Getting Into Cyber Security: 5 Skills You NEED to Learn
In this video I’m gonna take you throughthe top 5 skills you need to be learning to get into cybersecurity. If you’re new to the field or looking fora career transition, there’s just so much info out there that it’s hard to even getstarted. You might hear people talk about an alphabetsoup of certifications to take, but I’m here to tell you: THEY’RE NOT THAT IMPORTANT. While there’s some value going through theprocess of studying for certs, what IS IMPORTANT are your SKILLS and EXPERIENCE. Because in this field, what you can DO willmake you so much more successful than what

In this video I’m gonna take you throughthe top 5 skills you need to be learning to
get into cybersecurity.
If you’re new to the field or looking fora career transition, there’s just so much
info out there that it’s hard to even getstarted.
You might hear people talk about an alphabetsoup of certifications to take, but I’m
here to tell you: THEY’RE NOT THAT IMPORTANT.
While there’s some value going through theprocess of studying for certs, what IS IMPORTANT
are your SKILLS and EXPERIENCE.
Because in this field, what you can DO willmake you so much more successful than what
you KNOW.
Solving technical problems is THE way to earning the trust and confidence from people
you work with.
Buckle up and let’s dive right in.
Number 1: Building and using virtual machines.
Virtual machines, also called VMs, are operatingsystems that run on top of your existing or
“host” OS.
The virtualized OS is commonly referred toas a “guest”, and is managed by software
called a “hypervisor”.
The hypervisor lets you manage and allocateresources like CPU, Memory, and Disk space
on your guest.
Popular hypervisors you may have heard ofinclude Hyper-V by Microsoft, Virtualbox by
Oracle, VMware, and KVM.
Often times when you hear the term “cloud”it usually means thousands of VMs running
on specialized hypervisors on someone else’sserver farm in a datacenter somewhere.
Virtual machines let you become platform-agnostic,meaning you’re no longer limited to any
particular operating system and tools availablefor it.
Many people spend all their time just on oneOS and debate which ones are better.
Let me tell you: IT DOESN’T MATTER.
As a pro you should be versed in ALL of themand comfortable working with any platform.
This maximizes the scope of your skills andmakes you effective in any situation.
Virtual machines also give you the flexibilityto train and research in an isolated environment
without affecting your main driver.
You can quickly take snapshots of a guestOS and restore it to an earlier state.
Opening a suspect file you received?
Use a VM.
Want to practice configuring a server?
Use a VM.
Slinging exploits at a target?
Use a VM.
Moving on to…
Number 2: LEARN the command line.
Don’t run away but EMBRACE it.
The command line interface, commonly referredto as a SHELL, is the simplest and arguably
the most efficient way to interact with anoperating system.
For example, if I’m looking for an entryin this CSV file, Excel might freeze or crash.
Running a lightweight shell command gets mewhat I need in no time.
Why’s it called a shell?
The important parts of an OS that actuallymakes it run is called the KERNEL, because
it functions at the center of the system.
The part that’s exposed to a user is calledthe shell, since it wraps around the kernel.
It’s just like a car, where the steeringwheel, pedals, and dashboards giving you control
over the engine or transmission all existin the “shell” of the car.
The command line gives you the lowest levelaccess to software functionality that comes
with an operating system.
Many of the most useful tools don’t havea graphical interface to point and click.
Mastering the command line expands your arsenaland lets you get more done with less.
It lets you be able to use scripting and automationto tackle repetitive tasks that would otherwise
waste lots of time.
Automating your workflow by learning the commandline makes you a tremendously valuable asset
to the team.
I recommend starting out with Bash, or the“Bourne-again Shell” since it comes default
with almost every Linux distribution.
macOS used it in its Terminal app, but hassince changed to Zsh, or “Z-Shell”, and
has some nicer features.
If Bash is like a Toyota, then Zsh is morelike a Lexus.
