Start Here — Cybersecurity Vault Triage You have landed on a 240-note vault organized into 14 branches. Reading it linearly is wrong. This page routes you to the right path based on who you are right now. If you are not sure which persona fits, default to "New to cybersecurity" — the path costs nothing extra and the foundations apply to everyone. "I am new to cybersecurity" You have used computers, you may work in IT, but you have never thought security-first as a discipline. Your path (4-8 weeks of casual reading): Read Foundations (Phase 0) end-to-end. 4 notes, ~1 hour. This is the framework everything else assumes. Read Phase 1 — Substrate for the curated 12-note first-pass path through Networking → Web Security → Cryptography. Skip notes that go deeper than you need on first pass; you can return. Read the Must-Know 30 list to see where you are vs where you want to be. Open Phase 2 — Offense / Defense (Paired) and read its first-pass 6 pairs. This is where the real skill starts compounding. The page makes the pairing operational (4-step ritual per pair) so you actually read both sides instead of one. Stop trying to learn everything. Specialize when you have a job context that demands it. "I am an IT admin / sysadmin / infrastructure engineer" You run systems. You want to harden what you have and reason confidently about risk. Your path: Phase 0 — Foundations — non-negotiable. Networking first, in full: Networking — most of it will be familiar, but the security framing of things you already know is the point. Attack Surface Mapping — what is actually exposed from where. Offensive Security / Recon — how attackers see your systems. Detection Engineering — the half that makes you employable for security work, not just IT work. Linux Privilege Escalation — if you run Linux servers, this is non-optional. Pick your specialty: Cloud if you run cloud, Wireless if you run office networks, DevSecOps if you own a build pipeline. "I am a software developer" You write code. You want to ship features that do not become headlines. Your path: Phase 0 — Foundations — the threat-modeling note in particular changes how you read tickets. Web Security in full. If you build web/mobile apps, this is your daily surface. API Security — likely your second daily surface. Cryptography focused on the application-correctness notes: password hashing, JWT correctness, AEAD, cert validation. DevSecOps — your build pipeline is part of the threat surface. Phase 2 pair — Offensive + Detection — even one read-through changes how you write code. Reach into Security Playbooks for the testing procedures you can actually run on your own code. "I am rebuilding fundamentals deliberately" You have been in security or adjacent for a while and want to clean up your model rather than learn the next tool. Your path: Phase 0 — Foundations — yes, even if you "know it". The reflexes named there are what stop senior practitioners from plateauing. Phase 1 in full, but reading for the connections between notes rather than the content of each note. Phase 2 read in pairs — Offensive and Detection Engineering note-by-note. This is the senior move that most "experienced" practitioners have never actually done. Audit your own Must-Know 30 gaps. If you cannot explain any of the 30 in 90 seconds, that is your next reading. Read Cryptography for correctness, not for memorization. Most "I know crypto" claims fail at AEAD, KDFs, or CSPRNG pitfalls. Walk one real system you own through Threat Modeling Quickstart. The exercise reveals which branch you should refresh next. "I want to break into security as a career" You want a job in security and you are working backward from there. Your path: Read all four personas above. Your real path is a mix of "new to cybersecurity" (foundations) + the persona closest to your current job (IT admin / developer) + the rebuilder discipline. Phase 0 + Phase 1 + Phase 2 is the minimum portfolio of understanding. Without it you will be a button-pusher for any tool stack. Security Playbooks is where understanding becomes capability. Pick three playbooks and execute them on owned/authorized targets until you can run them from memory. Phase 4 — Specialty Tracks — pick one track (API / Cloud / DevSecOps / Wireless) based on your job context. Generalists are valuable; "I am applying to every cyber job" candidates are not. Privacy, Anonymity & OPSEC is professionally useful too — every offensive engagement, every IR investigation, every threat-intel job has OPSEC requirements. "I just want to read one thing" Read What Is Cybersecurity, and Why It Is Not a Tool List. That note alone is worth more than most "Intro to cybersecurity" courses. Related navigation Cybersecurity Index — full branch listing and study order. Foundations — Phase 0 entry. Must-Know 30 — the 30-note diagonal must-know cut across branches. Security Playbooks — concept into procedure. Explore nearby notes CybersecurityPhase 4 — Specialty Tracks (Pick What Your Job Demands)Phase 4 is the **only phase you do not read linearly**. By design, it is job-context-chosen: you pick the specialty your role actually requires, learn it deeply... Privacy, Anonymity & OPSECAccount CorrelationAccount correlation is the process of linking separate activities or personas through shared accounts, recovery data, identifiers, devices, or repeated usage... Offensive Security / ReconActive ReconActive recon is information gathering that directly interacts with target infrastructure, services, or applications to validate or extend what passive recon... Attack Surface MappingAdmin Interface DiscoveryAdmin interface discovery is the process of identifying management, control-plane, support, diagnostic, or privileged interfaces that should be restricted but may... CryptographyAEAD and Nonce MisuseAuthenticated Encryption with Associated Data (AEAD) encrypts plaintext and authenticates both ciphertext and optional associated data. Nonce misuse happens when... Privacy, Anonymity & OPSECAnonymity Threat ModelsAn anonymity threat model is a structured account of who is trying to link an action to a person, what they can observe, and what privacy controls actually reduce...