Cybersecurity Lab Notes - 2025-11-29
Summary
I focused on clarifying my learning pipeline, exposure to the offensive scene, and how I will structure my daily grind so the technical work actually compounds.
Cybersecurity Activities
1. Path and Curriculum Review
- Reviewed the overall training path:
- CyberSec 101 fundamentals
- TryHackMe and CTF practice leading toward PT1
- Long term progression toward eJPTv2 and deeper red team work
- Broke the path into concrete stages:
- Foundations: Linux, networking, basic scripting
- Web basics: HTTP, status codes, cookies, sessions
- Offensive core: enumeration, exploitation labs, post exploitation
2. CTF and Community Orientation
- Noted the role of CTFs for:
- Practicing real exploits in a safe environment
- Learning to chain multiple vulnerabilities
3. Study Capacity Planning for Cybersecurity
- Designed a study routine that prioritizes security work:
- Targeted 4 hours of focused cybersecurity study on workdays.
- Added extended blocks on weekends that are fully dedicated to labs and writeups.
- The goal is to maintain a weekly total that supports real technical growth rather than random bursts.
Key Takeaways
- The red team path is long, but now there is a clear structure: foundations, labs, CTF exposure, and certifications.
- CTFs and structured labs will be my main training grounds for offensive skills.