There's a moment when you're sitting in front of your screen, staring at a terminal, and something just clicks. Not metaphorically...I mean you actually broke into a practice system you set up yourself, and the rush you feel is indescribable. That was the moment I knew: cybersecurity is where I belong.
I'm starting this series to document my journey through the world of cybersecurity, the wins, the frustrations, the rabbit holes, and everything in between. If you're somewhere in the middle of your tech journey and curious about security, this series is for you.
Why Cybersecurity, and Why Now?
We live in a world where data is the new oil and someone is always trying to steal it.
Every week there's a new breach, a new ransomware attack, a new zero-day exploit making headlines. It's easy to feel like a passive observer watching the chaos unfold. But I didn't want to just watch. I wanted to be one of the people who understands what's happening — and helps stop it.
That shift in mindset is what pushed me to start this course. Not just to learn a skill, but to become someone who can actually make systems safer for everyone.
What I Already Know (And What I Don't)
I won't pretend I'm starting from zero. I have a solid foundation in:
- Networking basics — TCP/IP, DNS, HTTP/HTTPS, subnetting
- Linux fundamentals — navigating the terminal, file permissions, basic scripting
- Programming — comfortable with Python, some ex posure to Bash
But cybersecurity is a whole different beast. Knowing how things work is one thing. Knowing how they break and how to defend against that is an entirely different skill set.
That gap is exactly what I'm here to close.
What This Journey Looks Like
Here's the roadmap I've laid out for myself:
Phase 1 — Foundations
Networking deep dive (Wireshark, packet analysis)
OS security (Linux hardening, Windows security basics)
Cryptography fundamentals
Phase 2 — Offensive Security
Ethical hacking methodology
Reconnaissance, scanning, exploitation
Practice labs: TryHackMe, Hack The Box
Phase 3 — Defensive Security
SIEM tools and log analysis
Incident response basics
Vulnerability management
Phase 4 — Specialization
Choose a path: Pen testing, SOC analyst, or cloud security
Certifications (CompTIA Security+, CEH, or OSCP)
It's ambitious. It's supposed to be.
The Honest Truth About Starting Something Hard
Here's what nobody tells you about entering cybersecurity as an intermediate developer: your existing knowledge is a double-edged sword.
You know enough to feel confident but confidence in the wrong place can make you sloppy. Security demands a level of precision and paranoia that most developers never have to develop. Every assumption is a potential vulnerability. Every shortcut is a door left unlocked.
That humility is something I'm actively cultivating.
I'm not expecting overnight mastery. I'm expecting slow, consistent, compounding progress. And I'm documenting it all here so that when someone else starts this path, they don't feel alone in the struggle.
What's Coming Next
In my next post, I'll be diving into network fundamentals from a security lens — how attackers think about the same protocols we use every day, and how that changes the way you should build and configure systems.
If that sounds interesting to you, follow along. Drop a comment below. I'd love to know if you're on a similar journey, or if there's something specific you'd like me to cover.
Top comments (0)