Want a Job in Cyber Security as a Security Analyst, Penetration Tester, Security Engineer, or SOC Analyst? Here is Beginner Training.
Hands on training is how I learned over the years. Someone could show me, but it wouldn't sync in until I did it myself. What's the best way to learn?
I'm not affiliated with TryHackMe in any way, shape or form, but I send people their way all the time because of the structured learning. When I learned, I had to buy expensive hardware and make it all work.
It's true that building your own labs gives you experience, but many times you end up spending time focusing on hardware instead of what you are actually trying to learn.
1. Metasploit
2. Phishing
3. Burp Suite
4. Network Security
5. Web Hacking
6. Nmap
7. Initial Access
8. Red Team Fundamentals
9. Introduction to Offensive Security
10. Introduction to Defensive Security
11. Recent Threats
12. Compromising Active Directory
13. Host Evasions
14. Introduction to AWS
15. Introduction to IAM
16. Introduction to Pentesting
17. How the Web Works
18. Linux Fundamentals
19. Privilege Escalation
20. Network Security Evasion
21. Post Compromise
22. Cyber Defense Frameworks
23. Digital Forensics & Incident Response
24. Wireshark
25. Endpoint Security Monitoring
26. Software Security
27. Log Analysis
28. Advanced Splunk
29. Advanced ELK
30. Threat Hunting
31. Threat Emulation
32 Incident Response
33. Malware Analysis
34. Security Software Development
35. Network Exploitation Basics
36. Vulnerability Research
37. Cyber Security Awareness
38. Cyber Threat Intelligence
39. Network Security and Traffic
40. SIEM
41. Attacking and Defensing Core Services
42. Threat and Risks
43. Network and System Security
44. Managing Incidents
45. Web Hacking Fundamentals
46. Attacking and Defensing Core Services
47. Cryptography
48. Introduction to Cyber Security
49. IAM Privilege Escalation
50. Intro to Security Engineering
51. Windows Exploitation Basics
52. Tools and Code Analysis
53. Planning and Scoping
54. Information Gathering and Vuln Scanning
55. Attacks and Exploits
56. Shells and Privilege Escalation
57. Basic Computer Exploitation
58. Detection Engineering
59. Threat and Vuln Management
60. Security Operations and Monitoring
61. Threat Emulation
62. Incident Response and Forensics
63. Snort
64. Malware Analysis
65. Network Fundamentals
66. Windows Fundamentals
67. Scripting for Pentesters
These are hands on labs that will get you familiar with the tools we use in the industry every single day. Be sure to visit Tryhackme to check them out.
If you're Stuck, Here are 2 Ways I can Help you Get a Job in Cyber Security:
Â
1. My Break in Cyber Playbook - This playbook that I wrote will give you solid direction on the right path to take to get into Cyber Security. Better yet, it's also a complete guide on how to stand out to recruiters and make them find you. Get it here.
Â
2. Book a 1-on-1 Call with Me - Let me get to know you and steer you in the right direction so you can work toward land that next job in Cyber Security. I can help you get discovered by recruiters because I know what they are looking for. Â
My calls are informal, fun, and extremely productive. I guarantee you will have some great take-aways and feel more confident by the end of the call or I'll refund you completely.
Â
If you book a call within the next 12 hours, I will also give you a free copy (PDF) of my Break in Cyber Playbook that will help guide you to landing a job.
Â
Â
~ Mike Miller
Comments