Posts

Showing posts from February, 2025

I Stepped on Another Stone!

Image
I finally did it! I completed the Cisco Networking Basics course and earned my badge. But getting here wasn’t easy. It took a lot of learning, unlearning, and even failing before I could finally say I had mastered the concepts.   Networking is such a big part of cybersecurity, and I knew I needed to get the basics right. The course introduced me to concepts like the OSI and TCP/IP models, which help explain how data moves from one device to another. At first, these models felt a bit theoretical, but as I went deeper, I started to see how they applied to real-life networks.   I also learned about network commands like nslookup, netstat, ipconfig, and ping, which help check network connections and troubleshoot issues. Before this course, I had no idea that a simple command could tell me if a network was working or not. I also got hands-on experience setting up networks and configuring IP addresses, which made everything feel more real.   Just when I thought I...

The Dark Side of the Internet

Image
The internet is a vast space of knowledge, innovation, and connection. But beneath the surface lies a darker side, one filled with cyber threats, hidden vulnerabilities, and digital traps waiting for unsuspecting users. As I dive deeper into cybersecurity, I’ve uncovered some shocking realities about the dangers lurking online. Here’s what I’ve learned.   1. The Internet Is Crawling with Hackers (Even in Plain Sight) I used to think hackers were just individuals in hoodies typing away in secret rooms. But many operate in broad daylight, some even on social media! Forums and encrypted chatrooms host cybercriminals sharing stolen data, hacking tools, and phishing templates for anyone willing to buy.   Surprising Fact: There are "as-a-service" models for cybercrime, like Ransomware-as-a-Service (RaaS), where attackers don’t need technical skills to launch an attack.   2. Your Data Has Already Been Leaked (Probably) Ever wondered if your personal data is out th...

How I Passed the Cisco Introduction to Cybersecurity Course: My Experience & Tips

Cybersecurity is an ever-growing field, and as someone transitioning into it, I knew I had to start with the basics. That’s why I took the Cisco Introduction to Cybersecurity course. In this post, I’ll share my experience, key takeaways, and tips for anyone considering this course. As a beginner in cybersecurity, I wanted a structured way to understand the fundamentals. Cisco Networking Academy offers well-recognized courses, and this one seemed like the perfect starting point. What I Learned The importance of cybersecurity in today’s digital world. Different types of cyber threats and how they impact businesses and individuals. Basic security principles like the CIA Triad (Confidentiality, Integrity, Availability). Career paths in cybersecurity and the required skills. My Learning Process Consistency: I dedicated a specific time each day to study. Taking Notes: Writing down key points helped me retain information. Practice Questions: I reviewed quizzes and assessments multiple times. ...

How I'm Networking and Connecting with Cybersecurity Professionals on LinkedIn

Image
Networking is one of the most valuable skills in cybersecurity, and LinkedIn has been my go-to platform for building connections with industry professionals. As someone transitioning into cybersecurity, I’ve learned that technical skills alone aren’t enough. You also need a strong professional network. Cybersecurity is a dynamic field where knowledge-sharing, mentorship, and industry updates are crucial. Connecting with the right people can open doors to job opportunities, mentorship, and insights into the latest trends. How I'm Growing My Network on LinkedIn 1. Engaging with Content I actively engage with cybersecurity-related posts by liking, commenting, and sharing insights. This helps me stay visible and learn from experienced professionals. 2. Following Industry Leaders I follow top cybersecurity professionals, SOC analysts, ethical hackers, and security advocates. Their posts provide valuable knowledge, and sometimes, they share job opportunities. 3. Joining Cybersecuri...

Most Interesting Cybersecurity Case Study I’ve Read!

Image
Cybersecurity incidents serve as stark reminders of the vulnerabilities that exist in even the most secure systems. One of the most fascinating real-world cases I’ve come across is the 2013 Target Data Breach, a cyberattack that exposed the sensitive information of over 40 million customers and highlighted the devastating consequences of security lapses.   The attack began with a seemingly small vulnerability—an HVAC (heating, ventilation, and air conditioning) vendor that had access to Target’s network. Hackers gained entry by stealing credentials from this third-party supplier, a tactic known as supply chain compromise. Once inside the system, they installed malware on Target’s point-of-sale (POS) terminals, allowing them to collect credit and debit card details in real-time.   By the time Target detected the breach, millions of records had already been compromised. The financial and reputational damage was immense, with the company facing lawsuits, regulatory fine...

Cybersecurity Awareness Matters for Everyone

Image
Imagine this—you wake up, grab your phone, and see an email from your bank saying, "Urgent: Your account has been compromised! Click here to secure it now." Panic sets in. You click the link, enter your details… and just like that, a hacker has your banking credentials.   Scary, right? But this happens every single day to people who don’t realize they’re being tricked. Cybersecurity isn’t just for tech experts—it’s something we all need to be aware of because, let’s face it, our lives are online now more than ever.   How Can You Stay Safe Online?   The good news? You don’t need to be a hacker to protect yourself. Here are some simple habits that can make a huge difference:   1. Strong Passwords Save the Day Let’s be honest—how many of us still use passwords like "123456" or "password123"? If that’s you, it’s time for a change. A strong password should be long, unique, and a mix of letters, numbers, and symbols. Better yet, use a password manager s...

How I Stay Updated in Cybersecurity as a Beginner

When I first started learning about cybersecurity, I quickly realized how fast things change in this field. New threats, vulnerabilities, and hacking techniques emerge almost daily. At first, it felt overwhelming—like I was constantly trying to catch up. But then, I found a few reliable sources that helped me stay informed without feeling lost. Here are some of my go-to resources for keeping up with cybersecurity: Websites and Blogs I Follow There’s so much information out there, but these websites have been lifesavers for me: Cisco Networking Academy  – Cisco is a major player in my transition, and their courses cover everything from Cybersecurity to networking.  Cybrary  – This was one of the first platforms I found when I started learning. It offers free cybersecurity courses, so it’s a great place to start. Krebs on Security  – I love reading Brian Krebs’ reports on cybersecurity incidents. His storytelling makes security news engaging. Dark Reading ...

Why Networking Knowledge is Crucial for Cybersecurity Beginners

Image
When I first got serious about cybersecurity, I thought I would be learning only about threats, encryption, and security tools. But I quickly realized that before I can protect a system, I need to understand how it works—and that starts with networking. For anyone like me transitioning into cybersecurity, here’s why networking fundamentals should be your starting point: 1. Cybersecurity is About Securing Networks Cyber attacks don’t happen in isolation—they happen on networks. Hackers exploit vulnerabilities in how data moves from one point to another. Without an understanding of IP addresses, subnetting, firewalls, and VPNs, it’s hard to defend against attacks effectively. Think of it like being a security guard for a building. How can you stop intruders if you don’t know the layout of the building, how people enter and exit, or where the weak spots are? Networking gives you that “building map” for cybersecurity. 2. It Helps with Detecting Threats and Responding to Attacks As an...

Understanding the Role and Responsibilities of a SOC Analyst

Image
Cyber threats are evolving at an alarming rate, making cybersecurity one of the most crucial aspects of the digital world. At the heart of an organization’s security operations is a Security Operations Center (SOC) Analyst—a professional responsible for monitoring, detecting, and responding to security incidents. If you're considering a career in cybersecurity, the SOC Analyst role is an excellent entry point. But what exactly does a SOC Analyst do? W ho is a SOC Analyst? A SOC Analyst is a cybersecurity professional who works within a Security Operations Center (SOC) to protect an organization’s IT infrastructure from cyber threats. They act as the first line of defense, continuously monitoring systems for suspicious activity and responding to potential security incidents. SOC Analysts play a critical role in ensuring an organization’s security posture remains strong against ever-evolving cyber threats. Key Responsibilities of a SOC Analyst 1. Continuous Monitoring & Threa...

My Unfiltered Experience with Cisco’s Introduction to Cybersecurity

Image
When I decided to transition into cybersecurity, I knew I needed to start with the fundamentals. That’s why I took Cisco’s Introduction to Cybersecurity course. It was my first structured step into this field, and looking back, it was a great choice.   This course not only introduced me to core cybersecurity concepts but also helped me understand the bigger picture—why cybersecurity matters and how it affects individuals, businesses, and even nations. Here are my key takeaways:   1. Cybersecurity Is More Than Just Technology Before starting the course, I assumed cybersecurity was all about firewalls, encryption, and hacking techniques. But one of my biggest lessons was that people are often the weakest link in security. Social engineering, phishing attacks, and weak passwords are major threats that exploit human behavior rather than technical vulnerabilities.   2. The Expanding Cyber Threat Landscape  One thing that stood out to me was how rapidly new ...

