TL;DR
Becoming proficient in two infosec fields takes focused effort and a strategic approach. This guide outlines how to choose your specialisations, build foundational knowledge, gain practical experience, stay current, and network effectively.
1. Choose Your Fields Wisely
- Consider your interests: What areas of cyber security genuinely excite you? Passion fuels learning.
- Assess job market demand: Research which skills are highly sought after in your region and globally. Websites like Indeed, LinkedIn Jobs, and CyberSeek can help.
- Think about synergy: Some fields complement each other well (e.g., Penetration Testing & Digital Forensics; Cloud Security & Incident Response). This broadens your skillset.
- Examples of popular combinations:
- Network Security & Ethical Hacking
- Application Security & DevSecOps
- Incident Response & Threat Intelligence
- Cloud Security & Compliance
2. Build Foundational Knowledge
- Core Concepts: Regardless of your chosen fields, master these basics:
- Networking (TCP/IP, OSI Model)
- Operating Systems (Linux, Windows)
- Programming/Scripting (Python is highly recommended)
- Security Principles (CIA Triad, Authentication, Authorisation)
- Online Courses: Excellent resources include:
- TryHackMe: Hands-on learning paths.
- Cybrary: Wide range of courses and certifications.
- Coursera/edX: University-level courses on cyber security topics.
- SANS Institute (expensive, but highly respected).
- Books: Supplement online learning with foundational texts.
- Networking All-in-One For Dummies by Doug Lowe
- Hacking: The Art of Exploitation by Jon Erickson
- The Practice of System and Network Administration by Thomas A. Limoncelli, Christina J. Hogan, Strata R. Chalup
3. Gain Practical Experience
- Home Labs: Set up virtual machines (using VirtualBox or VMware) to practice your skills.
- Create a vulnerable web application (e.g., OWASP Juice Shop).
- Build a network topology and simulate attacks/defenses.
- Capture the Flag (CTF) Competitions: Excellent for honing skills in a gamified environment.
- HackTheBox
- OverTheWire
- TryHackMe CTFs
- Bug Bounty Programs: Earn rewards by finding vulnerabilities in real-world applications (requires significant skill). Platforms include HackerOne and Bugcrowd.
- Personal Projects: Develop security tools or automate tasks.
4. Specialise & Certify
- Field 1: Deep Dive: Focus on advanced concepts, techniques, and tools specific to your first chosen field.
- Field 2: Similar Approach: Repeat the deep dive for your second specialisation.
- Relevant Certifications (examples):
- Network Security: CompTIA Network+, CCNA Security, Certified Ethical Hacker (CEH)
- Application Security: Certified Secure Software Lifecycle Professional (CSSLP), Offensive Security Web Expert (OSWE)
- Incident Response: GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP – requires experience)
- Cloud Security: Certified Cloud Security Professional (CCSP), AWS Certified Security – Specialty
5. Stay Current
- Follow Industry Blogs & News: Keep up with the latest threats, vulnerabilities, and security trends.
- KrebsOnSecurity
- The Hacker News
- Dark Reading
- Attend Conferences & Webinars: Learn from experts and network with peers.
- Participate in Online Communities: Engage in discussions, share knowledge, and ask questions.
- Reddit (r/cybersecurity, r/netsec)
- Discord servers dedicated to infosec topics
6. Network Effectively
- LinkedIn: Connect with professionals in your fields and join relevant groups.
- Local Meetups: Attend local cyber security events to meet people face-to-face.
- Contribute to Open Source Projects: Showcase your skills and collaborate with others.
git clone https://github.com/example/security-project.git

