A New Chapter: This Is Where It All Starts


A Message to My Readers
Hey everyone,
I know each of you has big dreams — and I truly believe you can achieve them. Just remember: dream big, and more importantly, run in the right direction.
One thing life has taught me is this:
Consistency is everything.
If you stay disciplined and work on your goals regularly — without giving excuses — you'll see real progress. No shortcuts, no skipping. Just honest effort, every single day.
Be sincere in your learning. Stay true to your path. And keep pushing forward with purpose.
Let’s grow together. 💫
Start small, stay consistent, and grow your skills step by step! 🚀
How to Start Learning Cybersecurity (Made Simple)
Cybersecurity might sound complicated at first, but starting your journey doesn’t have to be hard. Whether you dream of becoming a hacker (security consultant) or a defender (security analyst), the path is simple — break things down, learn one area at a time, and build a habit of hands-on learning.
🧠 Choose Your Path
Cybersecurity is divided into two major paths:
Offensive Security (like ethical hackers)
Defensive Security (like cyber bodyguards)
Decide what interests you and start learning in that direction.
🚀 Begin with the Basics
Before jumping into advanced topics, understand the fundamentals:
Networking (how computers talk to each other)
Operating systems (especially Windows and Linux)
Cybersecurity concepts (firewalls, encryption, threats)
💻 Learn by Doing – TryHackMe
The best way to learn cybersecurity is by doing. Platforms like TryHackMe offer beginner-friendly exercises that simulate real-world attacks and defenses.
Start with:
“Introduction to Cyber Security”
“Pre-Security” learning path
🕒 Make It a Daily Habit
Set aside 30–60 minutes a day for learning. Consistency matters more than speed. Over time, you’ll build real skills.
🌟 Real Stories, Real People
Here’s proof that anyone can break into cybersecurity:
Paul switched from construction work to become a Security Engineer.
Kassandra left music teaching to become a Cybersecurity Professional.
Brandon used TryHackMe in school to land his first cyber job.
🧭 Common Cybersecurity Roles
Role | Description |
Penetration Tester | Finds weaknesses in systems (ethical hacker) |
Red Teamer | Simulates real attacks to test defenses |
Security Engineer | Builds and monitors secure networks/systems |
Introduction to Defensive Security
In the previous room, we explored offensive security — techniques used to identify and exploit vulnerabilities in systems to improve their security. This approach includes exploiting software bugs, misconfigurations, and weak access control policies. Professionals like red teamers and penetration testers specialize in this area.
Now, let’s turn our focus to its essential counterpart: defensive security.
🔐 What is Defensive Security?
Defensive security focuses on:
Preventing intrusions from occurring
Detecting and responding to intrusions when they happen
This is where blue teams come in. They are the frontline defenders responsible for securing systems and networks from attacks.
🛡️ Key Responsibilities in Defensive Security
User Cybersecurity Awareness
Educating users about threats like phishing or social engineering helps prevent attacks that target people instead of machines.Asset Management
Knowing what systems and devices are on your network is the first step to protecting them.System Patching and Updates
Ensuring software and hardware are updated to fix known vulnerabilities is critical in preventing exploitation.Preventative Security Devices
Tools like firewalls and Intrusion Prevention Systems (IPS) play a key role:Firewalls control incoming and outgoing network traffic.
IPS blocks traffic that matches attack patterns or rules.
Logging and Monitoring
Detecting threats in real-time is crucial. Monitoring tools help identify unusual behavior — like unauthorized devices connecting to the network.
🔍 What Else Does Defensive Security Involve?
In addition to the core areas above, defensive security also covers:
Security Operations Center (SOC) – Central hub where security professionals monitor and defend infrastructure.
Threat Intelligence – Gathering data on cyber threats to improve defense strategies.
Digital Forensics and Incident Response (DFIR) – Investigating incidents and responding to breaches.
Malware Analysis – Understanding how malicious software works to improve detection and prevention.
🔐 Areas of Defensive Security: Explained Simply
Defensive security is the backbone of protecting digital systems. It focuses on prevention, detection, and response to cyber threats. This article explores two major areas in defensive security:
🛡️ 1. Security Operations Center (SOC)
A Security Operations Center (SOC) is a team of cybersecurity professionals who monitor and protect an organization’s systems and networks in real time.
Key Responsibilities:
Detecting vulnerabilities and ensuring timely patching
Identifying policy violations that could harm the network
Stopping unauthorized activity, like stolen login attempts
Responding to network intrusions before damage spreads
Threat Intelligence
Threat intelligence involves gathering and analyzing data to understand potential attackers, their methods, and motives. It helps build a threat-informed defense strategy, making companies proactive against future attacks.
