avatarwhoisDJ

Summary

The article outlines five strategies for self-directed learning in cybersecurity, emphasizing the importance of identifying one's interests, self-education, practical lab experience, learning from experienced professionals, and staying informed about global cybersecurity events.

Abstract

The article "5 strategies to learn cybersecurity" provides guidance for individuals looking to navigate the vast field of cybersecurity. It suggests beginning with an evaluation of personal interests to select a cybersecurity subdomain, such as application security, cloud security, or network security, among others. The next step is to start self-educating by researching tools and technologies pertinent to the chosen subdomain, leveraging free online resources and networking with experienced professionals. Practical experience is recommended through lab environments where one can simulate real-world scenarios. The article also advises learning from the best by attending conferences and finding mentors, as well as staying current with global cybersecurity trends and events. The author encourages lifelong learning and highlights the importance of being proactive in one's educational journey in cybersecurity.

Opinions

  • The author believes that there is no one-size-fits-all approach to learning cybersecurity due to the unique interests and learning styles of individuals.
  • Emphasizing the importance of practical experience, the author suggests that setting up a lab environment is crucial for understanding the real-world application of cybersecurity concepts.
  • The article conveys the opinion that learning from the experiences of seasoned professionals is invaluable, as it can provide insights and shortcuts to understanding complex cybersecurity challenges.
  • Staying informed about global cybersecurity events is presented as a necessary component of one's education in the field, suggesting that real-world incidents can offer practical lessons.
  • The author endorses an AI service, ZAI.chat, as a cost-effective alternative to ChatGPT Plus(GPT-4), indicating a belief in the value and potential of AI tools in the learning process.

5 strategies to learn cybersecurity

Grab a cup of coffee ☕, and learn

There are too many online guides available on the internet which tell you about lots of stuff. This massive pile of information merely adds to our confusion. This article will give you a direction to help you understand how to learn about cybersecurity by yourself.

Photo by Gülfer ERGİN on Unsplash

Introduction

Today, everything is available on the internet, and everyone turns to search engines when they have a question. When you search without some guidance, all you are left with is more questions than before.

This process sometimes gets complicated when exploring a new field of study, and the available information is too much for you to understand.

Let’s understand that every person is unique, and there is no “one shoe fits all” solution.

Everyone learns differently and has different interests.

So, this article will help you figure out your path.

Let’s dive in.

1st Strategy – Evaluate your field of interest.

Photo by Dollar Gill on Unsplash

Cybersecurity is just the tip of the iceberg, and many subdomains are below that, contributing to the foundation of cybersecurity. These subdomains have multiple technologies and job types associated with them. Some are shown below:

Application security

This domain specializes in investigating flaws and finding vulnerabilities in front or back-end applications so that it is resistant to cyber-attacks. It also includes suggesting solutions to fixing those flaws.

Usually, burpsuit and vulnerability management tools are used.

Cloud security

The cloud security domain focuses on the security of cloud infra and its assets.

Types of cybersecurity functions managed by cloud service providers are:

  • Database and storage security
  • Encryption of cloud data at rest, in motion, and in use
  • Infrastructure security
  • Networking security
  • Application security functions
  • Data protection
  • Identity and access management

Critical infrastructure security

Organizations involved in critical infrastructure (e.g., communications, dams, energy, public sector, and transportation) rely on networks, applications, systems, and digital assets protected by exceptional security procedures and cybersecurity solutions.

Cyberattacks targeting SCADA (supervisory control and data acquisition) systems and other legacy systems have frequently targeted critical infrastructure. STUXNET was one such example of a cyberattack.

Data security

Data security, a subset of information security, protects the availability, confidentiality, and integrity of digital assets in motion (while they are being communicated) and at rest (when they are being kept).

To do this, it integrates a variety of cybersecurity solutions. It also includes encryption critical management solutions, data leakage prevention tools, etc.

Endpoint security

Cyberattacks most frequently originate from desktops, laptops, mobile devices, servers, and other endpoints. All of these devices’ data is safeguarded by endpoint security.

To defend networks against cyberattacks that leverage endpoints as ports of entry, it also includes other forms of cybersecurity.

It includes technologies like EDR, XDR, AV and other tools.

IoT (Internet of Things) security

IoT security aims to reduce the risks that these increasingly commonplace gadgets pose to businesses.

It segments them to reduce network exposure, employs various forms of cybersecurity to identify and categorize them, and works to reduce risks associated with unpatched firmware and other related vulnerabilities.