What Every Aspiring SOC Analyst Should Know

Image
  When I started my cybersecurity journey, I quickly realized that being a Security Operations Center (SOC) Analyst isn’t just about learning a few technical skills—it’s about developing the mindset of a digital detective. SOC Analysts are the first line of defense in cybersecurity, monitoring threats, investigating incidents, and responding to cyberattacks in real-time. But where do you even begin? I’ve been diving deep into the skills needed for this role, and here are some must-haves that every beginner should focus on: 1. Understanding Networking – The Foundation of Cybersecurity Before you can protect a network, you need to understand how it works. At first, networking felt like a foreign language, but breaking it down into smaller parts helped. Learning how data moves through networks, what protocols like TCP/IP, DNS, and HTTP do, and how attackers exploit them is crucial. What I’m using to learn: Cisco’s Introduction to Networking TryHackMe’s Network Fundamentals YouTube tut...

Understanding Cyber Threats

Image
Cyber threats are everywhere, and they evolve daily. As I dive deeper into cybersecurity, I’ve realized that understanding these threats is the first step to defending against them. But let’s be honest—cybersecurity can sometimes feel overwhelming with all the technical jargon. So today, I’m breaking down some common cyber threats in the simplest way possible. 1. Phishing – The Art of Deception Ever received an email claiming you’ve won a lottery you never entered? That’s phishing! Attackers trick you into clicking malicious links or sharing sensitive information by pretending to be a trusted source. If it sounds too good to be true, it probably is! 2. Malware – The Silent Invader Think of malware as a virus for your computer. It sneaks in through downloads, fake websites, or infected USBs and can steal data, lock files (ransomware), or even give hackers control of your device. Always download software from trusted sources! 3. Ransomware – Pay or Lose Access This one is scary. Ransomwa...

Challenges Are a Great Starting Point

Image
Transitioning into cybersecurity from a non-tech background is both exciting and overwhelming. Coming from social work, I had no prior experience in IT, yet I was drawn to cybersecurity long before I even understood how to break into the field. My journey so far has been filled with challenges, but each one has only strengthened my resolve. Challenges I Faced 1 . Lack of Technical Knowledge Coming from a non-technical field, I had to start from scratch. Terms like networking, firewalls, and penetration testing were completely foreign to me. It felt like stepping into a new world with its own language. 2.  Choosing the Right Learning Path With so many resources available, I didn’t know where to begin. Cybersecurity has multiple domains—SOC analysis, penetration testing, cloud security, governance, and more. Finding the right entry point was challenging.   3.  Imposter Syndrome Since I didn’t have an IT background, I often doubted myself. I wondered if I would ever c...

The Path to Becoming a SOC Analyst

Image
Transitioning into cybersecurity has been an exciting yet challenging experience. Coming from a social work background, I never imagined I would one day dive into the world of networks, security threats, and incident response. However, my interest in cybersecurity started long before I knew how to break into the field. Without guidance, I had no idea where to start. Instead, I ended up learning Backend Web Development through an internship. While I gained technical skills in Node.js, databases, and APIs, something always felt off—I wasn’t passionate about it. Cybersecurity, on the other hand, intrigued me. I finally decided to take the leap, and now I’m actively working towards becoming a SOC Analyst (Security Operations Center Analyst). But with so much to learn, I quickly realized that I needed a structured plan to avoid feeling lost or overwhelmed. Here’s the roadmap I’ve created for myself, which I believe will help anyone else on a similar journey. Step 1: Introduction to Cybersec...

Transitioning Into Cybersecurity??

Image
For the longest time, I believed my path in tech was set. I was a backend web developer, writing APIs, managing databases, and ensuring servers ran smoothly. But as time went on, I realized something was missing. While I enjoyed the logical problem-solving aspect of backend development, I didn’t feel a deep passion for it. I wasn’t excited about the work, and that feeling grew stronger over time. Like many in tech, I started exploring other fields, trying to find where I truly fit. That’s when I discovered cybersecurity, and something clicked. My interest in cybersecurity started as curiosity. I had always been fascinated by how hackers break into systems, how organizations defend against cyber threats, and how security incidents are handled. The more I read, the more intrigued I became. Unlike backend development, where I felt like I was just building, cybersecurity felt like a battlefield where I had to think like both an attacker and a defender. That challenge excited me. Switching ...