🧪 2. Digital Forensics & Incident Response (DFIR)
DFIR focuses on investigating incidents and recovering from them quickly and effectively.
Digital Forensics
It deals with collecting and analyzing digital evidence. This includes:
File system analysis – Recovering deleted or hidden data
Memory forensics – Inspecting what's running in RAM
Log review – Understanding system and network activities
Incident Response
A structured approach to handle attacks, broken into four phases:
Preparation – Train teams and set up defenses
Detection & Analysis – Identify and study the threat
Containment & Recovery – Stop the attack and restore systems
Post-Incident Review – Learn and improve future responses
🦠 Malware Analysis
Malware includes threats like:
Viruses – Spread and damage files
Trojans – Fake useful programs that do harm
Ransomware – Encrypts data and demands payment
Malware is analyzed in two ways:
Static analysis – Reviewing code without executing it
Dynamic analysis – Running the malware in a controlled environment to observe behavior
✅ Final Thoughts
Defensive security is not just about building walls — it's about smart monitoring, quick response, and learning from threats. SOC, DFIR, and malware analysis form the triad of a solid defense strategy, ensuring that digital environments stay secure and resilient.
🔐 Introduction to Cyber Security Careers
Cyber security is one of the most in-demand industries today, offering high salaries, diverse roles, and the thrill of legally hacking or defending digital systems. Whether you're drawn to offensive security (like ethical hacking) or defensive security (like incident response), there's a path for you.
🚀 Why Choose a Career in Cyber Security?
High Pay: Strong salaries right from entry-level
Exciting Work: From penetration testing to threat hunting and malware analysis
Growing Demand: Over 3.5 million cyber roles remain unfilled globally
🔍 Career Paths in Cyber Security
🛡️ Security Analyst
Role: Safeguard an organization’s data and systems
Responsibilities:
Analyze systems and identify risks
Collaborate with teams to implement security measures
Develop ongoing security strategies
Learning Paths: Pre-Security, Cyber Security 101, SOC Level 1
🔧 Security Engineer
Role: Design and implement systems to prevent cyberattacks
Responsibilities:
Test and monitor network defenses
Address vulnerabilities using threat data
Build secure system architectures
Learning Paths: SOC Level 1, Offensive Pentesting, JR Pen Tester
🚨 Incident Responder
Role: Act swiftly during cyberattacks to minimize damage
Responsibilities:
Build and test incident response plans
Contain and recover from breaches
Report findings and improve future responses
Learning Paths: SOC Level 1
🕵️ Digital Forensics Examiner
Role: Investigate digital evidence from incidents or cybercrimes
Responsibilities:
Collect and analyze digital data
Follow legal protocols
Document findings and help in legal or internal investigations
🧬 Malware Analyst
Role: Study and break down malicious software
Responsibilities:
Perform static and dynamic malware analysis
Discover how malware behaves
Report findings to improve detection
Skills Needed: Strong knowledge of programming (C, Assembly)
💥 Penetration Tester (Ethical Hacker)
Role: Test systems by simulating real-world attacks
Responsibilities:
Perform system and app vulnerability scans
Conduct red team-like assessments
Provide detailed reports with fixes
Learning Paths: JR Pen Tester, Offensive Pentesting
🩸 Red Teamer
Role: Simulate advanced threat actors to test company defenses
Responsibilities:
Emulate hackers to test detection systems
Avoid detection and maintain access
Evaluate and improve the company's defense response
Learning Paths: Red Teamer, Offensive Pentesting
🛠️ Get Started with TryHackMe
TryHackMe offers learning paths and hands-on labs tailored to each role. From beginner to advanced, you’ll find guided content to build the skills and experience needed to land your first job in cyber security.
🌟 Final Thoughts
Whether you're starting fresh or switching careers, cyber security offers a world of opportunity. With structured learning, hands-on practice, and career-specific guidance, you can be job-ready in no time.
Subscribe to my newsletter
Read articles from Sylvester (ANBU) directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

Sylvester (ANBU)
Sylvester (ANBU)
This blog serves as a beginner-friendly guide to understanding the world of cybersecurity. From defining what cybersecurity is to exploring its two major domains—offensive and defensive security—it breaks down various career paths such as Security Analyst, Engineer, Penetration Tester, and more. Whether you're just curious or planning a career, this blog gives you the insight and direction to get started in the cybersecurity field.