12-Phase Security Masterclass

The Void
Networking Roadmap

A 12-phase technical journey from binary foundations to adversarial traffic analysis.
Curated by Ismail TP | Cybersecurity Researcher

๐Ÿ›ก๏ธ

Absolute Basics

Establishing the mental model of connectivity.

๐Ÿ”ข

IP Mastery

Subnetting and addressing proficiency.

๐Ÿงช

Traffic Analysis

Capturing and dissecting raw packets.

๐Ÿ’€

Adversarial

Learning how infrastructure is exploited.

01

Foundation & Models

Phases 1-2: Understanding how data moves and the 7-layer architecture.

03

IP Addressing

Phase 3: Deep dive into binary, CIDR, and subnetting logic.

๐Ÿ’ก

Critical Requirement

Do not move forward until you master subnetting. It is the language of network boundaries.

04-06

MAC, Ports & DNS

Phases 4-6: Local network concepts, protocols, and name resolution.

07-09

Routing, Devices & Linux

Phases 7-9: Traffic flow, network hardware, and command line mastery.

10-12

Analysis, Security & Advanced

Phases 10-12: Packet analysis, network attacks, and interview readiness.