The Ultimate Guide

Start Your
Cybersecurity
Journey.

Everything has a first day. This is yours. Pick where you stand — the path unfolds below.

Scroll to explore

Where do you stand?

Choose Your Path.

Same destination. Different starting points.

You cannot hack a network if you don't know how data moves. You cannot secure a server if you can't use the command line. Master the fundamentals first — everything else builds on top of them.

1

Month 1

Networking & Operating Systems

You cannot hack a network if you don't know how data moves.

  • IP Addresses (IPv4 vs IPv6), DNS, Ports (80, 443, 22), OSI Model (Layers 1–7)
  • Linux file system: /etc, /var, /home — Commands: cd, ls, grep, chmod, sudo
  • Install Ubuntu on VirtualBox/VMware — hands-on from day one
2

Month 2

Core Security Concepts

Now that you understand the technology, learn how it breaks.

  • CIA Triad — Confidentiality, Integrity, Availability. Memorise this.
  • Phishing, Social Engineering, Malware types (Ransomware, Trojan, Spyware)
  • OWASP Top 10 — the 10 most critical web vulnerabilities
NetworkChuck on YouTube
Mistakes Everyone Makes (Don't Be That Person)
  • Don't install Kali Linux immediately. Learn Ubuntu first — Kali is a tool, not a playground.
  • Don't pay for bootcamps. TryHackMe, Cybrary, and YouTube are free and superior at this stage.
  • Don't try to hack anything without permission. It is a crime in every country.

You are not a beginner. You are a professional changing domains. Your strategy is "Translation", not Re-learning. Your existing experience is an advantage — you just need to learn the language of security.

<Devs / SysAdmins / QA / Network>

From IT Background

Developer → AppSec / DevSecOps

You know how to build. Now learn to break and patch.

  • / Learn SAST/DAST: Snyk, SonarQube, CI/CD Security pipelines
  • / Read: OWASP Top 10 — you'll recognize all 10
  • / Project: Build an app, inject an SQLi/XSS bug, then patch it

SysAdmin → Cloud Security / Blue Team

You already understand permissions and logs — that's 50% of defense.

  • / Learn: CIS Benchmarks, SIEM tools (Splunk, Wazuh), IAM
  • / Target cert: CompTIA Security+ or AWS Security Specialty

QA / Network → Penetration Testing

  • / Your testing mindset is already 70% of pentesting
  • / Learn: Burp Suite, Nmap, Metasploit. Do Hack The Box

<Sales / HR / Finance / Medical / Arts>

From Non-IT Background

Tech can be taught in 3 months. Crisis communication, stakeholder management, and clear reporting are harder to learn and take years. You already have these.

Strategy 1: The GRC Route (Less code, more logic)

Governance, Risk, and Compliance. Policy writing, auditing, risk management.

  • / Read: ISO 27001, NIST Framework, GDPR basics
  • / Target roles: Jr. GRC Analyst, Third-Party Risk Analyst

Strategy 2: The Tech Sprint (High effort, high reward)

  • / CompTIA A+ (Month 1–2) — do not skip even if it feels basic
  • / CompTIA Network+ (Month 3)
  • / CompTIA Security+ or CEH (Month 4+)

Certifications get you past HR filters. Projects get you the job. Pick your specialization, build the portfolio, and stop waiting.

RED TEAM

The Pentester

Find vulnerabilities before criminals do.

Write Pentest Reports

Don't just say "I hacked a box." Write: Executive Summary → Technical Walkthrough → Remediation. Publish on Medium.

GitHub Scripting

Build a Python "Subdomain Enumerator" or "Port Scanner" and host it publicly.

Cert Target

eJPT (beginner) → PNPT → OSCP (advanced)

BLUE TEAM

The SOC Analyst

Monitor, Detect, Respond.

Home Lab Blueprint

Ubuntu Server + Wazuh SIEM. Attack with Kali VM. Detect the attack. Screenshot the alerts.

Malware Analysis

Detonate a sample in Any.Run. Write a report: C2 IPs, persistence, exfiltration method.

Cert Target

CompTIA Security+ → CySA+ → BTL1

The Golden Rule

Don't list "Watching YouTube" as a skill. List Projects. "Built a Home Lab SIEM" beats "Enthusiastic self-learner" every single time.

Why Juniors Get Rejected
  • /Tool Monkey — knows Nmap but not the TCP handshake
  • /Can't explain risk to a non-technical manager
  • /No community presence — join Discord, build in public

AI-Powered Mentor

Ask Ethan.

Copy a prompt below, then open Ethan — your AI cybersecurity mentor — to get a personalised answer.

Beginner

Build My Learning Path

"I am completely new to cybersecurity. I have [X] hours per week and [Y] months. Build me a step-by-step learning plan with free resources only."

Beginner

Explain a Concept Simply

"Explain [concept, e.g. 'TCP/IP' or 'Public Key Cryptography'] to me like I am 15 years old. Use an analogy from real life."

Career Changer

Translate My Skills

"Act as a Technical Recruiter. I am a [Developer/SysAdmin/HR Professional]. List 5 specific security-relevant skills I already have. Format as a resume Skills section."

Career Changer

Write My Cover Letter

"I come from [Sales/HR/Finance]. Explain how my experience in 'Crisis Management' and 'Reporting' applies to a GRC Analyst role. Write 3 bullet points for my cover letter."

Job Seeker

Technical Interview Drill

"Act as a Senior Penetration Tester. Simulate a technical interview. Ask me one hard question about [Active Directory / SQL Injection / Buffer Overflow] and critique my answer."

Job Seeker

Incident Response Scenario

"Act as a SOC Manager. Present a Ransomware scenario. Walk me through the Containment and Eradication phases using the NIST Incident Response framework. Critique my answers."

Learn Every Day

Stay Sharp.

Cybersecurity changes daily. Commit to reading one article per day from these trusted sources.

Hands-On Platforms

The Next Step

One Conversation
Can Change Everything.

Ethan is trained on real-world cybersecurity knowledge. Ask the question you're afraid to ask anywhere else.

Start with Ethan

Free · No signup required · Powered by ChatGPT