Jump to ratings and reviews
Rate this book

From Sysadmin to Cybersecurity: The knowledge which will carve your path

Rate this book
From sysadmin to Cybersecurity
The knowledge which will carve your path



This book focuses its attention on trying to help young systems administrators, newcomers to IT and security and students who don’t have a lot of experience and knowledge and want to start their career in cyber security. I tried to structure this book to give you a good idea of the broad knowledge that is required and try to encourage you by showing that a lot of sysadmin tools, that you already know, can also be used to troubleshoot security problems as well.

There is currently a shortage of cybersecurity professionals, goes through the lack of professionals, how expensive these are can be to get into and to protect. I am a believer that everyone should be able to protect themselves and their systems, it should not be too expensive, as there are a lot of students coming out of university, a lot of start-up companies and the thing in common is not a lot of money available to invest in security, but attacks is a constant, so we must democratise somehow security and make it easier and affordable. There are two hurdles to overcome as I see; one is affordability and the second is convincing business owners hacking activities are real and can not only disrupt businesses but have the power to make them disappear.

I also talk about some of the attacks and malware I saw and faced back in the ’90s and how things were a lot simpler, there was no hardening, no-host firewalls, and no IDS/IPS systems things were wide open.

I also talk about the first real hacker a saw on the news; Kevin Mitnick, it looked like something of a movie, I saw one of the Security Agents with some equipment to detect his calls. It did not click that 30 years later, security was going to become such an important area.

I give some insight into some ideas and concepts, which are not very well explored; I explain the CIA triad (Confidentiality, Integrity and Availability) and how this principle can help you and can be applied.

I also talk about the perimeter network and how inadequate it is for today’s security; the concept of having a single firewall at the front of the network is inefficient and does not work for 75% or more of the attacks.

I also explore most of the necessary knowledge and skills necessary to embark on this security adventure.

I talk about hardware, operating system, TCP/IP stack, the 7 layer OSI model and the 4 Layer TCP/IP model, MAC address, arp protocol, TCP headers, Sockets, network topologies, sysadmin commands, backup, encryption (SSL/TLS) and a lot more.

134 pages, Paperback

Published December 18, 2021

1 person want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
1 (100%)
4 stars
0 (0%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.