🔍
Why Cyber Security is Hard to Learn (Tips For Success!) - YouTube
Channel: Cyberspatial
[3]
Cybersecurity is really hard to learn.
[5]
It’s not just broad and deep,
[6]
but also consists of many other fields
[8]
in technology and computing.
[10]
I get a lot of questions asking
[12]
what course to take
[13]
for learning cybersecurity,
[14]
which is kind of tough to answer
[15]
because the real answer is:
[17]
there is no course,
[18]
just a journey.
[19]
And everybody you ask
[20]
is going to give you
[21]
a different answer,
[22]
since each of their journeys
[23]
are all different as well.
[24]
It’s almost like asking
[26]
several UFC fighters
[27]
on how to fight.
[28]
Everybody’s going to give you
[29]
a different recommendation,
[31]
depending on where they came from.
[33]
Which is why in this video
[34]
we’re going to go over
[35]
why cybersecurity is so hard,
[37]
three different learning approaches
[38]
you can use to overcome this challenge,
[40]
and the overall mindset
[42]
you need to maintain to be successful
[43]
on your own journey.
[45]
So the biggest reason cybersecurity
[47]
is hard to learn is because
[49]
it consists of many different fields,
[51]
each with their own unique stack of skills.
[54]
Every component within each skill stack
[56]
could be a concept, tool,
[58]
or even an entirely new field.
[60]
Take networking for example,
[61]
a few components that come to mind
[63]
might be IPTables,
[64]
which let you set packet
[65]
filtering rules in Linux,
[67]
PCAPs, or packet captures, which are
[69]
static snapshots of data in motion,
[72]
TCP, or transmission control protocol,
[75]
which segments data into conversations
[77]
between devices.
[79]
BGP, or border gateway protocol,
[81]
which governs the routes between
[82]
autonomous systems on the Internet.
[85]
Or switches, which connect
[87]
physical devices together through cables
[89]
and relay ethernet frames between them.
[92]
Now that’s a lot of different things,
[93]
but they’re really just a few examples
[95]
of many different concepts that fall
[97]
under networking,
[98]
and the list could go on and on.
[100]
Each of these components
[101]
that I’ve mentioned can themselves,
[103]
be broken down into smaller
[105]
bundles of knowledge, rinse and repeat.
[108]
This idea of skill stacks can apply
[110]
to all the different subfields
[111]
in the cybersecurity world too,
[113]
some of which you see here.
[115]
What makes things complicated even further
[117]
is that all the stacks
[119]
are also interrelated to one another,
[121]
kind of like a skill network.
[123]
So to learn something
[124]
that’s more high level,
[125]
like penetration testing,
[126]
you might have to master a network of
[128]
skill stacks before having a solid enough
[131]
baseline to really understand it well.
[134]
This applies to other more cyber-specific
[137]
areas of concentration,
[138]
like privilege escalation,
[139]
security monitoring, incident response,
[142]
threat hunting, et cetera.
[144]
If you wanted to learn
[145]
all about cybersecurity, there’s really
[147]
too many different things to know,
[149]
since it could very well take
[151]
ten to twenty years mastering
[152]
just a few of them,at which point,
[154]
your mind might be oversaturated,
[157]
and not so interested in the other fields.
[159]
The reality is that you’ve got to
[161]
start off with just one or two areas
[163]
to concentrate in,
[165]
before expanding to others.
[167]
Whether you choose to become well-rounded
[168]
in a few different skill stacks,
[170]
or to be elite in just one,
[172]
there’s a lot of different journeys
[174]
you can take.
[175]
Personally I’d consider myself
[176]
as a mix of highs, mediums, and lows,
[179]
depending on the area we’re talking about.
[181]
So before you ask the question,
[182]
“How do I learn cybersecurity?”
[184]
and don’t know where to even begin,
[186]
the first principle is to discover
[188]
what topics are out there
[190]
and how they all connect
[191]
together on a broad level.
[193]
Then, you can start to narrow down
[195]
the learning scope to just the ones
[197]
you might be interested
[198]
in starting off with.
[199]
So with that being said,
[200]
let’s go over some techniques
[201]
you can use for learning
[202]
and training in cybersecurity.
[205]
Generally there’s three main ways
[207]
to learn complex topics:
[209]
top-down, bottom-up, and project-based.
[212]
Top-down is a really common approach,
[214]
where you pick a subject to tackle,
[216]
and then go after the resources
[218]
specifically tailored towards
[219]
learning that topic.
[221]
An example of people using
[222]
a top-down method might be pursuing
[224]
a specific certification on
[226]
“ethical hacking”, for instance.
[228]
It’s easy to think it’s as simple
[229]
as loading up Kali Linux
[231]
to sling some tools at targets,
[233]
or by grabbing some courses
[235]
and books on the subject,
[236]
then brain dumping everything
[238]
just to pass an exam or test.
[241]
Then you walk around thinking
[243]
that you're a Jedi,
[244]
but the reality is that your baseline
[246]
fundamentals are really weak,
[248]
and your true abilities
[249]
aren’t good enough to operate
[250]
in most real-world scenarios.
