How to learn Cybersecurity: Part 1 – Mindset

💡 The Necessary Mindset for Navigating Information Security

The domain of information security is incredibly vast—it’s simply unrealistic for any single individual to master every facet. To illustrate the scale, consider an analogous field like software development:

Imagine aspiring to be a programmer, recognizing that over 200 distinct programming languages exist, each capable of creating applications that could be subject to exploitation, debugging, or reverse engineering. If we dedicated 100 hours to learning each language, we would invest 20,000 hours, equivalent to roughly 2,500 eight-hour days, or nearly seven years of continuous study.

Think about that: seven years spent just on learning the syntax and semantics of every language, without ever having applied those skills to debug, exploit, or reverse engineer any of the programs created. We would then need another seven years to truly master the practical skills of debugging and reverse engineering.


⚖️ Prioritizing Principles Over Exhaustion

The central idea is clear: no one can or should dedicate such an immense amount of time to acquiring proficiency in every single niche within a massive field. Furthermore, it’s unnecessary. While you must dedicate time to grasping the foundational technical principles, structures, and processes, you won’t need seven years to do so.

Every programming language possesses unique strengths and weaknesses. However, once you achieve a deep understanding of one language, you’ll find that accelerating your knowledge in others becomes significantly easier. You don’t need to learn every language to competently read its code. They all adhere to common underlying concepts, famously defined by R. D. Tennent as:

  • The Principle of Abstraction
  • The Principle of Correspondence
  • The Principle of Data Type Completeness

In information security, the imperative is to quickly learn and internalize these core principles, structures, and processes, and then adapt that knowledge to the diverse environments you encounter. You will inevitably face situations where you simply don’t understand how a system works. This is a crucial, positive moment. It marks the point where your immediate task becomes identifying and filling those knowledge gaps.


🤝 Community and Collaboration

Numerous learning-focused communities in the information security space are accessible to help. Many of these offer free resources, including reviews of tested applications, intentionally vulnerable systems (known as “capture the flag” or “wargames” environments), and guides aimed at mutual assistance and skill development.

When engaging with other members, you’ll often observe a distinction between two general types of participants:

  1. Those who are aware of their lack of knowledge.
  2. Those who mistakenly believe they know everything.

It can be challenging or frustrating to navigate this dynamic, but it’s a normal component of the learning journey. Communication within these groups should always be respectful, maintaining the perspective that every expert started with zero knowledge in this field. This respectful, collaborative approach is vital for the success of the learning community and for everyone striving to advance their career.


🧠 The Mastery of Learning

A significant hurdle many people face is accurately gauging their current skill and knowledge level. In technical fields like penetration testing, the required breadth of understanding across varied technologies complicates this self-assessment. As established, the core challenge is the sheer volume of information. You could spend years superficially touching upon every single topic without mastering any, or you could focus intensely on one area to become a deep specialist.

A more effective alternative involves developing your personal research methodology, refining your learning process, and actively using this framework to enhance your knowledge. Success comes when you know how to search for the required information efficiently online and how to rapidly absorb and adapt that information to the specific operating environment. Before achieving this, however, you must dedicate time to deliberate practice of this methodology.


🏃 Practice Makes Proficient

Becoming a skilled security professional or penetration tester is attained only through considerable practice. There is no shortcut to practical skill improvement. You can passively read 50 books on programming and gain an understanding of how to read code—a useful foundation. However, to write a functional program yourself, you must engage in active learning, which means you have to write code, test it, and iterate on your own efforts.

One of the most frequent questions posed in the field is:

When is a penetration tester “good enough”?

Since we’ve accepted that no one person can know everything, the answer lies in your ability to find, choose, and adapt the necessary information.

While these three actions are foundational, there is one crucial element missing from this list that underpins the entire process.

The essential missing term is: LEARN

The process of “learning how to learn” effectively is difficult and often overlooked. Most educational systems focus on providing a single, predefined path to problem-solving. For instance, in a typical classroom setting, teachers introduce a concept, demonstrate a single method for solving a problem, and then provide exercises to practice that one method.

Let’s examine this cognitive rigidity. Look at the simple mathematical equation below and attempt to solve it:

$$20 \times \rule{1cm}{0.15mm} + \rule{1cm}{0.15mm} = 65535$$

While the equation is simple to solve, did you consider how many different combinations of whole numbers exist that could satisfy the equation? Did you limit yourself to one specific mathematical approach?

Optional Reflection:

Take a moment to ask yourself why you didn’t explore an alternative solution method. Note down your reasoning and reflect on the cognitive path that led you to your chosen method before proceeding.


🔓 Beyond the Obvious: Embracing Unconventional Thinking

Consider the challenge we just encountered. When presented with the seemingly simple mathematical equation, what constraints were you explicitly given? If you review the instructions, the answer is none. So, then, the critical question arises: why did you not consider introducing additional digits, or even more fundamentally, why did you not contemplate altering the arithmetic operations themselves?

This natural inclination to stick within predefined, often unstated, boundaries is precisely what we aim to challenge. Welcome to a core principle of problem-solving, particularly prevalent in fields like cybersecurity and innovation: “Thinking Outside the Box.”


🧠 Deconstructing Our Default Mindset

Why is it that our minds tend to restrict themselves to conventional approaches, even when no such restrictions are imposed? This phenomenon is deeply rooted in our educational and societal conditioning. From a young age, we are taught to follow specific rules and methodologies to arrive at predictable outcomes. Mathematics, for example, is often presented as a discipline with fixed operations and clear parameters. When we see an equation, our immediate instinct is to apply standard algebraic rules, to work within the given structure, rather than questioning the structure itself.

This ingrained “inside the box” thinking is efficient for routine tasks, but it can be a significant impediment when confronting novel or complex problems that require genuinely creative solutions. It’s a mental shortcut, a cognitive bias that favors known paths over unexplored territories. During this learning journey, we will progressively dismantle these self-imposed limitations by acquiring new information and diverse perspectives that will illuminate why our initial thoughts often remain confined. Our initial step is to gain clarity on the very nature of our current thought processes, to meticulously understand the mental frameworks we habitually employ. This self-awareness is paramount; before we can effectively “think outside the box,” we must first clearly define the boundaries of the box we are currently operating within. This deep dive into our existing cognitive patterns will reveal the underlying assumptions and default settings that guide our problem-solving efforts, thereby highlighting the specific areas that require deliberate adjustment and expansion.


✍️ Optional Exercise: A Deeper Reflection

Take a moment for a critical self-assessment. Reflect deeply on the following questions and articulate your responses in as much detail as possible, aiming for at least 200 words:

  • Why did you not consider changing the arithmetic operations in the previous equation? What specific mental processes or assumptions led you to believe that the operations ($+$, $\times$) were immutable?
  • Why did you not think to add more digits to the blanks? What was it about the visual presentation or your understanding of mathematical problems that suggested the blanks had a fixed number of digits, even though no such instruction was given?

Consider the influence of past experiences, educational background, and even the subconscious rules we apply to problem-solving. Were you seeking the “simplest” answer, or the most “conventional” one? Did you feel a pressure to conform to an unstated expectation of how mathematical problems should be solved? Exploring these questions honestly will provide invaluable insight into your current way of thinking and lay the groundwork for developing a more expansive and innovative problem-solving mindset.


🎯 Applying Simplicity: The Principle of the Razor

The act of “Thinking Outside the Box” empowers us to cross imaginary boundaries, thereby unlocking possibilities and options that were not immediately apparent. However, as we entertain a vast array of possibilities, the path to a solution can quickly become overly complex and confusing. The principle of Occam’s Razor provides an invaluable tool for simplifying these complicated circumstances.


📜 Defining Occam’s Razor

Occam’s Razor is one of the foundational tenets of modern scientific and philosophical inquiry. Its core definition can be summarized as follows:

The most straightforward theory among several sufficient possible explanations for the same state of facts is the preferable one. In practical terms: The simplest explanation is usually the most probable.

Consider a common scenario: your personal computer suddenly stops functioning. The list of potential causes that immediately springs to mind is vast—it could be a faulty power supply unit (PSU), a critical CPU failure, or perhaps a catastrophic motherboard malfunction.

When faced with such technical issues, our default reaction is often to list these possibilities and then begin a complex process of elimination. This typically starts with checking internal components, dismantling the machine, and verifying intricate connections. This approach, while systematic, often leads us down a rabbit hole of effort and complexity, as we search for the most likely internal cause while overlooking the factor of simplicity.

Instead, we should reframe our inquiry to be as simple as possible:

Why is my computer not receiving power?

By focusing on the fundamental element—”power”—our minds automatically form associations related to the power delivery mechanism. Most people immediately focus on the internal component, the PSU, assuming it must be defective.

However, remembering to Think Outside the Box is crucial here. If we limit the scope of the problem to only the components inside the computer case, we severely restrict our options. If we expand our boundaries, the first points of contact for power are the external wall socket, the surge protector, and the connected power cord. By checking these external factors first, we might quickly discover that the power strip was simply switched off.

In this classic example, the simplest explanation (a flicked switch) was also the most probable and the easiest to verify.


🧭 The Razor in Practical Application

While the theory of Occam’s Razor sounds straightforward, its effective application in practice requires nuance. We can state that the simplest explanation is the most probable, but we must acknowledge that this is not always the case. We must learn to distinguish between the individual details and mechanisms and the overarching general picture or concept.

Especially during the learning phase (which parallels the initial phases of a professional security assessment), we will constantly encounter new information. It is absolutely crucial to prioritize understanding the overall concept rather than getting bogged down in the minutiae of the individual steps.

For example, once you grasp the foundational concept of a Structured Query Language (SQL) injection—how it works by confusing code and data separation—the individual steps required to detect and exploit a new vulnerability may initially seem challenging. However, because you understand the conceptual flaw, adapting your techniques to identify SQL injection vulnerabilities in any given web application becomes much easier. The complexity lies in the steps, but the concept remains constant. The concept is always the main focus when mastering new topics.


⛰️ The Path to Discovery

This concept applies equally to defining effective penetration testing methodologies. In the cybersecurity community, there is endless debate about the optimal approach for every scenario. Yet, returning to the principle of Occam’s Razor and “Thinking Outside the Box,” the simplest explanation for a successful security assessment approach is often the most effective: work systematically with the information you can gather.

The unique techniques and individual commands used to acquire and leverage that information are the complex, individual steps. The overall concept of how you structure the assessment—your framework for information gathering, scanning, and exploitation—is the core focus. Once you understand the conceptual framework, adapting to unique system configurations and environment-specific conditions becomes intuitive. If you only learn a list of individual commands or steps, you will struggle to adapt when faced with novel situations because you lack the conceptual understanding of their systemic impact.

We will observe this phenomenon repeatedly throughout the learning process. Once the solution to a problem is identified, the process and steps required to achieve it almost always appear straightforward in retrospect. Hindsight makes everything easy. The true skill—the art—is not merely reaching the end goal or finding a vulnerability, but in finding the simplest, most effective path to discovery within a chaotic landscape of possibilities.


✨ Decoding “Talent”: A Developed Skillset

Within our social circles, we invariably encounter individuals whom we classify as “talented”—people who exhibit seemingly incredible performance and proficiency in a particular area. A common misconception is that such abilities are innate, stemming purely from genetics or other intangible, inherent factors.

While genetics certainly influences our cognitive processes, talent itself is not born, it is built. The remarkable ability to solve complex problems with excellence is the result of highly efficient thought processes developed through consistent engagement, often starting early in childhood. Children appear to develop these “talents” more effortlessly than adults because their thinking is less rigidly structured; they haven’t yet built the complex mental hurdles and tendency to overcomplicate situations that adults often display.


🏗️ Talent as Trained Efficiency

The official definition of talent—a natural aptitude or skill—is problematic upon closer inspection. If “natural” means existing in or caused by nature, this logic would apply to any skill.

Consider this thought experiment: Among any large group of people, how many could naturally fly an airplane? Starting, navigating, and safely landing an aircraft requires significant technical knowledge about controls, aerodynamics, and physics that differs vastly by aircraft type. No one can fly an airplane without considerable training and deliberate practice.

This misleading definition implies that masters of any craft are simply born that way. This is a crucial misconception that arises from our human tendency to observe exceptional performance and abstract away the years of effort. In reality, a talented individual is defined simply as someone who is highly efficient and performs exceptionally well in their specific domain.

This highly efficient ability to solve problems and challenges stems from constant, persistent confrontation with the corresponding situations and the problems they entail. It is not necessarily the confrontation with a single situation, but rather the formation of the problem-solving thought pattern itself. This constant effort expands the individual’s comfort zone and analytical repertoire, making it easier to conceptualize and tackle new challenges.

In essence, talent is a trained and adapted thought process and the associated thought patterns geared toward specific fields and situations.


🏋️ Influencing Our Mental Patterns

The good news is that we have a strong influence over our own thought processes and patterns, allowing us to deliberately develop and train this “talent” for any field we choose.

We are not born with pre-packaged skills. A newborn baby will not spontaneously speak five languages. However, consider an experienced guitarist. That person will find it significantly easier to learn to play the bass guitar than someone who has never touched a stringed instrument.

Let’s use an even clearer example: A drummer. Even a drummer will pick up the bass guitar faster than a complete novice. Why? Because the drummer has already developed a highly refined sense of rhythm, meter, timing, and dynamic emphasis. Drummers have already acquired many foundational skills related to musical structure. When learning the bass, the drummer can immediately focus on the instrument-specific techniques, while the inexperienced student must still develop that fundamental rhythmic awareness. To an outside observer, the drummer’s rapid progress would be perceived as innate talent.


🌟 Status Assignment and Discovery

The development of thought patterns often begins in childhood, influenced heavily by parental encouragement and whether activities are framed as engaging and fun. Engaging with a situation, even a simple one, forces the creation of new thought patterns, followed by the refinement of thought processes.

While a detailed explanation of the neurological and psychological development of these processes is beyond the scope of this topic, the core takeaway is vital: We actively influence the development of our thought patterns, our thought processes, and therefore, our talents.

Calling someone “talented” is ultimately a status assignment—a label we give to someone who learns something new quickly or grasps a new functionality with speed. Every person possesses a unique set of individual thought patterns, and it is this individuality that can lead to unique approaches to problem-solving. Over time and with practice, individuals will inevitably discover where their specific “talents” lie. In complex fields like cybersecurity, where the variety of situations is enormous, the sustained effort of practice is the only way to identify and hone those abilities.

How to learn Cybersecurity: Part 2 – Learning Dependecies