Guide to CTF Prep/Becoming a 1337 Hacker

Prerequisites and General Advice

Cybersecurity is a vast collection of different fields so this guide is a short intro to many different sections of cybersecurity and not a complete guide.
This guide does not necessarily have to be done in order. For instance, if you are a web developer(and know either JavaScript, PHP, and/or SQL) and aren't interested in learning things that aren't web security you can skip to the Web week and look through the resources at the bottom for web security practice sites. If you are a computer engineer in low-level languages(C/C++ and/or Assembly), you probably might want to just do reverse engineering and binary exploitation since those will be easier for you to transition into.
I strongly recommend general programming knowledge, although you could do these tutorials without it or while learning programming simultaneously.
This site and this course is a good starting point for complete beginners to programming and there are a ton more online.
I chose tutorials that were hands-on and engaging so readers don't lose interest. CTF stands for Capture the Flag, which are hacking contests that happen online every weekend: CTFtime
A rule of thumb is to try each problem for 20 minutes to the best of your ability-use google, look at man pages and online documentation THEN ask for help.
Most websites like HacktheBox, TryHackMe, picoCTF, and others have Discords and subreddits that are full of professionals.
Another site you may want to checkout is meetup.com, to meet other hackers and coders who can mentor you, or your local 2600 hacker group(i.e. Phoenix).

Installing Linux Virtual Machines

We use Linux since Kali comes with tools needed for attack-defense and jeopardy CTFs.
What is linux?
How to install VM:

Week 1: Let’s Hack!

If you don’t want to learn general cybersecurity or participate in attack-defense CTFs, skip this week. However, I would recommend for beginners to do this since it is important cybersecurity knowledge, hacking things is fun, and it is similar to what a professional hacker does.

Week 2: Web and Privelege Escalation Intro

Week 3: Binary exploitation and reverse engineering

Week 4: Binary Exploitation (sometimes called Pwn) and Reverse Engineering 2

Week 5 (Binary exploitation)

Week 6

Additional resources

ULTIMATE list for EVERYTHING HACKING(if there is one link you click on this is it)
Step-by-step binary exploitation course with help

More advanced exploitation resources

Exploit courses
Another course
Smash the stack! And maybe the heap too?
Too good to be true
Epic subreddit
Amazing course I can't find videos of