Cybersecurity

A while ago I briefly explored TryHackMe and Hack The Box, but I stepped away to focus entirely on web development. That focus paid off. After building a solid foundation there, it feels like the right time to circle back to cybersecurity with a clearer direction and stronger technical base.

Getting back into Linux played a big role in that decision. Working in a Linux environment again naturally pulls me toward understanding systems more deeply not just how to build applications, but how they behave, how they’re exposed, and how they’re attacked. Having web development experience now makes security concepts more concrete, since I can see both sides: how things are built and how they break.

At the moment, I’m revisiting the fundamentals rather than jumping straight into advanced material. I’m exploring the SOC analyst path to understand monitoring, logs, detection, and incident response from a defensive perspective, while also refreshing penetration testing basics to strengthen my offensive knowledge. I want a balanced view of both sides.

I’ve set up a Kali Linux virtual machine to create a small lab environment where I can experiment safely. I’m starting with widely used tools like nmap and netcat, focusing not just on running commands but on understanding what they actually do, what the outputs mean, and how they fit into real-world workflows.

This time, the goal isn’t casual exposure. It’s structured learning, deeper understanding, and building practical experience step by step.