How to Learn the It Skills of a Security Professional
How to Learn the It Skills of a Security Professional
There are two general routes to gaining this knowledge. For some, it works better if they just take some classes to get started. Others just Google what they want to learn and teach themselves. When I was coming up in security, most of my best learning came from my learning on my free time. That approach takes much longer, but it works for some people. Most do a combination of taking classes and self-teaching via Google and articles like this.
Gaining technical skills really boils down to a few questions:
How much time do you have to invest in learning this?
How much money do you have to invest?
How much money will your future/current employer be willing to invest? (People are surprised at how often employers are actually willing to pay for this type of training. You have to ask and even ask in your interviews when you are talking to employers.).
How serious are you about security and how much do you like security?
Answer these questions and you should be able to come up with your plan of attack. One place to start your education is here! I would suggest reading through as many of the articles as possible and watch the videos on the InfoSec Resources. Dont be overwhelmed by the fact that you wont understand it all. Just stay plugged in. Jot down the terms and ideas that really confuse you for later study.
When youre ready to get hands on, ideally, you have a spare computer or laptop to practice on. That machine needs the maximum RAM and CPU speed you can get in it in order to run multiple virtual machines. The more memory or speed you have, the more VMs you can run at the same time. If you dont have a dedicated machine then be sure youre setting up a virtual machine to work on.
Now that you have the machine — or your virtual machine — set up, download Backtrack4, or another Linux distro of your choice. First, read some tutorials on using Backtrack to do some basic stuff. If you have no technical skills, start with the basics. For example, learn how to get an IP address in Linux/Backtrack4. Then learn how to set a static IP address (one you assign).
Next, get yourself VMware or some other virtualization solution. Install Windows 2003, 2008, XP and 7. Just installing these will teach you some things and youll start to get more comfortable just from doing this. As a matter of fact, install them all two or three times.
Learn how to do basic things in each OS like: create user accounts, give permissions to users, lock user accounts, change IP addresses and network settings.
Next, you can learn how to network your Windows machines to each other. Create some shared files, store data there, move data from one machine to the other. Then move on to networking your Linux stuff with your Windows stuff. After youve got this all working, start reading up on how and why it works. After youve got some good theoretical knowledge on how it works, download wireshark, and tcpdump, for both Windows and Linux. Start studying the traffic between all the machines. First study traffic of you transferring files and other activities. Then study the traffic that is generated even when the machines are not actually transferring data.
Once youve done all the above things, and understand most of what youve done, you should be feeling comfortable with networking in general and have working knowledge of the operating systems from the perspective of a power user, at the very least, or a desktop administrator.
After this youre ready to start delving into security. Go back to where you started with Backtrack4. By now you should be a lot more comfortable with it. Start learning how to use things like Nmap and other scanners. For example, if you set up a web server (and if you didnt, go ahead and set one up), scan it and prove its a web server. From Linux, type the command ‘man nmap. Read the ENTIRE man page. After reading it make yourself some notes of the things that really interest you. Now run nmap using EVERY option listed in the man page. Study its output, revisit man again to remind yourself of what a particular scan type is doing and what certain options are.
Next, start reading about vulnerabilities. Some of it wont make sense yet, but thats OK. After spending no less than 20 hours total reading about vulnerabilities (doesnt matter how you stretch the 20 hours out), go back to Backtrack and learn how to exploit one of your unpatched Windows machines