Debi Kurnia
  • Future
  • Cybercrime
    • Cybersecurity
  • Privacy
  • Digital Life
  • Remote Work
    • Freelancing
  • Guest WriterJoin Us
  • Contact MeGet in Touch
No Result
View All Result
Debi Kurnia
  • Future
  • Cybercrime
    • Cybersecurity
  • Privacy
  • Digital Life
  • Remote Work
    • Freelancing
  • Guest WriterJoin Us
  • Contact MeGet in Touch
No Result
View All Result
Debi Kurnia
How to Study Cyber Security

How to Study Cyber Security Independently and Without Cost?

It’s About Learning How Things Work and How You Can Break Them

Guest Writer by Guest Writer
18/07/2022
in Cybersecurity
Reading Time: 4 mins read
0
Share on FacebookShare on TwitterShare on LinkedIn

This was the first question I ever asked myself, How to Study Cyber Security? After months of studying, deep analysis, and research, I concluded that everything is free these days. You have to want to learn and get better.

Contents hide
1 You might also like
2 The Guide to Cybersecurity for Security Professionals
3 Cyber Defense: The Art of the Subtle
4 How to Study Cyber Security? Cybersecurity Study Tips

People will ask you to teach them how to hack, but when you start with the important basics, they will say no because it’s boring. This is not what we want to know. We want to learn how to hack. There, we need to make sure they understand what hacking is really about. It’s not about writing fancy lines of code on a black and green screen. It’s about understanding how things work and figuring out how to break them. Know the ideas and how they work.

You might also like

Guide to Cybersecurity

The Guide to Cybersecurity for Security Professionals

30/07/2022
1.6k
cyber defense

Cyber Defense: The Art of the Subtle

12/07/2022
2.2k
How to Study Cyber Security

Everyone would have done that if it were easy. A baby doesn’t start walking right away. Instead, he learns to crawl, walk, and run. So, do things in the right order.

Hacking is about having the right mindset, which a person gets by practicing a lot, getting real-world experience, and building a solid base.

How to Study Cyber Security

How to Study Cyber Security? Cybersecurity Study Tips

Several helpful hints to build a solid basis:

  • Learn basic computer skills: Understand computers and the internet.
  • Learn Networking: What is an OSI model, how does data travel, how to deploy your network, etc.
  • Knowledge of the Linux Operating System: Choose your distro if you’ve worked with it; otherwise, use Kali Linux and learn the commands, Bash scripting, etc.
  • Coding: Cybersecurity doesn’t require programming or coding skills. Everyone in this industry recommends Python. YouTube has tons of free resources. Choose whichever you understand and prefer.
How to Study Cyber Security

Now, let’s move on to the basics of hacking. TryHackMe, HackTheBox, and PentesterLab are three of the best free tools out there. Now that you’ve finished all the basics, a few rooms on THM, and a few machines on HTB, you’re ready for an analyst job, but why stop here? It would be best if you moved up to the next level.

Now, at this point, you should already know what area you want to work in. Is it red team or blue team when it says offensive security or defensive security? Please find out more about it. It’s up to you which way you want to go. Now is the time to write your blogs and walkthroughs. Sharing your experience and knowledge with others will also help you learn more.

Solving CTFs (Capture the flag) is free and fun; you can learn a lot from them. If you learn to solve them well, you can make money from them. They are the same as Competitive programming, but you must find the hidden flags here. Some websites are picoCTF, CTFtime, Hacker 101 CTF, and OverTheWire. These are both easy and hard games, and it’s easy to find walkthroughs for them online.

How to Study Cyber Security

Make projects like keyloggers, password managers, and ransomware, and then put them to use in a VM or VirtualBox. How should they be made? Just put your research and thinking skills to use right now. Do internships at the beginning of your career to build a great resume.

Now, let’s move on to bug bounty. A bug bounty is breaking into an organization with permission as part of its bug bounty program and getting paid for finding vulnerabilities. A bug bounty program is run by every big company and some small ones. Here you just get paid for your skills.

How to Study Cyber Security

You can work on your bug-hunting skills at:

  • HackThisSite
  • HackTheBox
  • HellBound Hackers
  • PortSwigger
  • intigriti
  • bWAPP

Vulnerability-hunting websites:

  • Bugcrowd
  • HackerOne
  • intigriti

I’m glad you read it. If you liked the article, please tell your friends, stay in touch, and don’t forget: Never stop learning.

Tags: CybersecurityHackingLearningPrivacyResourceTechnology
Previous Post

The Threat of Cybercrime is Real

Next Post

Should You Have a LinkedIn Account?

Guest Writer

Guest Writer

This account belongs to a guest author.

Related Stories

AI

7 AI Sites You’ve Probably Never Heard Of!

by Debi Kurnia Putra
03/08/2022
0
1.7k

Let's use AI to make your daily life better. You probably use apps like Siri or Google Assistant, but do...

Guide to Cybersecurity

The Guide to Cybersecurity for Security Professionals

by Guest Writer
30/07/2022
0
1.6k

Most people think that cybersecurity is a vast subject. Even though I work in the field, I sometimes have to...

cybercrime risks

3 Most Important Cybercrime Risks to Consider

by Guest Writer
28/07/2022
0
1.8k

Cybercrime is a threat to everyone and every business. No business or person is immune or safe, so we all...

cookies

What Are Cookies, Privacy, and Cyber Security, and How Are They Related?

by Guest Writer
24/07/2022
0
2k

The following explains what Cookies, Privacy, and Cybersecurity are. Cookies What are they? Cookies are small information that a web...

Next Post
LinkedIn

Should You Have a LinkedIn Account?

Avoid Client Ghosting

Avoid Client Ghosting and Heartbreak When Freelancing

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Debi Kurnia

My name is Debi, and I work as an independent IT security and cyber security consultant to protect businesses from cyberattacks.
This is my blog.

  • Privacy Policy

© 2022 Debikurnia.com - Powered by DB.

No Result
View All Result
  • Home
  • Cybercrime
  • Cybersecurity
  • Digital Life
  • Freelancing
  • Future
  • Privacy
  • Remote Work

© 2022 Debikurnia.com - Powered by DB.