Bash is so popular and effective that Microsoftactually released the Windows Subsystem for
Linux, or “WSL” and lets you install severaldifferent Linux flavors to use Bash as a native
app.
This is super convenient, since I can accessmost of my Linux tools without having to switch
to a virtual machine.
Now understand that Powershell is actuallythe go-to native shell for Windows.
It’s very different from how you would usethe Linux command line, but gives you a ton
of powerful Windows administration abilities.
If you work in an environment where Windowsis the primary OS, definitely learn Powershell
as well.
I’m gonna start a series on the Linux commandline very soon.
Comment below to let me know what tools andconcepts you’d like to learn!
Number 3: System Administration.
All of us with a computer or smartphone, fromyour grandma to IT wizard is a really sysadmin
at some level.
It all depends on what level you’re at.
System administration involves the configuringand maintaining of computers, whether a personal
device or hi-powered server.
When I was first using computers as a kid,I loved to dive down into EVERY SINGLE SETTING
available on the computer, just to see whatit did.
Reading manuals, online guides, and playingaround just drove this curiosity further.
By doing that, I became the family IT helpdesk.
System administration is about knowing yourplatform and various tools inside and out
to be able to help others who don’t.
Whatever your skill, I challenge you to fiddlearound and learn by doing.
Delete some files, and try to recover them.
Download, open, and monitor old viruses ina virtual machine with tools like Windows
Sysinternals to see what they do.
Try to extract files and passwords off a computerwithout knowing the login info.
Whatever it is, push the limits of what youalready know by reading guides out there and
following along.
Practice a little more each day and you’lllevel up in no time.
Next up…
Number 4: Computer Networking.
THIS is the heart and soul of it all, whatI like to call the cyberspatial “laws of
physics”.
It’s understanding how devices interactwith each other and how data gets from point
A to point B. A strong foundation in networkingwill make you a rockstar troubleshooter, whether
you’re red teaming, defending, or runningday-to-day IT ops.
There’s two conceptual models that governcomputer networking: TCP/IP and OSI.
They group all your different networking andtelecommunication protocols into “layers”.
TCP/IP is older and uses four layers: networkaccess, internet, transport, and application
layers.
OSI stands for the Open System Interconnection,which is developed by the International Organization
for Standardization, or ISO.
These guys define everything from countrycodes to time and date formats.
OSI is newer and uses seven layers: physical,datalink, network, transport, session, presentation,
application layers.
All these layers are just a way to describe“what’s happening where”.
So if you’re receiving a package from someonein a different country, it’s gonna get passed
between envelopes, boxes, vehicles and planes,each with their own addressing method and
operating procedures.
When the post office tells you there’s anairline issue, you know where it is in the
transportation system that’s delaying yourdelivery.
Likewise, the networking layers all have differentfunctions, but as a whole work together to
let you stream videos from a server in a rackto a device in your hands.
Knowing what’s happening at each layer letsyou “see the matrix” and be much more
skilled at your craft.
Number 5: Personal digital security.
This is an area I’ve been particularly passionateabout because it affects our families, friends,
and organizations.
The cybercrime industry is booming.
You don’t have to scroll far to seewhat the online black market place looks like.
As technology becomes more intertwined withour lives, from Internet-connected cars to
refrigerators, the vulnerabilities and attackvectors are gonna increase more and more.
If you want to go deep into cybersecurity,there’s no better place to start than with
yourself.
From passwords, encryption, to secure comms,stay up-to-date with the latest security news
and best practices.
You might just be the subject-matter expertin your office that others go to for advice.
And that advice might just protect your companyfrom becoming front page news.
But most importantly is living it out yourselfas well!
You wouldn’t believe the number of timesI’ve seen cyber intrusions originate from
the security operations or IT department simplybecause people didn’t understand or practice
basic digital hygiene.So that’s it for thisvideo Thanks so much for tuning in, don’t
forget to subscribe for more content justlike this, AND if you have any further questions
please let me know.
See you soon!