12-Phase Security Masterclass

The Void
Networking Roadmap

A 12-phase technical journey from binary foundations to adversarial traffic analysis.

๐Ÿ›ก๏ธ

Absolute Basics

Establishing the mental model of connectivity.

๐Ÿ”ข

IP Mastery

Subnetting and addressing proficiency.

๐Ÿงช

Traffic Analysis

Capturing and dissecting raw packets.

๐Ÿ’€

Adversarial

Learning how infrastructure is exploited.

01

Foundation & Models

Phases 1-2: Understanding how data moves and the 7-layer architecture.

03

IP Addressing

Phase 3: Deep dive into binary, CIDR, and subnetting logic.

๐Ÿ’ก

Critical Requirement

Do not move forward until you master subnetting. It is the language of network boundaries.

04-06

MAC, Ports & DNS

Phases 4-6: Local network concepts, protocols, and name resolution.

๐Ÿ†”

MAC & Local Network

MAC addresses, ARP (IP mapping), Switches vs Hubs, and VLAN basics.

Layer 2
๐Ÿ”

DNS & Name Resolution

How DNS works, record types (A, MX, TXT), and tools like nslookup/dig.

Protocols

๐Ÿ”น Phase 5: Common Ports & Services

Service Port Risk Context
SSH 22 Remote Management (Encryption)
DNS 53 Name resolution (UDP/53)
HTTP/S 80/443 Web traffic (Encryption check)
SMB 445 File sharing (High risk/Lateral move)
RDP 3389 Remote Desktop (Brute force target)
07-09

Routing, Devices & Linux

Phases 7-9: Traffic flow, network hardware, and command line mastery.

10-12

Analysis, Security & Advanced

Phases 10-12: Packet analysis, network attacks, and interview readiness.