERING   │ │  ELECTRICAL        │
        │                            │ │  ENGINEERING       │
        │  • Machine and digital     │ │                    │
        │    systems design          │ │  • Energy, signals │
        │                            │ │  • Electronics     │
        │                            │ │  • Logic, firmware │
        └───────────────┬────────────┘ └──────────┬─────────┘
                        │                         │
                        └──────────────┬──────────┘
                                       │
┌──────────────────────────────────────────────────────────────┐
│  The most direct and secure way to become skilled in "cyber" │
│  is to study Computer Science where cyber is fully           │
│  "integrated".                                               │
└──────────────────────────────────────────────────────────────┘
──────────────────────────────────┘



════════════════════════════════════════════════════════════════
                        CYBER SECURITY
════════════════════════════════════════════════════════════════


┌───────────────────────────────┐
│   CTFs (Capture the Flag)     │
├───────────────────────────────┤
│  HackTheBox                   │
│  TryHackMe                    │
│  VulnHub                      │
│  picoCTF                      │
│  SANS Holiday Hack Challenge  │
└───────────────────────────────┘


┌───────────────────────────────┐
│        CERTIFICATIONS         │
├───────────────────────────────┤
│  Beginner Certifications      │
│   • CompTIA A+                │
│   • CompTIA Linux+            │
│   • CompTIA Network+          │
│   • CCNA                      │
│   • CompTIA Security+         │
│                               │
│  Advanced Certifications      │
│   • CEH     • CISA            │
│   • CISM    • GSEC            │
│   • GPEN    • GWAPT           │
│   • GIAC    • OSCP            │
│   • CREST   • CISSP           │
└───────────────────────────────┘


════════════════════════════════════════════════════════════════
                    FUNDAMENTAL IT SKILLS
════════════════════════════════════════════════════════════════

┌──────────────────────────────────────────────────────────────┐
│ Computer Hardware Components                                 │
│ Connection Types and their function                          │
│ OS-Independent Troubleshooting                               │
│ Understand Basics of Popular Suites                          │
│ Basics of Computer Networking                                │
└──────────────────────────────────────────────────────────────┘

        ┌───────────────┐        ┌───────────────┐
        │     NFC       │        │   Bluetooth   │
        ├───────────────┤        ├───────────────┤
        │     WiFi      │        │   Infrared    │
        └───────────────┘        └───────────────┘

        ┌───────────────┐        ┌───────────────┐
        │ MS Office     │        │   iCloud      │
        ├───────────────┤        ├───────────────┤
        │ Google Suite  │        │               │
        └───────────────┘        └───────────────┘


════════════════════════════════════════════════════════════════
                    OPERATING SYSTEMS
════════════════════════════════════════════════════════════════

        ┌───────────────┐   ┌───────────────┐   ┌───────────────┐
        │   Windows     │   │     Linux     │   │     macOS     │
        └───────────────┘   └───────────────┘   └───────────────┘

Learn for each OS:
---------------------------------------------------------------
• Installation and Configuration
• Different Versions and Differences
• Navigating using GUI and CLI
• Understand Permissions
• Installing Software and Applications
• Performing CRUD on Files
• Troubleshooting
• Common Commands
---------------------------------------------------------------


════════════════════════════════════════════════════════════════
                    NETWORKING KNOWLEDGE
════════════════════════════════════════════════════════════════

┌──────────────────────────────────────────────────────────────┐
│ Basics of Subnetting                                         │
│ Public vs Private IP Addresses                               │
│ IP Terminology                                               │
│   localhost | loopback | CIDR | subnet mask                  │
│   default gateway                                            │
└──────────────────────────────────────────────────────────────┘

Understand the terminology:
---------------------------------------------------------------
VLAN | DMZ | ARP | VM
DHCP | DNS | NAT | IP
Router | Switch | VPN
MAN | LAN | WAN | WLAN
---------------------------------------------------------------

Understand these services:
---------------------------------------------------------------
DHCP | DNS | NTP | IPAM
---------------------------------------------------------------

Network Topologies:
---------------------------------------------------------------
Star | Ring | Mesh | Bus
---------------------------------------------------------------

Network Protocols:
---------------------------------------------------------------
SSH | RDP | FTP | SFTP
HTTP / HTTPS | SSL / TLS
---------------------------------------------------------------


════════════════════════════════════════════════════════════════
                    VIRTUALIZATION
════════════════════════════════════════════════════════════════

