MasterWard Profile
  • Introduction
  • Media Links
  • Resume
  • HackThebox Notes
    • RedPanda
    • Metatwo
  • CTF Contest Writeups
    • 2017
      • Takoma Park CTF
      • TUCTF 2017
      • HITCON CTF 2017 Quals
      • CSAW CTF Qualification Round 2017
      • SEC-T CTF
      • Backdoor CTF 2017
      • Hack Dat Kiwi 2017
      • Kaspersky 2017
      • Hack.lu 2017
      • HackCon 2017
      • Defcamp 2017
      • Square CTF 2017
      • Mitre 2017
      • EKOPARTY CTF 2017
    • 2018
      • SEC-T CTF
      • Hackcon 2018
      • EasyCTF IV 2018
      • DefCamp CTF Qualifiers
      • PACTF 2018
      • CSAW CTF Qualifiers 2018
      • PicoCTF 2018
    • 2019
      • Newark Academy CTF 2019
      • Crypto CTF 2019
      • PicoCTF 2019
        • General Skills
        • Binary Exploitations
        • Forensics
        • Reverse Engineering
        • Cryptography
        • Web Exploitation
      • TAMUctf 19
    • 2021
      • picoCTF 2021
        • General Skills
        • Binary Exploitation
        • Forensics
        • Reverse Engineering
        • Cryptography
        • Web Exploitation
      • HackiHoli
      • S.H.E.L.L CTF
      • DawgCTF 2021
      • TCTF 2021
      • RedPwnCTF 2021
      • IJCTF 2021
      • UIUCTF 2021
      • Really Awesome CTF 2021
      • TMUCTF 2021
      • CSAW Qualifiers 2021
      • Pbjar CTF 2021
      • Deadface CTF 2021
    • 2022
      • NahamCon CTF 2022
      • BYUCTF 2022
      • DEF CON Qualifiers 2022
    • Useful Code
  • Software
    • Video Standardization and Compression
    • TOBIAS
    • Tracking Phone
    • Image Compression
    • Do Not Call Database
    • Color Blind Simulator
    • Gmail Unsubscriber
    • MP4 to GIF Converter
    • Optical Character Reading
    • Soft Jobs
    • OBD Project
    • Online Movie Finder
    • Work In Progress
      • Incremental Backup
      • Web Scraper - Wallpaper Edition
      • Web Blocker
      • File Manipulator
      • AppFiller
      • Cyber Security Projects
      • Bsaber AI
    • Ideas
      • CAN Programming
      • Malicious Programs
      • Remove Yourself from the Internet
      • DNA Classic
      • Auto Clicker
      • Adding Depth to a Video
      • Collage Mosaic Generator
      • Game Destroyer
      • Hearing aid Technology
      • Sign Language Recognition
      • Text Summarizer
      • Video to audio to text
      • Video Object Detection
      • VR demonstration
      • More Ideas to Elaborate on
    • Failure
      • Police Camera Radar
      • Already Created
      • Google Maps Game
      • Car price prediction
      • Bullshit Detector
      • Automated Code writter
      • Career Prediction
      • Samsung Remote Control Hack
      • Invalid Finder
      • PiHole Regex Filter
      • Group Archiver
  • Additional Articles
    • Cleaning Up a Computer Tricks
    • Getting started in Cyber Security
    • Speeding Up Your Internet
    • College Experience
    • Currently Writting
      • Reverse Engineering Notes
      • Bug Bounty Guide and Examples
      • OSCP help
      • Job Experience
      • Professional Job-Hunting Experience
Powered by GitBook
On this page
  • Step 1 - Get out there
  • Someone else Quotes
  • Another person
  • QA Part 2
  • Step 2 - ???

Was this helpful?

  1. Additional Articles

Getting started in Cyber Security

Step 1 - Get out there

This field is nothing like no other one. The reason I say that is because the term cyber security is a huge term that covers a lot of different jobs. Meet new people and be yourself. Everyone will fit somewhere.

Someone else Quotes

security consulting skills include:

  • can they find bugs or enable their teams to find killer bugs

  • can they talk to clients and not cause issues

  • can they write reports and think at the right level (how do we best communicate this to clients: engineers, PMs, CEOs?)

interviews often check for the following:

  • will they solve problems themselves, or give up?

  • do they have enough necessary technical background? do they show an aptitude for learning more?

  • do they bullshit, or are they honest when they don't know something?

  • how do they respond once they hit the limit of their knowledge?

Another person

For those coming from a different career looking for your first Information Technology/Cybersecurity role, I highly recommend the following.

Get experience.

Do you provide support to your less technically minded family and friends? It's experience.

Do you volunteer your technical skills at a charity, school, or another place of business? Experience.

Are you pursuing a degree or other vocational skill courses that incorporate building and securing networks, operating systems, applications, and combining all to make functional services? Yep, it's experience even if you don't have a certificate afterward.

Do you have a home lab? It could be as simple as adding some more memory and storage to your personal machine, then installing VMware workstation/Oracle Virtualbox. You can get more sophisticated and install free VMWare ESXi on a dedicated piece of hardware, or enable a Windows Server Hyper-V trial. Or you can go the cloud route; both AWS and Azure have free offerings. You can then install 90-day trials of Microsoft Windows, free Linux, other free/trial software in your lab using walkthroughs/youtube videos.

Take all of the skills you've learned above and build a resume that contains them. There are a lot of transferrable skills that work excellently in IT/Cybersecurity.

QA Part 2

Hey man wassup, I hope I'm not bothering you or anything but need some help so I'm a huge fan of cybersecurity ethical hacking, etc all that kind of related stuff, I have a general idea bout it but I don't know where to start so I made up a list; would be amazing if you could read it and tell me if I should focus on it if not would be helpful if you give me advice on where I should start, etc. - Learn Kali Linux - Continue on python (Since this year we started studying javascript HTML and python at school.) - Focus on the fundamentals like How does an IP address work, VPN, servers, etc ... Code deciphering. -Learn the basics of fishing or at least how to it works(Not for bad uses though ) -Learn the different ways to inject a virus. - Web exploitation.

Answer

  • Learn Kali Linux

    I have no idea what that means. You can learn the tools all you want with documentation, but memorizing like 600 tools is not worth it and only need a basic understanding.

  • Continue python

    Javascript and python are very useful and suggest you learn them well and you will get further than other people who want to do it without coding

  • Fundamentals

    Of course, focus on the fundamentals but if you know what you want to do, don't worry about the other aspects that much. You won't be expected to know networking and hardware, and programming.

  • Phishing

    Well I mean if you plan on taking a test or real penetration testing you will learn it naturally. No need to study as it will come naturally once you get enough practice at other things

  • Inject virus

    Well, that would be payloads sending and you will learn that when you study a specific field.

  • Web exploits

    Well, I would suggest if app sec to focus on that solely and you should be fine. It is a complex thing is if you aren't focusing on that area don't spend too much time learning it

    What time zone are you in? and feel free to ask questions anytime

Step 2 - ???

I have not gotten past step 1. I Will update once I get more experience.

PreviousCleaning Up a Computer TricksNextSpeeding Up Your Internet

Last updated 3 years ago

Was this helpful?