Day 2: Deepening My Cybersecurity Knowledge and Discovering My Path

Day 2: Deepening My Cybersecurity Knowledge and Discovering My Path

Today was the second day of my cybersecurity journey, and I’m already starting to see just how vast and intricate this field really is. Yesterday was all about laying the groundwork—getting a solid grasp on networking basics and familiarizing myself with essential cybersecurity terminologies. Today, I continued with those courses, but I also took some time to explore new resources and concepts that really opened my eyes to the possibilities within cybersecurity.

I started my day by revisiting the courses I began yesterday. I’m the type of person who likes to reinforce what I’ve learned, so I went back over some of the networking concepts, making sure I understood everything before moving forward. I spent a good amount of time on IP addresses, subnets, and routing—these are the building blocks of everything in cybersecurity, so I want to be rock-solid on them. But I didn’t just stick to the basics. Today, I took things a step further by diving into some new material that I found fascinating.

One of the most exciting things I did today was explore platforms like Hack The Box and TryHackMe. These are incredible resources for anyone looking to get hands-on experience with cybersecurity. I signed up for both and started working through some beginner challenges. The experience was unlike anything I’ve done before. Instead of just reading or watching videos, I was actively engaging with real-world scenarios, trying to break into systems, and understanding how vulnerabilities can be exploited. It was challenging, but also incredibly rewarding. I can already tell that these platforms are going to be key to my growth as a cybersecurity professional.

As I progressed through the day, I also learned about some critical concepts that are fundamental to cybersecurity: the CIA Triad and the DAD Triad. The CIA Triad—Confidentiality, Integrity, and Availability—is a model that helps guide the development and management of secure systems. Understanding this triad was like seeing the blueprint of cybersecurity. Each component plays a vital role in keeping data safe: Confidentiality ensures that information is only accessible to those who need it, Integrity guarantees that data is accurate and unaltered, and Availability makes sure that data and systems are accessible when needed.

On the flip side, the DAD Triad—Disclosure, Alteration, and Denial—represents the potential risks or failures that can occur if the CIA principles aren’t upheld. These triads are two sides of the same coin, and grasping both concepts is essential for anyone looking to work in cybersecurity.

I also spent some time today learning about Bug Bounty programs and Red Teaming. Bug Bounty programs are fascinating because they allow ethical hackers to find and report vulnerabilities in a system in exchange for rewards. It’s a win-win situation—the company gets their systems secured, and the hacker gets recognition and compensation. Red Teaming, on the other hand, is about simulating real-world attacks to test an organization’s defenses. The idea of being on the front lines, thinking like an adversary to protect valuable assets, is thrilling to me. It was during this part of my day that I realized I’ve found my calling in cybersecurity—I want to become a Penetration Tester.

Penetration testing, or ethical hacking, is where I see myself. The challenge of breaking into systems, identifying weaknesses, and then helping to fix them is exactly what I want to do. What attracts me most to this role is the combination of technical skill, creativity, and problem-solving. It’s like being a detective and a puzzle solver rolled into one. Plus, there’s a real sense of purpose in this work—knowing that what you do directly contributes to the safety and security of others.

To cap off my day, I did some research on real-world examples of ethical hackers in action. One story that stood out to me was about how ethical hackers helped catch two criminals who stole $1.9 million from MTN. These hackers were able to trace the digital breadcrumbs left behind by the criminals, identifying the weaknesses they exploited and ultimately leading to their capture. The way they used their skills to bring criminals to justice was inspiring. It made me imagine myself in their shoes, using my knowledge to catch cybercriminals in the future. It’s stories like these that fuel my passion and drive to succeed in this field.

As I close out Day 2, I feel more confident than ever in my decision to pursue cybersecurity. There’s so much more to learn, but I’m ready for it. The more I discover, the more I’m convinced that this is the path I’m meant to be on. I can’t wait to continue this journey and see where it takes me.

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *