<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Noor Fatima</title>
    <description>The latest articles on DEV Community by Noor Fatima (@nooreyy).</description>
    <link>https://dev.to/nooreyy</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3861415%2Fd7ec92e7-b518-4217-b1fa-47962cd42958.png</url>
      <title>DEV Community: Noor Fatima</title>
      <link>https://dev.to/nooreyy</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/nooreyy"/>
    <language>en</language>
    <item>
      <title>I Just Started My Cybersecurity Journey — And I'm Not Looking Back</title>
      <dc:creator>Noor Fatima</dc:creator>
      <pubDate>Sun, 05 Apr 2026 13:35:04 +0000</pubDate>
      <link>https://dev.to/nooreyy/i-just-started-my-cybersecurity-journey-and-im-not-looking-back-4cd2</link>
      <guid>https://dev.to/nooreyy/i-just-started-my-cybersecurity-journey-and-im-not-looking-back-4cd2</guid>
      <description>&lt;p&gt;There's a moment when you're sitting in front of your screen, staring at a terminal, and something just clicks. Not metaphorically...I mean you actually broke into a practice system you set up yourself, and the rush you feel is indescribable. That was the moment I knew: cybersecurity is where I belong.&lt;/p&gt;

&lt;p&gt;I'm starting this series to document my journey through the world of cybersecurity, the wins, the frustrations, the rabbit holes, and everything in between. If you're somewhere in the middle of your tech journey and curious about security, this series is for you.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Cybersecurity, and Why Now?
&lt;/h2&gt;

&lt;p&gt;We live in a world where data is the new oil and someone is always trying to steal it.&lt;br&gt;
Every week there's a new breach, a new ransomware attack, a new zero-day exploit making headlines. It's easy to feel like a passive observer watching the chaos unfold. But I didn't want to just watch. I wanted to be one of the people who understands what's happening — and helps stop it.&lt;br&gt;
That shift in mindset is what pushed me to start this course. Not just to learn a skill, but to become someone who can actually make systems safer for everyone.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I Already Know (And What I Don't)
&lt;/h2&gt;

&lt;p&gt;I won't pretend I'm starting from zero. I have a solid foundation in:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Networking basics&lt;/strong&gt; — TCP/IP, DNS, HTTP/HTTPS, subnetting&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Linux fundamentals&lt;/strong&gt; — navigating the terminal, file permissions, basic scripting&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Programming&lt;/strong&gt; — comfortable with Python, some ex
posure to Bash&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;But cybersecurity is a whole different beast. Knowing how things work is one thing. Knowing how they break and how to defend against that is an entirely different skill set.&lt;br&gt;
That gap is exactly what I'm here to close.&lt;/p&gt;

&lt;h2&gt;
  
  
  What This Journey Looks Like
&lt;/h2&gt;

&lt;p&gt;Here's the roadmap I've laid out for myself:&lt;br&gt;
&lt;strong&gt;Phase 1 — Foundations&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Networking deep dive (Wireshark, packet analysis)&lt;br&gt;
OS security (Linux hardening, Windows security basics)&lt;br&gt;
Cryptography fundamentals&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Phase 2 — Offensive Security&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Ethical hacking methodology&lt;br&gt;
Reconnaissance, scanning, exploitation&lt;br&gt;
Practice labs: TryHackMe, Hack The Box&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Phase 3 — Defensive Security&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;SIEM tools and log analysis&lt;br&gt;
Incident response basics&lt;br&gt;
Vulnerability management&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Phase 4 — Specialization&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Choose a path: Pen testing, SOC analyst, or cloud security&lt;br&gt;
Certifications (CompTIA Security+, CEH, or OSCP)&lt;/p&gt;

&lt;p&gt;It's ambitious. It's supposed to be.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Honest Truth About Starting Something Hard
&lt;/h2&gt;

&lt;p&gt;Here's what nobody tells you about entering cybersecurity as an intermediate developer: your existing knowledge is a double-edged sword.&lt;br&gt;
You know enough to feel confident but confidence in the wrong place can make you sloppy. Security demands a level of precision and paranoia that most developers never have to develop. Every assumption is a potential vulnerability. Every shortcut is a door left unlocked.&lt;br&gt;
That humility is something I'm actively cultivating.&lt;br&gt;
I'm not expecting overnight mastery. I'm expecting slow, consistent, compounding progress. And I'm documenting it all here so that when someone else starts this path, they don't feel alone in the struggle.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's Coming Next
&lt;/h2&gt;

&lt;p&gt;In my next post, I'll be diving into network fundamentals from a security lens — how attackers think about the same protocols we use every day, and how that changes the way you should build and configure systems.&lt;br&gt;
If that sounds interesting to you, follow along. Drop a comment below. I'd love to know if you're on a similar journey, or if there's something specific you'd like me to cover.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>career</category>
      <category>learning</category>
    </item>
  </channel>
</rss>
