1. Educate Yourself - This is extremely important. Learn the basics of cyber security. Use online resources, tutorials, courses, or whatever works for you. Learn the fundamentals.
2. Gain Relevant Education - while you are studying, you study and gain certifications. Certs give you great street cred. Hang those certs above your desk proudly.
3. Own the Labs - build your own labs. Whether it's with physical systems or VMs with AWS or Azure, have fun with it. You can get great experience safely by hacking your labs. Own them!
4. Join Communities - Maybe it's Discord, LinkedIn, Twitter, or somewhere else. Join likeminded people who have the same interests as you. Surround yourself with smart people and learn from them. Ask questions.
5. Learn Programming - Python, Java, or whatever you are into. It will certainly help, especially if you want a hands on tech position. Understanding basic coding will really help when analyzing vulnerabilities.
6. Learn Networking Fundamentals - TCP/IP, how packets flow through the wire, subnets, Vlans, and others. If you understand how packets flow and networks operate, everything else will come easy.
7. Explore Different Cyber Sports - Offensive Security, Defensive Security, GRC, Sales, or Engineering. Cyber Security is a huge arena. Pick a sport and dive in.
8. CTF events - There is no better way of getting hands on than to participate in capture the flag events. You get to play offense and defense. You get to strategize. The knowledge from these are priceless.
9. Stay Informed - What are the latest threats? What are the trends? Stay informed from websites, newsletters, blogs, and other great resources.
10. Seek Internships - People love free help. Offer your local community advice in Cyber Security. Offer help to local businesses that you have relationships with. This will give you real world experience and is a win win for everyone.
11. Make Connections - this is one that I can really help you with. Get visibility from recruiters, HR departments, and have endless opportunities come to your inbox. Learn how to change your career in 4 hours. breakincyber.com/post/linkedin-…
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Want Cyber Work? Here's a list of the Top Bug Bounty programs waiting for you.
One of my favorite things about the cyber security industry is Bug Bounty programs. Companies are waiting to pay you to help keep them secure. ⬇
#cybersecurity #informationsecurity #infosec
Bug Bounty programs are established by companies for the collaboration of external security researchers to help find vulnerabilities that they may have. The programs serve as a proactive approach to fixing potential security flaws.
Want a great experience? You can jump right in and join these programs. From day 1, you can help protect some of your favorite companies in the world. Here are some of the Top Bug Bounty Programs:
Dear Cyber Security Wannabe, If you Want to be a SOC Analyst or a Penetration Tester, you must know these 9 things about network packets. If you understand this, everything else will come easy. ⬇
The entire internet, every device, and the system you are reading this on uses network packets. To be of value to a SOC Team or PenTesting team, you must have a solid understanding of what a network packet is. Packets are the internet's motor. Without them, it doesn't exist.
These 9 steps will give you some insight on how to dissect a network packet and understand it. If you can grasp a solid understanding, most cyber security tools will seem easy. Once you learn to drive, you just have to understand the options in each car. This works the same.
Dear Cyber Security Wannabe, Here are 10 Ways to Get into GRC in Cyber Security. Here are the Top Security Frameworks for you to learn to work at home in your PJs. Knowledge is Power.
1. NIST Cyber Security Framework - this framework is widely used. Referred to as the NIST CSF, it has a great set of controls that can help an organization improve it's security posture.
2. ISO/IEC 27001 - This is an international standard for information security management. It provides a large set of controls for companies to protect their digital assets.