I’ve been doing Cybersecurity for around 10 years now, and I haven't spent most of that time writing but i get a lot of email asking the following question:
What should I do to get into Information Security?
I bet you have this type of question too. To explain you better I have it broken down in these category.
- Type of Education
- Type of Programming Languages you need to learn
- How to Stay up to date with cyber world
- How to practice ethically
- How to do Projects
- How to practice your skills
- Have a presence
- Type of certification
- Getting your first job
Education
I recommend doing Computer Science or Computer Information Systems or Information Technology with a good university. If you can’t do university you’ll need to learn another way, e.g., Online or certifications. Any of these will do as long as you have the curiosity and passion to complete what you start.
Here are the basic topics you need to learn from either university, self study or certification:
- Networking
- System Administration
- Programming (programming concepts/scripting/object orientation basics)
Programming
Stay Updated
- RSS Feed
- Some Online Articals
Practice Safely
- VMware
- VPS
- Stand up a website on Windows/Linux/PHP
- Build a blog on Linux/Wordpress
- Have a Kali Linux installation always ready
- Set up a proxy server
- Build and run your own VPN on a VPS
- Build an Active Directory forest for your house
- Setup a Vulnerable Machine and test your skills
Build Your Own Projects
First, have a definite, clear practical ideal; a goal, an objective. Second, have the necessary means to achieve your ends; wisdom, money, materials, and methods. Third, adjust all your means to that end
- Come up with a solution,
- Create the tool to solve it.
Earn While You Learn
A reward offered to a person who identifies an error or vulnerability in a computer program or system.
"Bug
Bounties are awesome. According to the BBC, Ethical hackers can earn more
than $350,000 yearly. Bug bounty programs award hackers an average of $50,000 a
month, with some paying out $1,000,000 a year in total."
There are two main platforms i recommend you to do bounties on: BugCrowd, and HackerOne.
The process is simple, you register on the site, look for a program you’re interested, and then you start finding bugs. Here are a few things to keep in mind:
- Read the rules and limitations associated with each program very carefully.
- There are manly 2 types of bounty program. Some pay money and Some
"A hacker does for love what others would not do for money"
Have a presence
Ok, now that you’ve done a few projects it’s time to let people know about them.
Website
First you need a website. Avoid writing too much on other services like Medium or Blogger—and definitely avoid Facebook.
it’s time to start following some folks. Engage in conversation. Don’t force it. Don’t overthrow when you aren’t knowledgeable about a particular topic. But if you have something to add then feel free to contribute. It doesn’t matter if you have 10 followers.
Don’t take it too seriously. Many top security researchers on Twitter ramble on about nothing 90% of the time. don’t worry about it. Keep to the above and you’ll be fine.
Certifications
Beginner cert
If you’re just starting out, I recommend you get the following certifications:
- A+
- Network+
- Linux+
- Security+
Advanced certs
- CISSP for anyone who wants a career in security
- CISA/CISM for all-around security people who want to become managers
- SANS (GSEC/GPEN/GWAPT) for technical people
- OSCP for penetration testing oriented people
OSCP and CREST are the most respected certifications for hardcore penetration testers, so definitely start thinking about those if that’s your interest.
Then there’s CEH. It’s there, and people sometimes ask about it, so you might as well get it just to have it. But don’t brag about having it and especially not around seasoned security people.
0 Comments