My Path into Cybersecurity

My journey into cybersecurity lol

My tech journey has been a mix of highs and lows. I first ventured into programming two years ago, starting with Python. Although I made some progress, I found it challenging, especially because my learning path was largely self-taught. I had this mindset that I needed to be good enough or have a solid foundation before engaging with others or seeking guidance.

After two months of working with Python, I hit a wall and decided to shift gears. That's when I explored UI/UX design. I spent about a year dabbling in it, though my progress was inconsistent due to school commitments. Unfortunately, I didn’t have the opportunity to immerse myself in UI/UX fully.

One day, I realized that if I was serious about pursuing tech, I needed to focus on something I was genuinely passionate about—something that couldn’t easily be automated by AI, ensuring job security in the future. After researching various fields, cybersecurity stood out to me. I spoke with my sister about it, and now, here I am, in the middle of my learning phase, excited to dive deeper into this ever-evolving field.

As I embarked on this new journey, I quickly learned that cybersecurity is not just about defending against threats but understanding them. Malware, for example, is malicious software designed to exploit any programmable device or network. I found fascinating stories behind notorious attacks, like the "ILOVEYOU" virus that spread through email, wreaking havoc, and "WannaCry," ransomware that demanded payment to unlock encrypted files.

Phishing emerged as another critical concept: tricking individuals into revealing sensitive information by masquerading as trustworthy entities. I recalled how someone could receive an email appearing to be from their bank, leading them to a deceptive link asking for their account details.

Then came the intriguing world of Man-in-the-Middle (MITM) attacks, where attackers secretly intercept communications between two parties, potentially stealing login credentials. It became clear that cybersecurity was not just about tools but understanding the psychology behind attacks.

As I delved deeper, I encountered terms like Honeypot—a decoy server designed to attract attackers, allowing professionals like me to study their methods—and Advanced Persistent Threats (APT), prolonged and targeted attacks where intruders stealthily access networks to steal sensitive information.

Throughout my exploration, I learned about the fundamental skills needed in cybersecurity, such as networking and system administration. Understanding the OSI model and TCP/IP protocols became crucial as I configured routers and navigated data packets across networks. Setting up virtual machines with Kali Linux allowed me to safely test different operating systems and run penetration tests, giving me hands-on experience.

I also discovered the importance of coding languages like SQL and Python, essential for scripting and automating security tasks. This led me to explore cloud security practices in AWS and Azure, understanding how to protect data and infrastructure in the cloud.

As I immersed myself in these concepts, I understood the value of risk analysis, incident response, and the significance of regular security audits. Each step reinforced my commitment to the field, highlighting the importance of both technical skills and soft skills, like communication and teamwork, in addressing security challenges.

Today, I stand at the beginning of an exciting journey in cybersecurity. Armed with knowledge about ethical hacking, the tools of the trade, and a determination to make a difference, I’m ready to take on the challenges this field presents. From learning about Nmap for network scanning to using Metasploit for penetration testing and John the Ripper for password cracking, I’m eager to dive deeper and grow in this dynamic landscape.

1. Security and Risk Management
I started to understand that everything begins with a strong foundation. This domain taught me how organizations create security policies and assess risks. It’s all about aligning security measures with business goals and ensuring they comply with laws and regulations. Knowing how to manage risk is crucial in this field.

2. Asset Security
Next, I learned about protecting valuable assets, especially data. This domain emphasizes the need to classify and handle information properly. I realized that understanding what data is most important helps decide how to protect it effectively. It’s all about keeping sensitive information safe from prying eyes.

3. Security Architecture and Engineering
Delving into system design was eye-opening. Here, I discovered how to integrate security into the development process. Concepts like least privilege and defense in depth became important to me. A well-thought-out design can significantly reduce vulnerabilities and improve overall security.

4. Communication and Network Security
Exploring network security highlighted the complexities of protecting data as it travels. I learned about secure communication methods and the various tools, like firewalls and encryption. Understanding how to safeguard data in transit was a key takeaway for me.

5. Identity and Access Management (IAM)
Controlling who has access to what is vital in cybersecurity. This domain taught me about authentication and authorization. It’s fascinating how organizations ensure only the right people can access sensitive information while keeping track of their actions.

6. Security Assessment and Testing
I realized that testing security measures is essential. This domain focuses on regular vulnerability assessments and penetration testing. Finding weaknesses helps organizations strengthen their defenses. I learned that it’s not enough to set up security; it needs to be regularly evaluated and updated.

7. Security Operations
Getting into the day-to-day aspects of cybersecurity was exciting. This domain is all about monitoring systems, managing incidents, and understanding threats. I learned how security teams respond to incidents in real-time, which is crucial for keeping organizations secure.

8. Software Development Security
Finally, I discovered the importance of incorporating security throughout the software development lifecycle. Secure coding practices and testing are essential to identify vulnerabilities early. I found that building security into the development process can save organizations from potential breaches down the line.

I then completed a course on introduction to cybersecurity at Netcad Academy. This is just the start of my adventure, and I can’t wait to see where it leads!

Resources

So far, I have used the following learning resources

Thank you for reading about my journey, let this be your cue to start your tech journey or delve deeper if you've already started.

Feel free to recommend cybersecurity boot camps and resources to me.

Have a nice day.

20
Subscribe to my newsletter

Read articles from Mbaoma chukwuemeka directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Mbaoma chukwuemeka
Mbaoma chukwuemeka

Beginner Cybersecurity Enthusiast | UI/UX Designer| Passionate About Learning & Growth