- Navigating Security
- Posts
- It's Q2, How Was Q1?
It's Q2, How Was Q1?
Are Your New Years Resolutions Still Relevant?
Yoo Welcome to Issue #10 of Navigating Security.
šQuote of the week:
āItās you vs you, then you vs everyone else that wants to work in cybersecurity.ā
What To Expect š«”
This week we discuss our goals from Q1 and what is in store for Q2.
š£ļøWhy you should divide your yearly goals into quarters
ā±ļøIncase you missed the previous issue, here you go:
This Weekās YouTube Video:
If Youāre A Jr Penetration Tester, Watch Thisā¦
ā ļø The newsletter is currently not sponsored
Direction & Goal Setting š£ļø
I started this newsletter because I always feel like Iām being pulled in different directions when it comes to the field. GenAI/LLM security is popping, Iāve always wanted to be a red teamer, bug bounty is something Iām highly interested in, and malware development seems pretty cool - these are all things I constantly think about. The problem with thinking this way is that you donāt end up learning anything because you donāt execute on anything - call it analysis paralysis or whatever. Whenever you feel overwhelmed just remember you canāt learn everything, and you wonāt; a friend had to remind me about this recently as I was kvetching.
A few weeks into 2024, I discovered the 12-week year. Instead of spreading your goals over 365.25 days, you split your year into 4 and tackle one major goal every 12 weeks. Itās just a way of dividing your year into quarters, but itās laid out in a way thatās appealing to the masses. It made sense to me because my goals are always so vague, itās pretty difficult to do any sort of reviews or benchmarks to see where Iām at until the goal is either reached or time runs out.
At that point, I decided to invest the rest of Q1 into getting started with bug bounty. I learned quite a lot, submitted a few bugs, but none paid out - just dups and N/Aās (OOS)š The biggest takeaway from this quarter is that your pentest mindset cannot be your bug bounty mindset, but your bug bounty mindset can be your pentest mindset. What am I saying? Bug bounty findings are pretty different from the stupid misconfigurations you report in pentests. Impact is key. The sooner you wrap your head around this, the easier it will be.
Whatās nextā
My next 12 weeks will be focused on my red teaming goal. I have to take the CRTP as part of my training for my new role so thatās the main goal. This will be cemented by revisiting the PEH course by TCM Security, the External Pentest Playbook by TCM Security, Game of Active Directory ( GOAD) - guided by Howard from IT Security Labs, and doing some of the modules from Maldev Academy because why not?
Side Note: Iām thinking of changing the newsletter cadence to bi-weekly. Nothing final, but Iām busy as hell. My brain and laziness canāt keep up. I also have to get back to YouTube, but thatās always a hassle because, to me, it seems people would rather watch the same old garbage āBest certification for cybersecurityā videos that some creators pump out every month with a different title and thumbnail - yes Iām salty š.
Anyway, evaluate your performance for the first quarter of 2024. How well are you executing the steps that will eventually achieve your goals? If your goal is too broad, divide it into sub-tasks and spread them over each quarter so that you can accurately measure your performance without feeling too overwhelmed. Remember, itās you vs you then you vs everyone else that wants to work in cybersecurity. Pattern up. Step up. Show up for yourself š«”
Suggestions
Hit me up on Discord or LinkedIn if you have anything you feel would be cool to include. Thanks, Cheers.