How To Get Started in Cyber Security From Zero To Hero
How To Get Started in Cyber Security From Zero To Hero
STARTED IN
CYBER
SECURITY FROM
ZERO TO CYBER
HERO
BY IZZMIER IZZUDDIN
Table of Contents
1 Introduction ................................................................................................. 4
2 Understanding Cybersecurity........................................................................ 5
2.1 What is Cybersecurity? .................................................................................... 5
2.2 The Importance of Cybersecurity ...................................................................... 5
2.3 Key Areas in Cybersecurity ............................................................................... 5
This guide is designed to take you from a complete beginner someone who might feel
like a "zero" in the vast world of cybersecurity to a proficient, confident and capable
professional a "hero" who can navigate the complexities of this dynamic field. Whether
you're just starting out, looking to switch careers or seeking to enhance your existing
skills, this roadmap will provide you with the necessary steps, skills and insights to
succeed in the ever-evolving landscape of cybersecurity.
By following the steps outlined in this guide, you'll gain a solid foundation in
cybersecurity principles, develop hands-on skills through practical exercises and build
the confidence needed to tackle real-world challenges. From understanding the basics
of network security to mastering advanced threat detection and incident response, this
guide will equip you with the tools you need to thrive in your cybersecurity career.
Ultimately, my mission is to help you transform your passion for cybersecurity into a
successful and fulfilling career. Whether you're aiming to protect organisations from
cyber threats, contribute to innovative security solutions or simply broaden your
understanding of this critical field, I hope this guide will serve as a valuable resource on
your journey. Let's embark on this path together and work towards making the digital
world a safer place for everyone.
2 Understanding Cybersecurity
The consequences of a cybersecurity breach can be severe. Financial losses from theft,
fraud and operational disruption can cripple an organisation. The damage to an
organisation's reputation can lead to a loss of trust among customers and partners,
which can be diPicult, if not impossible, to recover from. Additionally, there are legal
and regulatory consequences for failing to protect sensitive information, with potential
fines, lawsuits and other penalties.
Cybersecurity ensures the integrity, confidentiality and availability of data and systems,
acting as the first line of defence against these threats. It helps to prevent unauthorised
access, detects and responds to breaches when they occur and ensures that systems
can recover quickly and continue to operate even in the face of an attack. In essence,
cybersecurity is the backbone of modern digital operations, enabling organisations to
innovate and grow while minimising the risks associated with the digital landscape.
3.2 Certifications
Certifications are a key component of a cybersecurity professional’s resume. They not
only validate your expertise in specific areas but also signal to employers that you have
met industry-recognised standards. Many organisations require or prefer candidates
with certain certifications, making them an essential step in advancing your
cybersecurity career.
• Technical Skills:
• Soft Skills:
o Python: Known for its readability and extensive library support, Python is
often used for scripting tasks, automating processes and even developing
simple exploits.
• Capture The Flag (CTF) Challenges: CTF competitions are a popular way for
cybersecurity professionals to test and hone their skills. In these challenges,
participants solve puzzles related to various cybersecurity tasks like cracking
passwords, finding vulnerabilities in web applications or performing forensic
analysis. CTFs not only help in applying theoretical knowledge but also foster
critical thinking and problem-solving skills under time constraints. Many online
platforms and cybersecurity conferences host CTF events, which can be a
valuable addition to your training regimen.
• Home Labs: Setting up a home lab is one of the best ways to practice
cybersecurity skills. With a virtual environment, you can create networks, deploy
vulnerable machines and simulate attacks and defences. Tools like VirtualBox,
VMware or Hyper-V can help you create isolated environments where you can
safely experiment with penetration testing, malware analysis, incident response
and more. You can build your lab incrementally, starting with basic setups and
gradually introducing more complexity as your skills improve.
• Online Platforms: Websites like TryHackMe, Hack The Box and CyberSec Labs
provide controlled environments where you can practice cybersecurity skills in a
guided manner. These platforms oPer various challenges and scenarios that
mimic real-world situations, ranging from beginner to advanced levels. They are
excellent for learning new skills, testing your abilities and even preparing for
certification exams. The interactive nature of these platforms makes learning
more engaging and practical.
o DNS (Domain Name System): DNS is critical for resolving domain names
into IP addresses, allowing users to access websites using human-
readable names instead of numeric IP addresses. Understanding DNS is
important because it is often a target for attacks, such as DNS spoofing or
cache poisoning, where attackers can redirect traPic to malicious sites.
o Firewalls: Firewalls are critical security devices that monitor and control
incoming and outgoing network traPic based on predetermined security
rules. Understanding how firewalls operate, including packet filtering,
stateful inspection and application-level gateways, is crucial for
protecting networks from unauthorised access and various types of
attacks.
