DEV Community

Cover image for I Just Started My Cybersecurity Journey — And I'm Not Looking Back
Noor Fatima
Noor Fatima

Posted on

I Just Started My Cybersecurity Journey — And I'm Not Looking Back

There's a moment when you're sitting in front of your screen, staring at a terminal, and something just clicks. Not metaphorically...I mean you actually broke into a practice system you set up yourself, and the rush you feel is indescribable. That was the moment I knew: cybersecurity is where I belong.

I'm starting this series to document my journey through the world of cybersecurity, the wins, the frustrations, the rabbit holes, and everything in between. If you're somewhere in the middle of your tech journey and curious about security, this series is for you.

Why Cybersecurity, and Why Now?

We live in a world where data is the new oil and someone is always trying to steal it.
Every week there's a new breach, a new ransomware attack, a new zero-day exploit making headlines. It's easy to feel like a passive observer watching the chaos unfold. But I didn't want to just watch. I wanted to be one of the people who understands what's happening — and helps stop it.
That shift in mindset is what pushed me to start this course. Not just to learn a skill, but to become someone who can actually make systems safer for everyone.

What I Already Know (And What I Don't)

I won't pretend I'm starting from zero. I have a solid foundation in:

  1. Networking basics — TCP/IP, DNS, HTTP/HTTPS, subnetting
  2. Linux fundamentals — navigating the terminal, file permissions, basic scripting
  3. Programming — comfortable with Python, some ex posure to Bash

But cybersecurity is a whole different beast. Knowing how things work is one thing. Knowing how they break and how to defend against that is an entirely different skill set.
That gap is exactly what I'm here to close.

What This Journey Looks Like

Here's the roadmap I've laid out for myself:
Phase 1 — Foundations

Networking deep dive (Wireshark, packet analysis)
OS security (Linux hardening, Windows security basics)
Cryptography fundamentals

Phase 2 — Offensive Security

Ethical hacking methodology
Reconnaissance, scanning, exploitation
Practice labs: TryHackMe, Hack The Box

Phase 3 — Defensive Security

SIEM tools and log analysis
Incident response basics
Vulnerability management

Phase 4 — Specialization

Choose a path: Pen testing, SOC analyst, or cloud security
Certifications (CompTIA Security+, CEH, or OSCP)

It's ambitious. It's supposed to be.

The Honest Truth About Starting Something Hard

Here's what nobody tells you about entering cybersecurity as an intermediate developer: your existing knowledge is a double-edged sword.
You know enough to feel confident but confidence in the wrong place can make you sloppy. Security demands a level of precision and paranoia that most developers never have to develop. Every assumption is a potential vulnerability. Every shortcut is a door left unlocked.
That humility is something I'm actively cultivating.
I'm not expecting overnight mastery. I'm expecting slow, consistent, compounding progress. And I'm documenting it all here so that when someone else starts this path, they don't feel alone in the struggle.

What's Coming Next

In my next post, I'll be diving into network fundamentals from a security lens — how attackers think about the same protocols we use every day, and how that changes the way you should build and configure systems.
If that sounds interesting to you, follow along. Drop a comment below. I'd love to know if you're on a similar journey, or if there's something specific you'd like me to cover.

Top comments (0)