[253]
People at this stage in their journeys
[254]
are often known as skiddies,
[256]
which stands for script kiddies,
[257]
referring to all the young aspiring kids
[260]
that only know how to run tools
[261]
written by other people,
[263]
but not the principles
[264]
behind why or how they work.
[267]
In my opinion,
[268]
the best way to be successful
[269]
if you’re looking to use
[270]
a top-down learning method
[272]
is through an apprenticeship.
[273]
Back before education
[275]
was institutionalized through schools,
[277]
the only real way to learn
[279]
a skill or craft was to apprentice
[281]
under a master,
[282]
someone who had a few decades
[283]
of experience under their belt.
[285]
The knowledge transfer process
[287]
was rigorous and methodical,
[288]
to make sure that an apprentice
[290]
was actually teachable
[291]
and useful in adding value.
[293]
The main advantage to an apprenticeship
[295]
is that masters can point you
[296]
to the skill stacks that are relevant,
[298]
while filtering out the ones that aren’t.
[300]
It’s also handy that they can be there
[302]
for questions that are really hard
[303]
to find answers for all on your own.
[306]
The net effect of being an apprentice
[308]
is the huge amount of time saved
[310]
in the learning process,
[311]
which in my experience,
[312]
can reduce years into months.
[315]
The drawback to top-down learning
[316]
through an apprenticeship
[318]
is finding one in the first place.
[320]
Unfortunately, the truth is that
[322]
without having a solid baseline first,
[324]
many of the journeyman-level
[325]
and master-level practitioners
[327]
are either way too busy
[328]
or not interested in coaching you.
[330]
It’s a huge time investment
[332]
on their part to teach students,
[334]
since it takes them away
[335]
from research or actual work,
[337]
with a high risk of failure,
[339]
especially if the students
[340]
don’t have very much grit
[341]
or the drive to succeed
[342]
in the first place.
[344]
If a senior practitioner doesn’t
[345]
see much potential in you,
[347]
it’s easier to just walk on by.
[349]
This is why on-the-job training
[351]
and experience for cybersecurity
[352]
is so helpful because you’re surrounded
[354]
by co-workers you can learn from,
[356]
most of whom are likely better than you
[358]
in one or more areas.
[359]
Try to identify the most technical people
[361]
in your social network,
[363]
even if that means the IT helpdesk guy,
[366]
and spend time learning
[367]
as much as you can from them.
[369]
Once you’ve developed a decent relationship,
[371]
find out which experts they personally
[373]
look up to.
[374]
Then reach out to those guys.
[376]
If you’re not able to get mentorship
[378]
through professional circles,
[379]
you might consider building
[380]
a solid baseline knowledge through
[382]
the bottom-up approach.
[384]
Bottom-up learning is where you start
[386]
by picking a subject to tackle,
[388]
then decomposing it into the most basic
[390]
principles, definitions,
[391]
and tools that are related to it.
[393]
Then you start by learning
[394]
those component parts first
[396]
before diving into the target subject.
[398]
For a boxer it might mean
[400]
countless amounts of conditioning
[401]
and training in very simple
[403]
exercises that build muscle memory
[405]
and situational agility,
[407]
which indirectly improves
[408]
your fighting abilities over time.
[410]
Even though it takes a lot longer to do,
[412]
you build a very solid foundation
[414]
that becomes helpful
[415]
when you do make the switch
[416]
to more skill-oriented exercises.
[418]
In the case of cybersecurity
[420]
where you’re a mental athlete,
[422]
bottom-up learning translates into reading,
[424]
lots of reading.
[425]
Start with all the books
[426]
you can find that are related to computer
[428]
and network security and just marathon away.
[430]
What’s good about books
[432]
is that you tend to get higher
[434]
quality content than the average
[436]
Internet post and learn a thing
[437]
or two about each author,
[439]
most of whom are active
[440]
practitioners themselves.
[442]
They might also happen
[443]
to maintain a blog
[444]
or Tweet links to resources
[445]
for you to follow.
[446]
When you are reading,
[447]
remember to jot down
[448]
all the different vocabulary and concepts
[450]
you’re learning in something like a mindmap
[452]
or spaced repetition software like Anki.
[455]
Anki is a free and open-source tool
[457]
that lets you build flashcards
[458]
to learn just about any concept.
[461]
Unlike normal flashcards,
[462]
the heart of Anki is a scheduling algorithm
[464]
that decides when to show you concepts based
[467]
on how well you know it.
[470]
Research shows that active recall,
[472]
where you’re asked a question
[473]
and forced to remember the answer to,
[475]
is much more effective than passive study
[478]
for building strong memories.
[479]
Distributing the process over increasing
[481]
periods of time consistently,
[483]
further cements your knowledge
[485]
because it forces your brain
[486]
to retrieve it with deeper and deeper
[488]
levels of recall.