Common Virtualization Technologies:
---------------------------------------------------------------
VMware | VirtualBox | ESXi | Proxmox
---------------------------------------------------------------

Basics of Virtualization:
---------------------------------------------------------------
Hypervisor | Guest OS | Host OS | VM
---------------------------------------------------------------


════════════════════════════════════════════════════════════════
                 TROUBLESHOOTING & TOOLS
════════════════════════════════════════════════════════════════

Command-Line Tools:
---------------------------------------------------------------
ipconfig | ping | dig | netstat
route | nmap | tcpdump | arp
tracert | nslookup | iptables
---------------------------------------------------------------

Categories:
---------------------------------------------------------------
Packet Sniffers
Port Scanners
Protocol Analyzers
---------------------------------------------------------------


════════════════════════════════════════════════════════════════
              AUTHENTICATION & ACCESS CONTROL
════════════════════════════════════════════════════════════════

Authentication Methodologies:
---------------------------------------------------------------
Kerberos | RADIUS | LDAP | SSO
Certificates | Local Authentication
---------------------------------------------------------------

════════════════════════════════════════════════════════════════
                SECURITY SKILLS AND KNOWLEDGE
════════════════════════════════════════════════════════════════


┌──────────────────────────────────────────────────────────────┐
│ UNDERSTAND COMMON HACKING & SECURITY CONCEPTS                │
├──────────────────────────────────────────────────────────────┤
│ Understand Common Hacking Tools                              │
│ Understand Common Exploit Frameworks                         │
│ Understand Concept of Defense in Depth                       │
│ Understand Concept of Runbooks                               │
│ Understand Basics of Forensics                               │
│ Basics and Concepts of Threat Hunting                        │
│ Basics of Vulnerability Management                           │
│ Basics of Reverse Engineering                                │
│ Penetration Testing Rules of Engagement                      │
│ Perimeter vs DMZ vs Segmentation                             │
└──────────────────────────────────────────────────────────────┘


┌──────────────────────────────────────────────────────────────┐
│ CORE SECURITY CONCEPTS                                       │
├──────────────────────────────────────────────────────────────┤
│ Core Concepts of Zero Trust                                  │
│ Roles of Compliance and Auditors                             │
│ Understand the Definition of Risk                            │
│ Understand Backups and Resiliency                            │
│ Cyber Kill Chain                                             │
│ MFA & 2FA                                                    │
│ Honeypots                                                    │
│ Operating System Hardening                                   │
│ Understand Concept of Isolation                              │
│ Basics of IDS and IPS                                        │
│ Authentication vs Authorization                              │
└──────────────────────────────────────────────────────────────┘


┌──────────────────────────────────────────────────────────────┐
│ SECURITY OPERATIONS & ANALYSIS                               │
├──────────────────────────────────────────────────────────────┤
│ Blue / Red / Purple Teams                                    │
│ False Negative / False Positive                              │
│ True Negative / True Positive                                │
│ Basics of Threat Intel, OSINT                                │
│ Understand Handshakes                                        │
│ Understand CIA Triad                                         │
│ Privilege Escalation                                         │
│ Web-Based Attacks and OWASP Top 10                           │
│ Learn how Malware Works and Types                            │
└──────────────────────────────────────────────────────────────┘


════════════════════════════════════════════════════════════════
            TOOLS FOR INCIDENT RESPONSE & DISCOVERY
════════════════════════════════════════════════════════════════

dig | nmap | ping | arp | cat | dd
tail | hping | head | grep | nslookup
tracert | winhex | autopsy | ipconfig
curl | wireshark | memdump
FTK Imager


════════════════════════════════════════════════════════════════
                    BASICS OF CRYPTOGRAPHY
════════════════════════════════════════════════════════════════

Salting | Hashing | Key Exchange
Private vs Public Keys
PKI | Obfuscation


════════════════════════════════════════════════════════════════
                    ATTACK TYPES & DIFFERENCES
════════════════════════════════════════════════════════════════

Phishing | Whishing | Whaling
Smishing | Spam vs Spim
Shoulder Surfing | Tailgating
Dumpster Diving
Zero Day
Social Engineering
Reconnaissance | Impersonation
Watering Hole Attack
Drive-By Attack
Typo Squatting
Brute Force vs Password Spray


════════════════════════════════════════════════════════════════
                        COMMON ATTACKS
════════════════════════════════════════════════════════════════

DoS vs DDoS | MITM | CSRF
Spoofing | SQL Injection | XSS
Evil Twin | VLAN Hopping
DNS Poisoning
Deauth Attack
Replay Attack
Rogue Access Point
Buffer Overflow
Memory Leak
Pass the Hash
Directory Traversal