• CIS Controls: The Centre for Internet Security (CIS) Controls is a set of best
practices designed to protect organisations against common cyber threats. The
controls are organised into basic, foundational and organisational categories,
covering areas such as inventory and control of hardware and software assets,
secure configuration, vulnerability management and incident response.
Familiarity with CIS Controls helps cybersecurity professionals implement
ePective security measures that address the most common and impactful
threats.
• Security Operations Centre (SOC) Analyst: SOC Analysts are on the front lines
of cybersecurity, monitoring and analysing security events in real-time to detect
and respond to threats. Specialising as a SOC Analyst involves mastering
security information and event management (SIEM) tools like Splunk or QRadar,
understanding log analysis and developing expertise in threat detection and
incident handling. As a SOC Analyst, you’ll work closely with other security
professionals to protect an organisation’s assets and ensure that security
incidents are identified and mitigated quickly.
• Mentorship: Finding a mentor who can guide you through your career is
invaluable. A mentor can provide advice on career development, help you
navigate challenges and oPer insights based on their experiences. Mentorship
relationships can also lead to opportunities for professional growth, such as
introductions to key industry contacts, recommendations for job openings and
guidance on pursuing certifications or advanced education. To find a mentor,
consider reaching out to experienced professionals in your network, attending
industry events or participating in mentorship programs oPered by professional
organisations.
• Research and Reading: Staying informed about the latest threats, technologies
and best practices is crucial for success in cybersecurity. Regularly reading
industry blogs, research papers and books helps you stay ahead of emerging
threats and understand new developments in the field. Following thought
leaders, subscribing to cybersecurity newsletters and participating in webinars
are additional ways to stay informed. Engaging in research and reading also
helps you develop a deeper understanding of complex topics, allowing you to
contribute more ePectively to your organisation’s security ePorts.
7 Exploring Cybersecurity Roles
• Log Analysis: SOC Analysts regularly review logs from firewalls, intrusion
detection systems (IDS) and other security devices to identify patterns or
anomalies that could indicate a security threat. They must be skilled in
recognising false positives and prioritising genuine threats for further
investigation.
• Root Cause Analysis: After containing the threat, Incident Responders conduct
a thorough investigation to determine the root cause of the attack. This involves
analysing logs, memory dumps and network traPic to trace the attack back to its
origin and understand how the attackers gained access.
• Data Collection: Threat Intelligence Analysts collect data from various sources,
including open-source intelligence (OSINT), dark web monitoring, threat feeds
and internal logs. They gather information on threat actors, tactics, techniques
and procedures (TTPs), as well as indicators of compromise (IOCs) such as
malicious IP addresses or domain names.
• Peer Support: Seek support from colleagues and peers who understand the
challenges of cybersecurity work. Sharing your experiences with others in similar
roles can provide relief and foster a sense of camaraderie. Consider joining
support groups or professional networks where you can discuss challenges and
share coping strategies.
• Blog Posts: Written articles that showcase your knowledge on specific topics,
such as threat intelligence, secure coding practices or emerging cybersecurity
threats. These posts help demonstrate your ability to communicate complex
ideas clearly.
• Build Authority: By being seen as an expert who can educate others, you solidify
your reputation as a knowledgeable and trusted professional in your field.
• Expand Your Network: Engaging with attendees, fellow speakers and event
organisers can lead to valuable connections and potential collaborations.
• Twitter: Use Twitter to stay updated on the latest cybersecurity news, participate
in discussions and share quick insights or resources. Follow industry leaders and
engage with their content to increase your visibility.
• Content Sharing: Regularly share content that aligns with your personal brand,
such as your blog posts, interesting articles or relevant news. Use hashtags
strategically to reach a wider audience.
• Stay Informed: Regularly read cybersecurity news, research papers and blogs.
Keep up with the latest developments, vulnerabilities and attack methods.
• Expand Your Skill Set: Continuously seek opportunities to learn new skills,
whether through certifications, online courses or hands-on experience. Areas
like advanced threat detection, malware analysis and cloud security are
particularly important in today’s environment.
10.3 Adaptability
The ability to adapt is crucial in a field where change is the only constant. Cybersecurity
professionals must be agile, able to pivot quickly in response to new threats or changes
in the industry. This adaptability extends beyond technical skills to include:
• Learning from Mistakes: Recognise that errors and setbacks are part of the
learning process. Each mistake is an opportunity to improve and refine your
approach.
• Embracing New Technologies: Don’t be afraid to explore and adopt new tools,
methodologies or frameworks. Staying open to innovation can lead to more
ePective security strategies.
• Personalise Your Journey: Tailor your career path to align with your interests,
strengths and goals. Whether you’re drawn to penetration testing, incident
response or cybersecurity management, carve out a niche that excites you.