[490]
Using a bottom-up approach for cybersecurity
[492]
sets you up for learning new fields
[494]
much easier, since in cybersecurity,
[497]
many of the concepts show up again
[499]
time after time,
[500]
since everything is interconnected.
[502]
One downside to bottom-up learning
[504]
is that it can get monotonous,
[506]
since doing any activity
[507]
for its own sake without a clear goal
[509]
can get boring over time.
[510]
Which leads us to a third approach
[512]
for learning,
[513]
and actually one of my favorite methods,
[515]
which is through projects.
[517]
Project-based learning is a bit of a hybrid
[518]
approach between the previous two,
[520]
and gives you some more flexibility
[522]
using both.
[523]
To begin, you need to define
[525]
a technical outcome to work towards
[527]
that forces you to gather
[528]
and learn resources.
[529]
One of my first projects,
[531]
for example, was to be able to use
[533]
a computer without ever touching the GUI.
[535]
This process led me to become
[537]
quite proficient at the command-line
[539]
and learn many more concepts
[540]
than the original project entailed.
[542]
They say you should set smart goals,
[544]
which are specific, measurable, achievable,
[547]
relevant, and time-bound.
[549]
So something like “I want to hack”
[551]
wouldn’t qualify as smart.
[552]
A better alternative would be,
[554]
“I want to learn how to crack WEP encryption
[556]
on my home wireless network
[558]
by the end of the month.”
[560]
Even if it takes you much longer
[562]
than a month,
[563]
the process will expose you
[564]
to all sorts of different skill stacks,
[566]
from Aircrack, layer 2 networking,
[569]
the 802.11 protocol, and much more.
[572]
Project ideas tend to fall
[573]
into one of four categories:
[575]
making things, breaking things,
[577]
fixing things, and knowing things.
[579]
For instance, you could decide to build
[581]
a computer, then intentionally install
[583]
publicly available malware on it,
[585]
and then try to use host
[586]
or network forensics methods
[588]
to detect and eradicate the infection.
[590]
Documenting your entire process and workflow
[593]
can help solidify the entire
[595]
learning experience.
[596]
Whatever your project is,
[597]
it’s an opportunity to incorporate
[599]
both the top-down and bottom-up learning
[601]
we mentioned earlier.
[603]
The final principle that’ll help you
[604]
to get better at cybersecurity
[606]
is to change your mindset
[608]
and time horizon for picking it up.
[610]
The reality is that cybersecurity
[612]
takes a really long time to master,
[614]
much like becoming a doctor or lawyer.
[616]
What’s easy about established professions
[618]
like these is that there’s institutionalized
[621]
paths that have matured over the centuries.
[624]
If someone asked,
[625]
“Is there a doctor course anywhere”,
[626]
the answer is pretty clear.
[628]
In the United States, it takes
[629]
four years of medical school followed
[631]
by three to seven years of residency.
[634]
Medical residencies are basically
[635]
apprenticeships that involve working
[637]
at least 60 hours a week.
[639]
Many doctors that I’ve known
[640]
have worked 80 or more hours a week,
[643]
sleeping five or six hours each night.
[646]
Depending on your residency of choice,
[647]
this is anywhere from ten to twenty thousand
[650]
hours of training.
[651]
Assuming you’re only working 40 hours a
week,
[654]
this would take you at least ten to twenty
[656]
years on the job in a cybersecurity role
[658]
to attain just the absolute number
[660]
of equivalent hours as a doctor.
[663]
The author Matthew Green describes mastery
[665]
of any skill as a function of time
[667]
and intense focus applied to a particular
[669]
field of knowledge.
[671]
In our age of two-second attention spans
[672]
and instant gratification,
[674]
it’s easy to just want a simple crash course
[677]
or quick tutorial to teach you everything.
[679]
But just seeking out surface level education
[681]
keeps you at the unconsciously incompetent
[684]
level of learning,
[685]
where you’re really
[686]
confident but not actually skilled.
[689]
As you grow and progress,
[690]
you then realize you’re actually pretty
bad,
[692]
which could be a decision point as whether
[695]
or not to continue on the path.
[697]
If you do push through though,
[698]
you start to feel more comfortable
[700]
and accepting of the concepts
[701]
you know and don’t know.
[704]
At the most mature stage
[705]
of unconscious competence,
[706]
you’re pretty skilled
[707]
without even thinking about it.
[709]
In a field like cybersecurity
[711]
where there’s no clear,
[712]
institutionalized path
[713]
to becoming a professional,
[714]
you’ve really got to self-educate
[715]
using a combination of the different
[718]
learning approaches available
[720]
to achieve mastery.
[721]
So that’s it for this episode of
[723]
learning cybersecurity.
[724]
Hit that like button, subscribe,
[725]
and share it with friends
[726]
if you think this video has been
[728]
valuable for you.
[729]
Hit that notification bell
[730]
if you want an update for each new video
[732]
we launch.
[733]
It really goes a long way in supporting
[734]
what we’re doing.
[735]
Thanks so much for watching,
[736]
and I’ll see you soon!
Most Recent Videos:
You can go back to the homepage right here: Homepage





