Cybersecurity: Dive Deep into the Tools of the Trade
There are several tools that we utilize in the field of Cybersecurity.
Some being free and open source, others being commercial powerhouses. Some are single-purpose, others being Swiss Army knives.
Whether you’re learning some of these tools or just curious, over the next few weeks we will be going over tools in detailed posts, dissecting these tools one by one so you can wield them effectively.
Command Line
EDR
Nmap
NSM (Bro/Zeek or Snort)
Regex
SIEM
Sigma
Yara
Now, I could’ve had a gargantuan list of tools here. But decided to keep it reasonable and leaned towards open source. That way everyone has an opportunity to play with these tools.
What’s great about these is that the majority are free. This is a great time to thank the open source community. It’s amazing how many projects that ended up defining a standard in the field started off as a side gig. Take Sigma, for instance, began as a proof of concept, only after its founders learned that it was being used in production did they start to take on more development.
Acknowledging the Reality
We've all been there – the excitement of diving into a new field, followed by the inevitable frustrations and challenges. Cybersecurity is no exception. The learning curve can be steep, and the tools to learn can sometimes feel overwhelming.
We’ll be going over these one at a time and in plain language. And remember, at the end of the day its Concepts > Tools.
This series will just help you get your hands dirty with some of the tools of the trade. Because at some point, you will be using these. You also will most likely come across some of these in interviews.
By diving deep into each one, we're not just learning functionalities; we're grasping the big picture of how these fit together.
Reflecting on the days when I was just starting out, fueled by hunger and curiosity but overwhelmed by the vastness of tech. Through relentless self-study and by connecting with the right people, my path was carved. If you want to know more about my journey, dive into this post: Danny's Start in Cybersecurity.
As a reminder, I have a free course on Introductory Linux, I think you will get a lot of value out of it.
And if you ever feel stuck or need personalized guidance, I'm just a 1:1 consultation away
Conclusion
In summary, there are several powerful tools to learn in this field. These tools are foundational and harnessing them will take you a long way.
In the next issue, we will start with our first tool, the Command Line for both Windows and Linux. We will discuss specific use cases for each with examples.
Enjoyed this primer for the series to come? Subscribe for free and join a community of cybersecurity enthusiasts. Your support fuels this mission, and together, we'll pull the curtain back from the world of Cybersecurity.