════════════════════════════════════════════════════════════════
                    SECURITY FRAMEWORKS
════════════════════════════════════════════════════════════════

Diamond Model
Kill Chain
ATT&CK


════════════════════════════════════════════════════════════════
                    COMMON STANDARDS
════════════════════════════════════════════════════════════════

ISO | RMF
NIST | CIS | CSF


════════════════════════════════════════════════════════════════
         USING TOOLS FOR UNINTENDED / DUAL PURPOSES
════════════════════════════════════════════════════════════════

LOLBAS | GTFOBins | WADCOMS


════════════════════════════════════════════════════════════════
                    LOGS & TELEMETRY
════════════════════════════════════════════════════════════════

Event Logs | syslogs | netflow
Packet Captures | Firewall Logs


════════════════════════════════════════════════════════════════
                    HARDENING CONCEPTS
════════════════════════════════════════════════════════════════

MAC-based | NAC-based
Port Blocking | Group Policy
Sinkholes | ACLs | Patching
Jump Server | Endpoint Security


════════════════════════════════════════════════════════════════
                SECURITY CONTROLS & TECHNOLOGIES
════════════════════════════════════════════════════════════════

Antivirus | Antimalware | EDR | DLP
Firewall & Next-Gen Firewall
HIPS | NIDS | NIPS
Host-Based Firewall
Sandboxing
EAP vs PEAP | WPS | ACL
WPA vs WPA2 vs WPA3 vs WEP


════════════════════════════════════════════════════════════════
                    COMMON SECURITY TOOLS
════════════════════════════════════════════════════════════════

VirusTotal | urlscan | any.run
Joe Sandbox | urlvoid | WHOIS


════════════════════════════════════════════════════════════════
                INCIDENT RESPONSE PROCESS
════════════════════════════════════════════════════════════════

Preparation
Identification
Containment
Eradication
Recovery
Lessons Learned


════════════════════════════════════════════════════════════════
                THREAT CLASSIFICATION
════════════════════════════════════════════════════════════════

Zero Day
Known vs Unknown
APT


════════════════════════════════════════════════════════════════
                    AUDIENCE & STAKEHOLDERS
════════════════════════════════════════════════════════════════

Stakeholders | HR | Legal
Compliance | Management


════════════════════════════════════════════════════════════════
                 CLOUD SKILLS AND KNOWLEDGE
════════════════════════════════════════════════════════════════


┌──────────────────────────────────────────────────────────────┐
│ Understand the Concept of Security in the Cloud              │
│ Understand the differences between cloud and on-premises     │
│ Understand the concept of Infrastructure as Code             │
│ Understand the Concept of Serverless                         │
│ Understand the basics and general flow of deploying in cloud │
└──────────────────────────────────────────────────────────────┘


┌───────────────────────────────┐
│     CLOUD SERVICES MODELS     │
├───────────────────────────────┤
│ SaaS                          │
│ PaaS                          │
│ IaaS                          │
└───────────────────────────────┘


┌───────────────────────────────┐
│        CLOUD MODELS           │
├───────────────────────────────┤
│ Private                       │
│ Public                        │
│ Hybrid                        │
└───────────────────────────────┘


┌───────────────────────────────┐
│   COMMON CLOUD ENVIRONMENTS   │
├───────────────────────────────┤
│ AWS                           │
│ GCP                           │
│ Azure                         │
└───────────────────────────────┘


┌───────────────────────────────┐
│    COMMON CLOUD STORAGE       │
├───────────────────────────────┤
│ S3                            │
│ Dropbox                       │
│ iCloud                        │
│ Box                           │
│ OneDrive                      │
│ Google Drive                  │
└───────────────────────────────┘


════════════════════════════════════════════════════════════════
                    PROGRAMMING SKILLS
════════════════════════════════════════════════════════════════

          ┌──────────────┐
          │   Python     │
          └──────────────┘
          ┌──────────────┐
          │     Go       │
          └──────────────┘
          ┌──────────────┐
          │ JavaScript   │
          └──────────────┘
          ┌──────────────┐
          │     C++      │
          └──────────────┘
          ┌──────────────┐
          │    Bash      │
          └──────────────┘
          ┌──────────────┐
          │ PowerShell   │
          └──────────────┘


────────────────────────────────────────────────────────────────
                         KEEP LEARNING
────────────────────────────────────────────────────────────────

