A New Chapter: This Is Where It All Starts

A Message to My Readers

Hey everyone,

I know each of you has big dreams — and I truly believe you can achieve them. Just remember: dream big, and more importantly, run in the right direction.

One thing life has taught me is this:
Consistency is everything.
If you stay disciplined and work on your goals regularly — without giving excuses — you'll see real progress. No shortcuts, no skipping. Just honest effort, every single day.

Be sincere in your learning. Stay true to your path. And keep pushing forward with purpose.

Let’s grow together. 💫

Start small, stay consistent, and grow your skills step by step! 🚀


How to Start Learning Cybersecurity (Made Simple)

Cybersecurity might sound complicated at first, but starting your journey doesn’t have to be hard. Whether you dream of becoming a hacker (security consultant) or a defender (security analyst), the path is simple — break things down, learn one area at a time, and build a habit of hands-on learning.

🧠 Choose Your Path

Cybersecurity is divided into two major paths:

  • Offensive Security (like ethical hackers)

  • Defensive Security (like cyber bodyguards)

Decide what interests you and start learning in that direction.

🚀 Begin with the Basics

Before jumping into advanced topics, understand the fundamentals:

  • Networking (how computers talk to each other)

  • Operating systems (especially Windows and Linux)

  • Cybersecurity concepts (firewalls, encryption, threats)

💻 Learn by Doing – TryHackMe

The best way to learn cybersecurity is by doing. Platforms like TryHackMe offer beginner-friendly exercises that simulate real-world attacks and defenses.

Start with:

  • “Introduction to Cyber Security”

  • “Pre-Security” learning path

🕒 Make It a Daily Habit

Set aside 30–60 minutes a day for learning. Consistency matters more than speed. Over time, you’ll build real skills.

🌟 Real Stories, Real People

Here’s proof that anyone can break into cybersecurity:

  • Paul switched from construction work to become a Security Engineer.

  • Kassandra left music teaching to become a Cybersecurity Professional.

  • Brandon used TryHackMe in school to land his first cyber job.

🧭 Common Cybersecurity Roles

RoleDescription
Penetration TesterFinds weaknesses in systems (ethical hacker)
Red TeamerSimulates real attacks to test defenses
Security EngineerBuilds and monitors secure networks/systems


Introduction to Defensive Security

In the previous room, we explored offensive security — techniques used to identify and exploit vulnerabilities in systems to improve their security. This approach includes exploiting software bugs, misconfigurations, and weak access control policies. Professionals like red teamers and penetration testers specialize in this area.

Now, let’s turn our focus to its essential counterpart: defensive security.

🔐 What is Defensive Security?

Defensive security focuses on:

  1. Preventing intrusions from occurring

  2. Detecting and responding to intrusions when they happen

This is where blue teams come in. They are the frontline defenders responsible for securing systems and networks from attacks.


🛡️ Key Responsibilities in Defensive Security

  • User Cybersecurity Awareness
    Educating users about threats like phishing or social engineering helps prevent attacks that target people instead of machines.

  • Asset Management
    Knowing what systems and devices are on your network is the first step to protecting them.

  • System Patching and Updates
    Ensuring software and hardware are updated to fix known vulnerabilities is critical in preventing exploitation.

  • Preventative Security Devices
    Tools like firewalls and Intrusion Prevention Systems (IPS) play a key role:

    • Firewalls control incoming and outgoing network traffic.

    • IPS blocks traffic that matches attack patterns or rules.

  • Logging and Monitoring
    Detecting threats in real-time is crucial. Monitoring tools help identify unusual behavior — like unauthorized devices connecting to the network.


🔍 What Else Does Defensive Security Involve?

In addition to the core areas above, defensive security also covers:

  • Security Operations Center (SOC) – Central hub where security professionals monitor and defend infrastructure.

  • Threat Intelligence – Gathering data on cyber threats to improve defense strategies.

  • Digital Forensics and Incident Response (DFIR) – Investigating incidents and responding to breaches.

  • Malware Analysis – Understanding how malicious software works to improve detection and prevention.


🔐 Areas of Defensive Security: Explained Simply

Defensive security is the backbone of protecting digital systems. It focuses on prevention, detection, and response to cyber threats. This article explores two major areas in defensive security:


🛡️ 1. Security Operations Center (SOC)

A Security Operations Center (SOC) is a team of cybersecurity professionals who monitor and protect an organization’s systems and networks in real time.

Key Responsibilities:

  • Detecting vulnerabilities and ensuring timely patching

  • Identifying policy violations that could harm the network

  • Stopping unauthorized activity, like stolen login attempts

  • Responding to network intrusions before damage spreads

Threat Intelligence

Threat intelligence involves gathering and analyzing data to understand potential attackers, their methods, and motives. It helps build a threat-informed defense strategy, making companies proactive against future attacks.


