FURULIE LLC
F
Full Learning Roadmap

Training Path

From zero to operator. Each phase builds on the last — scripting, labs, specialization, mastery. Mapped to certifications and real-world career roles.

1

Foundations

Linux Fundamentals
Networking (TCP/IP, DNS, HTTP)
Python ScriptingPowerShell Scripting
Cryptography Basics

"Prepares you for hands-on hacking labs and tool operation."

CompTIA A+CompTIA Network+
2

Hacking Lab Operations

"You can now participate in CTFs and understand real vulnerability classes."

CompTIA Security+eJPT
3

Specialization

"Ready for OSCP-level challenges and professional operations."

OSCP (PEN-200)BTL1CySA+
4

Mastery

CyberWorld Missions
Advanced Exploit Dev
Intelligence Fusion
Purple Team Operations
Custom Tool Development

"Operating at senior/lead level across multiple domains."

OSEPOSEDGPENGCIH

Standard Issue Toolchain

The essential instrumentation for each phase of operation. These are the standards you will master.

1

Foundations

VS Code
Editor
Git
Version Control
Python
Scripting
VirtualBox
Virtualization
2

Web & Network

Nmap
Scanning
Wireshark
Packet Analysis
Burp Suite
Web Proxy
Shodan
OSINT
3

Exploitation

Metasploit
Framework
Mimikatz
Cred Dumping
BloodHound
AD Mapping
Cobalt Strike
C2 (Sim)
4

Advanced Ops

Ghidra
Reverse Eng
Elastic
SIEM / DFIR
Custom C2
Covert Infra
Maltego
Complex OSINT

Skill Proficiency Matrix

Cross-domain competency tracking. A balanced operator understands offensive capability, defensive analysis, and intelligence fusion.

Phase 1
Reconnaissance

Passive & active information gathering.

Network Analysis

Packet capture & traffic flow analysis.

Python Scripting

Automating basic tasks & tool creation.

Public Records

Searching open databases & registries.

Phase 2
Vulnerability Scanning

Identifying weaknesses in systems.

Log Analysis

SIEM basics & event correlation.

API Security

Securing REST/GraphQL endpoints.

Social Media Intel

SOCMINT pivoting and verification.

Phase 3
Exploitation

Buffer overflows & web app attacks.

Incident Response

Containment, eradication, recovery.

CI/CD Security

Pipeline hardening & sast/dast.

Geolocating

Image analysis & physical recon.

Phase 4
Adv. Evasion

AV/EDR bypass & obfuscation.

Threat Hunting

Proactive adversary detection.

Malware Analysis

Reverse engineering binaries.

C2 Infrastructure

Design & deployment of C2.