════════════════════════════════════════════════════════════════
                        OFFSEC / REVERSE ENGINEER
════════════════════════════════════════════════════════════════
Exploit development
Reverse engineering
Tradecraft
Weaponization
                              ▲
                              │
════════════════════════════════════════════════════════════════
               MALWARE DEVELOPMENT / ANALYSIS
════════════════════════════════════════════════════════════════
Low-level & high-level
Backends
Tooling
                              ▲
                              │
════════════════════════════════════════════════════════════════
                    KERNELS & FIRMWARE
════════════════════════════════════════════════════════════════
OS internals
Architectures
Vulnerabilities
                              ▲
                              │
════════════════════════════════════════════════════════════════
                ADVANCED OPERATING SYSTEMS
════════════════════════════════════════════════════════════════
Servers
Infrastructure
Adversarial mindset
                              ▲
                              │
════════════════════════════════════════════════════════════════
                   ADVANCED NETWORKING
════════════════════════════════════════════════════════════════
TCP/IP
Routing
Protocols (NOT circuits)
                              ▲
                              │
════════════════════════════════════════════════════════════════
                    COMPUTER SCIENCE
════════════════════════════════════════════════════════════════
Algorithms
Compilers
Operating Systems
Programming

════════════════════════════════════════════════════════════════
                        CYBERSECURITY
════════════════════════════════════════════════════════════════
Takes knowledge from all fields
Yet is a separate field altogether
                              ▲
                              │
════════════════════════════════════════════════════════════════
                     COMPUTER SCIENCE
════════════════════════════════════════════════════════════════
Umbrella discipline
Algorithms
Compilers
Operating Systems
Networking
Can include embedded engineering as a discipline
                              ▲
                              │
════════════════════════════════════════════════════════════════
                   COMPUTER ENGINEERING
════════════════════════════════════════════════════════════════
End goal is embedded engineering
and machine design
                              ▲
                              │
════════════════════════════════════════════════════════════════
                  ELECTRICAL ENGINEERING
════════════════════════════════════════════════════════════════
Energy
Signals
Electronics
Low-level firmware

════════════════════════════════════════════════════════════════
                 DISCIPLINE CONVERGENCE MODEL
════════════════════════════════════════════════════════════════

COMPUTER SCIENTIST — THE BRAIN

High-level computation.
Algorithms.
Logic.
Artificial intelligence.
Mainframes.
Cybersecurity.
How machines think.
How to make them learn.
Quantum computing.
The unknown.

This is where the horizon expands.

The scientist discovers knowledge.
There is no final goal.
No single book.
No single equation.

Research does not come with instructions.

The engineer then takes that science
and applies it to practical solutions.

This is why you will find:
• Computer scientists working on hardware
• Electrical engineers working on software

Everything is converging.


────────────────────────────────────────────────────────────────

As described by a Mechanical Engineer:

1. ELECTRICAL ENGINEER — THE NERVOUS SYSTEM

Interconnection.
Energy.
Signals.
Life.

Without nerves, there is no communication.
Without energy, there is no life.


2. MECHANICAL ENGINEER — THE SKELETON

Efficiency.
Muscles.
Movement.
Structure.
Strength.

The body that moves, resists, and works.

Without mechanics, everything collapses.


3. COMPUTER ENGINEER — THE REPTILIAN BRAIN

Hardware.
Embedded systems.
Machine-to-machine communication.
Control of basic functions.

Keeps the system alive and stable.
Ensures sensors, actuators, and logic
can understand each other.