🧪 2. Digital Forensics & Incident Response (DFIR)

DFIR focuses on investigating incidents and recovering from them quickly and effectively.

Digital Forensics

It deals with collecting and analyzing digital evidence. This includes:

  • File system analysis – Recovering deleted or hidden data

  • Memory forensics – Inspecting what's running in RAM

  • Log review – Understanding system and network activities

Incident Response

A structured approach to handle attacks, broken into four phases:

  1. Preparation – Train teams and set up defenses

  2. Detection & Analysis – Identify and study the threat

  3. Containment & Recovery – Stop the attack and restore systems

  4. Post-Incident Review – Learn and improve future responses


🦠 Malware Analysis

Malware includes threats like:

  • Viruses – Spread and damage files

  • Trojans – Fake useful programs that do harm

  • Ransomware – Encrypts data and demands payment

Malware is analyzed in two ways:

  • Static analysis – Reviewing code without executing it

  • Dynamic analysis – Running the malware in a controlled environment to observe behavior


✅ Final Thoughts

Defensive security is not just about building walls — it's about smart monitoring, quick response, and learning from threats. SOC, DFIR, and malware analysis form the triad of a solid defense strategy, ensuring that digital environments stay secure and resilient.


🔐 Introduction to Cyber Security Careers

Cyber security is one of the most in-demand industries today, offering high salaries, diverse roles, and the thrill of legally hacking or defending digital systems. Whether you're drawn to offensive security (like ethical hacking) or defensive security (like incident response), there's a path for you.


🚀 Why Choose a Career in Cyber Security?

  • High Pay: Strong salaries right from entry-level

  • Exciting Work: From penetration testing to threat hunting and malware analysis

  • Growing Demand: Over 3.5 million cyber roles remain unfilled globally


🔍 Career Paths in Cyber Security

🛡️ Security Analyst

Role: Safeguard an organization’s data and systems
Responsibilities:

  • Analyze systems and identify risks

  • Collaborate with teams to implement security measures

  • Develop ongoing security strategies
    Learning Paths: Pre-Security, Cyber Security 101, SOC Level 1


🔧 Security Engineer

Role: Design and implement systems to prevent cyberattacks
Responsibilities:

  • Test and monitor network defenses

  • Address vulnerabilities using threat data

  • Build secure system architectures
    Learning Paths: SOC Level 1, Offensive Pentesting, JR Pen Tester


🚨 Incident Responder

Role: Act swiftly during cyberattacks to minimize damage
Responsibilities:

  • Build and test incident response plans

  • Contain and recover from breaches

  • Report findings and improve future responses
    Learning Paths: SOC Level 1


🕵️ Digital Forensics Examiner

Role: Investigate digital evidence from incidents or cybercrimes
Responsibilities:

  • Collect and analyze digital data

  • Follow legal protocols

  • Document findings and help in legal or internal investigations


🧬 Malware Analyst

Role: Study and break down malicious software
Responsibilities:

  • Perform static and dynamic malware analysis

  • Discover how malware behaves

  • Report findings to improve detection
    Skills Needed: Strong knowledge of programming (C, Assembly)


💥 Penetration Tester (Ethical Hacker)

Role: Test systems by simulating real-world attacks
Responsibilities:

  • Perform system and app vulnerability scans

  • Conduct red team-like assessments

  • Provide detailed reports with fixes
    Learning Paths: JR Pen Tester, Offensive Pentesting


🩸 Red Teamer

Role: Simulate advanced threat actors to test company defenses
Responsibilities:

  • Emulate hackers to test detection systems

  • Avoid detection and maintain access

  • Evaluate and improve the company's defense response
    Learning Paths: Red Teamer, Offensive Pentesting


🛠️ Get Started with TryHackMe

TryHackMe offers learning paths and hands-on labs tailored to each role. From beginner to advanced, you’ll find guided content to build the skills and experience needed to land your first job in cyber security.


🌟 Final Thoughts

Whether you're starting fresh or switching careers, cyber security offers a world of opportunity. With structured learning, hands-on practice, and career-specific guidance, you can be job-ready in no time.

1
Subscribe to my newsletter

Read articles from Sylvester (ANBU) directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Sylvester (ANBU)
Sylvester (ANBU)

This blog serves as a beginner-friendly guide to understanding the world of cybersecurity. From defining what cybersecurity is to exploring its two major domains—offensive and defensive security—it breaks down various career paths such as Security Analyst, Engineer, Penetration Tester, and more. Whether you're just curious or planning a career, this blog gives you the insight and direction to get started in the cybersecurity field.