Mobile security

Cybersecurity techniques used to prevent unwanted access to mobile devices – such as laptops, tablets, and phones – and prevent them from being exploited as entry points into and out of networks are collectively called mobile security.

Network security

Software and hardware solutions that guard against events that lead to unauthorized access or service disruption are included in network security. This involves watching and reacting to network hardware threats (servers, clients, hubs, switches, bridges, peers, and connecting devices) and software (such as operating systems and protocols).

Most cyberattacks originate across a network. Network cybersecurity aims to keep an eye out for, identify, and address risks specific to networks.

Operational security

Operational security refers to a broad range of cybersecurity procedures and technologies that safeguard confidential information by instituting access controls and keeping an eye out for anomalous activity that might indicate malicious activity.

This usually involves a security operations center (SOC). Analyzing security events and alerts, then verifying with the relevant stakeholders to figure out if the alert was false positive or not.

Penetration testing

Penetration testing is an integral part of ethical hacking, which aims to test the security and defences of a system by legally and deliberately breaking into it.

This is used by organizations to learn and test the defences of the IT infrastructure.

Vulnerability Assessment

Vulnerability assessment is a subdomain of cybersecurity that involves systematically reviewing the security weaknesses in an information system. It evaluates if the system is susceptible to known vulnerabilities, assigns severity levels, and recommends remediation or mitigation if and whenever needed.

Vulnerability assessment can be applied to different domains, such as web applications, cloud services, and mobile platforms.

Security Auditing

Security auditing in cybersecurity is assessing an organization’s information systems and security measures against an audit checklist of best practices, standards, or regulations.

It helps identify and evaluate the strengths and weaknesses of the organization’s security posture and recommend improvements. Security auditing can be performed by internal or external auditors using various types of audits, such as compliance audits, penetration audits, or vulnerability audits.

2nd. Start educating yourself.

Photo by Seven Shooter on Unsplash

After seeing yourself interested in any subdomains, you can start researching the tools and technologies used in that domain.

Find out the commonly used tools in your favourite subdomain. Try to understand that tool and watch a few demonstrations of those tools.

Next, while you study, you can network with people with experience in that domain. And try to get some advice if you feel stuck.

There are lots of free tools, educational courses and videos available on the internet to help you with this. But that can only happen once you figure out the subdomain that interests you.

YouTube also has a lot of content creators who have shared information about specific tools and general details of subdomains.

There are datasheets and administration guides of the technologies shared by their companies about their architecture and usage.

Your public library can also provide information on some of these subdomains.

3rd strategy – Practice in lab environments.

Photo by imgix on Unsplash

Nowadays, most open-source tools are free, and new learners can leverage this to improve.

You can build your servers using virtualization tools and set up a lab-based network to test the working of any domains to simulate actual-world infrastructure.

Even though you may not create a full replica of the actual infrastructure, you can simulate a specific segment of the network based on the power and resources of your system.

There are blogs and YouTube videos available which show step-by-step how to create your SOC environment.

Here is one example:

4th strategy – Learn from the best.

Photo by Evangeline Shaw on Unsplash

There is a saying that you learn from your mistakes. But we do not have enough time in our life to make all the mistakes ourselves and learn from them.

So, the best course is to learn from people who are experienced and people who are on top of the cybersecurity community. These people have seen failures and hardships, their insight can definitely give you a different perspective.

That means attending conferences and events either in person or virtually and learning from their experiences and insights. Try to be mindful while listening to these people, as what they share is based on their lifelong experience in their domain.

Try to find a mentor who can guide you when you have questions. Think hard about what you want and ask questions. No question is a wrong question, so rise above your shyness and be fearless and passionate about learning.

Learning is lifelong, even though I am experienced in cybersecurity. All that I have learnt till now is that I don’t know enough.

So keep working towards your education.

5th strategy – Read about global events.

Photo by Roman Kraft on Unsplash

Along with your self-education, it is equally important to stay on top of the trends and technologies that change from time to time.

There are many cybersecurity news platforms which are dedicated to investigating cyberattacks and finding out the root cause.

Some channels continuously work towards uncovering data breaches and studying the dark web. At the same time, others are also focused on global cyber events.

You can subscribe to these channels via Linkedin, twitter, or RSS feeds or email notifications.

Read about the world and stay updated. This might also help you during your job interviews.

I hope you have learned something from this article and it helps you in your journey. Happy learning!

Photo by krakenimages on Unsplash
Education
Cybersecurity
How To
Cyber Security Training
Information Security
Recommended from ReadMedium