https://mermaid.js.org/syntax/gantt.html

The Gantt chart turned out really well, turned out exactly how it was meant to

Screen shot

VS Actual Gantt chart written in code

gantt 
	title Daily Schedule
	dateFormat HH:mm
	axisFormat %H:%M
	Day Start : milestone, m1, 07:00, 2m
	Email and coffee: 07:10,30m
	Typing Practice - Sit at folding table on divan, increase this time as it becomes more comfortable.: 07:40,15m
	Breakfast: 08:00,30m 
	Python Lesson: 08:30,30m
	Linux Lesson: 09:00, 30m
	Jobsearch: 09:30, 30m
	Revision: 10:00, 30m
	Get Ready for work: 10:30, 30m
	Work: 11:00, 6h
	Drive home: 17:00, 30m
	Dinner: 17:30, 1h
	relax - play a game/watch a movie or some TV/guitar practice: 18:30, 3h
	wind down - tea and a book: 21:30, 30m
	Day End : milestone, m2, 22:00, 4m
	


The skill tree on the other hand still has problems, in Obsidian, it displays far to large and does not render out onto the site

Screen shot

VS Actual Gantt chart written in code

flowchart TD
   Phase 1 — Foundations
  F1["IT basics: OS, files/permissions, users, CLI"]
  F2["Networking: IP, DNS, DHCP, routing, ports"]
  F3["Home lab: 1Ă—Windows + 1Ă—Linux (VMs or old PC)"]
  F4["Scripting: Python or PowerShell (30–60 min daily)"]
  F5["Git + GitHub (version control)"]
  A2 --> F1 --> F2 --> F3 --> F4 --> F5

   Specialization choices (fan-out nodes)
  O0["Helpdesk / IT Support"]
  O1["SOC Analyst (Blue Team)"]
  O2["GRC / Risk"]
  O3["Penetration Testing"]
  O4["Cloud Security"]
  A2 --> O0
  A2 --> O1
  A2 --> O2
  A2 --> O3
  A2 --> O4

   Track: SOC / Blue Team
  T1["Logs 101: syslog, Windows Events, NetFlow"]
  T1a["SIEM lab: Wazuh/ELK/Splunk; build 5 detections"]
  T1b["Network sec: Suricata/Snort; PCAP with Wireshark"]
  T1c["Hands-on labs (daily) + notes"]
  O1 --> T1 --> T1a --> T1b --> T1c --> P2a

   Track: Penetration Testing
  T3["Web basics: HTTP, auth, SQL; Linux/Bash"]
  T3a["Tools: Burp, Nmap, Metasploit; OWASP Top 10"]
  T3b["CTFs/labs + 2 full sample reports"]
  O3 --> T3 --> T3a --> T3b --> P2a

   Phase 2 — Portfolio & Proof
  P2a["Document 3–5 projects as case studies"]
  P2b["Public notes/blog; tidy GitHub READMEs"]
  P2c["One-page resume aligned to target role"]
  P2d["LinkedIn tuned; list 20 target companies"]
  P2a --> P2b --> P2c --> P2d --> P3

   Phase 4 — First Role → Security Role
  P4["Land entry role (helpdesk/analyst/intern)"]
  R2["Automate a pain point; measure impact"]
  R3["Ask for security-adjacent tasks (EDR, patching, logging)"]
  R4["Update portfolio with on-the-job wins"]
  P4 --> R2 --> R3 --> R4 --> P5

  %% Phase 5 — Specialize & Advance
  P5["Pick path: Blue/Red/Purple/GRC/Cloud/AppSec"]
  S5a["Advanced cert or project tied to path"]
  S5b["Mentor others; present at meetup or blog"]
  goal([Cyber security professional in chosen track])
  P5 --> S5a --> S5b --> goal

Back to the Central Hub