0
submitted 1 year ago* (last edited 1 year ago) by zhenta7@lemmy.ml to c/cybersecurity@lemmy.ml

I know this may be a very general question, but there are so many resources I don't know where to start.

I'm afraid with the free TryHackMe plan I'm limiting myself a lot.

I know portswigger trining, is it better than TryHackMe?

Am I better off starting directly with CTFs? If yes, which is the best to use? (overthewire, hackthebox ...)

Is roadmap.sh reliable?

How important are the certificates? I am a tech illiterate but never cared about certificates.

Or as a last resort, is it better to start directly with hackthebox?

you are viewing a single comment's thread
view the rest of the comments
[-] siravious@lemmy.world 6 points 1 year ago

I am a former enterprise architect in the cybersecurity space as well as a former director of cybersecurity operations and now own a cybersecurity consultancy.

My best advice is to ignore the tools for now. Understand the concepts of cybersecurity across all domains you can - from endpoint protection to privileged access management.

You can pick up a lot of this during the prep for certifications like CompTIA’s or CISSP.

Then whatever you find yourself most passionate about, find an entry level job in that discipline and that can be a way of starting “real world” exposure to the rest.

I hope this helps in some way, and best of luck!

[-] zhenta7@lemmy.ml 1 points 1 year ago

It will help me to get into Offensive security? Or just an entry point to proceed using "tools"

[-] siravious@lemmy.world 1 points 1 year ago

It would seem best to understand both offensive and defensive aspects of security, which, of course, is based on the fundamentals. There are no shortcuts to download a tool and become anything in Cybersecurity space because people who understand the fundamentals can easily counter most “amateur” attacks.

For example, if I hire somebody interested in a certain type of security position, my first question will always be the opposite… If you want to attack X, how would you defend it? and then how would you circumvent that defense, etc.

this post was submitted on 16 Aug 2023
0 points (50.0% liked)

/c/cybersecurity - Cybersecurity News & Discussion

2111 readers
1 users here now

A community for technical news and discussion of cybersecurity and closely related topics.

founded 4 years ago
MODERATORS