
Time to become absolute units on the Cybersecurity Battlefield
Now we are pretty much at the end of the multi-part series. I want to express getting to this part can take months to even years. But you have determined we are finally ready to dive into the world of Cybersecurity.
We know how the OS operates, we understand how computers communicate with each other as well as how network services such FTP or even SSH allows you to remotely communicate with another server or device etc. So its time we understand, HOW to defend it. This is the ROOT of Cybersecurity. How do we DEFEND or SECURE our assets or devices. Think of Cybersecurity as a fortified base. It’s a lot easier to attack a location that has maybe 1 or 2 guards, maybe just 1 guy in a watch tower. Compared to a base that has a guard on every corner on the outside and inside of the perimeters. They have multiple archers spread around, they have scouts who constantly explore the surrounding areas, etc. This is basic concept of layering your defences and the more defences they are the more the attacker has to take into consideration.
The importance or basics of cyber is like I said learning how to defend. So this is where everything from Encryption, Access Control, Best Standards, Firewalls, Application Control, Airgaps, Physical Security. Their is so much but we are here to learn the basics and what is the standard or need to know. Just like putting a lock on a door to putting a password on a user account, we start from the basics and work our way up. Which everything below will teach you. I recommend everyone to read and learn and do Security+. Just do it, and its like the start of understanding the thin top of the layer coating for security and how to defend your wonderful devices.
So lets cover the trainings or potential directions you may take to learn.
On-Hands Trainings: Tryhackme – This is the best platform BY FAR IMO the best one and one of the biggest ways I learned. It is guided, it holds your hand as well as challenges you. This platform is all you will need to learn and be prepared for cyber. BUT I will add some other options, CBTnuggets – I have used a few of them but its not super specific or it targets certifications as a whole BUT good for certification prep.
Video Trainings: So their is multiple source or videos for cybersecurity BUT as usual youtube the security topics. But I will add some of my favorites or go to’s.
Security+ Prep by Professor Messer
John Hammond for Offensive or General Security Topics
Cybermentor
Books and Digital Content: The books or digital content I would suggest is either googling topics BUT for books I have a few wonderful options
Security+ Prep Or whatever the current Security+ version prep.
GCIH – Certified Incident Handler – This is another certification book but knowledge is valuable this is coming from a “Forensics” approach.
CySA+ Certification Book – This is another certification book but the knowledge of how to be a Security Analyst or SOC analyst is valuable here.
Certifications: Certifications can vary BUT I will help cover ones that I think can help you get started.
CompTIA Security+
SSCP – Systems Security Certified Practitioner
Congratulations you have officially gotten into Cybersecurity now its time to find your speciality. Where you the Cybersecurity beginner can start pursuing more complex and advanced skills, which I mentioned in part 1, You can go offensive, defensive, forensics, management, auditing, consulting etc. You just have to find what you like in cyber and start researching what that field needs, the tools used, the skills required, maybe certifications or trainings needed. The cyberworld is your oyster and its time for you to have fun and enjoy.
I will be doing 1 more part as a bonus blog post to help give a personal message from me to you and maybe provide words of encouragement as well as how to maybe even get your first job or position in cyber.