ARSENE LUPAN Posted September 17 Share Posted September 17 I have a question for seasoned hackers. I’m new to information technology. I’m learning coding in freecampcode.org and I have a profile in tryhackme. I’m doing this because I have to start somewhere. I’m wanting to purchase hak5 only products and build from the learning. If you had a chance to relearn what you know how would you pursue? Also I haven’t even installed a Linux software yet. I’m thinking of installing Slackware ? Can anyone give some advice on how to proceed? Quote Link to comment Share on other sites More sharing options...
dark_pyrro Posted September 18 Share Posted September 18 It all depends on what your goal is and the time frame. I would probably not change a thing when it comes to me specifically, but I've been working with IT for well over 30 years now. There's nothing wrong jumping straight into the CyberSec pool, but for me, a broad experience is a very good platform to stand on. When saying that, I mean that you know things about basic computing (hardware, operating systems), networking, programming/scripting, etc. etc. and not just from a security perspective. It's a big field to cover though, I would say with confidence that no one can cover it all in every single aspect. That's not possible regardless how experienced you are. So, if you haven't chosen the path to travel you can ask yourself where most customers/users are. I would say "Microsoft". So, learning Windows (client OS and Server), Active Directory, PowerShell scripting, the online Microsoft architecture (365, and not the apps but all things behind it) along with networking can be a starting point that will keep you busy for some years to come if you want to get good at it. Also, you could start with the cybersec perspective of it all, but I would probably start as a PC admin (or such). Since it's pretty difficult to recruit people when it comes to CyberSec (to a SOC or such), I tend to look for admins since they most often are very skilled when it comes to knowledge about the object that is being protected, i.e. they know how the engine runs and it's often pretty easy to add the "security mindset" (many of them are already interested in that area). There are of course a lot of other areas that are equally valid, I'm just suggesting. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.