┌──────────────────────────────────────────────────────────────────────────────┐
│                    EMBEDDED SYSTEMS ENGINEERING ROADMAP                      │
├──────────────────────────────────────────────────────────────────────────────┤
│                                                                              │
│ SOFTWARE DOMAIN                                                              │
│                                                                              │
│ Programming Languages:                                                       │
│   C, C++, Python, Assembly, Rust                                             │
│                                                                              │
│ Programming Fundamentals:                                                    │
│   Algorithms & Data Structures                                               │
│   Design Patterns                                                            │
│   State Machines                                                             │
│   Memory Management                                                          │
│                                                                              │
│ Operating Systems:                                                           │
│   Embedded Linux:                                                            │
│     Linux Kernel, Device Drivers, U-Boot                                     │
│     Buildroot / Yocto                                                        │
│     Threading / Parallelism, IPC, Qt Framework                               │
│                                                                              │
│   RTOS:                                                                      │
│     RTOS Basics, FreeRTOS, Zephyr, QNX                                       │
│     µC/OS, RT-Thread                                                         │
│                                                                              │
│ Microcontrollers:                                                            │
│   GPIO, ADC / DAC, Timers / Counters, PWM                                    │
│   Watchdog, Interrupts, DMA                                                  │
│   Clock Management, Power Management                                         │
│   Bootloader / DFU                                                           │
│                                                                              │
│ SDLC & Tooling:                                                              │
│   SDLC Models: Agile / SCRUM, V-Model                                        │
│   Version Control: SVN, Git                                                  │
│   Build Systems: Compilers / GCC, Make / CMake                               │
│                 Bash Scripting, Docker                                       │
│   Debugging: JTAG / SWD, GDB, OpenOCD                                        │
│                                                                              │
│ Testing & Quality:                                                           │
│   TDD & Unit Testing                                                         │
│   CI / CD Pipelines                                                          │
│   SIL / HIL Testing                                                          │
│   Standards & Certifications                                                 │
│                                                                              │
│ Embedded Domains:                                                            │
│   Embedded Security                                                          │
│   Embedded GUI                                                               │
│   IoT, Edge AI                                                               │
│   AUTOSAR                                                                    │
│                                                                              │
│ INTERFACES & PROTOCOLS                                                       │
│                                                                              │
│ Basic Interfaces: UART, I2C, SPI                                             │
│ High-Speed: Ethernet, USB, PCIe                                              │
│ Wireless: Bluetooth, Wi-Fi, LoRa, Zigbee                                     │
│           Thread, Matter, UWB                                                │
│ Industrial: Modbus, Profinet, EtherCAT, MQTT, CoAP                           │
│ Automotive: CAN, LIN, MOST, FlexRay                                          │
│ Network / Cellular: TCP/IP, UDP                                              │
│                     GSM / LTE, LTE-M / 5G, NB-IoT                            │
│                                                                              │
│ HARDWARE DOMAIN                                                              │
│                                                                              │
│ Electronics:                                                                 │
│   Basic Math & Calculus                                                      │
│   Principles of Electric Circuits                                            │
│   Electronics Fundamentals                                                   │
│   Digital Design                                                             │
│   Computer Architecture                                                      │
│                                                                              │
│ Test Equipment:                                                              │
│   Multimeter                                                                 │
│   Logic / Protocol Analyzer                                                  │
│   Oscilloscope                                                               │
│                                                                              │
│ Prototyping Skills:                                                          │
│   Breadboarding                                                              │
│   Hardware Design Basics                                                     │
│   PCB Design / EMC                                                           │
│   Soldering / Rework                                                         │
│                                                                              │
│ Advanced Hardware:                                                           │
│   FPGA Development                                                           │
│                                                                              │
│ System-Level Concepts:                                                       │
│   Memory Technologies & File Systems                                         │
│   Hardware Simulation / Emulation                                            │
│   Sensors & Actuators                                                        │
│   Digital Signal Processing                                                  │
│   Control Theory                                                             │
│                                                                              │
│ SOFT SKILLS                                                                  │
│                                                                              │
│   Communication Skills                                                       │
│   Problem-Solving & Critical Thinking                                        │
│   Teamwork & Collaboration                                                   │
│   Organization & Time Management                                             │
│   Self-Driven & Independent Learning                                         │
│   Adaptability & Patience                                                    │
│                                                                              │
│ APPLICATION DOMAINS                                                          │
│                                                                              │
│   Automotive                                                                 │
│   Healthcare                                                                 │
│   Robotics                                                                   │
│   Aerospace                                                                  │
│   Consumer Electronics                                                       │
│   Telecommunications                                                         │
│   Agriculture                                                                │
│                                                                              │
└──────────────────────────────────────────────────────────────────────────────┘


┌──────────────────────────────────────────────────────────────────────────────┐
│                               LEGAL NOTICE                                   │
├──────────────────────────────────────────────────────────────────────────────┤
│                                                                              │
│ All users and viewers are expected to comply fully with all applicable       │
│ federal, state, and international laws.                                      │
│                                                                              │
│ The authors and publishers of this material do not accept liability for      │
│ any misuse, misinterpretation, or unauthorized application of the            │
│ information provided.                                                        │
│                                                                              │
│ This content is provided for educational and informational purposes only.    │
│                                                                              │
│ Always operate within legal and ethical boundaries.                          │
│                                                                              │
└──────────────────────────────────────────────────────────────────────────────┘

← back