JOHN STRAND’S
5 Phase Plan
for starting in Computer Security
Check out the full video of John talking about his plan here:
PHASE 1
Learn your core operating systems. Build a lab. Get started with a language. Learn basic security fundamentals.
Start your education with the soft skills. Understand the technology: how are these machines used in business? What are people doing with them? You can be as technical as anyone, but if you don’t understand the application of what you’re trying to do and if you can’t SPEAK THE BUSINESS SPEAK, you won’t get far.
Windows:
Go to the Windows Evaluation Center. Install software from Microsoft. This is going to be painful. Some things are easy to install, like Active Directory. Some things are very, very difficult to install, like SCCM or Configuration Management. But these are important lessons for you to learn. Set up the things that you will be constantly defending (or constantly attacking) as a security professional.
Linux:
Install everything... from scratch. Don’t know how? Visit a search engine. Type your question. Click the button. Don’t give up just because it’s hard. Security isn’t about taking the easy route – it’s about constantly learning, even under exceptionally difficult circumstances. The only way to get good is by struggling. If you need to, remove your easy way out and uninstall Windows.
Also, learn Bash scripting (there are other shells, but Bash is the one you’re gonna end up using more than not).
Networking:
Set up a network lab. First, get your stuff at home up-and-running and make sure you KNOW what it is doing. Then, get some simulators (https://www.brianlinkletter.com/open-source-network-simulators/). Get some gear. You can buy old equipment for cheap on eBay. Take it apart. Find out how it works. Buy two or three of things... you’re gonna end up breaking a few.
Coding:
Learn to code. Python is the best place to start (though other languages are important to learn). Study online. Code Academy, Code Warrior, and Pluralsight are all great resources, among many others.
Security Standards:
Learn the CIS top 20 Critical Security Controls. The AuditScripts Critical Security Controls Master Mapping spreadsheet (https://www.auditscripts.com/free-resources/critical-security-controls/) is an incredibly valuable resource. It can help you learn not only one framework, but directly apply that to a variety of other frameworks through its intensive cross-referencing. Knowing these is a big plus in your resume. It’s strategic and high-level. Learn it.
PHASE 2
Time to start projects! (You may have already... that’s fine!)
Move from being a consumer, to a creator
You should:
Start a security group (working on a team is an important experience)
- At work
- At school
Learn PowerShell (...this will take a while)
Keep up-to-date on security news
Eliminate distractions that are holding you back
PHASE 3
This is the time of web apps – you’ll have to know these
Start with PHP and ASP.NET (don’t get distracted by anything else yet)
Feel free to branch out to networked iOS and Android Apps
Learn to code (badly)
Develop SOMETHING
PHASE 4
Time to start hacking stuff!
Learn IDA and Immunity Debugger
Pick a protocol and understand that protocol
Hit online challenges
(You’ve already been playing with Metasploit this whole time, right?)
Download ZAP from OWASP
Use and learn ALL this:
Windows ATT&CK for Enterprise Matrix
SANS Ultimate Pentest Poster
PHASE 5
PRESENT!
Give talks everywhere and anywhere
Present on things you JUST learned!
Take advantage of cons/events/webcasts as a speaker and...
Put. Yourself. Out. There.
IN CLOSING…
Feel free to:
Indulge in distractions
Stick to this plan
Ignore this plan
Develop your own plan
Get good at just one thing
Get a degree
Don’t get a degree
Get certifications
Don’t get certified
Do NOT do the following:
Sink into video games
Waste your time figuring out the cube
Binge watch shows on Netflix
Use Bing for anything
Just barely learn Metasploit to impress people
Spend more time on the hacker “look” than learning
Get angry
Blame others
Check out the full video of John talking about his plan here: