DEV Community

Cover image for Embarking on the Cybersecurity Journey: A Beginner’s Guide
Aswin Barath
Aswin Barath

Posted on • Originally published at Medium

Embarking on the Cybersecurity Journey: A Beginner’s Guide

Hey everyone! 👋

Today, I took the plunge and decided to pursue the Complete Cybersecurity Bootcamp, which is part of the exciting Ethical Hacker & Cybersecurity Expert Career Path. I’ve already gained some basic knowledge, and I can’t wait to share what I’ve learned so far in a fun and beginner-friendly way!

What is Cyber Security?

Imagine you have a super-secret diary with a lock on it, and you want to make sure nobody can read your secrets. That’s exactly what Cybersecurity is about, but instead of a diary, we’re protecting computers and networks from bad guys who want to peek into our digital lives.

Cyber Security Prerequisites:

  1. Networking Basics: Think of it as understanding how the internet works — like knowing the difference between a modem and a router. It’s like being a wizard who can cast spells to make the internet run smoothly.

  2. OS Knowledge: You need to be familiar with at least one of the three operating systems — Windows, macOS, or Linux. It’s like choosing your superhero costume — each has its own unique powers.

  3. Certifications (Optional): These are like achievement badges that showcase your skills and boost your profile. They include Network+Security+, and Certified Ethical Hacker. Think of them as medals that prove you’re a cybersecurity champ!

  4. Programming: Imagine you’re solving puzzles using a special language that computers understand. That’s what programming is! You don’t have to be a genius, just curious and willing to learn.

  5. Tools: In the course, we’ll explore various tools that help us fight cyber threats. They’re like cool gadgets in a spy movie — except instead of lasers and grappling hooks, we have firewalls and encryption software.

Cyber Security Career Paths:

  1. Security Engineers: They’re the guardians of digital fortresses, setting up defences and keeping the bad guys out.

  2. Security Architects: Picture them as the architects of a secure kingdom, designing and building strong defences to protect valuable information.

  3. Incident Responders: When trouble strikes, they’re like cyber firefighters, rushing in to save the day and investigate security breaches.

  4. Security Consultants: They’re like cybersecurity doctors, diagnosing vulnerabilities and prescribing solutions to keep organizations safe. There’s even a Freelance Consulting ZTM Course (link at the end of the blog) that can help us become cybersecurity consultants!

  5. Ethical Hackers/Penetration Testers: They use their skills for good, breaking into systems to identify weaknesses and help organizations strengthen their defences. They’re the Sherlock Holmes of the cybersecurity world.

Cyber Security History:

If you’re curious about how this exciting field came to be, check out these resources to explore its fascinating history and learn more about approaching the Cyber Security field:

Remember, this is just the beginning of our cybersecurity journey! Let’s have fun, learn together, and become the digital defenders of tomorrow.

Who Am I?

I’m Aswin Barath, a Software Engineering Nerd who loves building Web Applications, now sharing my knowledge through Blogging during the busy time of my freelancing work life. Here’s the link to all of my craziness categorized by platforms under one place: https://linktr.ee/AswinBarath

Join me to learn Cyber Security!

Checkout the Cybersecurity Series where my mission is to share my knowledge on Security concepts like Cyber Security and Hacking: https://dev.to/aswin2001barath/series/24168

Resources:

Learn what I know about Cyber Security from my favourite knowledge sources:

🎙 Disclosure: Please note that some of the links mentioned on this page may be affiliate links. This means that if you click on one of these links and make a purchase, I may earn a small commission from the sale.

Thank you so much for reading my blog🙂.

Happy hacking! 🕵️‍♀️🔒

Top comments (0)