{"id":25,"date":"2025-04-11T09:47:40","date_gmt":"2025-04-11T09:47:40","guid":{"rendered":"https:\/\/hackingwithj.com\/?page_id=25"},"modified":"2025-04-28T13:47:08","modified_gmt":"2025-04-28T13:47:08","slug":"contact","status":"publish","type":"page","link":"https:\/\/hackingwithj.com\/?page_id=25","title":{"rendered":"Roadmap"},"content":{"rendered":"\n<p>Welcome to my Pentesting Roadmap page! After 8 years of studying and working in IT, I decided to fully dive into cybersecurity \u2014 more specifically <strong>ethical hacking and pentesting<\/strong>. This page shows where I stand today, what I&#8217;m currently learning, and where I want to go.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udcda Current Skills<\/h2>\n\n\n\n<p>Over the years, I&#8217;ve built a solid IT foundation that I\u2019m now using to grow into a professional pentester:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Database Knowledge<\/strong>: SQL programming (queries, reading code, basic optimization)<\/li>\n\n\n\n<li><strong>Code Analysis<\/strong>: Able to read and understand code (e.g., Java, Python, PHP)<\/li>\n\n\n\n<li><strong>Networking Fundamentals<\/strong>: TCP\/IP, routing, switching, firewall basics<\/li>\n\n\n\n<li><strong>Security Basics<\/strong>:\n<ul class=\"wp-block-list\">\n<li>CEH (Certified Ethical Hacker) Foundation course completed<\/li>\n\n\n\n<li>Knowledge of OWASP Top 10 vulnerabilities<\/li>\n\n\n\n<li>Basic use of vulnerability scanning tools (Nessus, OpenVAS)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>System Management<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Windows Server &amp; Active Directory experience<\/li>\n\n\n\n<li>Linux server basics (Ubuntu, shell scripting)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>API Knowledge<\/strong>:\n<ul class=\"wp-block-list\">\n<li>REST API understanding<\/li>\n\n\n\n<li>Practical experience with Postman and basic manual API testing<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83c\udfaf Current Focus Areas<\/h2>\n\n\n\n<p>Right now, I&#8217;m working on sharpening my skills even further by following professional courses like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>EC-Council CEH (Certified Ethical Hacker)<\/strong> full course<\/li>\n\n\n\n<li><strong>Cisco Ethical Hacker<\/strong><\/li>\n\n\n\n<li><strong>API Security Fundamentals<\/strong> (through <a class=\"\" href=\"https:\/\/www.apisecuniversity.com\/\">APIsec University<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>At the company where I work as a <strong>Functional Manager<\/strong>, I&#8217;m also allowed to <strong>internally hack and test<\/strong> our systems and APIs as part of my learning process. This gives me real-world, hands-on experience that I can use to grow faster.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udee3\ufe0f Roadmap 2025 and Beyond<\/h2>\n\n\n\n<p>Here\u2019s how I\u2019m planning to develop my pentesting skills:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Period<\/th><th>Goal<\/th><\/tr><\/thead><tbody><tr><td>Q2 2025<\/td><td>Finish CEH Certification, continue API security practice<\/td><\/tr><tr><td>Q3 2025<\/td><td>Start Offensive Security&#8217;s OSCP preparation (Penetration Testing)<\/td><\/tr><tr><td>Q4 2025<\/td><td>Learn Active Directory pentesting &amp; network exploitation<\/td><\/tr><tr><td>2026<\/td><td>Achieve OSCP certification<\/td><\/tr><tr><td>2026 and beyond<\/td><td>Specialize in API security and web application pentesting<\/td><\/tr><tr><td>Long Term<\/td><td>Possibly Offensive Security&#8217;s OSWA (Web Assessor) or CRTO (Red Team Ops) certifications<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udccc Why Document This?<\/h2>\n\n\n\n<p>I believe that <strong>clear goals and accountability<\/strong> are super important when growing in cybersecurity. This page not only tracks my own progress \u2014 but hopefully inspires others starting their journey too. Thanks for reading! \ud83d\ude80<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to my Pentesting Roadmap page! After 8 years of studying and working in IT, I decided to fully dive into cybersecurity \u2014 more specifically ethical hacking and pentesting. This page shows where I stand today, what I&#8217;m currently learning, and where I want to go. \ud83d\udcda Current Skills Over the years, I&#8217;ve built a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"class_list":["post-25","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/hackingwithj.com\/index.php?rest_route=\/wp\/v2\/pages\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackingwithj.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hackingwithj.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hackingwithj.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hackingwithj.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=25"}],"version-history":[{"count":5,"href":"https:\/\/hackingwithj.com\/index.php?rest_route=\/wp\/v2\/pages\/25\/revisions"}],"predecessor-version":[{"id":135,"href":"https:\/\/hackingwithj.com\/index.php?rest_route=\/wp\/v2\/pages\/25\/revisions\/135"}],"wp:attachment":[{"href":"https:\/\/hackingwithj.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}