From Curiosity to Cybersecurity: My First Step as an Ethical Hacker

As a teenager in Nepal, I’ve been fascinated by how computers and the internet work. I remember breaking my own computer a few times—and fixing it, sometimes with help from YouTube! That early curiosity slowly turned into a deeper interest in understanding not just how systems operate, but also how they can be secured.
My real journey into ethical hacking began after I completed my Bachelor’s degree in Information Technology. Throughout my undergraduate studies, I built a strong foundation in programming, networking, and database systems. However, it was only after graduation that I found myself increasingly drawn to the world of cybersecurity. I realized that my true passion wasn’t just about building or maintaining systems, but about protecting them and learning how to identify their vulnerabilities.
Now, as I take my first serious steps into ethical hacking, I want to share my experiences and challenges in hopes of inspiring others who are starting out on a similar path.
How My Curiosity Became a Mission
My curiosity was first piqued by series Mr. Robot and news stories about hackers—sometimes shown as heroes, sometimes as villains. I wondered:
What does it actually mean to be a hacker?
Is it all just about breaking things, or is there a bigger purpose?
I quickly discovered the world of ethical hacking, where skills are used to protect, not harm. The idea that I could use technical knowledge to defend people and organizations excited me. That’s when my casual interest turned into a mission.
Getting Started: My Learning Roadmap
I decided to take a structured approach. Here’s how I started:
Research: I read articles and watched videos explaining what ethical hacking is.
Courses: I enrolled in beginner-friendly platforms like TryHackMe and Hack The Box. Their guided labs are amazing for hands-on learning! I have also engaged in different udemy courses of zSecurity (Zaid Sabih)
Books: “The Web Application Hacker’s Handbook” and “Linux Basics for Hackers” became my companions.
YouTube Channels: I follow channels like NetworkChuck, The Cyber Mentor, and LiveOverflow for tips and walkthroughs.
Certifications: Recently i have earned my CEH(Master) certifications and planning for PT1 certification.
Setting Up My Hacking Lab
I quickly learned that having a safe place to practice is important. Here’s what my first lab setup looks like:
Operating System: I installed Kali Linux and different target machine on a virtual machine (VMware/VirtualBox).
Basic Tools: I started exploring tools like Nmap (network scanning), Wireshark (traffic analysis), Burp Suite (Penetration Testing) and Metasploit (exploit framework).
Practice Labs: Platforms like TryHackMe, Hack The Box provide safe, legal environments for practice.
Challenges I’ve Faced
Overwhelming Information: There is so much to learn! I sometimes feel lost, but breaking topics into small, daily goals helps.
Technical Hurdles: Issues like network settings, VM errors, or tool installations are common. Community forums and documentation are lifesavers.
Imposter Syndrome: I sometimes doubt if I’m cut out for this field. But I remind myself: every expert was once a beginner.
My Short-Term and Long-Term Goals
Short-Term:
Complete at least 1 TryHackMe rooms everyday
Write regular blog posts about my learning
Network with fellow cybersecurity enthusiasts
Long-Term:
Earn my PT1 and OSCP certifications
Land a role as a penetration tester or security researcher
Help make cyberspace more secure
Conclusion
My journey from curiosity to cybersecurity is just beginning. There will be challenges, setbacks, and lots of learning. But I’m excited to grow, share my experiences, and connect with others in the community.
If you’re also starting your ethical hacking journey, let’s connect! What was your first step into cybersecurity? Any tips for a beginner like me? Drop a comment below!
Thanks for reading! You can follow my journey here as I learn, fail, and succeed—one step at a time.
Subscribe to my newsletter
Read articles from praveen magar directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

praveen magar
praveen magar
Master of Computer Science(Texas College of Management and IT) || Aspiring Security Analyst || Information Technology Graduate || CYBER SECURITY || CEH (Master) || Lecturer and Researcher at University