5 strategies to learn cybersecurity
Grab a cup of coffee ☕, and learn
There are too many online guides available on the internet which tell you about lots of stuff. This massive pile of information merely adds to our confusion. This article will give you a direction to help you understand how to learn about cybersecurity by yourself.

Introduction
Today, everything is available on the internet, and everyone turns to search engines when they have a question. When you search without some guidance, all you are left with is more questions than before.
This process sometimes gets complicated when exploring a new field of study, and the available information is too much for you to understand.
Let’s understand that every person is unique, and there is no “one shoe fits all” solution.
Everyone learns differently and has different interests.
So, this article will help you figure out your path.
Let’s dive in.
1st Strategy – Evaluate your field of interest.

Cybersecurity is just the tip of the iceberg, and many subdomains are below that, contributing to the foundation of cybersecurity. These subdomains have multiple technologies and job types associated with them. Some are shown below:
Application security
This domain specializes in investigating flaws and finding vulnerabilities in front or back-end applications so that it is resistant to cyber-attacks. It also includes suggesting solutions to fixing those flaws.
Usually, burpsuit and vulnerability management tools are used.
Cloud security
The cloud security domain focuses on the security of cloud infra and its assets.
Types of cybersecurity functions managed by cloud service providers are:
- Database and storage security
- Encryption of cloud data at rest, in motion, and in use
- Infrastructure security
- Networking security
- Application security functions
- Data protection
- Identity and access management
Critical infrastructure security
Organizations involved in critical infrastructure (e.g., communications, dams, energy, public sector, and transportation) rely on networks, applications, systems, and digital assets protected by exceptional security procedures and cybersecurity solutions.
Cyberattacks targeting SCADA (supervisory control and data acquisition) systems and other legacy systems have frequently targeted critical infrastructure. STUXNET was one such example of a cyberattack.
Data security
Data security, a subset of information security, protects the availability, confidentiality, and integrity of digital assets in motion (while they are being communicated) and at rest (when they are being kept).
To do this, it integrates a variety of cybersecurity solutions. It also includes encryption critical management solutions, data leakage prevention tools, etc.
Endpoint security
Cyberattacks most frequently originate from desktops, laptops, mobile devices, servers, and other endpoints. All of these devices’ data is safeguarded by endpoint security.
To defend networks against cyberattacks that leverage endpoints as ports of entry, it also includes other forms of cybersecurity.
It includes technologies like EDR, XDR, AV and other tools.
IoT (Internet of Things) security
IoT security aims to reduce the risks that these increasingly commonplace gadgets pose to businesses.
It segments them to reduce network exposure, employs various forms of cybersecurity to identify and categorize them, and works to reduce risks associated with unpatched firmware and other related vulnerabilities.
Mobile security
Cybersecurity techniques used to prevent unwanted access to mobile devices – such as laptops, tablets, and phones – and prevent them from being exploited as entry points into and out of networks are collectively called mobile security.
Network security
Software and hardware solutions that guard against events that lead to unauthorized access or service disruption are included in network security. This involves watching and reacting to network hardware threats (servers, clients, hubs, switches, bridges, peers, and connecting devices) and software (such as operating systems and protocols).
Most cyberattacks originate across a network. Network cybersecurity aims to keep an eye out for, identify, and address risks specific to networks.
Operational security
Operational security refers to a broad range of cybersecurity procedures and technologies that safeguard confidential information by instituting access controls and keeping an eye out for anomalous activity that might indicate malicious activity.
This usually involves a security operations center (SOC). Analyzing security events and alerts, then verifying with the relevant stakeholders to figure out if the alert was false positive or not.
Penetration testing
Penetration testing is an integral part of ethical hacking, which aims to test the security and defences of a system by legally and deliberately breaking into it.
This is used by organizations to learn and test the defences of the IT infrastructure.
Vulnerability Assessment
Vulnerability assessment is a subdomain of cybersecurity that involves systematically reviewing the security weaknesses in an information system. It evaluates if the system is susceptible to known vulnerabilities, assigns severity levels, and recommends remediation or mitigation if and whenever needed.
Vulnerability assessment can be applied to different domains, such as web applications, cloud services, and mobile platforms.
Security Auditing
Security auditing in cybersecurity is assessing an organization’s information systems and security measures against an audit checklist of best practices, standards, or regulations.
It helps identify and evaluate the strengths and weaknesses of the organization’s security posture and recommend improvements. Security auditing can be performed by internal or external auditors using various types of audits, such as compliance audits, penetration audits, or vulnerability audits.
2nd. Start educating yourself.

After seeing yourself interested in any subdomains, you can start researching the tools and technologies used in that domain.
Find out the commonly used tools in your favourite subdomain. Try to understand that tool and watch a few demonstrations of those tools.
Next, while you study, you can network with people with experience in that domain. And try to get some advice if you feel stuck.
There are lots of free tools, educational courses and videos available on the internet to help you with this. But that can only happen once you figure out the subdomain that interests you.
YouTube also has a lot of content creators who have shared information about specific tools and general details of subdomains.
There are datasheets and administration guides of the technologies shared by their companies about their architecture and usage.
Your public library can also provide information on some of these subdomains.
3rd strategy – Practice in lab environments.

Nowadays, most open-source tools are free, and new learners can leverage this to improve.
You can build your servers using virtualization tools and set up a lab-based network to test the working of any domains to simulate actual-world infrastructure.
Even though you may not create a full replica of the actual infrastructure, you can simulate a specific segment of the network based on the power and resources of your system.
There are blogs and YouTube videos available which show step-by-step how to create your SOC environment.
Here is one example: