<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Decoded Security]]></title><description><![CDATA[Helping people break into cybersecurity, prepare for interviews, and land their first job in the field.]]></description><link>https://www.decodedsecurity.com</link><image><url>https://substackcdn.com/image/fetch/$s_!hqdo!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8809eb-cbfe-4d76-a2e7-af1df277c77a_500x500.png</url><title>Decoded Security</title><link>https://www.decodedsecurity.com</link></image><generator>Substack</generator><lastBuildDate>Fri, 17 Apr 2026 18:12:38 GMT</lastBuildDate><atom:link href="https://www.decodedsecurity.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Decoded Security]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[erich.winkler@decodedsecurity.com]]></webMaster><itunes:owner><itunes:email><![CDATA[erich.winkler@decodedsecurity.com]]></itunes:email><itunes:name><![CDATA[Erich Winkler]]></itunes:name></itunes:owner><itunes:author><![CDATA[Erich Winkler]]></itunes:author><googleplay:owner><![CDATA[erich.winkler@decodedsecurity.com]]></googleplay:owner><googleplay:email><![CDATA[erich.winkler@decodedsecurity.com]]></googleplay:email><googleplay:author><![CDATA[Erich Winkler]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Understand Biometric Authentication Like a CISSP Expert in Under 10 Minutes]]></title><description><![CDATA[Biometrics are considered the gold standard of authentication. But if you don&#8217;t understand FRR, FAR, and CER, you will get CISSP questions wrong. Fix that in 10 minutes.]]></description><link>https://www.decodedsecurity.com/p/understand-biometric-authentication</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/understand-biometric-authentication</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Tue, 14 Apr 2026 11:14:15 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b4afbe57-6418-4603-bdd3-d93e058e3c9f_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>One of the biggest problems in cybersecurity is actually quite simple:</p><p><strong>How do you prove someone is who they claim to be?</strong></p><p>Because if you get this wrong, nothing else matters.</p><p>It doesn&#8217;t matter how well your whole system is set up if you can&#8217;t be sure who you are talking to.</p><p>That&#8217;s why the process of&nbsp;<strong>authentication&nbsp;</strong>is so widely tested during all cybersecurity exams, including the CC, CISSP, and Security+.</p><blockquote><p><strong>Not familiar with the methods of authentication yet? Read this First!</strong></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;b982de8c-cf18-4e11-967d-db6d7249f7ba&quot;,&quot;caption&quot;:&quot;Last time, we learned what hashing is and why it is so important for basically all IT systems. Today, we take a look at another important Cybersecurity topic: Authentication.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity 101: Methods of Authentication&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:259197825,&quot;name&quot;:&quot;Erich Winkler&quot;,&quot;bio&quot;:&quot;Cybersecurity Manager | CISSP Associate | Helping people land their first cybersecurity role without a degree or career reset&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!zLJJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb404eb9a-cceb-4d1d-86d2-e362bdf449fc_1024x1024.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-04-17T08:50:12.816Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!S22a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3842a76b-639a-454d-9b5d-960576724e72_620x620.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.decodedsecurity.com/p/cybersecurity-101-methods-of-authentication&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:161522575,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:2,&quot;publication_id&quot;:4708911,&quot;publication_name&quot;:&quot;Decoded Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!hqdo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8809eb-cbfe-4d76-a2e7-af1df277c77a_500x500.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div></blockquote><p>Today, we are going to focus on a method that is treated as the <strong>gold standard. </strong></p><p>But just because this method is better than asking for a password, that doesn&#8217;t make it automatically secure.</p><p>And be sure that the exam will test you on that.</p><p>Let&#8217;s get to it!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Preparing for the CISSP certification exam? Subscribe to <strong>Decoded Security</strong> and learn for FREE!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Biometric authentication</h2><p><strong>Definition: </strong><em>Biometrics</em> verifies an individual&#8217;s identity by analyzing a unique personal characteristic.</p><p>That sounds pretty clear, doesn&#8217;t it? </p><p>You simply take anything that you can reliably analyze and is based on unique personal characteristics and uses instead of a dumb password.</p><p><strong>Well, there is a catch</strong>. But before I tell it to you, let&#8217;s add more definitions to make sure you know everything you need.</p><p><strong>There are two types of biometric authentication:</strong></p><ol><li><p><strong>Physiological: </strong>Uses <strong>physical attributes</strong> unique to an individual</p><ol><li><p>Fingerprints</p></li><li><p>Retina / Iris (<strong>Note:</strong> Privacy issues - PHI)</p></li><li><p>Facial structure</p></li><li><p>Hand geometry</p></li></ol></li><li><p><strong>Behavioral: </strong>Uses <strong>patterns of behavior</strong> unique to an individual</p><ol><li><p>Signature dynamics</p></li><li><p>Keystroke dynamics</p></li><li><p>Voice patterns</p></li></ol></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bqLq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c53853f-367a-4c97-a7cf-d85ebad5f70f_1801x1091.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bqLq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c53853f-367a-4c97-a7cf-d85ebad5f70f_1801x1091.png 424w, https://substackcdn.com/image/fetch/$s_!bqLq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c53853f-367a-4c97-a7cf-d85ebad5f70f_1801x1091.png 848w, https://substackcdn.com/image/fetch/$s_!bqLq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c53853f-367a-4c97-a7cf-d85ebad5f70f_1801x1091.png 1272w, https://substackcdn.com/image/fetch/$s_!bqLq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c53853f-367a-4c97-a7cf-d85ebad5f70f_1801x1091.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bqLq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c53853f-367a-4c97-a7cf-d85ebad5f70f_1801x1091.png" width="1456" height="882" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c53853f-367a-4c97-a7cf-d85ebad5f70f_1801x1091.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:882,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:152995,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/193969700?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c53853f-367a-4c97-a7cf-d85ebad5f70f_1801x1091.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bqLq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c53853f-367a-4c97-a7cf-d85ebad5f70f_1801x1091.png 424w, https://substackcdn.com/image/fetch/$s_!bqLq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c53853f-367a-4c97-a7cf-d85ebad5f70f_1801x1091.png 848w, https://substackcdn.com/image/fetch/$s_!bqLq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c53853f-367a-4c97-a7cf-d85ebad5f70f_1801x1091.png 1272w, https://substackcdn.com/image/fetch/$s_!bqLq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c53853f-367a-4c97-a7cf-d85ebad5f70f_1801x1091.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"></div></div></a></figure></div><p><strong>Why is this so important?</strong></p><p>Because behavioral characteristics can change over time. We are not machines, and we don&#8217;t always do things the same way. </p><p><strong>Make sure to keep it in mind!</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Do you want to break into cybersecurity?</strong> Subscribe to <strong>Decoded Security</strong> and get specific insights from someone who has done it before you!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>&#8220;The Catch&#8221; - Errors </h2><blockquote><p><strong>Exam tip:</strong> This is what you actually need to know</p></blockquote><p>Remember how I mentioned <em>&#8220;the catch&#8221;?</em></p><p>Here it is:</p><blockquote><p><strong>Biometric authentication doesn&#8217;t always work as expected.</strong></p></blockquote><p><strong>With passwords, it&#8217;s simple:</strong></p><ul><li><p>100 % Match &#8594; access granted</p></li><li><p>No match &#8594; access denied</p></li></ul><p>It&#8217;s 100% or nothing.</p><p>But biometrics don&#8217;t work like that.</p><p><strong>You never get a perfect match.</strong></p><p>Instead, the system asks:</p><blockquote><p>&#8220;Is this <em>close enough</em> to be the same person?&#8221;</p></blockquote><p>And that&#8217;s where problems start.</p><p><strong>Because now, two things can happen:</strong></p><h4>1. False Rejection Rate (FRR)</h4><p><strong>Event:</strong> The system rejects a <strong>legitimate user.</strong></p><p><strong>FRR Definition: </strong>The percentage of times a biometric system incorrectly rejects a legitimate user.</p><p><strong>Example: </strong>Your fingerprint is valid, but the system doesn&#8217;t recognize it.</p><h4>2. False Acceptance Rate (FAR)</h4><p><strong>Event: </strong>An attacker is accepted as a legitimate user.</p><p><strong>Definition:</strong><br>The percentage of times a biometric system incorrectly accepts an unauthorized user.</p><h3>Which one is better?</h3><p>Well, that depends on the system.</p><p><strong>If you make the system stricter:</strong></p><ul><li><p>FAR &#8595; (more secure)</p></li><li><p>FRR &#8593; (more users get blocked)</p></li></ul><p><strong>If you make it more lenient:</strong></p><ul><li><p>FRR &#8595; (better usability)</p></li><li><p>FAR &#8593; (less secure)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CXNd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7800db-c9f1-4f7c-99e6-c3ea006ac9c9_535x431.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CXNd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7800db-c9f1-4f7c-99e6-c3ea006ac9c9_535x431.png 424w, https://substackcdn.com/image/fetch/$s_!CXNd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7800db-c9f1-4f7c-99e6-c3ea006ac9c9_535x431.png 848w, https://substackcdn.com/image/fetch/$s_!CXNd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7800db-c9f1-4f7c-99e6-c3ea006ac9c9_535x431.png 1272w, https://substackcdn.com/image/fetch/$s_!CXNd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7800db-c9f1-4f7c-99e6-c3ea006ac9c9_535x431.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CXNd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7800db-c9f1-4f7c-99e6-c3ea006ac9c9_535x431.png" width="535" height="431" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ab7800db-c9f1-4f7c-99e6-c3ea006ac9c9_535x431.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:431,&quot;width&quot;:535,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:23697,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/193969700?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7800db-c9f1-4f7c-99e6-c3ea006ac9c9_535x431.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CXNd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7800db-c9f1-4f7c-99e6-c3ea006ac9c9_535x431.png 424w, https://substackcdn.com/image/fetch/$s_!CXNd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7800db-c9f1-4f7c-99e6-c3ea006ac9c9_535x431.png 848w, https://substackcdn.com/image/fetch/$s_!CXNd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7800db-c9f1-4f7c-99e6-c3ea006ac9c9_535x431.png 1272w, https://substackcdn.com/image/fetch/$s_!CXNd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7800db-c9f1-4f7c-99e6-c3ea006ac9c9_535x431.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"></div></div></a></figure></div></li></ul><p>Without changing the biometric mechanism, you can only decide <strong>which mistake you prefer</strong>.</p><p>Great. Now you understand the main problem with biometric authentication and its sensitivity. </p><p>Now there is one more question to answer: <strong>How do we compare biometric systems?</strong></p><p>Because every system has FRR and FAR.</p><p>And depending on the configuration, you can <strong>tune one&#8230; but worsen the other</strong>.</p><p><strong>So which one matters more?</strong></p><p>FRR or FAR? And at what setting?</p><p>This is exactly why we use the <strong>Crossover Error Rate (CER)</strong>.</p><div class="callout-block" data-callout="true"><p>Are you preparing for a certification exam? Make sure to check the <a href="https://www.decodedsecurity.com/p/certification-hub">Decoded Security Certification Hub</a> for more FREE Resources!</p></div><h4>Crossover Error Rate (CER)</h4><p><strong>Definition:</strong><br>The point at which the <strong>False Rejection Rate (FRR)</strong> equals the <strong>False Acceptance Rate (FAR)</strong>.</p><p>In other words, it&#8217;s the point where the system makes <strong>equal mistakes on both sides</strong>.</p><p>It is a <strong>single number</strong> to compare biometric systems.</p><ul><li><p>Lower CER &#8594; <strong>fewer total errors &#8594; better system</strong></p></li><li><p>Higher CER &#8594; <strong>more errors &#8594; worse system</strong></p></li></ul><p>And that&#8217;s it! You can now compare two biometric systems! </p><h2>Additional Information (Exam Notes)</h2><ul><li><p>Biometrics are based on <strong>probability, not certainty</strong></p></li><li><p><strong>Threshold setting</strong> determines system sensitivity (strict vs lenient)</p></li><li><p>Lower threshold &#8594; <strong>higher FAR</strong>, lower FRR</p></li><li><p>Higher threshold &#8594; <strong>lower FAR</strong>, higher FRR</p></li><li><p><strong>False Acceptance Rate (FAR)</strong> is a bigger security risk than FRR</p></li><li><p><strong>False Rejection Rate (FRR)</strong> mainly affects usability</p></li><li><p><strong>Crossover Error Rate (CER)</strong> is used to compare systems</p></li><li><p>Lower CER = <strong>better overall accuracy</strong></p></li><li><p>Physiological biometrics are generally <strong>more stable</strong> than behavioral ones</p></li><li><p>Some methods raise <strong>privacy concerns</strong> (e.g., retina scan &#8594; PHI)</p></li><li><p><strong>Processing speed matters</strong> (slow systems reduce adoption)</p></li><li><p><strong>BIOMETRIC SYSTEMS ARE EXPENSIVE!</strong></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Interested in more resources laser-focused on the CISSP, CC, and Security+ exams? Join Decoded Security Community with 1000+ people and learn something new every week!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Conclusion</h2><p>Congratulations! After reading this article, you are ahead of most people.</p><p>You now understand that biometrics isn&#8217;t just about scanning fingerprints.</p><p>You understand both its benefits and its drawbacks, including the errors involved.</p><p>We also covered how to prioritize error types based on system sensitivity and how to compare biometric systems.</p><p>With all of that, you are more prepared than 95% of people claiming to be cybersecurity experts.</p><p>Thanks for reading Decoded Security!</p><p>&#8212; Erich</p><div class="callout-block" data-callout="true"><p>If you&#8217;re preparing for <strong>CISSP, CC, or Security+,</strong> make sure to check the <a href="https://www.decodedsecurity.com/p/certification-hub">Decoded Security Certification Hub</a> for more free resources!</p></div><h2><strong>Let&#8217;s Connect</strong></h2><p>If you want to collaborate, discuss, or just geek out over networking and cybersecurity, reach out:</p><div class="pullquote"><p style="text-align: center;"><em><strong>Email: <a href="mailto:erich.winkler@decodedsecurity.com">erich.winkler@decodedsecurity.com</a><br>LinkedIn: <a href="https://www.linkedin.com/in/winkleri/">Erich Winkler</a><br>Gumroad community: <a href="https://decodedsecurity.gumroad.com/">Decoded Security</a><br>Start Here: <a href="https://www.decodedsecurity.com/p/start-here-decoded-security-roadmap">Decoded Security Roadmap<br></a><br>Enjoyed this article? Like it or drop a comment. I&#8217;d love to hear your thoughts and questions!</strong></em></p></div>]]></content:encoded></item><item><title><![CDATA[This Is How I Explain The Man-in-the-Middle Attacks To a Beginner]]></title><description><![CDATA[Most people can define a Man-in-the-Middle attack. Almost no one understands how it actually works. In this guide, you&#8217;ll simulate it yourself, capture a real session, and see how attackers work!]]></description><link>https://www.decodedsecurity.com/p/this-is-how-i-explain-the-man-in</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/this-is-how-i-explain-the-man-in</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Sat, 11 Apr 2026 12:01:39 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/04636393-2042-4b7a-b969-d26ee81001bf_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>For years, I was given one question that I thought I could answer perfectly.</p><p>It was the CISSP exam that made me realize that what I know isn&#8217;t enough. </p><p>The question was quite simple:  What is a Man-in-the-Middle attack?</p><p><strong>And I got a very simple answer:</strong> It is a type of attack where an attacker positions himself between two parties who believe they are interacting directly.</p><p>Easy and correct answer, right?</p><p>Well, it is. But if you believe this is enough to pass cybersecurity exams and interviews, you&#8217;re wrong. </p><p>After reading this article, you will know everything you need to know about this attack for CC, Security+, CISSP exams, and in actual real-world scenarios. </p><blockquote><p><strong>Warning:</strong> CC, CISSP, and Security+ relevant topic!</p></blockquote><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Almost 1,000 people read <strong>Decoded Security</strong> every week! Join our community and let&#8217;s grow together!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>What is a MitM Attack?</h2><p>Let&#8217;s start from the beginning and describe what this term means. </p><p>The MitM Attack is a TYPE of attack where <strong>an attacker positions themselves between two parties communicating.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!l1ZG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b1b8b64-7c8b-44b7-98a0-77221baf30eb_1211x831.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!l1ZG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b1b8b64-7c8b-44b7-98a0-77221baf30eb_1211x831.png 424w, https://substackcdn.com/image/fetch/$s_!l1ZG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b1b8b64-7c8b-44b7-98a0-77221baf30eb_1211x831.png 848w, https://substackcdn.com/image/fetch/$s_!l1ZG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b1b8b64-7c8b-44b7-98a0-77221baf30eb_1211x831.png 1272w, https://substackcdn.com/image/fetch/$s_!l1ZG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b1b8b64-7c8b-44b7-98a0-77221baf30eb_1211x831.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!l1ZG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b1b8b64-7c8b-44b7-98a0-77221baf30eb_1211x831.png" width="1211" height="831" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b1b8b64-7c8b-44b7-98a0-77221baf30eb_1211x831.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:831,&quot;width&quot;:1211,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:92045,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/193554841?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b1b8b64-7c8b-44b7-98a0-77221baf30eb_1211x831.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!l1ZG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b1b8b64-7c8b-44b7-98a0-77221baf30eb_1211x831.png 424w, https://substackcdn.com/image/fetch/$s_!l1ZG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b1b8b64-7c8b-44b7-98a0-77221baf30eb_1211x831.png 848w, https://substackcdn.com/image/fetch/$s_!l1ZG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b1b8b64-7c8b-44b7-98a0-77221baf30eb_1211x831.png 1272w, https://substackcdn.com/image/fetch/$s_!l1ZG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b1b8b64-7c8b-44b7-98a0-77221baf30eb_1211x831.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"></div></div></a></figure></div><p><strong>Instead of:</strong><br>Client &#8594; Server</p><p><strong>It becomes:</strong><br>Client &#8594; Attacker &#8594; Server</p><p>And what is so dangerous about it? </p><p>The client probably won&#8217;t even recognize it. Everything works as usual. You open any website, check your emails, and watch YouTube videos.</p><p><strong>But the attacker can now:</strong></p><ul><li><p>Read the traffic</p></li><li><p>Modify it</p></li><li><p>Steal sensitive data</p></li></ul><p>In other words, all <a href="https://www.decodedsecurity.com/p/3-things-you-need-to-know-for-your?r=4abibl">core Cybersecurity objectives of the CIA triad</a> are threatened. </p><p>And yes, you guessed it right, that&#8217;s no good.</p><p>Before we go through a specific example, let&#8217;s answer one more question that is frequently asked in both exams and interviews.</p><p><strong>Question:</strong> How does a MitM attack affect the core cybersecurity objectives?</p><p><strong>Answer: </strong></p><p><strong>CIA Triad</strong></p><ul><li><p>Confidentiality - <strong>Broken</strong></p><ul><li><p><strong>Compromised</strong></p></li><li><p>Without further security controls, the attacker can intercept sensitive data (passwords, emails, tokens)</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yXaq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50321881-c4e6-48df-8812-a58b708d604b_1194x615.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yXaq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50321881-c4e6-48df-8812-a58b708d604b_1194x615.png 424w, https://substackcdn.com/image/fetch/$s_!yXaq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50321881-c4e6-48df-8812-a58b708d604b_1194x615.png 848w, https://substackcdn.com/image/fetch/$s_!yXaq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50321881-c4e6-48df-8812-a58b708d604b_1194x615.png 1272w, https://substackcdn.com/image/fetch/$s_!yXaq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50321881-c4e6-48df-8812-a58b708d604b_1194x615.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yXaq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50321881-c4e6-48df-8812-a58b708d604b_1194x615.png" width="1194" height="615" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/50321881-c4e6-48df-8812-a58b708d604b_1194x615.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:615,&quot;width&quot;:1194,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:64582,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/193554841?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50321881-c4e6-48df-8812-a58b708d604b_1194x615.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yXaq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50321881-c4e6-48df-8812-a58b708d604b_1194x615.png 424w, https://substackcdn.com/image/fetch/$s_!yXaq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50321881-c4e6-48df-8812-a58b708d604b_1194x615.png 848w, https://substackcdn.com/image/fetch/$s_!yXaq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50321881-c4e6-48df-8812-a58b708d604b_1194x615.png 1272w, https://substackcdn.com/image/fetch/$s_!yXaq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50321881-c4e6-48df-8812-a58b708d604b_1194x615.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"></div></div></a></figure></div></li><li><p>Integrity</p><ul><li><p><strong>Compromised</strong></p></li><li><p>An attacker can modify messages in transit</p></li><li><p>&#8594; Data arrives altered without the sender/receiver knowing</p></li></ul></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MBrA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d038e2-3b3f-4d72-b08f-8d692b74cc89_1525x482.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MBrA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d038e2-3b3f-4d72-b08f-8d692b74cc89_1525x482.png 424w, https://substackcdn.com/image/fetch/$s_!MBrA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d038e2-3b3f-4d72-b08f-8d692b74cc89_1525x482.png 848w, https://substackcdn.com/image/fetch/$s_!MBrA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d038e2-3b3f-4d72-b08f-8d692b74cc89_1525x482.png 1272w, https://substackcdn.com/image/fetch/$s_!MBrA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d038e2-3b3f-4d72-b08f-8d692b74cc89_1525x482.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MBrA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d038e2-3b3f-4d72-b08f-8d692b74cc89_1525x482.png" width="1456" height="460" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/51d038e2-3b3f-4d72-b08f-8d692b74cc89_1525x482.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:460,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:61643,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/193554841?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d038e2-3b3f-4d72-b08f-8d692b74cc89_1525x482.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MBrA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d038e2-3b3f-4d72-b08f-8d692b74cc89_1525x482.png 424w, https://substackcdn.com/image/fetch/$s_!MBrA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d038e2-3b3f-4d72-b08f-8d692b74cc89_1525x482.png 848w, https://substackcdn.com/image/fetch/$s_!MBrA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d038e2-3b3f-4d72-b08f-8d692b74cc89_1525x482.png 1272w, https://substackcdn.com/image/fetch/$s_!MBrA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51d038e2-3b3f-4d72-b08f-8d692b74cc89_1525x482.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"></div></div></a></figure></div><ul><li><p>Availability</p><ul><li><p><strong>Usually unaffected (but can be impacted)</strong></p></li><li><p>MitM is primarily passive/stealthy</p></li><li><p>&#8594; In some cases, an attacker may drop or delay packets (DoS-like behavior)</p></li></ul></li></ul><p>So, if you ever get this question, and if you&#8217;re serious about cybersecurity, you probably will, make sure to understand which core cybersecurity objectives are typically the most affected by this type of attack.</p><p>Great! Enough theory!</p><p>Now it&#8217;s time to get some hands-on experience and try this attack by yourself.</p><p>Because that&#8217;s what differentiates people who know just theory, and who actually understand the concept. You can&#8217;t replace hands-on experience with hours of reading.</p><p>And that&#8217;s why I prepared a simple Docker Lab, which will guide you step by step on how to simulate this attack.</p><p>Let&#8217;s get to it! </p><blockquote><p>Are you preparing for the CC, Security+, or CISSP exam? <br><br>Comment &#8220;CYBERSECURITY&#8221; and I will send you a free guide focusing on <strong>Top 10 Cybersecurity Fundamentals</strong>.</p></blockquote><h2>Hands-On Docker Lab: Man-in-the-Middle Attack</h2><h3>How the attack actually happens</h3><p><strong>Let&#8217;s do something most cybersecurity content never shows you:</strong></p><p>Instead of just reading about a Man-in-the-Middle attack, you&#8217;ll <strong>simulate one yourself</strong>.</p><h3>What you&#8217;re about to build</h3><p><strong>You will simulate this exact scenario:</strong></p><pre><code><code>Victim (Browser) &#8594; Attacker (MitM Proxy) &#8594; Web Server</code></code></pre><p>The attacker will sit in the middle and <strong>capture session data in real time</strong>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Take your <strong>cybersecurity knowledge</strong> to the next level with <strong>Decoded Security</strong>!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://www.decodedsecurity.com/p/this-is-how-i-explain-the-man-in">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[[3/3] The 4-Week Security+ Strategy: What to Do Every Single Day]]></title><description><![CDATA[Stop wasting money on expensive cybersecurity courses that don&#8217;t get you results. Here&#8217;s the exact strategy I used to pass cybersecurity exams, broken down into a simple 4-week plan you can follow!]]></description><link>https://www.decodedsecurity.com/p/33-the-4-week-security-strategy-what</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/33-the-4-week-security-strategy-what</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Tue, 07 Apr 2026 13:33:17 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d73573bd-07de-4d47-a6f5-ad2962ed258f_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It&#8217;s finally here, the final piece of this series, showing people how anyone can pass the Security+ exam in 4 weeks. </p><p>In the previous articles, we have covered what the exam looks like. Its structure, domains, and the distribution of points between them. </p><p>I also provided you with study resources that are laser-focused on things you need to answer the questions correctly.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;506a8c3f-560d-47e8-bd34-bef7971e32a5&quot;,&quot;caption&quot;:&quot;You want to get a job in cybersecurity, and you need to spice up your resume.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;[1/3] How to Pass Security+ in 4 Weeks - Introduction&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:259197825,&quot;name&quot;:&quot;Erich Winkler&quot;,&quot;bio&quot;:&quot;Cybersecurity Manager | CISSP Associate | Helping people land their first cybersecurity role without a degree or career reset&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!zLJJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb404eb9a-cceb-4d1d-86d2-e362bdf449fc_1024x1024.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-25T11:10:11.530Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7d28a3af-e2a1-407a-9594-496f056ae4fe_1536x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.decodedsecurity.com/p/13-how-to-pass-security-in-4-weeks&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:192073061,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:8,&quot;publication_id&quot;:4708911,&quot;publication_name&quot;:&quot;Decoded Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!hqdo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8809eb-cbfe-4d76-a2e7-af1df277c77a_500x500.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;79b8b8ed-b67a-4a51-91a2-ce6566e719bd&quot;,&quot;caption&quot;:&quot;Most people fail CompTIA Security+ for one simple reason.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;[2/3] Security+ Domains Explained: What to Study (and What to Ignore)&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:259197825,&quot;name&quot;:&quot;Erich Winkler&quot;,&quot;bio&quot;:&quot;Cybersecurity Manager | CISSP Associate | Helping people land their first cybersecurity role without a degree or career reset&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!zLJJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb404eb9a-cceb-4d1d-86d2-e362bdf449fc_1024x1024.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-04-02T05:01:15.657Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aca0bdb0-b4b7-4f48-bc8f-b0b1b4b2f305_1536x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.decodedsecurity.com/p/23-security-domains-explained-what&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:192842249,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:4708911,&quot;publication_name&quot;:&quot;Decoded Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!hqdo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8809eb-cbfe-4d76-a2e7-af1df277c77a_500x500.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>And after covering all of that, you miss only one last thing to successfully pass the Security+ exam. </p><p>A strategy. Today, we will take all the knowledge and create a plan that will get you where you want to be.</p><p>This article gives you that system.</p><p>A clear plan for what to do every week and every single day.</p><p>So you can stop guessing and start executing.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Almost 1,000 people read <strong>Decoded Security</strong> every week! Join our community and let&#8217;s grow together!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!h6CP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2342938-5b4a-40a3-bb5c-43a0832f6dd1_3061x2304.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!h6CP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2342938-5b4a-40a3-bb5c-43a0832f6dd1_3061x2304.png 424w, https://substackcdn.com/image/fetch/$s_!h6CP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2342938-5b4a-40a3-bb5c-43a0832f6dd1_3061x2304.png 848w, https://substackcdn.com/image/fetch/$s_!h6CP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2342938-5b4a-40a3-bb5c-43a0832f6dd1_3061x2304.png 1272w, https://substackcdn.com/image/fetch/$s_!h6CP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2342938-5b4a-40a3-bb5c-43a0832f6dd1_3061x2304.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!h6CP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2342938-5b4a-40a3-bb5c-43a0832f6dd1_3061x2304.png" width="1456" height="1096" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2342938-5b4a-40a3-bb5c-43a0832f6dd1_3061x2304.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1096,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:299264,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/192096471?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2342938-5b4a-40a3-bb5c-43a0832f6dd1_3061x2304.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!h6CP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2342938-5b4a-40a3-bb5c-43a0832f6dd1_3061x2304.png 424w, https://substackcdn.com/image/fetch/$s_!h6CP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2342938-5b4a-40a3-bb5c-43a0832f6dd1_3061x2304.png 848w, https://substackcdn.com/image/fetch/$s_!h6CP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2342938-5b4a-40a3-bb5c-43a0832f6dd1_3061x2304.png 1272w, https://substackcdn.com/image/fetch/$s_!h6CP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2342938-5b4a-40a3-bb5c-43a0832f6dd1_3061x2304.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The 4-Week Strategy (Simple, Not Easy)</h2><p><strong>Your entire preparation has 3 phases. </strong>And what I like about it is that it works for almost any exam you will ever take. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4OGw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7868982b-d87f-4164-bd06-0854e6176681_3285x1217.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4OGw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7868982b-d87f-4164-bd06-0854e6176681_3285x1217.png 424w, https://substackcdn.com/image/fetch/$s_!4OGw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7868982b-d87f-4164-bd06-0854e6176681_3285x1217.png 848w, https://substackcdn.com/image/fetch/$s_!4OGw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7868982b-d87f-4164-bd06-0854e6176681_3285x1217.png 1272w, https://substackcdn.com/image/fetch/$s_!4OGw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7868982b-d87f-4164-bd06-0854e6176681_3285x1217.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4OGw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7868982b-d87f-4164-bd06-0854e6176681_3285x1217.png" width="1456" height="539" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7868982b-d87f-4164-bd06-0854e6176681_3285x1217.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:539,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:206208,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/192096471?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7868982b-d87f-4164-bd06-0854e6176681_3285x1217.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!4OGw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7868982b-d87f-4164-bd06-0854e6176681_3285x1217.png 424w, https://substackcdn.com/image/fetch/$s_!4OGw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7868982b-d87f-4164-bd06-0854e6176681_3285x1217.png 848w, https://substackcdn.com/image/fetch/$s_!4OGw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7868982b-d87f-4164-bd06-0854e6176681_3285x1217.png 1272w, https://substackcdn.com/image/fetch/$s_!4OGw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7868982b-d87f-4164-bd06-0854e6176681_3285x1217.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Phase 1: Build Understanding (Week 1)</h3><p><strong>Goals: </strong></p><ul><li><p>Understand the concept of the exam</p></li><li><p>List topics for each domain</p></li><li><p><strong>Understand the fundamentals</strong></p></li></ul><p><strong>What you do:</strong></p><ul><li><p>Read the introduction where I describe the exam - <a href="https://www.decodedsecurity.com/p/13-how-to-pass-security-in-4-weeks">Exam structure</a></p></li><li><p>Open an Excel or take a piece of paper and list all the main topics for each domain. I made that easy for you: <a href="https://www.decodedsecurity.com/p/23-security-domains-explained-what">Security+ Domains</a></p></li><li><p>Go through the core concepts - Luckily for you, I covered the Top 10 most important concepts in my FREE guide - <a href="https://decodedsecurity.gumroad.com/l/Top10_Cybersecurity_Concepts">Top 10 Cybersecurity fundamentals</a></p></li></ul><p>Okay, now you should have a complete overview of what you need to learn. That&#8217;s a great start. </p><p>Start with the topics I listed and make sure to write down all terms that you are not familiar with.</p><p><strong>Outcome of this phase:</strong></p><ul><li><p>A complete list of all topics you need to understand for the exam</p></li><li><p>List of terms you need to be familiar with</p></li><li><p>A mindmap describing how the terms connect together</p></li></ul><div class="callout-block" data-callout="true"><p><strong>Are you preparing for CompTIA Security+?</strong></p><p><strong>Comment &#8220;Security+&#8221; and I&#8217;ll send you a FREE guide describing the TOP 10 most important topics for the exam!</strong></p></div><h3>Phase 2: Connect the Dots And Test Yourself Soon (Week 2&#8211;3)</h3><p>Most people wait for practice tests until the very last moment. </p><p>They are afraid of failing. </p><p>Here is the thing: You are allowed to fail in the preparation phase. That&#8217;s what forces you to learn. </p><p>So, the second you read through the fundamentals, it&#8217;s time to start testing yourself. </p><p>And, very importantly, add the topics from the practice test to your list. That&#8217;s absolutely crucial. </p><p>At the end of week 2, you should be stressed about how big your list got and that you are running out of time. </p><p>If that&#8217;s what you are feeling now, you&#8217;re on the right track! Don&#8217;t stop!</p><p>And if you feel overwhelmed, I&#8217;d recommend using an approach that helped me many times in my life and by which I was able to pass the CISSP exam while working full-time.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;a3ebd199-edb8-4aad-83ee-c7f0e78ffac0&quot;,&quot;caption&quot;:&quot;You want to do something for your career. Or mayber you&#8217;re still in school preparing for a difficult exam that&#8217;s coming up.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Get Control Over Your Results: How to Study Efficiently While Being Busy&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:259197825,&quot;name&quot;:&quot;Erich Winkler&quot;,&quot;bio&quot;:&quot;Cybersecurity Manager | CISSP Associate | Helping people land their first cybersecurity role without a degree or career reset&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!zLJJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb404eb9a-cceb-4d1d-86d2-e362bdf449fc_1024x1024.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-11-03T12:34:07.297Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/939e8254-14af-4a58-8e0b-6f684af7cbfb_1456x1048.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.decodedsecurity.com/p/get-control-over-your-results-how&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:177687976,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:14,&quot;comment_count&quot;:2,&quot;publication_id&quot;:4708911,&quot;publication_name&quot;:&quot;Decoded Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!hqdo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8809eb-cbfe-4d76-a2e7-af1df277c77a_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h4>Divide and Conquer</h4><p>When your list gets overwhelming, don&#8217;t try to fix everything at once.</p><p><strong>Break it down:</strong></p><ul><li><p>Pick one domain</p></li><li><p>Focus only on that</p></li><li><p>Close the gaps</p></li><li><p>Move to the next</p></li></ul><p>Make sure to check the topics in your list and track your progress. That will keep you motivated. Once you check all the topics from one domain, take the practice test again. It will feel good that you know the answers!</p><div class="callout-block" data-callout="true"><p>Want to go beyond passing Security+?</p><p>I created a <strong><a href="https://decodedsecurity.gumroad.com/l/CybersecurityBlueprint">90-day roadmap to land your first cybersecurity job</a></strong><a href="https://decodedsecurity.gumroad.com/l/CybersecurityBlueprint">.</a></p></div><h3>Phase 3: Think Like the Exam (Week 4)</h3><p>Until now, I strongly encouraged you to deep dive into the topics. Truly understand what&#8217;s going on behind the scenes. </p><p>But this is the time to get practical. </p><p>You&#8217;ve spent 3 weeks reading materials, watching tutorials, and connecting the dots. You&#8217;ve got plenty of diagrams, notes, and maybe ANKI cards.</p><p>That will all serve you well in your career. </p><p>But now, you need results. Which means, stop caring about how things work and start giving answers that the exam expects.</p><p>Every exam have different way the questions are phrased, meant, and created. </p><p>You are at a huge disadvantage. The people who created the exam are the ones who set the rules. </p><p>You need to adapt. And the best way to do that is to practice the question as much as possible. </p><p><strong>So here is the recipe for this phase:</strong></p><ul><li><p>Full practice exams daily</p></li><li><p>Timed conditions</p></li><li><p>Focus on weak areas only</p></li><li><p>Light review</p></li></ul><h2>How to Know You&#8217;re Ready</h2><p><strong>Simple:</strong></p><ul><li><p>You consistently score <strong>80%+</strong> on practice exams</p></li><li><p>You understand <em>why</em> the answers are correct</p></li><li><p>You recognize patterns in the practice questions quickly</p></li></ul><p><strong>At that point, it&#8217;s time to take the exam. </strong></p><p>Don&#8217;t wait for confidence.</p><p><strong>Confidence comes after you pass.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Preparing for any cybersecurity certification exam? Subscribe to <strong>Decoded Security</strong> and learn for FREE!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Conclusion</h2><p>This is how I passed even the most difficult cybersecurity exams there are. </p><p>Having a good strategy is more important than having years of experience. I know many people who have been in the field longer than I have and still failed.</p><p>Stop waiting to be ready. Don&#8217;t listen to people telling you don&#8217;t have a chance.  </p><p>You don&#8217;t need more time. You don&#8217;t need more resources.</p><p><strong>You need:</strong></p><ul><li><p>Focus</p></li><li><p>Consistency</p></li><li><p>Study materials</p></li><li><p>And a system</p></li></ul><p>And I just gave you resources and a system. Now it&#8217;s time for you to add focus and consistency to the equation.</p><p><strong>Follow this for 4 weeks, and you will pass.</strong></p><div class="callout-block" data-callout="true"><p>Here is one more offer. If you get stuck on any topic, you can contact me at erich.winkler@decodedsecurity.com or comment under this post, and I will guide you. </p></div><p>Thanks for reading Decoded Security!</p><p>- Erich</p><h2><strong>Let&#8217;s Connect</strong></h2><p>If you want to collaborate, discuss, or just geek out over networking and cybersecurity, reach out:</p><div class="pullquote"><p style="text-align: center;"><em><strong>Email: <a href="mailto:erich.winkler@decodedsecurity.com">erich.winkler@decodedsecurity.com</a><br>LinkedIn: <a href="https://www.linkedin.com/in/winkleri/">Erich Winkler</a><br>Gumroad community: <a href="https://decodedsecurity.gumroad.com/">Decoded Security</a><br>Start Here: <a href="https://www.decodedsecurity.com/p/start-here-decoded-security-roadmap">Decoded Security Roadmap<br></a><br>Enjoyed this article? Like it or drop a comment. I&#8217;d love to hear your thoughts and questions!</strong></em></p></div><p><strong>Let&#8217;s learn and grow together!</strong></p>]]></content:encoded></item><item><title><![CDATA[[2/3] Security+ Domains Explained: What to Study (and What to Ignore)]]></title><description><![CDATA[How to pass CompTIA Security+ in 4 weeks without years of experience, expensive courses, or wasting time on irrelevant topics! All you need is a plan and 4 weeks of execution.]]></description><link>https://www.decodedsecurity.com/p/23-security-domains-explained-what</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/23-security-domains-explained-what</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Thu, 02 Apr 2026 05:01:15 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/aca0bdb0-b4b7-4f48-bc8f-b0b1b4b2f305_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Most people fail CompTIA Security+ for one simple reason.</p><p>It isn&#8217;t a lack of experience.</p><p>It isn&#8217;t that they are not smart enough.</p><p>It isn&#8217;t even an absence of an $800 course.</p><p>It&#8217;s not knowing what really matters for the exam.</p><p>They treat all topics the same. They try to &#8220;cover everything.&#8221; And naturally, they get lost and fail. </p><div class="pullquote"><p>&#128161; <strong>NOTE: </strong>&#8220;Security+ is not about knowing everything. It&#8217;s about knowing what matters.&#8221;</p></div><p>In Part 1, we talked about what the exam really is.</p><p>Now it&#8217;s time to break it down:</p><p>&#128073; What&#8217;s inside each domain<br>&#128073; What you should actually focus on<br>&#128073; What you can safely ignore</p><p>Let&#8217;s get to it!</p><blockquote><p>WARNING: This article won&#8217;t bring anything exciting, but it will help you bring structure to your preparation for the CompTIA Security+ exam.</p></blockquote><div><hr></div><p><strong>If you&#8217;re just joining: </strong>This is Part 2 of my 3-part series on how to pass CompTIA Security+ in 4 weeks.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;8d9222d9-f7ad-460a-8eb2-c86f46b678fc&quot;,&quot;caption&quot;:&quot;You want to get a job in cybersecurity, and you need to spice up your resume.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;[1/3] How to Pass Security+ in 4 Weeks - Introduction&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:259197825,&quot;name&quot;:&quot;Erich Winkler&quot;,&quot;bio&quot;:&quot;Cybersecurity Manager | CISSP Associate | Helping people land their first cybersecurity role without a degree or career reset&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!zLJJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb404eb9a-cceb-4d1d-86d2-e362bdf449fc_1024x1024.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-25T11:10:11.530Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7d28a3af-e2a1-407a-9594-496f056ae4fe_1536x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.decodedsecurity.com/p/13-how-to-pass-security-in-4-weeks&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:192073061,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:8,&quot;publication_id&quot;:4708911,&quot;publication_name&quot;:&quot;Decoded Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!hqdo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8809eb-cbfe-4d76-a2e7-af1df277c77a_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><strong>In Part 1, I explained:</strong></p><ul><li><p>what the exam actually tests</p></li><li><p>why most people fail</p></li><li><p>how to think about Security+ the right way</p></li></ul><p><strong>Now we focus on what to study, and what to ignore.</strong></p><div><hr></div><h2><strong>The 5 Domains of Security+</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u46L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u46L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 424w, https://substackcdn.com/image/fetch/$s_!u46L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 848w, https://substackcdn.com/image/fetch/$s_!u46L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 1272w, https://substackcdn.com/image/fetch/$s_!u46L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u46L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png" width="1080" height="1350" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1350,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!u46L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 424w, https://substackcdn.com/image/fetch/$s_!u46L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 848w, https://substackcdn.com/image/fetch/$s_!u46L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 1272w, https://substackcdn.com/image/fetch/$s_!u46L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I have already mentioned this last time, but I think it&#8217;s absolutely crucial to understand this. </p><p><strong>Understanding the exam structure is not optional. </strong>It&#8217;s one of the fastest ways to improve your score.</p><p><strong>The current version (SY0-701) is built around 5 domains. </strong></p><p>And you need to know what hides under the hood of each domain. And yes, you guessed it right, that&#8217;s what I am going to show you today!</p><p>And not only that! I have already explained most of the topics in my 80+ articles here on Decoded Security. So, this is nothing but just a big bank of resources that will help you pass this exam without an $800 course!</p><p>Sounds good, right?</p><p>So let&#8217;s take it domain by domain!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Preparing for any cybersecurity certificaiton exam? Subscribe to <strong>Decoded Security</strong> and learn for FREE!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>General Security Concepts (12%)</h3><p>The goal of this chapter is to verify that you understand the fundamental concepts of cybersecurity. Yes, it counts &#8220;only&#8221; for 12% of the exam, but you are going to need those concepts across all domains, so make sure you know them!</p><blockquote><p><strong>Note: Each topic links to a detailed article if you want to go deeper. :) </strong></p></blockquote><h3>What to focus on:</h3><ul><li><p><a href="https://www.decodedsecurity.com/p/threat-risk-vulnerability-why-cissp?utm_source=publication-search">CIA Triad (Confidentiality, Integrity, Availability)</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/the-aaa-framework-can-your-cowokers?utm_source=publication-search">AAA (Authentication, Authorization, Accounting)</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/cybersecurity-controls-from-zero?utm_source=publication-search">Security controls:</a></p><ul><li><p>Technical</p></li><li><p>Administrative</p></li><li><p>Physical</p></li></ul></li><li><p><a href="https://www.decodedsecurity.com/p/the-8-security-principles-every-cissp?utm_source=publication-search">Core principles</a>:</p><ul><li><p>Least privilege</p></li><li><p>Zero Trust</p></li><li><p>Defense in depth</p></li></ul></li><li><p>Cryptography basics:</p><ul><li><p><a href="https://www.decodedsecurity.com/p/symmetric-vs-asymmetric-encryption">Symmetric vs asymmetric</a> </p></li><li><p><a href="https://www.decodedsecurity.com/p/hashing-what-it-is-and-why-its-not">Hashing vs encryption</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/diffie-hellman-explained-like-youre?utm_source=publication-search">Diffie-Hellman</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/digital-signatures-explained-with">Digital Signatures</a></p></li></ul></li><li><p><a href="https://www.decodedsecurity.com/p/7-networking-questions-that-instantly?utm_source=publication-search">Networking Fundamentals:</a></p><ul><li><p><a href="https://www.decodedsecurity.com/p/what-are-the-things-that-keep-our">Network Devices</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/why-most-beginners-dont-understand?">IP addressing</a></p></li></ul><p></p></li></ul><div class="pullquote"><p>Are you preparing for CompTIA Security+?</p><p>Comment <strong>&#8220;Security+&#8221;</strong> and I&#8217;ll send you a FREE guide describing the TOP 10 most important topics for the exam!</p></div><h3>Threats, Vulnerabilities, and Mitigations (22%)</h3><p>The goal of this domain is <strong>to understand how attacks actually work and how to stop them.</strong></p><p>You need to know the types of attacks to recognize them and design systems that are resilient to them. </p><h3>What to focus on:</h3><ul><li><p><strong><a href="https://www.decodedsecurity.com/p/virus-vs-worm-the-malware-basics">Malware</a></strong>:</p><ul><li><p>Ransomware</p></li><li><p>Trojans</p></li><li><p>Worms</p></li></ul></li><li><p><a href="https://www.decodedsecurity.com/p/the-psychology-of-hacking-why-smart">Social engineering</a>:</p><ul><li><p><a href="https://www.decodedsecurity.com/p/how-phishing-works-in-5-steps">Phishing</a></p></li><li><p>Pretexting</p></li><li><p>Baiting</p></li></ul></li><li><p><a href="https://www.decodedsecurity.com/p/top-5-most-important-network-protocols?">Network protocols</a></p><ul><li><p>TCP/UDP</p></li><li><p>FTP</p></li><li><p>SMTP</p></li><li><p>&#8230;.. (see the article above)</p></li></ul></li><li><p><strong>Network attacks: (in progress)</strong></p><ul><li><p>DoS / DDoS</p></li><li><p>Man-in-the-middle</p></li><li><p>DNS spoofing</p></li></ul></li><li><p><strong>Vulnerabilities: (in progress)</strong></p><ul><li><p>Misconfigurations</p></li><li><p>Unpatched systems</p></li><li><p>Weak passwords</p></li></ul></li><li><p><strong>Mitigation basics: (in progress)</strong></p><ul><li><p>Patching</p></li><li><p>Input validation</p></li><li><p>Segmentation</p></li></ul></li></ul><h3><strong>Security Architecture (18%)</strong></h3><p>This domain focuses on secure design.</p><p>In other words, it teaches you how to <strong>build systems that are secure by default, not systems that need to be fixed later.</strong></p><p>You&#8217;re not reacting to attacks here. You&#8217;re preventing them before they even become possible.</p><p>This includes how networks are structured, how systems communicate, how identities are managed, and how trust is established between components.</p><p><strong>Because once a system is deployed, fixing security issues becomes:</strong><br>- slower<br>- more expensive<br>- and often incomplete</p><p>That&#8217;s why good security professionals think about architecture first.</p><h4>What to focus on:</h4><ul><li><p>Network design:</p><ul><li><p>Segmentation (In progress)</p></li><li><p>DMZ (In progress)</p></li><li><p><a href="https://www.decodedsecurity.com/p/this-is-how-i-explain-dns-to-beginners">DNS</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/the-complete-guide-to-firewall-types">Firewalls</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/certification-authorities-cas-what">Certification Authority</a></p></li></ul></li><li><p><a href="https://www.decodedsecurity.com/p/cloud-based-systems">Cloud</a>:</p><ul><li><p><a href="https://www.decodedsecurity.com/p/cloud-based-systems">Shared responsibility model</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/cloud-based-systems">IaaS / PaaS / SaaS</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/the-nines-arent-enough-the-7-things">Service-level agreement</a></p></li></ul></li><li><p><a href="https://www.decodedsecurity.com/p/the-8-security-principles-every-cissp">Zero Trust</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/top-5-most-important-network-protocols?">Secure protocols:</a></p><ul><li><p>HTTPS / TLS</p></li><li><p>SSH</p></li></ul></li><li><p>Identity &amp; Access Management</p><ul><li><p><a href="https://www.decodedsecurity.com/p/access-controls">Access Control</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/access-control-concepts-101-logical">Access Control Concepts</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/the-aaa-framework-can-your-cowokers">AAA Framework</a></p></li></ul></li><li><p>System hardening (In progress)</p></li></ul><blockquote><p>Are you preparing for the Security+ exam? Let me know in the comments and let&#8217;s discuss it! </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/23-security-domains-explained-what/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/23-security-domains-explained-what/comments"><span>Leave a comment</span></a></p></blockquote><h3><strong>Security Operations (28%)</strong>  </h3><p>This is the most important domain on the exam.</p><p>This is where cybersecurity becomes <strong>real work</strong>.</p><p>You&#8217;re not designing systems anymore. You&#8217;re operating them.</p><ul><li><p> detecting attacks</p></li><li><p>responding to incidents</p></li><li><p>minimizing damage</p></li><li><p>recovering systems</p></li></ul><p>Basically, we focus on&nbsp;<strong>what you do when something actually happens.</strong></p><p><strong>Key idea here:</strong><br>You won&#8217;t be judged on preventing every incident.<br>You&#8217;ll be judged on how you handle them.</p><h3>What to focus on:</h3><ul><li><p><strong>Monitoring &amp; logging: (In progress)</strong></p><ul><li><p>SIEM basics</p></li><li><p>Log analysis</p></li></ul></li><li><p><strong><a href="https://www.decodedsecurity.com/p/the-incident-response-mistakes-that">Incident response:</a></strong></p><ul><li><p>Preparation</p></li><li><p>Detection</p></li><li><p>Containment</p></li><li><p>Recovery</p></li><li><p>Reporting</p></li></ul></li><li><p><strong>Vulnerability management (In progress)</strong></p><ul><li><p>Scanning</p></li><li><p>Prioritization</p></li></ul></li><li><p><strong>Tools (high-level):</strong></p><ul><li><p>EDR (In progress)</p></li><li><p><a href="https://www.decodedsecurity.com/i/191237121/question-6-what-is-the-difference-between-ids-and-ips">IDS / IPS</a></p></li></ul></li><li><p>Backup &amp; recovery</p><ul><li><p><a href="https://www.decodedsecurity.com/p/the-storage-mistake-90-of-people">RAID</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/the-final-goodbye-how-to-dispose">Secure Data Disposal</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/the-data-lifecycle-from-creation">Secure Data Lifecycle</a></p></li></ul></li></ul><blockquote><p>Is there any comment you are struggling with? Just let me know in the comments and I will break it down for you!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/23-security-domains-explained-what/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/23-security-domains-explained-what/comments"><span>Leave a comment</span></a></p></blockquote><h3><strong>Security Program Management and Oversight (20%)</strong>  (My favorite domain!!)</h3><p>This is where cybersecurity becomes a <strong>business decision</strong>.</p><p>It&#8217;s not about tools. It&#8217;s about <strong>managing risk</strong>.</p><p><strong>Because in reality:</strong></p><ul><li><p>You can&#8217;t secure everything</p></li><li><p>You can&#8217;t eliminate all risk</p></li></ul><p>So the goal is to <strong>understand risk and make the right decisions. Because at the end, it&#8217;s all about MONEY.</strong></p><p>Most technical people underestimate this domain. That&#8217;s a mistake.</p><p><strong>Because this is how companies actually decide:</strong></p><ul><li><p>what to protect</p></li><li><p>how much to invest</p></li><li><p>what risks to accept</p></li></ul><p>&#128161; <strong>Key idea:</strong><br>Security is not about eliminating risk. It&#8217;s about managing it.</p><h3>What to focus on:</h3><ul><li><p><a href="https://www.decodedsecurity.com/p/risk-management-managing-risks-in">Risk management:</a></p><ul><li><p>Risk = likelihood &#215; impact</p></li><li><p>Mitigate / Transfer / Accept / Avoid</p></li><li><p><a href="https://www.decodedsecurity.com/p/how-risk-management-frameworks-keep">Risk Management frameworks</a></p></li></ul></li><li><p><a href="https://www.decodedsecurity.com/p/security-policies-standards-and-procedures">Policies, standards, procedures</a></p></li><li><p>Compliance and Privacy:</p><ul><li><p><a href="https://www.decodedsecurity.com/p/gdpr-explained-the-privacy-law-that">GDPR</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/15-laws-every-cissp-candidate-must">HIPAA</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/15-laws-every-cissp-candidate-must">PCI-DSS</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/15-laws-every-cissp-candidate-must">FISMA</a></p></li></ul></li><li><p><strong><a href="https://www.decodedsecurity.com/p/why-we-need-to-be-lawyers-intellectual">Intellectual Property &amp; Compliance</a></strong></p></li><li><p>Third-party risk (In progress)</p></li><li><p>Security awareness (In progress)</p></li></ul><p>This is it. That&#8217;s the list of topics you need to cover to have a chance to pass the exam! <br>I know it might look scary, but trust me. We just made a very important step.</p><p>We put everything we need to know in one place. Which means, now we just start crossing the things off the list. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to Decoded Security to learn more every week!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Conclusion</h2><p>This is it! The exam might sound scary at this point, but I promise you&#8212;once you start crossing topics off your list, it will feel better and better.</p><p><strong>You now know:</strong></p><ul><li><p>the structure of the exam</p></li><li><p>what the exam looks like</p></li><li><p>what is in each domain</p></li></ul><p>And you have the resources to help you study.</p><p>You&#8217;re missing one last thing:</p><p>A strategy.</p><p>That&#8217;s what we&#8217;ll dive into next time!</p><p>Thanks for reading Decoded Security!</p><p>- Erich</p><p><strong>PS: If you have any questions, feel free to reach out to me!</strong></p><p><strong>The last part of the series is already available here:</strong> <br></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;5771dd2d-8f19-42b9-8d1d-b6c2c6181fa8&quot;,&quot;caption&quot;:&quot;It&#8217;s finally here, the final piece of this series, showing people how anyone can pass the Security+ exam in 4 weeks.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;[3/3] The 4-Week Security+ Strategy: What to Do Every Single Day&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:259197825,&quot;name&quot;:&quot;Erich Winkler&quot;,&quot;bio&quot;:&quot;Cybersecurity Manager | CISSP Associate | Helping people land their first cybersecurity role without a degree or career reset&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!zLJJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb404eb9a-cceb-4d1d-86d2-e362bdf449fc_1024x1024.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-04-07T13:33:17.555Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d73573bd-07de-4d47-a6f5-ad2962ed258f_1536x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.decodedsecurity.com/p/33-the-4-week-security-strategy-what&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:192096471,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:4708911,&quot;publication_name&quot;:&quot;Decoded Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!hqdo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8809eb-cbfe-4d76-a2e7-af1df277c77a_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h2><strong>Let&#8217;s Connect</strong></h2><p>If you want to collaborate, discuss, or just geek out over networking and cybersecurity, reach out:</p><div class="pullquote"><p style="text-align: center;"><em><strong>Email: <a href="mailto:erich.winkler@decodedsecurity.com">erich.winkler@decodedsecurity.com</a><br>LinkedIn: <a href="https://www.linkedin.com/in/winkleri/">Erich Winkler</a><br>Gumroad community: <a href="https://decodedsecurity.gumroad.com/">Decoded Security</a><br>Start Here: <a href="https://www.decodedsecurity.com/p/start-here-decoded-security-roadmap">Decoded Security Roadmap<br></a><br>Enjoyed this article? Like it or drop a comment. I&#8217;d love to hear your thoughts and questions!</strong></em></p></div><p><strong>Let&#8217;s learn and grow together!</strong></p><div class="directMessage button" data-attrs="{&quot;userId&quot;:259197825,&quot;userName&quot;:&quot;Erich Winkler&quot;,&quot;canDm&quot;:null,&quot;dmUpgradeOptions&quot;:null,&quot;isEditorNode&quot;:true}" data-component-name="DirectMessageToDOM"></div><p></p><p></p><h1></h1><p></p>]]></content:encoded></item><item><title><![CDATA[What Actually Happens When You Open a Website]]></title><description><![CDATA[Most people don&#8217;t know what happens when you open a website. And if you can&#8217;t explain what happens when you open a website, you don&#8217;t understand networking, you&#8217;re just memorizing.]]></description><link>https://www.decodedsecurity.com/p/what-actually-happens-when-you-open</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/what-actually-happens-when-you-open</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Sun, 29 Mar 2026 16:57:37 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c342a60d-14f7-4f17-9896-d095ce3bcc06_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Everybody claims to know exactly how networking works. </p><p>Really..go out and ask people who have anything to do with tech.</p><p>They will all tell you how it&#8217;s easy, and everybody knows it. </p><p>Then ask them to explain the series of events that happen when you open a website. </p><p>That&#8217;s where the confidence disappears.</p><p>Because this isn&#8217;t a trivia question.</p><p>It&#8217;s a test of whether you understand the system or just memorize pieces of it.</p><p>And in cybersecurity, that difference matters.</p><p>Because you can&#8217;t protect what you don&#8217;t fully understand.</p><p>That&#8217;s why this question shows up in interviews.</p><p>And if you can answer it clearly, step by step, you&#8217;re already ahead of most candidates.</p><p><strong>In this article, you&#8217;ll learn exactly that.</strong></p><h3>High-level concept</h3><p>First, you need to understand that opening a website is not a single action.</p><p>It&#8217;s a <strong>chain of dependencies</strong>:</p><pre><code>DNS &#8594; TCP &#8594; TLS &#8594; HTTP &#8594; Rendering</code></pre><p><strong>Each link of this chain solves a different problem:</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RSSa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d82d45-af2c-4d3c-8fd7-e58198d13a0f_1440x966.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RSSa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d82d45-af2c-4d3c-8fd7-e58198d13a0f_1440x966.png 424w, https://substackcdn.com/image/fetch/$s_!RSSa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d82d45-af2c-4d3c-8fd7-e58198d13a0f_1440x966.png 848w, https://substackcdn.com/image/fetch/$s_!RSSa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d82d45-af2c-4d3c-8fd7-e58198d13a0f_1440x966.png 1272w, https://substackcdn.com/image/fetch/$s_!RSSa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d82d45-af2c-4d3c-8fd7-e58198d13a0f_1440x966.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RSSa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d82d45-af2c-4d3c-8fd7-e58198d13a0f_1440x966.png" width="1440" height="966" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/78d82d45-af2c-4d3c-8fd7-e58198d13a0f_1440x966.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:966,&quot;width&quot;:1440,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:84918,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/191237109?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d82d45-af2c-4d3c-8fd7-e58198d13a0f_1440x966.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RSSa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d82d45-af2c-4d3c-8fd7-e58198d13a0f_1440x966.png 424w, https://substackcdn.com/image/fetch/$s_!RSSa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d82d45-af2c-4d3c-8fd7-e58198d13a0f_1440x966.png 848w, https://substackcdn.com/image/fetch/$s_!RSSa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d82d45-af2c-4d3c-8fd7-e58198d13a0f_1440x966.png 1272w, https://substackcdn.com/image/fetch/$s_!RSSa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d82d45-af2c-4d3c-8fd7-e58198d13a0f_1440x966.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p>DNS &#8594; <em>Where is the server? </em><strong>(Application layer)</strong></p></li><li><p>TCP &#8594; <em>Can we communicate reliably? </em><strong>(Transport layer)</strong></p></li><li><p>TLS &#8594; <em>Can I trust you? </em><strong>(Between Application and Transport)</strong></p></li><li><p>HTTP &#8594; <em>Give me the content</em> <strong>(Application layer)</strong></p></li></ul><blockquote><p>Make sure you understand the <a href="https://open.substack.com/pub/cybersecerich/p/introduction-to-the-tcpip-model?utm_campaign=post-expanded-share&amp;utm_medium=web">TCP/IP model</a> and its different layers.</p></blockquote><h2>Step-by-Step (Interview-Level Explanation)</h2><h3>1. URL Parsing</h3><p>Let&#8217;s start from the beginning. <br><strong>When you type:</strong></p><pre><code>https://www.example.com/login?user=admin</code></pre><p><strong>Your browser parse the URL:</strong></p><ul><li><p><strong>Scheme (Protocol)</strong> &#8594; <code>https</code></p></li><li><p><strong>Host (Domain)</strong> &#8594; <code>www.example.com</code></p></li><li><p><strong>Path</strong> &#8594; <code>/login</code></p></li><li><p><strong>Query string</strong> &#8594; <code>user=admin</code></p></li></ul><p>The scheme (<code>https</code>) doesn&#8217;t just define the protocol, it determines the entire communication stack that will be used.</p><p><strong>For example:</strong></p><pre><code><code>https:// &#8594; HTTP over TLS over TCP
http:// &#8594; HTTP over TCP</code></code></pre><p>Okay great. We parsed the URL. What now? We want to send the request to the server, right? </p><p>Well, not so fast. We don&#8217;t even know where the server is yet..</p><h2>2. DNS Resolution - Finding the Server</h2><p>Your browser knows <em>where</em> to go. It doesn&#8217;t know the IP address yet.</p><p>DNS translates <code>example.com</code> into <code>93.184.216.34</code>.</p><p><strong>Here&#8217;s the real lookup chain, and where it stops depends on what&#8217;s already cached:</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bbqG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90dadfbb-9e21-4eab-9327-d7767c107009_1440x856.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bbqG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90dadfbb-9e21-4eab-9327-d7767c107009_1440x856.png 424w, https://substackcdn.com/image/fetch/$s_!bbqG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90dadfbb-9e21-4eab-9327-d7767c107009_1440x856.png 848w, https://substackcdn.com/image/fetch/$s_!bbqG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90dadfbb-9e21-4eab-9327-d7767c107009_1440x856.png 1272w, https://substackcdn.com/image/fetch/$s_!bbqG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90dadfbb-9e21-4eab-9327-d7767c107009_1440x856.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bbqG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90dadfbb-9e21-4eab-9327-d7767c107009_1440x856.png" width="1440" height="856" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/90dadfbb-9e21-4eab-9327-d7767c107009_1440x856.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:856,&quot;width&quot;:1440,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:73694,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/191237109?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90dadfbb-9e21-4eab-9327-d7767c107009_1440x856.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bbqG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90dadfbb-9e21-4eab-9327-d7767c107009_1440x856.png 424w, https://substackcdn.com/image/fetch/$s_!bbqG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90dadfbb-9e21-4eab-9327-d7767c107009_1440x856.png 848w, https://substackcdn.com/image/fetch/$s_!bbqG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90dadfbb-9e21-4eab-9327-d7767c107009_1440x856.png 1272w, https://substackcdn.com/image/fetch/$s_!bbqG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90dadfbb-9e21-4eab-9327-d7767c107009_1440x856.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The query descends until one level can answer. Most everyday lookups never reach the root, they hit a cache first.</p><blockquote><p>This is very simplified explanation, if you want to know more about how DNS really works, read it HERE: </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;562b685a-647b-40ee-b72b-954ef0d63544&quot;,&quot;caption&quot;:&quot;I have to confess something here. For years, I didn&#8217;t know how DNS (Domain Name Server) actually works.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;This Is How I Explain DNS To Beginners&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:259197825,&quot;name&quot;:&quot;Erich Winkler&quot;,&quot;bio&quot;:&quot;Cybersecurity Manager | CISSP Associate | Helping people land their first cybersecurity role without a degree or career reset&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!zLJJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb404eb9a-cceb-4d1d-86d2-e362bdf449fc_1024x1024.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-04T21:01:15.604Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fcef5240-a1b1-436f-a505-9aae44284cd9_1536x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.decodedsecurity.com/p/this-is-how-i-explain-dns-to-beginners&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:186845933,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:30,&quot;comment_count&quot;:18,&quot;publication_id&quot;:4708911,&quot;publication_name&quot;:&quot;Decoded Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!hqdo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8809eb-cbfe-4d76-a2e7-af1df277c77a_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div></blockquote><p>Okay, great! Now we have the IP address and we can make the request, right?</p><p>Well, not yet!</p><h3>Step 3: TCP Handshake (Making the Connection)</h3><p>We need to establish a reliable connection first!</p><p>That&#8217;s the job for the <strong>Transport layer. </strong>In particular, the TCP protocol.</p><p>It establishes a connection between two devices using something called a <strong>three-way handshake</strong>:</p><ol><li><p><strong>SYN</strong> &#8594; Client wants to start communication</p></li><li><p><strong>SYN-ACK</strong> &#8594; Server acknowledges</p></li><li><p><strong>ACK</strong> &#8594; Client confirms</p></li></ol><p>That&#8217;s it. Simple, efficient.</p><blockquote><p>Do you want to know more? I love to hear that! I have covered this topic in one of my previous articles! Read it here: <a href="https://www.decodedsecurity.com/i/188384153/tcp-transmission-control-protocol">TCP protocol.</a></p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vDqV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vDqV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 424w, https://substackcdn.com/image/fetch/$s_!vDqV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 848w, https://substackcdn.com/image/fetch/$s_!vDqV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 1272w, https://substackcdn.com/image/fetch/$s_!vDqV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vDqV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png" width="936" height="799" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/df82f607-1688-4526-9de8-05cea52e8386_936x799.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:799,&quot;width&quot;:936,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vDqV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 424w, https://substackcdn.com/image/fetch/$s_!vDqV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 848w, https://substackcdn.com/image/fetch/$s_!vDqV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 1272w, https://substackcdn.com/image/fetch/$s_!vDqV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Okay, okay. So now it&#8217;s finally time to make a request, right? </p><p>Well, we are really almost there! I promise!</p><h3>Step 4: TLS Handshake</h3><p>This is where it gets interesting when it comes to security. </p><p>The TLS protocol lies between the application and transport layers. <br>It has three simple (haha)..ensure <strong>authenticity, integrity, confidentiality </strong>of the connection.</p><p><strong>Here&#8217;s what each step actually does:</strong></p><p><strong>1. Client Hello: </strong>Your browser initiates the handshake by sending:</p><ul><li><p>Supported TLS versions</p></li><li><p>Supported cipher suites</p></li><li><p>Random data (used later for key generation)</p></li></ul><p><strong>2. Server Hello + Certificate</strong></p><p>The server responds with:</p><ul><li><p>The selected cipher suite</p></li><li><p>Its <strong>digital certificate</strong></p></li></ul><p>That certificate contains:</p><ul><li><p>The server&#8217;s <strong>public key</strong></p></li><li><p>A <strong>digital signature</strong> from a trusted Certificate Authority (CA)</p></li></ul><p><strong>3. Certificate Verification</strong></p><p>Your browser validates the certificate:</p><ul><li><p>Is it signed by a trusted CA?</p></li><li><p>Is it expired?</p></li><li><p>Does the domain match?</p></li></ul><blockquote><p>If you don&#8217;t know what a Certification Authority is, I got you covered! </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;6f82ebec-4292-4c18-930d-00ccb91ceaa4&quot;,&quot;caption&quot;:&quot;&#128216; Essential for anyone preparing for the ISC2 CC exam&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Certification Authorities (CAs): What is it and why do we need it? &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:259197825,&quot;name&quot;:&quot;Erich Winkler&quot;,&quot;bio&quot;:&quot;Cybersecurity Manager | CISSP Associate | Helping people land their first cybersecurity role without a degree or career reset&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!zLJJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb404eb9a-cceb-4d1d-86d2-e362bdf449fc_1024x1024.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-05-10T09:20:03.374Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!SbPa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6c22282-6776-4db1-8326-9dbdfe3b8af3_1080x1920.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.decodedsecurity.com/p/certification-authorities-cas-what&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:163231485,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:1,&quot;publication_id&quot;:4708911,&quot;publication_name&quot;:&quot;Decoded Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!hqdo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8809eb-cbfe-4d76-a2e7-af1df277c77a_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div></blockquote><p>This is where your <strong>digital signatures article connects directly</strong>.</p><p><strong>Without a valid signature, the browser rejects the connection.</strong></p><p><strong>4. Key Exchange</strong></p><p>The client and server establish a <strong>shared secret</strong>.</p><p>In modern TLS (1.2+ / 1.3), this is typically done using:</p><ul><li><p><strong>(EC)DHE</strong> &#8594; ephemeral key exchange</p></li></ul><p><strong>Important: </strong>The certificate is used for authentication, not for encrypting all traffic directly.</p><p><strong>5. Secure Channel Established</strong></p><p>Both sides derive <strong>session keys</strong>.</p><p><strong>From this point on:</strong></p><ul><li><p>All data is <strong>encrypted</strong></p></li><li><p>All data is <strong>integrity-protected</strong></p></li></ul><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TI_q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e27515-7db2-4518-92eb-f2f049d1e248_1440x814.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TI_q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e27515-7db2-4518-92eb-f2f049d1e248_1440x814.png 424w, https://substackcdn.com/image/fetch/$s_!TI_q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e27515-7db2-4518-92eb-f2f049d1e248_1440x814.png 848w, https://substackcdn.com/image/fetch/$s_!TI_q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e27515-7db2-4518-92eb-f2f049d1e248_1440x814.png 1272w, https://substackcdn.com/image/fetch/$s_!TI_q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e27515-7db2-4518-92eb-f2f049d1e248_1440x814.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TI_q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e27515-7db2-4518-92eb-f2f049d1e248_1440x814.png" width="1440" height="814" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8e27515-7db2-4518-92eb-f2f049d1e248_1440x814.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:814,&quot;width&quot;:1440,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:66358,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/191237109?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e27515-7db2-4518-92eb-f2f049d1e248_1440x814.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TI_q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e27515-7db2-4518-92eb-f2f049d1e248_1440x814.png 424w, https://substackcdn.com/image/fetch/$s_!TI_q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e27515-7db2-4518-92eb-f2f049d1e248_1440x814.png 848w, https://substackcdn.com/image/fetch/$s_!TI_q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e27515-7db2-4518-92eb-f2f049d1e248_1440x814.png 1272w, https://substackcdn.com/image/fetch/$s_!TI_q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e27515-7db2-4518-92eb-f2f049d1e248_1440x814.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Step 5: HTTP Request and Response (Finally Asking for Data)</strong></h3><p>Once the secure channel is open, the browser sends:</p><pre><code><code>GET /login HTTP/1.1
Host: example.com</code></code></pre><p>The server processes the request, queries a database if needed, and returns HTML with a <code>200 OK</code> response.</p><h3><strong>Step 6: Browser Rendering (The Part You Actually See)</strong></h3><p>The browser parses the HTML, loads CSS, and executes JavaScript.</p><p>Only now do you see the page.</p><p>Everything before this? Invisible. Automatic. Completed in under a second.</p><p>And almost entirely attackable if any single step is misconfigured.</p><div class="pullquote"><p><strong>If you've made it this far, which step surprised you most?</strong> Drop a comment below. I read every single one!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/what-actually-happens-when-you-open/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.decodedsecurity.com/p/what-actually-happens-when-you-open/comments"><span>Leave a comment</span></a></p></div><h2><strong>Hands-On Lab: See the Whole Chain With Docker</strong></h2><p>Congratulations! You now understand the whole process. Which is great! </p><p>But just a theory isn&#8217;t enough. If you want to get ahead of other candidates, you must get that hands-on experience. </p><p>That&#8217;s why I prepared a lab that recreates DNS resolution, HTTP requests, and live TLS negotiation in a contained environment. </p><p><strong>What you need:</strong> Docker Desktop. Nothing else.</p><blockquote><p>If you don&#8217;t know how to use Docker or what it is, I got you covered. <br>&#8594; Download a free step-by-step guide <a href="https://decodedsecurity.gumroad.com/l/Docker_guide">HERE</a>. </p></blockquote>
      <p>
          <a href="https://www.decodedsecurity.com/p/what-actually-happens-when-you-open">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[[1/3] How to Pass Security+ in 4 Weeks - Introduction]]></title><description><![CDATA[4 weeks. No expensive course. No years of experience required. Just a solid plan, starting with understanding exactly what the Security+ exam is testing you on. That&#8217;s what this article offers!]]></description><link>https://www.decodedsecurity.com/p/13-how-to-pass-security-in-4-weeks</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/13-how-to-pass-security-in-4-weeks</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Wed, 25 Mar 2026 11:10:11 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/7d28a3af-e2a1-407a-9594-496f056ae4fe_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>You want to get a job in cybersecurity, and you need to spice up your resume. <br>So you decided to take the Security+ exam. </p><p><strong>Good move!</strong> </p><p>Most people will tell you that it is impossible to pass the exam without a $500 course.</p><p>Most people will tell you it doesn&#8217;t make any sense to take the exam if you don&#8217;t have X (choose a random number) years of experience. </p><p>DO NOT LISTEN TO THEM!</p><p>I don&#8217;t know you, but I know that if you dedicate 4 weeks of your life to this, you will pass the exam. All you need to do is have a good plan and take action.</p><p>I can&#8217;t force you to take action, but I can tell you exactly what matters for the exam, thereby reducing your required effort to a bare minimum.</p><p>How am I going to do it? </p><p>In this 3-part series, not only will I provide resources and study materials that will explain the concepts from the exam, but I will also explain how the exam tests you and what to focus on.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to <strong>Decoded Security</strong> and get ready for the Security+ exam!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>What CompTIA Security+ Really Is</h2><p>Before we deep-dive into the details of this exam, let&#8217;s take a moment to talk about what this certification is and what it offers. </p><p><strong>Security+</strong> is an <strong>entry-level</strong> cybersecurity certification from <strong>CompTIA</strong>, one of the most recognized names in IT certifications.</p><p>It's vendor-neutral. Which means it doesn't teach you how to use one specific tool or platform. Instead, it teaches you how to <em>think</em> like a security professional. </p><p>So if you hope to learn how to properly set up <strong>Microsoft Intune</strong>, this is not the right choice.</p><blockquote><p>However, if you're career-switching into cybersecurity, <strong>Security+</strong> is often the first certification hiring managers want to see on your resume. </p></blockquote><p>Simply, it is a smart choice for people who understand that Cybersecurity concepts are not tied to any platform. And since you&#8217;re reading this, I have a feeling you are that kind of person! </p><blockquote><p>Are you preparing for the Security+ exam? Let me know in the comments! </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/13-how-to-pass-security-in-4-weeks/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/13-how-to-pass-security-in-4-weeks/comments"><span>Leave a comment</span></a></p></blockquote><h2>The 5 Domains of Security+</h2><p>Understanding the exam structure is not optional.</p><p>It&#8217;s one of the fastest ways to improve your score.</p><p>The current version (SY0-701) is built around 5 domains:</p><ol><li><p><strong>General Security Concepts (12%)</strong> &#8594; The fundamentals. Why security exists and the core principles (like CIA) everything is built on.</p></li><li><p><strong>Threats, Vulnerabilities, and Mitigations (22%)</strong> &#8594; What can go wrong, how attackers exploit it, and how you stop them.</p></li><li><p><strong>Security Architecture (18%)</strong> &#8594; How to design systems so they&#8217;re secure from the start, not fixed later.</p></li><li><p><strong>Security Operations (28%)</strong> &#8594; What you actually do day-to-day: monitor, detect, and respond to threats.</p></li><li><p><strong>Security Program Management and Oversight (20%)</strong> &#8594; The business side: managing risk, setting policies, and aligning security with company goals.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u46L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u46L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 424w, https://substackcdn.com/image/fetch/$s_!u46L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 848w, https://substackcdn.com/image/fetch/$s_!u46L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 1272w, https://substackcdn.com/image/fetch/$s_!u46L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u46L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png" width="1080" height="1350" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1350,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:276520,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/192073061?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09b55d6e-16c7-4a8b-96ee-dc7776b16574_1080x1350.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!u46L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 424w, https://substackcdn.com/image/fetch/$s_!u46L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 848w, https://substackcdn.com/image/fetch/$s_!u46L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 1272w, https://substackcdn.com/image/fetch/$s_!u46L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae433e5d-bc4d-4fa7-b54e-3ff469c92d3d_1080x1350.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It is important to notice that the domains are not equal. </p><p>For example, S<strong>ecurity Operations alone = 28% of the exam</strong></p><p><strong>That means: </strong>You can spend hours memorizing definitions from Domain 1, and still fail because you ignored how security works in practice.</p><blockquote><p>Next week, I&#8217;ll walk you through each domain step-by-step so you can actually apply them in the exam. <strong>Subscribe to follow the full series</strong>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/subscribe?"><span>Subscribe now</span></a></p></blockquote><h2>Exam details</h2><p>I am not going to go into all the details, as you can easily find them on the CompTIA website. However, I think it is worth mentioning what you should expect. </p><p><strong>Number of questions:</strong> Maximum of 90 questions<br><strong>Time limit:</strong> 90 minutes<br><strong>Passing score:</strong> 750 out of 900<br><strong>Testing options:</strong> Testing center or online-proctored exam</p><p>But the most important thing is the type of questions.<br>The exam combines <strong>performance-based</strong> and <strong>multiple-choice questions</strong>.</p><p>And trust me, the first time you see them, <strong>all 4 answers will look correct</strong>.</p><p>That&#8217;s intentional.</p><p>Your job isn&#8217;t to find <em>a</em> correct answer, it&#8217;s to choose the <strong>best</strong> one.</p><p>And I&#8217;ll help you develop the eye for detail to do exactly that.</p><blockquote><p> <strong>Are you ready to lock in and pass the exam?</strong> <br>Comment &#8220;Security+&#8220; and I will send you a FREE guide that describes TOP 10 Cybersecurity Fundamentals you need for the exam.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/13-how-to-pass-security-in-4-weeks/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/13-how-to-pass-security-in-4-weeks/comments"><span>Leave a comment</span></a></p></blockquote><h2><strong>Conclusion</strong></h2><p>Security+ is a big milestone for people who are new to cybersecurity, but it is not as complicated as people make it.</p><p>What makes it hard is not knowing what to focus on. That&#8217;s the only reason why people spend $1,000s for Security+ courses. </p><p>If you commit the next 4 weeks to this properly, you won&#8217;t just pass the exam.</p><p>You&#8217;ll actually understand the basics of cybersecurity.</p><p>And that&#8217;s what separates people who &#8220;Pass and forget&#8221; from those who build a real career.</p><p>So let&#8217;s do this properly and let&#8217;s do this together!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">And make sure you&#8217;re subscribed. Next week, we will go through all the domains, and you don&#8217;t want to miss that!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Let&#8217;s Connect</strong></h2><p>If you want to collaborate, discuss, or just geek out over networking and cybersecurity, reach out:</p><div class="pullquote"><p><strong>Email:</strong> <a href="mailto:erich.winkler@decodedsecurity.com">erich.winkler@decodedsecurity.com</a><br><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/in/winkleri/">Erich Winkler</a><br><strong>Gumroad community:</strong> <a href="https://decodedsecurity.gumroad.com/">Decoded Security</a><br><strong>Start Here:</strong> <a href="https://www.decodedsecurity.com/p/start-here-decoded-security-roadmap">Decoded Security Roadmap<br></a><br>Enjoyed this article? Like it or drop a comment. I&#8217;d love to hear your thoughts and questions!</p></div><p><strong>Let&#8217;s learn and grow together!</strong></p><p><strong>Next part is available here:</strong><br></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;1e3ad391-62be-4336-9aaf-05b644f68922&quot;,&quot;caption&quot;:&quot;Most people fail CompTIA Security+ for one simple reason.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;[2/3] Security+ Domains Explained: What to Study (and What to Ignore)&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:259197825,&quot;name&quot;:&quot;Erich Winkler&quot;,&quot;bio&quot;:&quot;Cybersecurity Manager | CISSP Associate | Helping people land their first cybersecurity role without a degree or career reset&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!zLJJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb404eb9a-cceb-4d1d-86d2-e362bdf449fc_1024x1024.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-04-02T05:01:15.657Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aca0bdb0-b4b7-4f48-bc8f-b0b1b4b2f305_1536x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.decodedsecurity.com/p/23-security-domains-explained-what&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:192842249,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:4708911,&quot;publication_name&quot;:&quot;Decoded Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!hqdo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8809eb-cbfe-4d76-a2e7-af1df277c77a_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div>]]></content:encoded></item><item><title><![CDATA[This is how I explain subnetting to a beginner]]></title><description><![CDATA[Subnetting isn&#8217;t hard,you were just taught wrong. This beginner-friendly guide breaks it down using a simple mental model, so you can finally understand how IP addresses and subnet masks really work!]]></description><link>https://www.decodedsecurity.com/p/this-is-how-i-explain-subnetting</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/this-is-how-i-explain-subnetting</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Sat, 21 Mar 2026 17:00:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/803e4def-67d6-4e2f-ac28-066b36a88e2d_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Subnetting confuses a lot of people. And I completely get it. I was confused too.</p><p>And you know what? <br>I think the only reason why it is confusing for so many people is that it&#8217;s explained incorrectly.</p><p>Most tutorials jump straight into masks, ranges, and formulas&#8230;</p><p>Without explaining what&#8217;s actually underneath.</p><p>And that&#8217;s the problem.</p><p>Because subnetting only makes sense once you understand one thing:</p><p><strong>What an IP address really is</strong>!</p><blockquote><p>Have you struggled with subnetting in the past? Give this article a like and help other people with the same problem discover it!</p></blockquote><h2>What is an IP address? </h2><p>Most people see an IP address like this:</p><p><code>192.168.1.42</code></p><p>And treat it like a label.</p><p>But it&#8217;s not.</p><blockquote><p>It&#8217;s a structured 32-bit number, and every part of it has meaning.</p></blockquote><p>So here is what your IP address actually looks like. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jg6b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5195c8b0-b6b2-416c-bbb7-397b6674abf9_1581x632.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jg6b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5195c8b0-b6b2-416c-bbb7-397b6674abf9_1581x632.png 424w, https://substackcdn.com/image/fetch/$s_!jg6b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5195c8b0-b6b2-416c-bbb7-397b6674abf9_1581x632.png 848w, https://substackcdn.com/image/fetch/$s_!jg6b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5195c8b0-b6b2-416c-bbb7-397b6674abf9_1581x632.png 1272w, https://substackcdn.com/image/fetch/$s_!jg6b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5195c8b0-b6b2-416c-bbb7-397b6674abf9_1581x632.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jg6b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5195c8b0-b6b2-416c-bbb7-397b6674abf9_1581x632.png" width="1456" height="582" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5195c8b0-b6b2-416c-bbb7-397b6674abf9_1581x632.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:582,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:93623,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/191566783?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5195c8b0-b6b2-416c-bbb7-397b6674abf9_1581x632.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!jg6b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5195c8b0-b6b2-416c-bbb7-397b6674abf9_1581x632.png 424w, https://substackcdn.com/image/fetch/$s_!jg6b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5195c8b0-b6b2-416c-bbb7-397b6674abf9_1581x632.png 848w, https://substackcdn.com/image/fetch/$s_!jg6b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5195c8b0-b6b2-416c-bbb7-397b6674abf9_1581x632.png 1272w, https://substackcdn.com/image/fetch/$s_!jg6b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5195c8b0-b6b2-416c-bbb7-397b6674abf9_1581x632.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">IP address - Binary</figcaption></figure></div><p></p><p>Those dots between the numbers? That just separates bytes. </p><p>That 192 in your IP address? It&#8217;s actually 11000000 in binary.</p><p><strong>Why am I talking about it?</strong></p><p>Because once you think of an IP address as 4 bytes rather than 4 random numbers, things get a lot easier!</p><p><strong>So the first lecture today is this:</strong></p><blockquote><p>Always think of an IP address as 4 individual bytes. </p></blockquote><p>Now, I am going to show you why it&#8217;s so important.</p><blockquote><p>Have you ever thought of an IP address this way? <br>If not, give this article a like and help other people find it! </p></blockquote><h2>Subnetting - What does it really mean?</h2><p>Let&#8217;s start with the definition.</p><blockquote><p><strong>Definition:</strong> Subnetting is the process of dividing an IP network into smaller sub-networks by splitting the IP address into a network portion and a host portion.</p></blockquote><p>That didn&#8217;t tell you much, huh? <br>Don&#8217;t worry, it didn&#8217;t mean to.</p><p>Let&#8217;s break it down in plain English.</p><p><strong>Subnetting means:</strong></p><blockquote><p><strong>Choosing how many bits identify the network, and how many identify the device.</strong></p></blockquote><p>So when you think of an IP address as a line of bits:</p><pre><code>[ network bits | host bits ]</code></pre><p>Subnetting is simply <strong>deciding where that boundary (&#8220;|&#8221;) sits. </strong></p><p>On the left, we have a fixed number of bits that define the network, and on the right, we have a fixed number of bits that address individual devices.</p><p>Still confusing, right? Let&#8217;s take a look at an example.</p><p>Don&#8217;t give up now! It&#8217;s about to start making sense!</p><h3>Example - Mask /24</h3><p>The last term you need to know here is a &#8220;subnet mask.&#8221;</p><blockquote><p><strong>Here is the definition:</strong> A subnet mask is a 32-bit value that defines which part of an IP address represents the network and which part represents the host.</p></blockquote><p>In other words, it is a simple representation of how many bits you reserve for addressing individual devices. </p><p>Basically, it&#8217;s just a fancy way of saying, put the boundary (&#8220;|&#8221;) here, thank you.</p><p><strong>So, what if you have a /24 mask?</strong> </p><p>That means, you take the first 24 bits from the left and set them to 1.</p><pre><code><code>11111111.11111111.11111111.00000000</code></code></pre><p>In dotted decimal notation, it would look like this:</p><pre><code><code>255.255.255.0</code></code></pre><p>This means the first 24 bits define the network. They are fixed, and only the last 8 bits (last byte) are dedicated to individual devices. </p><pre><code><code>192.168.1.X // X - devices</code></code></pre><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!j4E2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd46ce42e-a574-467b-af64-218b3514ffac_3306x1209.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j4E2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd46ce42e-a574-467b-af64-218b3514ffac_3306x1209.png 424w, https://substackcdn.com/image/fetch/$s_!j4E2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd46ce42e-a574-467b-af64-218b3514ffac_3306x1209.png 848w, https://substackcdn.com/image/fetch/$s_!j4E2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd46ce42e-a574-467b-af64-218b3514ffac_3306x1209.png 1272w, https://substackcdn.com/image/fetch/$s_!j4E2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd46ce42e-a574-467b-af64-218b3514ffac_3306x1209.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j4E2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd46ce42e-a574-467b-af64-218b3514ffac_3306x1209.png" width="1456" height="532" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d46ce42e-a574-467b-af64-218b3514ffac_3306x1209.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:532,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:197923,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/191566783?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd46ce42e-a574-467b-af64-218b3514ffac_3306x1209.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!j4E2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd46ce42e-a574-467b-af64-218b3514ffac_3306x1209.png 424w, https://substackcdn.com/image/fetch/$s_!j4E2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd46ce42e-a574-467b-af64-218b3514ffac_3306x1209.png 848w, https://substackcdn.com/image/fetch/$s_!j4E2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd46ce42e-a574-467b-af64-218b3514ffac_3306x1209.png 1272w, https://substackcdn.com/image/fetch/$s_!j4E2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd46ce42e-a574-467b-af64-218b3514ffac_3306x1209.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>So, how many devices do you think you can have in this network?</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/this-is-how-i-explain-subnetting/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/this-is-how-i-explain-subnetting/comments"><span>Leave a comment</span></a></p><p>Have you answered it in the comments?</p><p>No?</p><blockquote><p>This is how you learn, think about it, and give us your answer!</p></blockquote><p>Okay, great. Let&#8217;s see what the correct answer is.</p><p>You have 8 bits, which can hold 2 values: 0 and 1.</p><p>That 2^8 combinations = 256 devices.</p><p>If that was your answer, you&#8217;re <strong>almost</strong> correct.</p><p>The correct answer is 254. Why? Because you have to exclude network and broadcast addresses. <strong>We&#8217;ll talk about it next time!</strong></p><h2>What&#8217;s next</h2><p>First of all, if you don&#8217;t fully understand subnetting now, don&#8217;t worry. It can be a very confusing topic at first. </p><p>Take your time, and read this article twice. Once you do, you can try to create subnets with different masks.</p><pre><code><code>192.168.1.0/25
192.168.1.0/12
192.168.1.0/27</code></code></pre><p>Take a pen and paper and answer the following questions. </p><ul><li><p>What does the network mask actually look like?</p></li><li><p>How many devices can there be? </p></li><li><p>And what would the network and broadcast addresses be? </p></li><li><p>What is the first and last usable address? </p></li></ul><blockquote><p>If you answer these in the comments, I will personally give you feedback!</p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/this-is-how-i-explain-subnetting/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/this-is-how-i-explain-subnetting/comments"><span>Leave a comment</span></a></p><h2>Conclusion</h2><p>Congratulations! You just took a huge step in your cybersecurity journey, and I am proud of you.</p><p>After reading this article, you are now able to design a network with adequate subnets. You know what an IP address actually is and what those funny numbers after &#8220;/&#8221; mean.</p><p>Believe it or not, that puts you way ahead of most people. Really, go ahead and ask around and see for yourself how many people can give you the right answer. I&#8217;ll wait!</p><p>Next time, we will talk about cybersecurity implications.</p><p>So subscribe and learn something new every week!</p><p>Thank you for reading <strong>Decoded Security</strong>!</p><p>Erich</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Subscribe</strong> today and get the <a href="https://decodedsecurity.gumroad.com/l/InterviewGuide">Cybersecurity Interview Cheat Sheet</a> for FREE as a welcome gift!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p></p><h2><strong>&#8252;&#65039; Free Resource &#128680;</strong></h2><p>If this article helped, I put together a free 80-page guide covering the 10 cybersecurity concepts behind 90% of entry-level interview questions.</p><p>&#128073; <strong>Download it here:</strong> <a href="https://decodedsecurity.gumroad.com/l/Top10_Cybersecurity_Concepts">decodedsecurity.gumroad.com/l/Top10_Cybersecurity_Concepts</a></p><h2><strong>Let&#8217;s Connect</strong></h2><p>If you want to collaborate, discuss, or just geek out over networking and cybersecurity, reach out:</p><p><strong>Email:</strong> <a href="mailto:erich.winkler@decodedsecurity.com">erich.winkler@decodedsecurity.com</a></p><p><strong>LinkedIn:</strong> Erich Winkler</p><p><strong>Gumroad community:</strong> Decoded Security</p><p><strong>Start Here:</strong> Decoded Security Roadmap</p><p>Enjoyed this article? Like it or drop a comment. I&#8217;d love to hear your thoughts and questions!</p><p><strong>Let&#8217;s learn and grow together!</strong></p><p></p><p></p><p> </p>]]></content:encoded></item><item><title><![CDATA[7 Networking Questions That Instantly Expose Beginners in Cybersecurity Interviews]]></title><description><![CDATA[If you can&#8217;t answer these 7 networking questions properly, you don&#8217;t understand cybersecurity yet. Here&#8217;s how to think beyond definitions, and start answering like a professional.]]></description><link>https://www.decodedsecurity.com/p/7-networking-questions-that-instantly</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/7-networking-questions-that-instantly</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Wed, 18 Mar 2026 05:01:08 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5baf57bc-67ea-48b7-b87f-a997c4abb10e_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I still remember the moment I realized how little I actually understood about networking.</p><p>It was back in school. I had studied for weeks. I knew what TCP was. I had memorized the OSI model layers. I even felt good about it.</p><p>Then my professor asked me a simple question:</p><p><em>&#8220;Can you explain what actually happens during a three-way handshake, and why it matters from a security perspective?&#8221;</em></p><p><strong>I answered something like:</strong> &#8220;SYN, SYN-ACK, ACK.&#8221;</p><p>Silence.</p><p>That&#8217;s not an explanation. That&#8217;s three acronyms.</p><p>And that&#8217;s the difference between memorizing networking and actually understanding it.</p><p>And since networking is one of the key domains in cybersecurity, you need to actually understand it.</p><p>Here are the 7 networking questions that expose that gap, and what a strong answer actually looks like.</p><p>&#8252;&#65039; <strong>Warning: CC, Security+, and CISSP relevant topic!</strong></p><h2>Why Networking Questions Are Different</h2><p>Most beginners study cybersecurity tools.</p><p>Firewalls. IDS. SIEM. Endpoint protection.</p><p>But tools sit on top of networks.</p><p>If you don&#8217;t understand how networks actually work, how data moves, where it comes from, and where it goes, you don&#8217;t really understand what those tools are protecting.</p><p>And interviewers know that.</p><p>That&#8217;s why networking questions aren&#8217;t just knowledge checks.</p><p>They&#8217;re a test of how you think.</p><p><em>If you&#8217;re not familiar with the basics of network protocols yet, I recommend reading this first: <a href="https://www.decodedsecurity.com/p/top-5-most-important-network-protocols">Top 5 Most Important Network Protocols for Cybersecurity Beginners</a></em></p><div><hr></div><h2>&#8252;&#65039; Free Resource &#128680;</h2><blockquote><p>If you&#8217;re just starting out in cybersecurity, I know how overwhelming it feels to figure out what to learn first.</p><p>I&#8217;ve been there.</p><p>That&#8217;s why I created a free 80-page guide covering the 10 cybersecurity concepts behind 90% of entry-level interview questions.</p><p>&#128073; Download it for free: <a href="https://decodedsecurity.gumroad.com/l/Top10_Cybersecurity_Concepts">decodedsecurity.gumroad.com/l/Top10_Cybersecurity_Concepts</a></p></blockquote><div><hr></div><h2>Question 1: &#8220;What&#8217;s the difference between TCP and UDP?&#8221;</h2><p>This question sounds basic.</p><p>That&#8217;s the point.</p><p>It&#8217;s a filter. If you can&#8217;t explain this clearly and connect it to security, the interviewer already knows the next questions will be harder for you.</p><p><strong>Where beginners go wrong:</strong></p><p>They answer with a definition.</p><p>&#8220;TCP is connection-oriented. UDP is connectionless.&#8221;</p><p>Technically correct. Completely forgettable.</p><p><strong>What a strong answer sounds like:</strong></p><p>Think of TCP like a phone call. Before either person says a word, you both confirm the other is there. If the call drops, you know immediately.</p><p>UDP is more like leaving a voicemail. You send it and assume it arrived. No confirmation. </p><p>That difference matters a lot in security.</p><p>Then you can simple continue with how it matters to cybersecurity:</p><p>TCP&#8217;s connection process is exactly what SYN flood attacks exploit. attackers send thousands of connection requests that they never complete, overwhelming the server with half-open connections.</p><p>UDP, because it has no handshake, gets abused in DNS amplification attacks, small requests generate massive responses, flooding a target with traffic.</p><p><em><strong>I cover TCP and UDP in depth here:</strong> <a href="https://www.decodedsecurity.com/p/top-5-most-important-network-protocols">Top 5 Most Important Network Protocols for Cybersecurity Beginners</a></em></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">If this exposed gaps in your understanding, follow <strong>Decoded Security</strong>. This is exactly what we fix here.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h2>Question 2: &#8220;Walk me through what happens when you type google.com into your browser.&#8221;</h2><p>This is the most comprehensive networking question.</p><p>It covers DNS, TCP, IP addressing, HTTP, and TLS. All in one answer.</p><p>Interviewers use it to see how deep your knowledge actually goes.</p><p><strong>Where beginners go wrong:</strong></p><p>&#8220;The browser looks up the IP address and loads the page.&#8221;</p><p>That&#8217;s one sentence. There are at least ten distinct steps happening.</p><p><strong>What a strong answer sounds like:</strong></p><p>First, your browser checks its local DNS cache. If it doesn&#8217;t know the IP address for google.com, it asks your operating system, which checks its own cache, then forwards the request to your DNS resolver.</p><p>The resolver works through the DNS hierarchy: root servers, then TLD servers for .com, then Google&#8217;s authoritative name servers, until it gets the IP address back.</p><p>Now your browser has an IP. </p><p>It uses TCP to connect with the target by sending a SYN, receiving a SYN-ACK, and confirming with an ACK.</p><p>If it&#8217;s HTTPS, a TLS handshake happens next. Certificates are exchanged, encryption is negotiated, and a secure session is established.</p><p>Then the HTTP request goes through, the server responds, and your browser renders the page.</p><p>Every single step in that process is a potential attack surface.</p><p>DNS can be poisoned. Certificates can be forged. The TCP handshake can be exploited. </p><p>This answer shows you understand where things can go wrong, not just that they usually go right.</p><p><em>Want to understand the DNS part of this in detail? Read this: <a href="https://www.decodedsecurity.com/p/this-is-how-i-explain-dns-to-beginners">This Is How I Explain DNS To Beginners</a></em></p><div><hr></div><blockquote><p><strong>Do you find this article useful? Give it a like, it helps me understand what topics to cover next!</strong></p></blockquote><div><hr></div><h2>Question 3: &#8220;What is a subnet mask and why does it matter?&#8221;</h2><p>Subnetting confuses more beginners than almost any other networking topic.</p><p>Not because it&#8217;s impossibly hard. But most people memorize the formula without understanding what it&#8217;s actually doing.</p><p><strong>Where beginners go wrong:</strong></p><p>&#8220;255.255.255.0 means a /24 subnet.&#8221;</p><p>Okay. But why? And what does that have to do with security?</p><p><strong>What a strong answer sounds like:</strong></p><p>Think of a city divided into neighborhoods. The subnet mask is what defines those neighborhood boundaries.</p><p><strong>It tells a device:</strong> &#8220;These addresses are local, talk to them directly. Those addresses are outside your network, send that traffic to the router.&#8221;</p><p>A /24 subnet mask means the first 24 bits define the network. The last 8 bits identify individual devices. That gives you 254 usable host addresses within that network.</p><p>From a security perspective, this is the foundation of network segmentation.</p><p>In a well-designed network, your servers, workstations, IoT devices, and guest Wi-Fi are all on separate subnets.</p><p>Why?</p><p>Because if an attacker compromises a guest laptop, the subnet boundary limits how far they can move. They can&#8217;t simply reach your file servers. The network is divided by design.</p><p>That&#8217;s not just a networking concept. That&#8217;s the principle of least privilege applied to infrastructure.</p><p><em>For more on private IP addresses, public addresses, and how network segmentation works in practice, read this: <a href="https://www.decodedsecurity.com/p/why-most-beginners-dont-understand">Why Most Beginners Don&#8217;t Understand How Networks Actually Work</a></em></p><div><hr></div><h2>Question 4: &#8220;What&#8217;s the difference between a hub, a switch, and a router?&#8221;</h2><p>This one catches people who only studied software-side security.</p><p>Network defenders need to understand how traffic flows at the hardware level. This is where attacks become visible, or invisible.</p><p><strong>Where beginners go wrong:</strong></p><p>Treating all three as &#8220;things that connect computers to a network.&#8221;</p><p>They have fundamentally different behaviors. And those differences change how attacks work.</p><p><strong>What a strong answer sounds like:</strong></p><p>A <strong>hub</strong> is the least intelligent device. It receives data on one port and broadcasts it to every other port. Every device on the network sees every packet, even packets not meant for them.</p><p>A <strong>switch</strong> is smarter. It learns which device is connected to which port by tracking MAC addresses. When data arrives, it sends it only to the correct port. Traffic is contained.</p><p>A <strong>router</strong> operates at a different level entirely. It works with IP addresses, not MAC addresses, and it connects different networks together. Your home router connects your local network to the internet.</p><p>Here&#8217;s why that matters for security.</p><p>In a hub-based network, any device can capture all traffic passively, using nothing more than a tool like Wireshark. No special access needed.</p><p>Switches replaced hubs to solve exactly this problem.</p><p>But even on switched networks, an attack called ARP poisoning can trick the switch into flooding traffic everywhere, recreating hub-like behavior for an attacker who knows what they&#8217;re doing.</p><p><em>Want to understand how these devices fit into the bigger picture of network architecture? I cover hubs, switches, routers, proxies, and more in detail here: <a href="https://open.substack.com/pub/cybersecerich/p/what-are-the-things-that-keep-our">What Are the Things That Keep Our Networks Alive?</a></em></p><div><hr></div><h2>Question 5: &#8220;What is a firewall and what can&#8217;t it do?&#8221;</h2><p>Everyone can answer the first half.</p><p>The second half is where most beginners stop cold.</p><p>And stopping there tells the interviewer that you see security tools as magic boxes &#8212; not as components with specific, bounded functions.</p><p><strong>Where beginners go wrong:</strong></p><p>&#8220;A firewall filters traffic based on rules.&#8221;</p><p>True. But incomplete.</p><p><strong>What a strong answer sounds like:</strong></p><p>A firewall is like a security checkpoint at the entrance of a building. It inspects what&#8217;s coming in and going out based on an approved list: IP addresses, ports, protocols.</p><p>Traditional firewalls are excellent at enforcing those perimeter rules. Block all incoming traffic on port 23 (Telnet)? Easy. Allow only HTTPS on port 443? Done.</p><p>But here&#8217;s what a firewall cannot do.</p><p>It cannot inspect encrypted traffic without special capabilities. If an attacker is communicating over HTTPS port 443, the firewall sees a valid connection &#8212; it has no visibility into what&#8217;s inside.</p><p>It cannot stop insider threats. It cannot detect stolen credentials being used correctly. It has no visibility into attacks that originate from inside the network.</p><p>This is why a firewall alone is never enough.</p><p>Understanding the limits of a control is what separates a security professional from someone who just passed a certification exam.</p><p><em>Not all firewalls work the same way, though. Packet filtering, stateful, proxy, and next-generation firewalls each have different capabilities &#8212; and different blind spots. I break them all down here: <a href="https://open.substack.com/pub/cybersecerich/p/the-complete-guide-to-firewall-types">The Complete Guide to Firewall Types: From Packet Filters to Next-Gen</a></em></p><div><hr></div><p>Are you preparing for a cybersecurity interview or certification? Let me know in the comments! I&#8217;d love to know what topics would help you most!</p><div><hr></div><h2>Question 6: &#8220;What is the difference between IDS and IPS?&#8221;</h2><p>These two tools get confused constantly.</p><p>Even by people who have been in IT for years.</p><p><strong>Where beginners go wrong:</strong></p><p>&#8220;IDS detects threats. IPS prevents them.&#8221;</p><p>That&#8217;s the one-liner. It&#8217;s correct but empty.</p><p><strong>What a strong answer sounds like:</strong></p><p>An IDS (Intrusion Detection System) is a passive observer. It watches network traffic, compares it against known patterns and signatures, and raises an alert when something looks suspicious. It sees everything. It stops nothing.</p><p>An IPS (Intrusion Prevention System) is an IDS with authority. It sits inline on the network, meaning all traffic has to pass through it. When it detects a threat, it can drop the packet, block the connection, or quarantine the source. In real time.</p><p><strong>Think of it this way:</strong> an IDS is a security camera. An IPS is a security camera with a locked door attached to it.</p><p>Now here&#8217;s the part most beginners miss.</p><p>An IPS sounds strictly better. So why would you ever choose detection without prevention?</p><p>Because an IPS carries real risk. False positives on an IDS generate alerts. False positives on an IPS block legitimate traffic. A misconfigured IPS can take down business-critical applications.</p><p>In sensitive environments, an IDS is sometimes the right choice precisely because it cannot accidentally break things while it watches.</p><p><strong>Knowing when not to use a control is as important as knowing what the control does.</strong></p><div><hr></div><h2>Question 7: &#8220;What happens during a three-way handshake?&#8221;</h2><p>And finally, let&#8217;s go back to the original question!</p><p>This question appears in almost every entry-level and mid-level security interview.</p><p>And answering it poorly is a red flag, because the follow-up questions about attacks build directly on top of it.</p><p><strong>Where beginners go wrong:</strong></p><p>&#8220;SYN, SYN-ACK, ACK.&#8221;</p><p>Three acronyms are not an explanation.</p><p><strong>What a strong answer sounds like:</strong></p><p>The three-way handshake is how TCP establishes a reliable connection before any data is sent. It&#8217;s the mutual agreement that both sides are ready to communicate.</p><p>Step one: the client sends a SYN packet to the server. It&#8217;s saying: &#8220;I want to connect, and here&#8217;s my starting sequence number.&#8221;</p><p>Step two: the server responds with a SYN-ACK. &#8220;Got it. I&#8217;m ready. Here&#8217;s my sequence number.&#8221;</p><p>Step three: the client sends an ACK back. &#8220;Confirmed. Let&#8217;s communicate.&#8221;</p><p>Now, both sides have synchronized sequence numbers, and a connection is established.</p><p>Here&#8217;s why this matters from an attack perspective.</p><p>A SYN flood attack exploits step one. </p><p>An attacker sends thousands of SYN packets: often using spoofed IP addresses, and never sends the final ACK. </p><p>The server keeps allocating memory and resources, waiting for confirmations that never arrive. </p><p>Eventually, it runs out of capacity to handle legitimate connections.</p><p>This is a classic denial-of-service technique.</p><p><strong>And understanding the handshake is exactly what makes the attack make sense.</strong></p><p><em>I cover TCP in detail as part of this article: <a href="https://www.decodedsecurity.com/p/top-5-most-important-network-protocols">Top 5 Most Important Network Protocols for Cybersecurity Beginners</a></em></p><div><hr></div><h2>Conclusion</h2><p>Read through those seven questions again.</p><p>Notice what every strong answer has in common.</p><p>It&#8217;s not just technical accuracy.</p><p>Every answer connects the concept to a security implication. Every answer shows the interviewer that the candidate isn&#8217;t just reciting a textbook. </p><p>They&#8217;re thinking like someone who has to defend a real network.</p><p>That&#8217;s what the interview is actually testing.</p><p>Not whether you memorized the right definition. But whether you can look at a protocol, a device, or a tool, and immediately see where it breaks, where it gets abused, and why it matters.</p><p>If you can do that consistently, you&#8217;re not a beginner anymore.</p><div><hr></div><h2>Key Takeaways</h2><p><strong>Here&#8217;s what I want you to remember:</strong></p><ul><li><p>Interviewers don&#8217;t want definitions. They want understanding.</p></li><li><p>Every networking concept has a security implication. Always connect the two.</p></li><li><p>TCP and UDP behave differently, and attackers exploit both.</p></li><li><p>Subnetting and IP addressing are the foundation of network segmentation.</p></li><li><p>Every security control has limits. Knowing those limits is what makes you dangerous.</p></li><li><p>The three-way handshake isn&#8217;t trivia. It&#8217;s the foundation of connection-based attacks.</p></li><li><p><strong>Keep going. Foundations take time to build. But they never stop paying off.</strong></p></li></ul><div><hr></div><h2>&#8252;&#65039; Free Resource &#128680;</h2><p><strong>If this article helped, I put together a free 80-page guide covering the 10 cybersecurity concepts behind 90% of entry-level interview questions.</strong></p><p>It&#8217;s free. No catch.</p><p>&#128073; Download it here: <a href="https://decodedsecurity.gumroad.com/l/Top10_Cybersecurity_Concepts">decodedsecurity.gumroad.com/l/Top10_Cybersecurity_Concepts</a></p><div><hr></div><h2>Let&#8217;s Connect</h2><p>If you want to collaborate, discuss, or just geek out over networking and cybersecurity, reach out:</p><p><strong>Email:</strong> <a href="mailto:erich.winkler@decodedsecurity.com">erich.winkler@decodedsecurity.com</a></p><p><strong>LinkedIn:</strong> Erich Winkler</p><p><strong>Gumroad community:</strong> Decoded Security</p><p><strong>Start Here:</strong> Decoded Security Roadmap</p><p>Enjoyed this article? Like it or drop a comment. I&#8217;d love to hear your thoughts and questions!</p><p><strong>Let&#8217;s learn and grow together!</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em>Subscribe to Decoded Security for new cybersecurity lessons every week.</em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Why Most Beginners Don’t Understand How Networks Actually Work]]></title><description><![CDATA[Most beginners try to learn cybersecurity tools first. That&#8217;s a mistake. If you don&#8217;t understand private vs public IP addresses and NAT, you don&#8217;t really understand how networks work.]]></description><link>https://www.decodedsecurity.com/p/why-most-beginners-dont-understand</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/why-most-beginners-dont-understand</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Fri, 13 Mar 2026 10:52:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5no6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2244d3c6-4c3c-4afa-a825-03502bc90673_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><p><strong>Networking fundamentals every cybersecurity beginner must understand</strong></p></blockquote><p>After publishing my article about the <strong><a href="https://open.substack.com/pub/cybersecerich/p/top-5-most-important-network-protocols?utm_campaign=post-expanded-share&amp;utm_medium=web">5 most important network protocols every cybersecurity beginner should understand</a>,</strong> many of my subscribers asked me what else people should know about networking.</p><p>That&#8217;s why I&#8217;d like to explain one of the most fundamental concepts of modern networking. </p><p>Because protocols like <strong>HTTP, TCP, UDP, SMTP, and FTP</strong> explain <strong>how systems communicate.</strong></p><p>But there is another question beginners rarely ask:</p><p><strong>Where are these systems actually located?</strong></p><p>Because communication between systems only makes sense if you understand <strong>how networks are structured.</strong></p><p>And that leads us to one of the most important concepts in cybersecurity:</p><p><strong>Private IP addresses, public IP addresses, and network segmentation.</strong></p><p>Understanding this will help you answer a surprising number of interview questions and explain <strong>how attackers move through networks.</strong></p><div class="pullquote"><p>&#8252;&#65039; <strong>Free Resource</strong> &#128680;</p><p>If you&#8217;re new to cybersecurity, figuring out <strong>what to learn first</strong> can be overwhelming. I know because I&#8217;ve been there.</p><p>So I decided to put the <strong>most important concepts in one place</strong>.</p><p>I created a <strong>free 80-page guide</strong> that explains the <strong>10 cybersecurity concepts behind 90% of entry-level interview questions</strong>.</p><p>Now, you don&#8217;t need to spend thousands as I did.</p><p>&#128073; <strong>Download it for free:</strong> <a href="https://decodedsecurity.gumroad.com/l/Top10_Cybersecurity_Concepts">decodedsecurity.gumroad.com/l/Top10_Cybersecurity_Concepts</a></p></div><h2>Quick Recap: Systems Are Always Communicating</h2><p>In the previous article, we talked about protocols like:</p><p>&#8226; HTTP for web traffic<br>&#8226; TCP for reliable communication<br>&#8226; UDP for fast communication<br>&#8226; SMTP for email<br>&#8226; FTP for file transfers</p><p>These protocols define <strong>how systems talk to each other</strong>.</p><p><strong>For example:</strong></p><p>Your browser communicates with a web server using <strong>HTTP over TCP</strong>.</p><p>But before that communication even starts, something else must happen.</p><p>Your computer needs to know:</p><p><strong>Where is the server located?</strong></p><p>And this is where <strong>IP addresses</strong> come in.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Subscribe</strong> today and get the <a href="https://decodedsecurity.gumroad.com/l/InterviewGuide">Cybersecurity Interview Cheat Sheet</a> for FREE as a welcome gift!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>What Is an IP Address?</h2><p>An IP address is basically the <strong>network location of a device</strong>.</p><p>Think of it like a <strong>postal address for computers</strong>.</p><p>Example:</p><pre><code>192.168.1.15</code></pre><p>This address allows other systems to send data to your device.</p><p>Without IP addresses, protocols like HTTP or SMTP would have <strong>no idea where to send data</strong>.</p><p>But not all IP addresses behave the same.</p><p>There are two types you absolutely need to understand.</p><blockquote><p><strong>Note:</strong> If you are not familiar with network devices, I recommend reading this article: <strong><a href="https://www.decodedsecurity.com/p/what-are-the-things-that-keep-our?r=4abibl">What are the things that keep our networks alive?</a></strong></p></blockquote><h2>Public IP Addresses</h2><p>A <strong>public IP address</strong> is visible to the entire Internet.</p><p>Anyone can send traffic to it.</p><p>Example:</p><pre><code>8.8.8.8</code></pre><p>This is Google&#8217;s public DNS server.</p><p><strong>Public IP addresses are assigned by:</strong></p><ul><li><p>internet service providers</p></li><li><p>cloud providers</p></li><li><p>hosting companies</p></li></ul><p>From a cybersecurity perspective, this is important because:</p><blockquote><p><strong>Anything with a public IP address is exposed to the internet.</strong></p></blockquote><p>And exposed systems get scanned constantly.</p><p>There are automated bots scanning the internet <strong>24/7</strong> looking for:</p><ul><li><p>vulnerable servers</p></li><li><p>outdated software</p></li><li><p>open ports</p></li><li><p>misconfigured services</p></li></ul><p>Public IP addresses create an <strong>attack surface</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QYgE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12608823-c788-4d4c-b2b0-4d52fee14916_1320x1644.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QYgE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12608823-c788-4d4c-b2b0-4d52fee14916_1320x1644.png 424w, https://substackcdn.com/image/fetch/$s_!QYgE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12608823-c788-4d4c-b2b0-4d52fee14916_1320x1644.png 848w, https://substackcdn.com/image/fetch/$s_!QYgE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12608823-c788-4d4c-b2b0-4d52fee14916_1320x1644.png 1272w, https://substackcdn.com/image/fetch/$s_!QYgE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12608823-c788-4d4c-b2b0-4d52fee14916_1320x1644.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QYgE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12608823-c788-4d4c-b2b0-4d52fee14916_1320x1644.png" width="1320" height="1644" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12608823-c788-4d4c-b2b0-4d52fee14916_1320x1644.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1644,&quot;width&quot;:1320,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:95121,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QYgE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12608823-c788-4d4c-b2b0-4d52fee14916_1320x1644.png 424w, https://substackcdn.com/image/fetch/$s_!QYgE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12608823-c788-4d4c-b2b0-4d52fee14916_1320x1644.png 848w, https://substackcdn.com/image/fetch/$s_!QYgE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12608823-c788-4d4c-b2b0-4d52fee14916_1320x1644.png 1272w, https://substackcdn.com/image/fetch/$s_!QYgE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12608823-c788-4d4c-b2b0-4d52fee14916_1320x1644.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p>Are you interested in more articles about networking? Let me know in the comments!</p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/why-most-beginners-dont-understand/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/why-most-beginners-dont-understand/comments"><span>Leave a comment</span></a></p><h2>Private IP Addresses</h2><p>Private IP addresses are used inside <strong>internal networks</strong>.</p><p>They <strong>cannot be reached directly from the internet</strong>.</p><p>Why do we need them?</p><p>Because there <strong>aren&#8217;t enough public IPv4 addresses</strong> for every device in the world. Instead of giving every device its own public IP, networks use <strong>private addresses internally</strong>, which can be reused by anyone.</p><p>If you check your home network right now, your devices probably look something like this:</p><pre><code>Router: 192.168.1.1
Laptop: 192.168.1.15
Phone:  192.168.1.22
TV:     192.168.1.40</code></pre><p>These devices communicate internally using private IP addresses.</p><p>But they still access the internet.</p><p>How?</p><p>Through something called <strong>NAT</strong>.</p><h2>NAT: The Translator Between Private and Public Networks</h2><p>Your router has <strong>two identities</strong>.</p><p>Inside the network:</p><pre><code>192.168.1.1</code></pre><p>On the internet:</p><pre><code>203.0.113.24</code></pre><p>When your laptop sends traffic to a website:</p><pre><code>192.168.1.15 &#8594; google.com</code></pre><p>Your router translates it so the internet sees:</p><pre><code>203.0.113.24 &#8594; google.com</code></pre><p>The response then returns to the router, which forwards it to the correct internal device.</p><p>This allows <strong>many devices to share a single public IP address</strong>.</p><p>But here&#8217;s something many beginners misunderstand.</p><blockquote><p><strong>Private IP addresses were created to solve an address shortage problem, not security problems.</strong></p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5no6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2244d3c6-4c3c-4afa-a825-03502bc90673_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5no6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2244d3c6-4c3c-4afa-a825-03502bc90673_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!5no6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2244d3c6-4c3c-4afa-a825-03502bc90673_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!5no6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2244d3c6-4c3c-4afa-a825-03502bc90673_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!5no6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2244d3c6-4c3c-4afa-a825-03502bc90673_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5no6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2244d3c6-4c3c-4afa-a825-03502bc90673_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2244d3c6-4c3c-4afa-a825-03502bc90673_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3261074,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/187377711?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2244d3c6-4c3c-4afa-a825-03502bc90673_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5no6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2244d3c6-4c3c-4afa-a825-03502bc90673_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!5no6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2244d3c6-4c3c-4afa-a825-03502bc90673_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!5no6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2244d3c6-4c3c-4afa-a825-03502bc90673_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!5no6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2244d3c6-4c3c-4afa-a825-03502bc90673_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p>If you&#8217;d like to see <strong>how this works in practice</strong>, I can show you how to build a <strong>small simulated network on your own computer</strong>.</p><p>We&#8217;ll create a private network, assign IP addresses, and see <strong>how NAT works in real time</strong>.</p><p>If you&#8217;re interested, let me know in the comments and I&#8217;ll create the lab.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/why-most-beginners-dont-understand/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/why-most-beginners-dont-understand/comments"><span>Leave a comment</span></a></p></blockquote><h1>What Should You Learn Next?</h1><p>If you&#8217;re starting your cybersecurity journey, focus on fundamentals.</p><p>You don&#8217;t need to learn everything at once.</p><p>Start with:</p><ul><li><p><a href="https://open.substack.com/pub/cybersecerich/p/top-5-most-important-network-protocols?utm_campaign=post-expanded-share&amp;utm_medium=web">Network protocols</a></p></li><li><p>IP addressing (Here)</p></li><li><p><a href="https://www.decodedsecurity.com/p/this-is-how-i-explain-dns-to-beginners?r=4abibl">DNS</a> </p></li><li><p><a href="https://www.decodedsecurity.com/p/diffie-hellman-explained-like-youre?r=4abibl">Encryption</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/what-are-the-things-that-keep-our?r=4abibl">Network Devices</a></p></li></ul><p>These concepts appear everywhere in cybersecurity.</p><p>And if you master them, you will already be ahead of most beginners.</p><h3><strong>Let&#8217;s connect</strong></h3><p>If you want to <strong>collaborate, discuss, or just geek out over virtualization and cloud security</strong>, reach out to me:</p><ul><li><p><strong>Email:</strong> erich.winkler@decodedsecurity.com</p></li><li><p><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/in/winkleri/">Erich Winkler</a></p></li><li><p><strong>Gumroad community: </strong><a href="https://decodedsecurity.gumroad.com/">Decoded Security</a></p></li><li><p><strong><a href="https://open.substack.com/pub/cybersecerich/p/start-here-decoded-security-roadmap?utm_campaign=post-expanded-share&amp;utm_medium=web">Start Here: Decoded Security Roadmap</a></strong></p></li></ul><p><strong>Enjoyed this article?</strong> Like it or drop a comment. I&#8217;d love to hear your thoughts and questions!</p><p>Let&#8217;s learn and grow together!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to Decoded Security for FREE.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Digital Signatures Explained (With a 5-Minute Hands-On Lab)]]></title><description><![CDATA[Learn how digital signatures protect software and data from tampering. In this beginner-friendly guide, you&#8217;ll understand the theory and then build a small Docker lab to sign and verify files yourself]]></description><link>https://www.decodedsecurity.com/p/digital-signatures-explained-with</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/digital-signatures-explained-with</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Wed, 11 Mar 2026 12:52:57 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/bbf943f5-487e-4049-878b-84b2522db008_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When you download software from the internet, how do you know it hasn&#8217;t been modified by an attacker?</p><p>What stops someone from replacing the file with malware?</p><p>This is exactly the problem <strong>digital signatures solve</strong>.</p><p>In this article, I&#8217;ll explain how digital signatures work, and then we&#8217;ll build a <strong>small Docker lab where you can try it yourself in 5 minutes.</strong></p><h1>What You&#8217;ll Learn</h1><p>Before we dive in, here&#8217;s what you&#8217;ll learn in this article:</p><p>&#8226; What <strong>digital signatures</strong> are and why they are important<br>&#8226; How digital signatures protect <strong>integrity and authenticity</strong><br>&#8226; How the <strong>digital signing process</strong> works step by step<br>&#8226; How to <strong>create and verify a digital signature yourself</strong><br>&#8226; How tampering with a file <strong>breaks the signature</strong></p><p>By the end of this article, you won&#8217;t just understand digital signatures in theory, you&#8217;ll <strong>see them working in practice and be able to sign any file</strong>!</p><blockquote><p>If you find this article helpful, consider <strong>liking the post</strong> so more people can discover. I appreciate your time! Thank you!</p></blockquote><h2>The Theory</h2><p>Let&#8217;s start with the theoretical background. I know it sounds boring, but like it or not, if you want a career in cybersecurity, you need to know why you do things, not just how to do them.</p><p><strong>Digital signatures solve two main problems:</strong></p><ol><li><p><strong>Integrity</strong><br>The file was <strong>not modified</strong>.</p></li><li><p><strong>Authenticity</strong><br>The file was <strong>created by the expected sender</strong>.</p></li></ol><p>If you&#8217;re not familiar with those terms, I got you covered: <strong><a href="https://open.substack.com/pub/cybersecerich/p/my-first-week-of-cissp-prep-what?utm_campaign=post-expanded-share&amp;utm_medium=web">CIA Triad</a></strong></p><p>Let&#8217;s look at a simple example.</p><p>Imagine someone sends you a file.</p><p>It contains <strong>payment instructions</strong> for transferring a large amount of money.</p><p>But an attacker intercepts the file and sends you a modified version with <strong>different payment details</strong>.</p><p>The document looks identical.</p><p>You send the money.</p><p>It&#8217;s gone.</p><p>Digital signatures prevent that.</p><p><strong>They allow the receiver to verify that:</strong></p><ul><li><p>The file was <strong>created by the claimed sender</strong></p></li><li><p>The file was <strong>not modified by anyone else</strong></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">If you enjoy learning cybersecurity this way, subscribe to <strong>Decoded Security</strong> for more simple breakdowns and practical labs.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>How does the whole process work?</h3><p>Great, now we know what problem we are solving here. <br>Now let&#8217;s walk through the process step by step.</p><p>As always, we have Alice and Bob, and Alice wants to send a message to Bob, while Bob needs to be sure that the message is really from Alice and wasn&#8217;t modified by anyone else. </p><p><strong>They need to perform the following steps:</strong></p><p><strong>1. Alice creates a message</strong></p><p>For example, the message contains payment information.</p><p><strong>2. The message is hashed</strong></p><p>Alice runs the message through a <strong>hash function</strong>.</p><p>A hash function converts the message into a short fixed-length value called a <strong>hash</strong>. <br>( more information about hashing here: <strong><a href="https://www.decodedsecurity.com/p/hashing-what-it-is-and-why-its-not?r=4abibl">Hashing: What It Is and Why It&#8217;s Not the Same as Encryption</a>)</strong></p><p>Even a tiny change in the message would produce a completely different hash. So that ensures that any changes are discoverable.</p><p><strong>3. Alice signs the hash</strong></p><p>This might be a little tricky. What does it mean to sign the hash? <br>In this case, it means encrypting the hash using <strong>your private key</strong>.</p><blockquote><p>If you&#8217;re not familiar with asymmetric cryptography and its key, I got you covered: <strong><a href="https://www.decodedsecurity.com/p/symmetric-vs-asymmetric-encryption?r=4abibl">Symmetric vs Asymmetric Encryption: What&#8217;s the Difference?</a></strong></p></blockquote><p>So, in our scenario, Alice encrypts the hash using <strong>her private key</strong>.<br>This encrypted hash is called the <strong>digital signature</strong>.</p><p><strong>4. Alice sends the message and the signature</strong></p><p>Alice sends the message along with the digital signature to Bob.</p><p><strong>5. Bob verifies the signature</strong></p><p><strong>Bob performs two checks:</strong></p><ol><li><p> Bob hashes the original message.</p></li><li><p>Bob decrypts the signature using <strong>Alice&#8217;s public key</strong> to obtain the original hash.</p></li></ol><p>Finally, Bob compares the two hashes.</p><p><strong>If they match:</strong></p><ul><li><p>The message was <strong>not modified</strong> (integrity)</p></li><li><p>The message was <strong>signed by Alice</strong> (authenticity)</p></li></ul><p>If the hashes are different, the message was <strong>tampered with</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZYGr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe99a5102-004e-4633-bbff-00d706f195bb_3428x1720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZYGr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe99a5102-004e-4633-bbff-00d706f195bb_3428x1720.png 424w, https://substackcdn.com/image/fetch/$s_!ZYGr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe99a5102-004e-4633-bbff-00d706f195bb_3428x1720.png 848w, https://substackcdn.com/image/fetch/$s_!ZYGr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe99a5102-004e-4633-bbff-00d706f195bb_3428x1720.png 1272w, https://substackcdn.com/image/fetch/$s_!ZYGr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe99a5102-004e-4633-bbff-00d706f195bb_3428x1720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZYGr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe99a5102-004e-4633-bbff-00d706f195bb_3428x1720.png" width="1456" height="731" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e99a5102-004e-4633-bbff-00d706f195bb_3428x1720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:731,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZYGr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe99a5102-004e-4633-bbff-00d706f195bb_3428x1720.png 424w, https://substackcdn.com/image/fetch/$s_!ZYGr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe99a5102-004e-4633-bbff-00d706f195bb_3428x1720.png 848w, https://substackcdn.com/image/fetch/$s_!ZYGr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe99a5102-004e-4633-bbff-00d706f195bb_3428x1720.png 1272w, https://substackcdn.com/image/fetch/$s_!ZYGr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe99a5102-004e-4633-bbff-00d706f195bb_3428x1720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"></div></div></a><figcaption class="image-caption">Digital signature - Process overview</figcaption></figure></div><h3>Key takeaways</h3><p>Before we move to the practical lab, let&#8217;s summarize the most important points.</p><ul><li><p>Digital signatures protect both integrity and authenticity.</p></li><li><p>They combine hashing and asymmetric cryptography.</p></li><li><p>Only the sender can create a valid signature using the private key.</p></li><li><p>Anyone can verify the signature using the public key.</p></li><li><p>If the hashes don&#8217;t match, the message was tampered with.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">If you enjoy learning cybersecurity this way, subscribe to <strong>Decoded Security</strong> for more simple breakdowns and practical labs.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Hands-On Lab: Try Digital Signatures Yourself</h2><p>Okay, enough theory! You need to convince people that you are really good at cybersecurity, and the only way to do that is to show them something real.</p><p>Let&#8217;s see how digital signatures work in practice.</p><p><strong>In this short lab, we will:</strong></p><ul><li><p>generate a <strong>private and public key</strong></p></li><li><p>create a <strong>message</strong></p></li><li><p><strong>sign</strong> the message</p></li><li><p><strong>verify</strong> the signature</p></li><li><p>modify the message and watch the verification <strong>fail</strong></p></li></ul><p>To keep things simple, we&#8217;ll run everything inside a <strong>Docker container</strong> with OpenSSL.</p><blockquote><p><strong>If you don&#8217;t know how to use Docker, I have created a simple guide for you for FREE:</strong> <a href="https://decodedsecurity.gumroad.com/l/Docker_guide">Docker Guide</a></p></blockquote><h3>Step 1: Create the Lab Environment</h3><p>Create a new folder for the lab:</p><pre><code>digital-signature-lab</code></pre><p>Inside the folder, create a file called:</p><pre><code>Dockerfile</code></pre><p>Add the following content:</p><pre><code>FROM ubuntu:22.04

RUN apt-get update &amp;&amp; \
    apt-get install -y openssl

WORKDIR /lab

CMD ["/bin/bash"]</code></pre><p>This container simply installs <strong>OpenSSL</strong>, which we&#8217;ll use to create and verify digital signatures.</p><h3>Step 2: Build the Docker Image</h3><p>Build the container:</p><pre><code>docker build -t signature-lab .</code></pre><div><hr></div><h3>Step 3: Start the Container</h3><p>Run the container:</p><pre><code>docker run -it signature-lab</code></pre><p>You are now inside the lab environment.</p><div><hr></div><h3>Step 4: Generate a Key Pair</h3><p>First, we generate a <strong>private key</strong>.</p><pre><code>openssl genrsa -out private.key 2048</code></pre><p>Now extract the <strong>public key</strong> from it:</p><pre><code>openssl rsa -in private.key -pubout -out public.key</code></pre><p>You should now have two files:</p><pre><code>private.key
public.key</code></pre><p>Remember:</p><ul><li><p><strong>Private key &#8594; used to sign</strong></p></li><li><p><strong>Public key &#8594; used to verify</strong></p></li></ul><h3>Step 5: Create a Message</h3><p>Let&#8217;s create a simple message file:</p><pre><code>echo &#8220;Send &#8364;10,000 to account 12345&#8221; &gt; message.txt</code></pre><p>Check the file:</p><pre><code>cat message.txt</code></pre><div><hr></div><h3>Step 6: Sign the Message</h3><p>Now Alice signs the message using her <strong>private key</strong>.</p><pre><code>openssl dgst -sha256 -sign private.key -out signature.bin message.txt</code></pre><p>This command:</p><ol><li><p>hashes the message using <strong>SHA-256</strong></p></li><li><p>encrypts the hash using the <strong>private key</strong></p></li><li><p>creates a <strong>digital signature</strong></p></li></ol><p>You should now have:</p><pre><code>message.txt
signature.bin</code></pre><div><hr></div><h3>Step 7:Verify the Signature</h3><p>Now Bob verifies the message using <strong>Alice&#8217;s public key</strong>.</p><pre><code>openssl dgst -sha256 -verify public.key -signature signature.bin message.txt</code></pre><p>If everything is correct, you will see:</p><pre><code>Verified OK</code></pre><p><strong>This means:</strong></p><ul><li><p>The message was <strong>not modified</strong></p></li><li><p>The signature was created using <strong>Alice&#8217;s private key</strong></p></li></ul><div><hr></div><h3>Step 8: Simulate an Attack</h3><p>Now, let&#8217;s simulate an attacker modifying the message.</p><p><strong>Change the file:</strong></p><pre><code>echo &#8220;Send &#8364;10,000 to account 99999&#8221; &gt; message.txt</code></pre><p><strong>Try to verify the signature again:</strong></p><pre><code>openssl dgst -sha256 -verify public.key -signature signature.bin message.txt</code></pre><p>This time, you should see an error message:</p><pre><code>Verification Failure (or similar)</code></pre><p>Why?</p><p>Because the message changed &#8594; the hash changed &#8594; the signature no longer matches.</p><p>This is exactly how <strong>digital signatures detect tampering</strong>.</p><div class="pullquote"><p>Were you able to reproduce the lab and verify the signature yourself?<br>Let me know in the comments. I&#8217;d love to hear if everything worked or if you ran into any issues.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/digital-signatures-explained-with/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/digital-signatures-explained-with/comments"><span>Leave a comment</span></a></p></div><div><hr></div><h1>What We Just Did</h1><p>In this small lab, you reproduced the <strong>exact process used in real systems</strong>:</p><ol><li><p>Create a message</p></li><li><p>Hash the message</p></li><li><p>Sign the hash with a private key</p></li><li><p>Send message + signature</p></li><li><p>Verify using the public key</p></li></ol><p>This mechanism protects many things you use every day:</p><ul><li><p>software updates</p></li><li><p>code signing</p></li><li><p>secure email</p></li><li><p>TLS certificates</p></li></ul><p>Without digital signatures, <strong>trust on the internet would be extremely difficult</strong>. <br></p><div class="pullquote"><p>Were you able to verify the digital signature? <br>Let me know in the comments!</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/digital-signatures-explained-with/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/digital-signatures-explained-with/comments"><span>Leave a comment</span></a></p><h2>Conclusion</h2><p>Digital signatures are one of the most important building blocks of modern cybersecurity.</p><p>They allow us to verify that the data was <strong>not modified</strong> and that it really came from the <strong>expected sender</strong>.</p><p>This simple idea, <strong>hash the data, sign the hash, verify the signature</strong>, is what protects many systems we use every day.</p><p>Software updates, secure emails, TLS certificates, and signed applications all rely on this mechanism.</p><p>Without digital signatures, trusting software and data on the internet would be extremely difficult.</p><p>Now that you understand how they work, you&#8217;ve taken another step toward thinking like a <strong>cybersecurity professional</strong>.</p><p>See you next time!</p><p>Erich<br>Decoded Security</p><h3><strong>Let&#8217;s connect</strong></h3><p>If you want to <strong>collaborate, discuss, or just geek out over virtualization and cloud security</strong>, reach out to me:</p><ul><li><p><strong>Email:</strong> erich.winkler@decodedsecurity.com</p></li><li><p><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/in/winkleri/">Erich Winkler</a></p></li><li><p><strong>Gumroad community: </strong><a href="https://decodedsecurity.gumroad.com/">Decoded Security</a></p></li><li><p><strong><a href="https://open.substack.com/pub/cybersecerich/p/start-here-decoded-security-roadmap?utm_campaign=post-expanded-share&amp;utm_medium=web">Start Here: Decoded Security Roadmap</a></strong></p></li></ul><p><strong>Enjoyed this article?</strong> Like it or drop a comment. I&#8217;d love to hear your thoughts and questions!</p><p><strong>Let&#8217;s learn and grow together!</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to <strong>Decoded Security</strong> to learn more about cybersecurity for FREE!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Virus vs Worm: The Malware Basics Most Cybersecurity Beginners Get Wrong]]></title><description><![CDATA[Viruses, worms, trojans, ransomware&#8230; most people mix them up. Here&#8217;s the simple way to tell them apart.]]></description><link>https://www.decodedsecurity.com/p/virus-vs-worm-the-malware-basics</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/virus-vs-worm-the-malware-basics</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Wed, 04 Mar 2026 19:01:43 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/636ef788-e99c-4864-9be3-71392d8e0a79_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Do you know the difference between a virus and a worm?</p><p>Most people don&#8217;t. And I don&#8217;t blame them.</p><p>The terms get used interchangeably in news headlines, casual conversation, and, unfortunately, even in some training materials.</p><p>But if you&#8217;re preparing for the CISSP, or you&#8217;re serious about cybersecurity, this distinction is not optional.</p><p><strong>So let&#8217;s fix it. Fast.</strong></p><div class="pullquote"><h2>Quick Challenge</h2><p>Before you read the article, test your knowledge. Can you correctly identify the different types of malware?</p><p>I created a <strong>short 5-question quiz</strong> based on this topic.</p><p>&#128073; <strong>Try the quiz:</strong><br><a href="https://forms.gle/nxzCQqz9iXzz1iBu5">https://forms.gle/nxzCQqz9iXzz1iBu5</a></p><p><strong>Leave your score in the comments so we can see how everyone did.</strong><br>Did you get <strong>5/5</strong>, or did something surprise you?</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/virus-vs-worm-the-malware-basics/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/virus-vs-worm-the-malware-basics/comments"><span>Leave a comment</span></a></p></div><blockquote><p>&#128077; And if you enjoy these kinds of challenges, leave a like.</p></blockquote><h1>First: What Even Is Malware?</h1><p>Malware is the umbrella term. It stands for malicious software, any code designed to harm the confidentiality, integrity, or availability of a system.</p><p>Everything else? </p><p>Virus, worm, trojan, ransomware... <strong>those are types of malware</strong>.</p><p>Think of it like this: &#8220;animal&#8221; is the category. </p><p>&#8220;Dog&#8221; and &#8220;cat&#8221; are specific types. You wouldn&#8217;t say &#8220;I saw an animal&#8221; when what you mean is &#8220;I saw a lion.&#8221;</p><p>The same logic applies here.</p><h2>The Types You Need to Know</h2><h3>Virus</h3><p>A virus attaches itself to a file or program. When you open that file, the virus executes and spreads to other files.</p><ul><li><p>Requires user action to spread, someone has to open the infected file</p></li><li><p>Can stay dormant until triggered</p></li><li><p><strong>Classic example:</strong> downloading an infected email attachment</p></li></ul><h3>Worm</h3><p>A worm spreads on its own. No user action required. It scans networks, finds vulnerable systems, and installs itself automatically.</p><ul><li><p>Self-replicating, no file sharing needed</p></li><li><p>Can infect entire networks in minutes</p></li><li><p>The key differentiator from a virus: no human interaction required</p></li></ul><h3>Trojan (Trojan Horse)</h3><p>A trojan disguises itself as legitimate software. You think you&#8217;re installing a useful tool. You&#8217;re actually installing a backdoor.</p><ul><li><p>Does not self-replicate, that&#8217;s the virus/worm job</p></li><li><p>Opens a backdoor for attackers to access your system remotely</p></li><li><p>Can steal data, log keystrokes, or activate your camera</p></li></ul><h3>Ransomware</h3><p>Ransomware encrypts your files and demands payment to get them back. It&#8217;s one of the most disruptive and financially devastating malware types out there.</p><ul><li><p>Spreads via phishing emails, malicious links, or worm-like exploitation</p></li><li><p><strong>Best practice:</strong> Do not pay the ransom. Payment does not guarantee recovery, and it funds more attacks.</p></li></ul><p><em><strong>The best protection against Ransomware is having a good backup strategy! Not paying the ransom!</strong></em></p><h3>Rootkit</h3><p>A rootkit hides deep inside your operating system, at the kernel level. It replaces core system files, so antivirus software doesn&#8217;t see it.</p><ul><li><p>Extremely hard to detect</p></li><li><p>Gives attackers long-term, covert access to your machine</p></li><li><p>Detection requires behavioral analysis and memory scanning, not just signature scans</p></li></ul><h3>Fileless Malware</h3><p>Fileless malware is exactly what it sounds like: no file is written to disk. It lives entirely in memory, using trusted system tools like PowerShell to do its dirty work.</p><ul><li><p>Invisible to traditional antivirus, there&#8217;s nothing on disk to scan</p></li><li><p>Delivered via phishing, malicious macros, or browser exploits</p></li><li><p>Prevention: keep browsers and OS updated. Disable macros by default.</p></li></ul><blockquote><p>&#128172; <strong>Did you already know the difference between a virus and a worm? <br>Let&#8217;s keep it simple! </strong>Comment <strong>yes or no</strong>.</p></blockquote><h3>One-Line Summary for Each Type</h3><p>I have a very bad memory, and that&#8217;s why I like summaries. It will help you remember the key information you need to know about each term. </p><p><strong>These are the key takeaways:</strong></p><ul><li><p><strong>Virus:</strong> attaches to files, needs user to spread it</p></li><li><p><strong>Worm:</strong> spreads itself, no human required</p></li><li><p><strong>Trojan:</strong> disguised as legitimate software, opens a backdoor</p></li><li><p><strong>Ransomware:</strong> encrypts your data, demands payment</p></li><li><p><strong>Rootkit:</strong> hides at kernel level, antivirus can&#8217;t see it</p></li><li><p><strong>Fileless:</strong> lives in memory, nothing written to disk</p></li></ul><h3>Why This Matters Beyond any Exams</h3><p>On the CISSP exam, you&#8217;ll be asked to identify malware types from scenario descriptions. Getting this wrong costs you marks.</p><p>But in the real world, it costs more than marks.</p><p>If you misidentify a worm as a virus, you treat it wrong. You focus on the infected file instead of network propagation, and the worm keeps spreading while you&#8217;re looking the wrong way.</p><p>The right diagnosis leads to the right response.</p><blockquote><p>&#128077; <strong>If you learned something new today, leave a like so more people can discover Decoded Security.</strong></p></blockquote><h3>Conclusion</h3><p>Congratulations! Now you know the basic malware types. <br>It is a great step forward in knowing how to protect your systems against them.</p><p><strong>But here&#8217;s the real question:</strong></p><p><strong>How does malware actually get onto your system in the first place? And how does it stay hidden from all our security controls?</strong></p><p>That&#8217;s what we are going to cover next time!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe if you want to learn how viruses spread across our systems, while staying hidden from all our defenses!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Cybersecurity Basics Series</strong></h2><p>1&#65039;&#8419; Malware Types (this article)<br>2&#65039;&#8419; Malware Propagation Techniques <em>(next)</em><br>3&#65039;&#8419; <a href="https://www.decodedsecurity.com/p/access-controls?r=4abibl">Access Control Models</a><br>4&#65039;&#8419; <a href="https://www.decodedsecurity.com/p/symmetric-vs-asymmetric-encryption?r=4abibl">Encryption Basics</a><br>5&#65039;&#8419; <a href="https://www.decodedsecurity.com/p/the-incident-response-mistakes-that?r=4abibl">Incident Response</a></p><h2><strong>Ready to level up your cybersecurity skills?</strong></h2><ul><li><p><strong>&#10067;Take the quiz</strong> to test your understanding: <a href="https://cybersecerich.substack.com/p/test-your-cybersecurity-knowledge?utm_source=chatgpt.com">CybersecErich: Quiz Hub</a></p></li><li><p><strong>&#128240;Subscribe</strong> (free or paid) to get new posts straight to your inbox.</p></li><li><p><strong>Share</strong> this with a friend studying for CISSP, or anyone curious about cybersecurity</p></li></ul><p></p>]]></content:encoded></item><item><title><![CDATA[The 3 Skills That Matter Most for Landing Your First SOC Job]]></title><description><![CDATA[SOC roles are one of the best entry points into cybersecurity. Here&#8217;s what you should focus on to get hired!]]></description><link>https://www.decodedsecurity.com/p/the-3-skills-that-matter-most-for</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/the-3-skills-that-matter-most-for</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Thu, 26 Feb 2026 20:57:57 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/22dac25b-f3e1-4ede-8373-b93cdc927745_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><p><strong>Warning:</strong> List of study materials at the end of the article!</p></blockquote><p>In my previous article, <strong><a href="https://open.substack.com/pub/cybersecerich/p/how-to-choose-the-right-cybersecurity?utm_campaign=post-expanded-share&amp;utm_medium=web">How to Choose the Right Cybersecurity Role Before You Waste Time and Money on the Wrong Certifications</a></strong>, I explained that cybersecurity isn&#8217;t one job, it&#8217;s a system with multiple career paths.</p><p>One of those paths was <strong>Security Operations (SOC)</strong>.</p><p>And for many people, SOC is one of the best entry points into cybersecurity.</p><p>Why?</p><p><strong>Because SOC roles expose you to:</strong></p><ul><li><p>Real attacks</p></li><li><p>Real systems</p></li><li><p>Real investigations</p></li><li><p>Real tools</p></li></ul><blockquote><p>Do you want to land your first job in cybersecurity? Comment &#8220;<strong>interview&#8221;</strong> and I&#8217;ll share a cybersecurity interview guide with you for FREE. No strings attached.</p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/the-3-skills-that-matter-most-for/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/the-3-skills-that-matter-most-for/comments"><span>Leave a comment</span></a></p><p>You learn faster than in almost any other junior security role.</p><p>But after choosing a path, the next logical question becomes:</p><blockquote><p>&#8220;Okay&#8230; what should I actually learn now?&#8221;</p></blockquote><p>Certifications are often the first thing people think about.</p><p>But certifications don&#8217;t build competence on their own.</p><p>Skills do.</p><p>If your goal is your first SOC job, these are the three areas that will increase your chances the most.</p><div class="pullquote"><p><strong>Growth tip:</strong> If you don&#8217;t want to on what to focus on, just let me know in the comments. I will help you out!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/the-3-skills-that-matter-most-for/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/the-3-skills-that-matter-most-for/comments"><span>Leave a comment</span></a></p></div><h1>1. Networking Fundamentals</h1><p>SOC analysts investigate alerts.</p><p>And most alerts involve network activity.</p><ul><li><p>Suspicious IP addresses.</p></li><li><p>DNS traffic.</p></li><li><p>Authentication attempts.</p></li><li><p>Connections to unknown servers.</p></li></ul><p>And to investigate something, you need to understand it first.</p><p>The good news? </p><p>You don&#8217;t need to learn everything at once.</p><p>You need the right fundamentals.</p><p>If you&#8217;re unsure where to start, I already covered the most important protocols beginners should focus on here:</p><p>&#128073; <strong><a href="https://open.substack.com/pub/cybersecerich/p/top-5-most-important-network-protocols?utm_campaign=post-expanded-share&amp;utm_medium=web">Top 5 most important network protocols for cybersecurity beginners</a></strong></p><p><strong>One simple truth:</strong></p><blockquote><p>Networking is the language of SOC. Make sure you can describe a three-way handshake anytime!</p></blockquote><h1>2. Linux and System Basics</h1><p>Many security tools and enterprise systems run on Linux.</p><p>Cloud workloads? Linux.<br>Security appliances? Linux.<br>Servers? Often Linux.</p><p>You simply can&#8217;t avoid it!</p><p>However, you don&#8217;t need to become a Linux <strong>beast overnight</strong>!<br>You&#8217;re no administrator, you&#8217;re a SOC analyst.<br>You don&#8217;t need 1,000 commands.<br>You need a practical subset.</p><p><strong>I explained exactly which ones matter most here:</strong></p><p>&#128073; <strong><a href="https://open.substack.com/pub/cybersecerich/p/top-5-linux-command-for-an-entry?utm_campaign=post-expanded-share&amp;utm_medium=web">Top 5 Linux commands for an entry-level cybersecurity role</a></strong></p><p>Even beginner Linux familiarity already puts you ahead of many candidates.</p><p>And because I know how it feels to be completely lost, I chose 5  Linux commands I&#8217;d start with if I were completely new to Linux.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!obN_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9a017af-519e-4db7-bb83-fdf5a94239c4_1080x1350.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!obN_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9a017af-519e-4db7-bb83-fdf5a94239c4_1080x1350.png 424w, https://substackcdn.com/image/fetch/$s_!obN_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9a017af-519e-4db7-bb83-fdf5a94239c4_1080x1350.png 848w, https://substackcdn.com/image/fetch/$s_!obN_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9a017af-519e-4db7-bb83-fdf5a94239c4_1080x1350.png 1272w, https://substackcdn.com/image/fetch/$s_!obN_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9a017af-519e-4db7-bb83-fdf5a94239c4_1080x1350.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!obN_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9a017af-519e-4db7-bb83-fdf5a94239c4_1080x1350.png" width="1080" height="1350" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9a017af-519e-4db7-bb83-fdf5a94239c4_1080x1350.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1350,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:162012,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/189289093?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9a017af-519e-4db7-bb83-fdf5a94239c4_1080x1350.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!obN_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9a017af-519e-4db7-bb83-fdf5a94239c4_1080x1350.png 424w, https://substackcdn.com/image/fetch/$s_!obN_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9a017af-519e-4db7-bb83-fdf5a94239c4_1080x1350.png 848w, https://substackcdn.com/image/fetch/$s_!obN_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9a017af-519e-4db7-bb83-fdf5a94239c4_1080x1350.png 1272w, https://substackcdn.com/image/fetch/$s_!obN_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9a017af-519e-4db7-bb83-fdf5a94239c4_1080x1350.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p>What commands would you add on the list? Let me know in the comments!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/the-3-skills-that-matter-most-for/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/the-3-skills-that-matter-most-for/comments"><span>Leave a comment</span></a></p></blockquote><h1>3. Hands-On Investigation Practice</h1><p>This is the biggest differentiator.</p><p>Employers want evidence that you can think like an analyst.</p><p><strong>That means:</strong></p><ul><li><p>Looking at logs</p></li><li><p>Understanding alerts</p></li><li><p>Asking questions</p></li><li><p>Connecting evidence</p></li></ul><p>The employer wants proof that you know what you&#8217;re looking for.</p><blockquote><p>But here is the problem. How are you going to prove experience without getting the job first?</p></blockquote><p>Well, the answer is simple: <strong>A PERSONAL PROJECT.</strong></p><p><strong>For example:</strong></p><blockquote><p>&#8220;I created a lab and analyzed suspicious login activity.&#8221;</p></blockquote><p>How? You can use Docker containers to simulate any number of computers and any network topology. </p><div class="pullquote"><p>If you have no idea how to create a Docker container, I have something for you: <a href="https://decodedsecurity.gumroad.com/l/Docker_guide">Run Your First Docker Environment in 60 Minutes</a>. <br>Don&#8217;t worry, it&#8217;s FREE.</p></div><blockquote><p>Did you manage to run your first Docker environment? Let me know in the comments!</p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/the-3-skills-that-matter-most-for/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/the-3-skills-that-matter-most-for/comments"><span>Leave a comment</span></a></p><h2>Cybersecurity is confusing at the beginning.</h2><p>So if you feel overwhelmed, don&#8217;t worry.</p><p>That&#8217;s normal.</p><p>I was exactly where you are now.</p><p>There are countless certifications, tools, and learning paths, and it&#8217;s very easy to jump from one topic to another without clear direction.</p><p>That&#8217;s why choosing a path matters, and focusing on the right fundamentals matters even more.</p><p><strong>If your goal is SOC roles, focus on what actually builds competence:</strong></p><ul><li><p>Networking fundamentals</p></li><li><p>Linux and system basics</p></li><li><p>Hands-on investigation practice</p></li></ul><p>These skills create real momentum.</p><p>And momentum is what gets people hired.</p><p>If you ever feel unsure about what you should focus on next, you can always reach out to me. I genuinely enjoy helping people navigate the beginning of their cybersecurity journey.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/the-3-skills-that-matter-most-for/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/the-3-skills-that-matter-most-for/comments"><span>Leave a comment</span></a></p><p>If you focus on the fundamentals, stay curious, and keep practicing, you are already ahead of most beginners entering the field.</p><p>Progress beats perfection.</p><p>Keep going!</p><h1>Here is your actionable checklist!</h1><p>If you&#8217;re serious about landing your first SOC job, start with this:</p><ol><li><p><strong>Check Your Networking Basics</strong><br>Make sure you understand IPs, DNS, and the TCP three-way handshake.</p></li><li><p><strong>Practice Linux for 30 Minutes + Create 2 Docker containers on the same network!</strong></p></li><li><p><strong>Start a Small Security Project</strong><br>Create a lab, analyze logs, or simulate login attempts.<br><strong>Your goal:</strong> something you can talk about in an interview.</p></li></ol><blockquote><p>&#8220;I built a lab and investigated security events.&#8221;</p></blockquote><p>That sentence alone can set you apart.</p><p>Which step will you start first?</p><p><strong>Comment: NETWORK</strong> | <strong>LINUX</strong> | <strong>PROJECT</strong></p><p>&#8230;and I&#8217;ll share one practical tip to help you.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/the-3-skills-that-matter-most-for/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/the-3-skills-that-matter-most-for/comments"><span>Leave a comment</span></a></p><h3>BONUS: List of study materials</h3><p>The three areas we discussed are broad.</p><p>If you&#8217;re serious about building a career in cybersecurity, especially in SOC, you should also understand the following foundational topics.</p><p>These concepts appear constantly in real environments, certifications, and interviews.</p><p><strong>Here are some resources to help you go deeper:</strong></p><ol><li><p>Risk Management: <strong><a href="https://www.decodedsecurity.com/p/risk-management-managing-risks-in?r=4abibl">Risk Management: Managing risks in six steps</a></strong></p></li><li><p>Basics of Virtualization:<strong> <a href="https://www.decodedsecurity.com/p/containers-vs-virtual-machines-the?r=4abibl">Containers vs. Virtual Machines</a></strong></p></li><li><p>Quantitative Risk Analysis: <strong><a href="https://www.decodedsecurity.com/p/quantitative-risk-analysis-let-the?r=4abibl">Quantitative Risk Analysis: Let The Numbers Do All The Talking</a></strong></p></li><li><p>Access Control: <strong><a href="https://www.decodedsecurity.com/p/access-controls?r=4abibl">Access Controls: Who Gets the Keys?</a></strong></p></li><li><p>Diffie-Hellman: <strong><a href="https://open.substack.com/pub/cybersecerich/p/diffie-hellman-explained-like-youre?utm_campaign=post-expanded-share&amp;utm_medium=web">Diffie-Hellman Explained Like You&#8217;re 12 (And Why Interviewers Love Asking About It)</a></strong></p></li><li><p>ISO/OSI model: <strong><a href="https://www.decodedsecurity.com/p/understanding-the-isoosi-model-why?r=4abibl">Understanding the ISO/OSI Model &#8211; Why is it crucial for Cybersecurity professionals?</a></strong></p></li><li><p>DNS: <strong><a href="https://www.decodedsecurity.com/p/this-is-how-i-explain-dns-to-beginners?r=4abibl">This Is How I Explain DNS To Beginners</a></strong></p></li></ol><h3><strong>Let&#8217;s connect</strong></h3><p>If you want to <strong>collaborate, discuss, or just geek out over virtualization and cloud security</strong>, reach out to me:</p><ul><li><p><strong>Email:</strong> erich.winkler@decodedsecurity.com</p></li><li><p><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/in/winkleri/">Erich Winkler</a></p></li><li><p><strong>Gumroad community: </strong><a href="https://decodedsecurity.gumroad.com/">Decoded Security</a></p></li><li><p><strong><a href="https://open.substack.com/pub/cybersecerich/p/start-here-decoded-security-roadmap?utm_campaign=post-expanded-share&amp;utm_medium=web">Start Here: Decoded Security Roadmap</a></strong></p></li></ul><p><strong>Enjoyed this article?</strong> Like it or drop a comment. I&#8217;d love to hear your thoughts and questions!</p><p>Let&#8217;s learn and grow together!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to Decoded Security to land your first cybersecurity job!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Diffie-Hellman Explained Like You’re 12 (And Why Interviewers Love Asking About It)]]></title><description><![CDATA[One of the most common cybersecurity interview questions, especially for entry-level roles, is:]]></description><link>https://www.decodedsecurity.com/p/diffie-hellman-explained-like-youre</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/diffie-hellman-explained-like-youre</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Wed, 25 Feb 2026 20:36:36 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c493ce1f-635b-42c3-9567-ef9daba1d357_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>One of the most common cybersecurity interview questions, especially for entry-level roles, is:</strong></p><blockquote><p>&#8220;Can you explain Diffie-Hellman?&#8221;</p></blockquote><p>It also appears in major certifications like <strong>CC (Certified in Cybersecurity)</strong> and <strong>CISSP</strong>.</p><p>Not because you need to calculate the math&#8230;</p><p>&#8230;but because it tests whether you understand a <strong>core security concept: secure key exchange over an insecure channel.</strong></p><p>And there is a good reason for that! </p><blockquote><p><strong>Note:</strong> If this article helped you understand Diffie-Hellman, drop a like so more people can find it too. Thank you!</p></blockquote><h2>What problem does it solve?</h2><p>Imagine you want to send a secret message to someone.</p><p>So, you generate a key and use a secure algorithm to encrypt your message. </p><p>Great!</p><p>But there&#8217;s a problem.</p><p>How do you share the key with the other party? </p><p>They need to decrypt the message somehow, and everyone can see your communication channel.</p><p>Hackers. Governments. Your ISP. Anyone.</p><p>So how do you create a <strong>shared secret</strong> without ever meeting in person, and without anyone else discovering it?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!q8Bq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5292ceb8-3923-4fc7-ab58-28a24386db6d_1624x806.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!q8Bq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5292ceb8-3923-4fc7-ab58-28a24386db6d_1624x806.png 424w, https://substackcdn.com/image/fetch/$s_!q8Bq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5292ceb8-3923-4fc7-ab58-28a24386db6d_1624x806.png 848w, https://substackcdn.com/image/fetch/$s_!q8Bq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5292ceb8-3923-4fc7-ab58-28a24386db6d_1624x806.png 1272w, https://substackcdn.com/image/fetch/$s_!q8Bq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5292ceb8-3923-4fc7-ab58-28a24386db6d_1624x806.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!q8Bq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5292ceb8-3923-4fc7-ab58-28a24386db6d_1624x806.png" width="1456" height="723" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5292ceb8-3923-4fc7-ab58-28a24386db6d_1624x806.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:723,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:97551,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/188795449?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5292ceb8-3923-4fc7-ab58-28a24386db6d_1624x806.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!q8Bq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5292ceb8-3923-4fc7-ab58-28a24386db6d_1624x806.png 424w, https://substackcdn.com/image/fetch/$s_!q8Bq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5292ceb8-3923-4fc7-ab58-28a24386db6d_1624x806.png 848w, https://substackcdn.com/image/fetch/$s_!q8Bq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5292ceb8-3923-4fc7-ab58-28a24386db6d_1624x806.png 1272w, https://substackcdn.com/image/fetch/$s_!q8Bq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5292ceb8-3923-4fc7-ab58-28a24386db6d_1624x806.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><blockquote><p><strong>Warning:</strong> If you&#8217;re not sure how symmetric encryption works. I got you covered! <br><strong><a href="https://www.decodedsecurity.com/p/symmetric-vs-asymmetric-encryption?r=4abibl">Symmetric vs Asymmetric Encryption: What&#8217;s the Difference?</a></strong></p></blockquote><p>The solution is called <strong>Diffie-Hellman key exchange</strong>.</p><p>And today, it protects almost everything you do online.</p><blockquote><p>Are you preparing for any cybersecurity certification exam? Let us know in the comments! </p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/diffie-hellman-explained-like-youre/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/diffie-hellman-explained-like-youre/comments"><span>Leave a comment</span></a></p><h2>What Is the Purpose?</h2><p><strong>The purpose of Diffie-Hellman is simple:</strong></p><blockquote><p>Create a shared secret between two parties without transmitting the secret itself. <br>(REMEMBER THIS)</p></blockquote><p><strong>That shared secret can then be used for:</strong></p><ul><li><p>Encryption keys (TLS / HTTPS)</p></li><li><p>VPN tunnels</p></li><li><p>Secure messaging</p></li><li><p>Authentication protocols</p></li></ul><p><strong>Important: </strong>Diffie-Hellman does <strong>not encrypt data itself</strong>.</p><p>It only creates the secret key.</p><p>Encryption algorithms (like AES) use that key afterward.</p><p>Okay, now that you know the purpose, let&#8217;s take a look at how it works!</p><h2>Principle: The Colored Water Example</h2><p>I will explain this algorithm without using complicated mathematical formulas. That isn&#8217;t the point here. So instead of a discrete logarithm problem, I am going to use colors!</p><p><strong>Let&#8217;s imagine the following scenario:</strong></p><ol><li><p>You have two people who want to communicate securely: Alice and Bob.</p></li><li><p>They want to create a secret color mixture (shared secret).</p></li><li><p>But an attacker (Eve) is watching everything on the public channel.</p></li></ol><p>So what should they do? </p><blockquote><p>Do you find this analogy convenient? Let me know in the comments!</p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/diffie-hellman-explained-like-youre/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/diffie-hellman-explained-like-youre/comments"><span>Leave a comment</span></a></p><h3><strong>Step 1: </strong>Alice and Bob should agree on public parameters</h3><p>In our example, this could be the color <strong>yellow</strong>.<br>This is called a <strong>public parameter</strong>.<br>Everyone can see it:</p><ul><li><p>Alice sees it </p></li><li><p>Bob sees it </p></li><li><p>Eve (the attacker) also sees it </p></li></ul><p>And that&#8217;s completely fine.<br>There is <strong>no secrecy</strong> yet.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mxZY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5caeb6-60f5-44fa-89cf-2b2b9e726e78_1618x1110.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mxZY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5caeb6-60f5-44fa-89cf-2b2b9e726e78_1618x1110.png 424w, https://substackcdn.com/image/fetch/$s_!mxZY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5caeb6-60f5-44fa-89cf-2b2b9e726e78_1618x1110.png 848w, https://substackcdn.com/image/fetch/$s_!mxZY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5caeb6-60f5-44fa-89cf-2b2b9e726e78_1618x1110.png 1272w, https://substackcdn.com/image/fetch/$s_!mxZY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5caeb6-60f5-44fa-89cf-2b2b9e726e78_1618x1110.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mxZY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5caeb6-60f5-44fa-89cf-2b2b9e726e78_1618x1110.png" width="1456" height="999" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1d5caeb6-60f5-44fa-89cf-2b2b9e726e78_1618x1110.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:999,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:86778,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/188795449?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5caeb6-60f5-44fa-89cf-2b2b9e726e78_1618x1110.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mxZY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5caeb6-60f5-44fa-89cf-2b2b9e726e78_1618x1110.png 424w, https://substackcdn.com/image/fetch/$s_!mxZY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5caeb6-60f5-44fa-89cf-2b2b9e726e78_1618x1110.png 848w, https://substackcdn.com/image/fetch/$s_!mxZY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5caeb6-60f5-44fa-89cf-2b2b9e726e78_1618x1110.png 1272w, https://substackcdn.com/image/fetch/$s_!mxZY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d5caeb6-60f5-44fa-89cf-2b2b9e726e78_1618x1110.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h3>Step 2: Private Secret Colors</h3><p>Now it gets interesting. Both Alice and Bob choose a secret private color that they don&#8217;t share with anyone.</p><p>Let&#8217;s say that Alice chooses blue and Bob chooses red.</p><p>Once they have their own secret color, take a glass of yellow water (public) and add their secret-colored water to the glass.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Irww!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dbc05d-a68c-419e-b983-1489dfb2d768_1643x1110.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Irww!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dbc05d-a68c-419e-b983-1489dfb2d768_1643x1110.png 424w, https://substackcdn.com/image/fetch/$s_!Irww!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dbc05d-a68c-419e-b983-1489dfb2d768_1643x1110.png 848w, https://substackcdn.com/image/fetch/$s_!Irww!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dbc05d-a68c-419e-b983-1489dfb2d768_1643x1110.png 1272w, https://substackcdn.com/image/fetch/$s_!Irww!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dbc05d-a68c-419e-b983-1489dfb2d768_1643x1110.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Irww!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dbc05d-a68c-419e-b983-1489dfb2d768_1643x1110.png" width="1456" height="984" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b6dbc05d-a68c-419e-b983-1489dfb2d768_1643x1110.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:984,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:111330,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/188795449?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dbc05d-a68c-419e-b983-1489dfb2d768_1643x1110.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Irww!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dbc05d-a68c-419e-b983-1489dfb2d768_1643x1110.png 424w, https://substackcdn.com/image/fetch/$s_!Irww!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dbc05d-a68c-419e-b983-1489dfb2d768_1643x1110.png 848w, https://substackcdn.com/image/fetch/$s_!Irww!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dbc05d-a68c-419e-b983-1489dfb2d768_1643x1110.png 1272w, https://substackcdn.com/image/fetch/$s_!Irww!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6dbc05d-a68c-419e-b983-1489dfb2d768_1643x1110.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Step 3: Exchange the Mixed Colors</h3><p>They exchange their mixtures publicly again.</p><p>So now:</p><ul><li><p>Alice receives Bob&#8217;s mixture</p></li><li><p>Bob receives Alice&#8217;s mixture</p></li></ul><p>Eve still sees everything. She has both Bob&#8217;s mixture and Alice&#8217;s mixture. But it is impossible for her to separate the two individual colors from the mix. </p><p>So the information is useless for her. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AGfO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc210d984-2089-4af4-81df-0d9b0600bb5f_1618x1110.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AGfO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc210d984-2089-4af4-81df-0d9b0600bb5f_1618x1110.png 424w, https://substackcdn.com/image/fetch/$s_!AGfO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc210d984-2089-4af4-81df-0d9b0600bb5f_1618x1110.png 848w, https://substackcdn.com/image/fetch/$s_!AGfO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc210d984-2089-4af4-81df-0d9b0600bb5f_1618x1110.png 1272w, https://substackcdn.com/image/fetch/$s_!AGfO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc210d984-2089-4af4-81df-0d9b0600bb5f_1618x1110.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AGfO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc210d984-2089-4af4-81df-0d9b0600bb5f_1618x1110.png" width="1456" height="999" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c210d984-2089-4af4-81df-0d9b0600bb5f_1618x1110.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:999,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:111674,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/188795449?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc210d984-2089-4af4-81df-0d9b0600bb5f_1618x1110.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AGfO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc210d984-2089-4af4-81df-0d9b0600bb5f_1618x1110.png 424w, https://substackcdn.com/image/fetch/$s_!AGfO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc210d984-2089-4af4-81df-0d9b0600bb5f_1618x1110.png 848w, https://substackcdn.com/image/fetch/$s_!AGfO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc210d984-2089-4af4-81df-0d9b0600bb5f_1618x1110.png 1272w, https://substackcdn.com/image/fetch/$s_!AGfO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc210d984-2089-4af4-81df-0d9b0600bb5f_1618x1110.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Step 4: Final Secret</h3><p>Now, both add their <strong>own secret color again</strong>.<br>Both end up with the <strong>same final color</strong>.<br>But Eve cannot reproduce it.<br><br><strong>And that&#8217;s it! Bot and Alice now have their shared secret and can easily communicate securely!</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Y7i_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff09e600c-fd27-4ad2-b948-4c7c3e579184_1760x1418.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Y7i_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff09e600c-fd27-4ad2-b948-4c7c3e579184_1760x1418.png 424w, https://substackcdn.com/image/fetch/$s_!Y7i_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff09e600c-fd27-4ad2-b948-4c7c3e579184_1760x1418.png 848w, https://substackcdn.com/image/fetch/$s_!Y7i_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff09e600c-fd27-4ad2-b948-4c7c3e579184_1760x1418.png 1272w, https://substackcdn.com/image/fetch/$s_!Y7i_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff09e600c-fd27-4ad2-b948-4c7c3e579184_1760x1418.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Y7i_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff09e600c-fd27-4ad2-b948-4c7c3e579184_1760x1418.png" width="1456" height="1173" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f09e600c-fd27-4ad2-b948-4c7c3e579184_1760x1418.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1173,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:143918,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/188795449?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff09e600c-fd27-4ad2-b948-4c7c3e579184_1760x1418.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Y7i_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff09e600c-fd27-4ad2-b948-4c7c3e579184_1760x1418.png 424w, https://substackcdn.com/image/fetch/$s_!Y7i_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff09e600c-fd27-4ad2-b948-4c7c3e579184_1760x1418.png 848w, https://substackcdn.com/image/fetch/$s_!Y7i_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff09e600c-fd27-4ad2-b948-4c7c3e579184_1760x1418.png 1272w, https://substackcdn.com/image/fetch/$s_!Y7i_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff09e600c-fd27-4ad2-b948-4c7c3e579184_1760x1418.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p><strong>If this article helped you understand the concept of the Diffie-Hellman algorithm, drop a like and help more people understand it!</strong></p></blockquote><h2>Conclusion</h2><p>If you&#8217;re reading this, congratulations.</p><p>Understanding Diffie-Hellman is a huge step forward and absolutely crucial for certification exams such as <strong>CC</strong>, <strong>Security+</strong>, or <strong>CISSP</strong>.</p><p>More importantly, it means you&#8217;re beginning to understand <strong>how secure communication actually starts</strong>, and that&#8217;s one of the foundations of cybersecurity.</p><p>I know cryptography can feel intimidating at first, so here are the key takeaways I want you to remember:</p><p>You don&#8217;t need to understand the math. Focus on the concept first.</p><p>Diffie-Hellman is about <strong>creating a shared secret over an insecure channel</strong>.</p><p>It does <strong>not encrypt data</strong>, it creates the key that encryption uses later.</p><p>Public parameters can be visible to everyone. Security comes from private values.</p><p>Modern protocols like <strong>TLS</strong>, <strong>VPNs</strong>, and <strong>secure messaging</strong> use Diffie-Hellman (or its variants) in the handshake phase.</p><p>If you understand this principle, you&#8217;re already ahead of many beginners, and you&#8217;ll recognize one of the most common cybersecurity interview questions instantly.</p><p>Keep going.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to Decoded Security to learn more about cybersecurity every week. Subscribe today, and you&#8217;ll get a special welcome gift!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>Let&#8217;s connect</strong></h3><p>If you want to <strong>collaborate, discuss, or just geek out over virtualization and cloud security</strong>, reach out to me:</p><ul><li><p><strong>Email:</strong> erich.winkler@decodedsecurity.com</p></li><li><p><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/in/winkleri/">Erich Winkler</a></p></li><li><p><strong>Gumroad community: </strong><a href="https://decodedsecurity.gumroad.com/">Decoded Security</a></p></li><li><p><strong><a href="https://open.substack.com/pub/cybersecerich/p/start-here-decoded-security-roadmap?utm_campaign=post-expanded-share&amp;utm_medium=web">Start Here: Decoded Security Roadmap</a></strong></p></li></ul><p><strong>Enjoyed this article?</strong> Like it or drop a comment. I&#8217;d love to hear your thoughts and questions!</p><p>Let&#8217;s learn and grow together!</p><p></p>]]></content:encoded></item><item><title><![CDATA[Top 5 most important network protocols for cybersecurity beginners]]></title><description><![CDATA[Most beginners waste months trying to learn networking the wrong way. If you're starting your cybersecurity career, these are the 5 protocols you should focus on first.]]></description><link>https://www.decodedsecurity.com/p/top-5-most-important-network-protocols</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/top-5-most-important-network-protocols</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Thu, 19 Feb 2026 18:59:28 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4c50a779-480d-4c99-80e3-5318f0ffe24e_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Back when I wanted to get into cybersecurity, everybody kept telling me to &#8220;learn networking.&#8221;</p><p>Great. I can do that.</p><p>I sat down and started learning.</p><p>After a while, I realized there is an infinite number of things that I could be learning and that I had no idea what to focus on.</p><p>I was jumping from one topic to another, TCP today, DNS tomorrow, VLANs next week, without really knowing what actually mattered.</p><p>It felt like trying to drink from a <strong>fire hose</strong>.</p><p>If this sounds familiar, you&#8217;re not alone.</p><p>The truth is: <strong>you don&#8217;t need to learn everything at once!</strong></p><p>In this article, I&#8217;ll show you the <strong>5 most important network protocols every cybersecurity beginner should understand</strong> and why they matter in real-world security.</p><blockquote><p>Before we get into that, please make sure you understand the <a href="https://www.decodedsecurity.com/p/introduction-to-the-tcpip-model">TCP/IP model</a> and its layers.</p></blockquote><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Want to learn more about networking and <strong>cybersecurity</strong>? Subscribe to <strong>Decoded Security</strong> for new lessons every week.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>HTTP/HTTPS</h2><p><strong>Layer:</strong> Application Layer (Layer 7 - ISO/OSI model, Layer 4 TCP/IP model)</p><p><strong>Function:</strong><br>Transfers web data between a client and a web server. Typically between user&#8217;s browser and a web server.</p><p><strong>Process:</strong><br>HTTP uses a request&#8211;response model. A client (browser) sends an HTTP request to a server, and the server responds with content (HTML, images, API data, etc.).</p><p>Not sure what it means? Maybe this picture will help you.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BW8G!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4713a9-c1cf-4fca-9201-f8dc843e83ce_1140x1069.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BW8G!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4713a9-c1cf-4fca-9201-f8dc843e83ce_1140x1069.png 424w, https://substackcdn.com/image/fetch/$s_!BW8G!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4713a9-c1cf-4fca-9201-f8dc843e83ce_1140x1069.png 848w, https://substackcdn.com/image/fetch/$s_!BW8G!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4713a9-c1cf-4fca-9201-f8dc843e83ce_1140x1069.png 1272w, https://substackcdn.com/image/fetch/$s_!BW8G!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4713a9-c1cf-4fca-9201-f8dc843e83ce_1140x1069.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BW8G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4713a9-c1cf-4fca-9201-f8dc843e83ce_1140x1069.png" width="1140" height="1069" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0f4713a9-c1cf-4fca-9201-f8dc843e83ce_1140x1069.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1069,&quot;width&quot;:1140,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:102579,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/188384153?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4713a9-c1cf-4fca-9201-f8dc843e83ce_1140x1069.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BW8G!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4713a9-c1cf-4fca-9201-f8dc843e83ce_1140x1069.png 424w, https://substackcdn.com/image/fetch/$s_!BW8G!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4713a9-c1cf-4fca-9201-f8dc843e83ce_1140x1069.png 848w, https://substackcdn.com/image/fetch/$s_!BW8G!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4713a9-c1cf-4fca-9201-f8dc843e83ce_1140x1069.png 1272w, https://substackcdn.com/image/fetch/$s_!BW8G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f4713a9-c1cf-4fca-9201-f8dc843e83ce_1140x1069.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Looking at this picture, two questions might pop in your head.</p><p>What are HTTP methods and what are the Status codes?</p><p>Let&#8217;s take it step by step.</p><p>An <strong>HTTP method</strong> defines the <strong>action</strong> that a client wants to perform on a resource located on a web server.</p><p><strong>There are 4 main methods:</strong></p><ul><li><p><strong>GET (Read)</strong> &#8594; Retrieve data from a server</p></li><li><p><strong>POST(Create)</strong> &#8594; Send data to the server (e.g., login form submission)</p></li><li><p><strong>PUT(Update)</strong> &#8594; Update or replace data on the server</p></li><li><p><strong>DELETE(Delete)</strong> &#8594; Remove data from the server</p></li></ul><p>HTTP response codes (also called <strong>status codes</strong>) are messages sent by the server to tell the client what happened with the request.</p><p><strong>In simple terms:</strong></p><blockquote><p>Status codes tell you whether your request worked, or why it failed.</p></blockquote><p><strong>Remember that famous Error 404? Yes, that is a response code!</strong></p><p><strong>Why it matters to cybersecurity:</strong><br>Most internet traffic today is web traffic. Many attacks target web communication, including:</p><ul><li><p>Man-in-the-Middle (MitM)</p></li><li><p>Session hijacking</p></li><li><p>Credential theft</p></li><li><p>Web application attacks (XSS, SQL injection)</p></li></ul><p>And if you want to protect your systems agains those attacks, you need to understand this protocol first!</p><p><strong>Note:</strong> HTTPS works the same way but adds <strong>TLS encryption</strong>, which protects the communication from interception or tampering.</p><h2>TCP (Transmission Control Protocol)</h2><p><strong>Layer:</strong> Transport Layer (Layer 4 &#8212; ISO/OSI model, Layer 3 &#8212; TCP/IP model)</p><p><strong>Function:</strong><br>Provides reliable, ordered, and error-checked delivery of data between devices.</p><blockquote><p><strong>Make sure to understand the three-way handshake!</strong></p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Oqop!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F660cb80e-89a7-49ee-bf73-039cc525b279_614x131.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Oqop!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F660cb80e-89a7-49ee-bf73-039cc525b279_614x131.png 424w, https://substackcdn.com/image/fetch/$s_!Oqop!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F660cb80e-89a7-49ee-bf73-039cc525b279_614x131.png 848w, https://substackcdn.com/image/fetch/$s_!Oqop!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F660cb80e-89a7-49ee-bf73-039cc525b279_614x131.png 1272w, https://substackcdn.com/image/fetch/$s_!Oqop!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F660cb80e-89a7-49ee-bf73-039cc525b279_614x131.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Oqop!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F660cb80e-89a7-49ee-bf73-039cc525b279_614x131.png" width="614" height="131" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/660cb80e-89a7-49ee-bf73-039cc525b279_614x131.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:131,&quot;width&quot;:614,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:22631,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/188384153?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F660cb80e-89a7-49ee-bf73-039cc525b279_614x131.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Oqop!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F660cb80e-89a7-49ee-bf73-039cc525b279_614x131.png 424w, https://substackcdn.com/image/fetch/$s_!Oqop!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F660cb80e-89a7-49ee-bf73-039cc525b279_614x131.png 848w, https://substackcdn.com/image/fetch/$s_!Oqop!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F660cb80e-89a7-49ee-bf73-039cc525b279_614x131.png 1272w, https://substackcdn.com/image/fetch/$s_!Oqop!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F660cb80e-89a7-49ee-bf73-039cc525b279_614x131.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong>Process:</strong><br>Before sending data, TCP establishes a connection between two devices using something called a <strong>three-way handshake</strong>:</p><ol><li><p><strong>SYN</strong> &#8594; Client wants to start communication</p></li><li><p><strong>SYN-ACK</strong> &#8594; Server acknowledges</p></li><li><p><strong>ACK</strong> &#8594; Client confirms</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vDqV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vDqV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 424w, https://substackcdn.com/image/fetch/$s_!vDqV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 848w, https://substackcdn.com/image/fetch/$s_!vDqV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 1272w, https://substackcdn.com/image/fetch/$s_!vDqV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vDqV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png" width="936" height="799" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/df82f607-1688-4526-9de8-05cea52e8386_936x799.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:799,&quot;width&quot;:936,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:86187,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/188384153?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vDqV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 424w, https://substackcdn.com/image/fetch/$s_!vDqV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 848w, https://substackcdn.com/image/fetch/$s_!vDqV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 1272w, https://substackcdn.com/image/fetch/$s_!vDqV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf82f607-1688-4526-9de8-05cea52e8386_936x799.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Once the connection is established, data can be transmitted reliably. <strong>TCP ensures that:</strong></p><ul><li><p>Packets arrive in the correct order</p></li><li><p>Missing packets are retransmitted</p></li><li><p>Communication is stable</p></li></ul><p><strong>Understanding TCP helps you understand:</strong></p><ul><li><p>Port scanning</p></li><li><p>Network connections</p></li><li><p>Session hijacking</p></li><li><p>SYN flood attacks (DoS)</p></li><li><p>Firewall behavior</p></li></ul><p>If you don&#8217;t understand TCP, you don&#8217;t really understand how systems communicate.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Subscribe</strong> today and get the <a href="https://decodedsecurity.gumroad.com/l/InterviewGuide">Cybersecurity Interview Cheat Sheet</a> for FREE as a welcome gift!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><br>UDP (User Datagram Protocol)</h2><p><strong>Layer:</strong> Transport Layer (Layer 4 &#8212; ISO/OSI model, Layer 3 &#8212; TCP/IP model)</p><p><strong>Function:</strong><br>Provides fast, connectionless data transmission without reliability guarantees.</p><p><strong>Process:</strong><br>Unlike TCP, UDP does <strong>not</strong> establish a connection before sending data.</p><p>It simply sends packets (called <strong>datagrams</strong>) to the destination <strong>without</strong>:</p><ul><li><p>Acknowledgments</p></li><li><p>Retransmissions</p></li><li><p>Ordering guarantees</p></li></ul><p>This makes UDP much faster, but less reliable. (SEND AND HOPE)</p><p><strong>Why it matters to cybersecurity:</strong></p><p>UDP is commonly used in:</p><ul><li><p>DNS</p></li><li><p>Video streaming</p></li><li><p>Online gaming</p></li><li><p>VoIP</p></li></ul><p>It is also heavily abused in <strong>DDoS amplification attacks</strong> because attackers can send large volumes of traffic quickly.</p><p>Understanding UDP explains why some attacks can generate massive traffic and overwhelm systems.</p><div class="pullquote"><p>If you want know more about differences between UDP and TCP, let me know in the comments!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/top-5-most-important-network-protocols/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/top-5-most-important-network-protocols/comments"><span>Leave a comment</span></a></p></div><h2>SMTP (Simple Mail Transfer Protocol)</h2><p><strong>Layer:</strong> Application Layer (Layer 7 &#8212; ISO/OSI model, Layer 4 &#8212; TCP/IP model)</p><p><strong>Function:</strong><br>Used to send emails between mail servers and from clients to servers.</p><blockquote><p>SMTP is curerntly a standard for transferring email messages.</p></blockquote><p><strong>Process:</strong></p><ol><li><p>A user sends an email from their email client.</p></li><li><p>The email is transferred to a mail server using SMTP.</p></li><li><p>The server forwards the message to the recipient&#8217;s mail server.</p></li><li><p><strong>The recipient retrieves it using another protocol</strong> (like IMAP or POP3). - <strong>DIFFERENT PROTOCOL</strong> </p></li></ol><p>SMTP was originally designed without strong security, which is why additional protections were later added (SPF, DKIM, DMARC).</p><p><strong>Why it matters to cybersecurity:</strong></p><p>Email is the <strong>number one attack vector</strong> in cybersecurity.</p><p>Understanding SMTP helps you understand:</p><ul><li><p>Phishing attacks</p></li><li><p>Email spoofing</p></li><li><p>Malware delivery</p></li><li><p>Business Email Compromise (BEC)</p></li><li><p>Email authentication mechanisms</p></li></ul><p><strong>If you work in security, you will deal with email threats constantly. </strong></p><p><strong>Example:</strong><br>Sending an email from Gmail or Outlook.</p><h2>FTP (File Transfer Protocol)</h2><p><strong>Layer:</strong> Application Layer (Layer 7 &#8212; ISO/OSI model, Layer 4 &#8212; TCP/IP model)</p><p><strong>Function:</strong><br>FTP allows efficient uploading and downloading of files between hosts.</p><p><strong>Process:</strong></p><p><strong>FTP uses two separate connections:</strong></p><ul><li><p>A control connection (commands)</p></li><li><p>A data connection (file transfer)</p></li></ul><p>Traditional FTP does <strong>not encrypt</strong> communication, meaning:</p><ul><li><p>Usernames</p></li><li><p>Passwords</p></li><li><p>Files</p></li></ul><p>can be intercepted.</p><p><strong>Because of this, secure alternatives were created:</strong></p><ul><li><p><strong>SFTP</strong> (SSH File Transfer Protocol)</p></li><li><p><strong>FTPS</strong> (FTP over TLS)</p></li></ul><p><strong>Why it matters to cybersecurity:</strong></p><p>FTP is a classic example of an <strong>insecure legacy protocol</strong> still found in many environments.</p><p><strong>Security professionals need to understand it because:</strong></p><ul><li><p>Credentials can be captured easily</p></li><li><p>Servers are often misconfigured</p></li><li><p>Attackers frequently scan for exposed FTP services</p></li></ul><p><strong>It teaches an important lesson:</strong></p><blockquote><p>Just because a protocol exists doesn&#8217;t mean it is secure.</p></blockquote><p><strong>Example:</strong><br>Uploading files to a web hosting server.</p><p><strong>Great! Let&#8217;s sum it all up now.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Lv3i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17daa30d-5d6e-42c2-8005-222b214499b4_743x266.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Lv3i!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17daa30d-5d6e-42c2-8005-222b214499b4_743x266.png 424w, https://substackcdn.com/image/fetch/$s_!Lv3i!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17daa30d-5d6e-42c2-8005-222b214499b4_743x266.png 848w, https://substackcdn.com/image/fetch/$s_!Lv3i!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17daa30d-5d6e-42c2-8005-222b214499b4_743x266.png 1272w, https://substackcdn.com/image/fetch/$s_!Lv3i!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17daa30d-5d6e-42c2-8005-222b214499b4_743x266.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Lv3i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17daa30d-5d6e-42c2-8005-222b214499b4_743x266.png" width="743" height="266" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/17daa30d-5d6e-42c2-8005-222b214499b4_743x266.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:266,&quot;width&quot;:743,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:19164,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/188384153?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17daa30d-5d6e-42c2-8005-222b214499b4_743x266.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Lv3i!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17daa30d-5d6e-42c2-8005-222b214499b4_743x266.png 424w, https://substackcdn.com/image/fetch/$s_!Lv3i!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17daa30d-5d6e-42c2-8005-222b214499b4_743x266.png 848w, https://substackcdn.com/image/fetch/$s_!Lv3i!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17daa30d-5d6e-42c2-8005-222b214499b4_743x266.png 1272w, https://substackcdn.com/image/fetch/$s_!Lv3i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17daa30d-5d6e-42c2-8005-222b214499b4_743x266.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Are you preparing for your first <strong>Cybersecurity interview</strong>? Subscribe to <strong>Decoded Security</strong> and let&#8217;s get you ready!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>What now?</h2><p>If you&#8217;re reading this, congratulations.</p><p>Understanding these protocols is a great start and absolutely crucial for certification exams such as <strong>CC, Security+, or CISSP</strong>.</p><p>More importantly, it means you&#8217;re beginning to understand how systems actually communicate, and that&#8217;s the foundation of <strong>cybersecurity</strong>.</p><p><strong>I know it can feel overwhelming at times, so here are the key takeaways I want you to remember:</strong></p><ul><li><p>You don&#8217;t need to learn everything at once. Focus on the fundamentals first.</p></li><li><p>Most cyber attacks exploit <strong>communication</strong> between systems, networking knowledge gives you visibility into that.</p></li><li><p>TCP and UDP are crucial transport layer protocols. Make sure to understand the differences between them.</p></li><li><p>Make sure to understand at which ISO/OSI layer the protocol operates</p></li></ul><p><strong>If you master these basics, you&#8217;re already ahead of most people!</strong></p><p>Keep going.</p><p></p><h3><strong>Let&#8217;s connect</strong></h3><p>If you want to <strong>collaborate, discuss, or just geek out over virtualization and cloud security</strong>, reach out to me:</p><ul><li><p><strong>Email:</strong> erich.winkler@decodedsecurity.com</p></li><li><p><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/in/winkleri/">Erich Winkler</a></p></li><li><p><strong>Gumroad community: </strong><a href="https://decodedsecurity.gumroad.com/">Decoded Security</a></p></li><li><p><strong><a href="https://open.substack.com/pub/cybersecerich/p/start-here-decoded-security-roadmap?utm_campaign=post-expanded-share&amp;utm_medium=web">Start Here: Decoded Security Roadmap</a></strong></p></li></ul><p><strong>Enjoyed this article?</strong> Like it or drop a comment. I&#8217;d love to hear your thoughts and questions!</p><p>Let&#8217;s learn and grow together!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!am3M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23cedbd3-2b0a-44d1-b6e6-c9c56a8a3e46_1080x1350.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!am3M!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23cedbd3-2b0a-44d1-b6e6-c9c56a8a3e46_1080x1350.png 424w, https://substackcdn.com/image/fetch/$s_!am3M!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23cedbd3-2b0a-44d1-b6e6-c9c56a8a3e46_1080x1350.png 848w, https://substackcdn.com/image/fetch/$s_!am3M!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23cedbd3-2b0a-44d1-b6e6-c9c56a8a3e46_1080x1350.png 1272w, https://substackcdn.com/image/fetch/$s_!am3M!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23cedbd3-2b0a-44d1-b6e6-c9c56a8a3e46_1080x1350.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!am3M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23cedbd3-2b0a-44d1-b6e6-c9c56a8a3e46_1080x1350.png" width="1080" height="1350" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/23cedbd3-2b0a-44d1-b6e6-c9c56a8a3e46_1080x1350.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1350,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:205923,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/188384153?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23cedbd3-2b0a-44d1-b6e6-c9c56a8a3e46_1080x1350.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!am3M!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23cedbd3-2b0a-44d1-b6e6-c9c56a8a3e46_1080x1350.png 424w, https://substackcdn.com/image/fetch/$s_!am3M!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23cedbd3-2b0a-44d1-b6e6-c9c56a8a3e46_1080x1350.png 848w, https://substackcdn.com/image/fetch/$s_!am3M!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23cedbd3-2b0a-44d1-b6e6-c9c56a8a3e46_1080x1350.png 1272w, https://substackcdn.com/image/fetch/$s_!am3M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F23cedbd3-2b0a-44d1-b6e6-c9c56a8a3e46_1080x1350.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Top 5 Linux commands for an entry-level cybersecurity role]]></title><description><![CDATA[Do you want to land a job in cybersecurity, but everyone requires "Linux proficiency"? You don&#8217;t need 1,000 Linux commands. You need the 5 that actually show up in real security work. Let me show you!]]></description><link>https://www.decodedsecurity.com/p/top-5-linux-command-for-an-entry</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/top-5-linux-command-for-an-entry</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Thu, 12 Feb 2026 00:01:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6800fa08-1136-4808-8c1f-79d56f028721_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Here&#8217;s the hard truth:</strong><br>If you want your first job in cybersecurity, you need to know the basics of Linux.</p><p>That&#8217;s <strong>non-negotiable</strong>.<br>And no cybersecurity certificate will save you from it.</p><p>There are over <strong>1,000 Linux commands</strong>, more than anyone can realistically learn.</p><p>The good news?<br>You don&#8217;t need to.</p><p>You don&#8217;t need to be a Linux wizard.<br>You need a <strong>small, job-relevant subset</strong> of commands.</p><p>The bad news?<br>Figuring out <em>which ones</em> to learn is hard, especially when you&#8217;re learning on your own.</p><p>I remember struggling in the terminal, running &#8220;advanced&#8221; commands while not even knowing how to list files in my current directory.</p><p>I want to help you avoid that.</p><p>Here are <strong>5 Linux commands you&#8217;ll use constantly</strong> in your first cybersecurity role.</p><p><strong>Let&#8217;s get to it.</strong></p><div class="pullquote"><p>If you&#8217;re new to Linux and don&#8217;t even know how to start it on your own computer, drop a comment below.</p><p>I&#8217;ll reply with a simple, beginner-friendly way to get started, no prior experience needed.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/top-5-linux-command-for-an-entry/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.decodedsecurity.com/p/top-5-linux-command-for-an-entry/comments"><span>Leave a comment</span></a></p></div><h2>Top 5 commands</h2><p>Is this everything you need to become an expert?</p><p>No.</p><p>But these commands give you something far more important than expertise: <strong>orientation</strong>.</p><p>They let you explore a Linux system on your own, files, processes, and the network, without feeling lost.</p><p>And that matters, because in cybersecurity, learning doesn&#8217;t happen by staring at a black screen.<br>It happens by <strong>trying things, breaking things, and understanding what you see</strong>.</p><p>This is where that starts.</p><h3>1. List files and directories</h3><p><strong>Command:</strong> ls</p><p><strong>Purpose:</strong> Show what files and directories exist in a given location.</p><p><strong>Useful arguments:</strong></p><ul><li><p><code>-l</code>: Shows detailed information: permissions, owner, group, size, and timestamps.</p></li><li><p><code>-a: </code>Includes hidden files (those starting with <code>.</code>).</p></li><li><p><code>-h: </code>Displays file sizes in human-readable format (KB, MB, GB).</p></li><li><p><code>-la: </code>The most commonly used combination. Shows <strong>everything</strong>, with full details.</p></li></ul><p><strong>Example of usage:</strong> You enter a directory you don&#8217;t recognize and want to see <strong>everything</strong> inside it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!s732!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8ade43-defd-4663-8661-0e9995c71ec6_2764x1084.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!s732!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8ade43-defd-4663-8661-0e9995c71ec6_2764x1084.png 424w, https://substackcdn.com/image/fetch/$s_!s732!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8ade43-defd-4663-8661-0e9995c71ec6_2764x1084.png 848w, https://substackcdn.com/image/fetch/$s_!s732!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8ade43-defd-4663-8661-0e9995c71ec6_2764x1084.png 1272w, https://substackcdn.com/image/fetch/$s_!s732!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8ade43-defd-4663-8661-0e9995c71ec6_2764x1084.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!s732!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8ade43-defd-4663-8661-0e9995c71ec6_2764x1084.png" width="1456" height="571" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b8ade43-defd-4663-8661-0e9995c71ec6_2764x1084.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:571,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!s732!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8ade43-defd-4663-8661-0e9995c71ec6_2764x1084.png 424w, https://substackcdn.com/image/fetch/$s_!s732!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8ade43-defd-4663-8661-0e9995c71ec6_2764x1084.png 848w, https://substackcdn.com/image/fetch/$s_!s732!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8ade43-defd-4663-8661-0e9995c71ec6_2764x1084.png 1272w, https://substackcdn.com/image/fetch/$s_!s732!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8ade43-defd-4663-8661-0e9995c71ec6_2764x1084.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>2. Change directories</h3><p><strong>Command:</strong> <code>cd</code></p><p><strong>Purpose: </strong>Move between directories in the Linux filesystem.<br><strong>Useful arguments:</strong></p><ul><li><p><code>cd /path/to/directory </code></p><ul><li><p>Move directly to a specific location.</p></li></ul></li><li><p><code>cd ..</code></p><ul><li><p>Move one directory up.</p></li></ul></li><li><p><code>cd ~</code></p><ul><li><p>Jump to your home directory.</p></li></ul></li><li><p><code>cd -</code></p><ul><li><p>Switch back to the previous directory.</p></li></ul></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QWLM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3a5111e-f851-4106-994a-9fdda835cf91_1716x999.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QWLM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3a5111e-f851-4106-994a-9fdda835cf91_1716x999.png 424w, https://substackcdn.com/image/fetch/$s_!QWLM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3a5111e-f851-4106-994a-9fdda835cf91_1716x999.png 848w, https://substackcdn.com/image/fetch/$s_!QWLM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3a5111e-f851-4106-994a-9fdda835cf91_1716x999.png 1272w, https://substackcdn.com/image/fetch/$s_!QWLM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3a5111e-f851-4106-994a-9fdda835cf91_1716x999.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QWLM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3a5111e-f851-4106-994a-9fdda835cf91_1716x999.png" width="1456" height="848" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a3a5111e-f851-4106-994a-9fdda835cf91_1716x999.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:848,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:133220,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecerich.substack.com/i/187010228?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3a5111e-f851-4106-994a-9fdda835cf91_1716x999.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QWLM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3a5111e-f851-4106-994a-9fdda835cf91_1716x999.png 424w, https://substackcdn.com/image/fetch/$s_!QWLM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3a5111e-f851-4106-994a-9fdda835cf91_1716x999.png 848w, https://substackcdn.com/image/fetch/$s_!QWLM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3a5111e-f851-4106-994a-9fdda835cf91_1716x999.png 1272w, https://substackcdn.com/image/fetch/$s_!QWLM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3a5111e-f851-4106-994a-9fdda835cf91_1716x999.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>When to use - example:</strong></p><p>You need to check the log files located in &#8220;/var/log&#8221;.</p><pre><code><code>cd /var/log</code></code></pre><p>This moves you straight to the logs so you can continue your investigation. Then you can run the &#8220;ls&#8221; command to see all the files in the directory.</p><blockquote><p>Do you want to learn more about Linux commands? Let me know in the comments!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/top-5-linux-command-for-an-entry/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/top-5-linux-command-for-an-entry/comments"><span>Leave a comment</span></a></p></blockquote><h2>3. Copy and move files</h2><p><strong>Commands:</strong> <code>cp</code>, <code>mv</code></p><p><strong>Purpose:</strong><br>Copy or move files and directories.</p><p><strong>Useful arguments:</strong></p><h3><code>cp</code> (copy)</h3><ul><li><p><code>cp file1 file2</code><br>Copy a file to a new location or name.</p></li><li><p><code>cp -r directory/ destination/</code><br>Copy directories recursively.</p></li></ul><h3><code>mv</code> (move / rename)</h3><ul><li><p><code>mv file destination/</code><br>Move a file to a different directory.</p></li><li><p><code>mv oldname newname</code><br>Rename a file.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!l_QP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d8cde40-124e-42b6-a2c7-563a378ee85e_1352x1191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!l_QP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d8cde40-124e-42b6-a2c7-563a378ee85e_1352x1191.png 424w, https://substackcdn.com/image/fetch/$s_!l_QP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d8cde40-124e-42b6-a2c7-563a378ee85e_1352x1191.png 848w, https://substackcdn.com/image/fetch/$s_!l_QP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d8cde40-124e-42b6-a2c7-563a378ee85e_1352x1191.png 1272w, https://substackcdn.com/image/fetch/$s_!l_QP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d8cde40-124e-42b6-a2c7-563a378ee85e_1352x1191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!l_QP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d8cde40-124e-42b6-a2c7-563a378ee85e_1352x1191.png" width="1352" height="1191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4d8cde40-124e-42b6-a2c7-563a378ee85e_1352x1191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1191,&quot;width&quot;:1352,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:104270,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecerich.substack.com/i/187010228?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d8cde40-124e-42b6-a2c7-563a378ee85e_1352x1191.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!l_QP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d8cde40-124e-42b6-a2c7-563a378ee85e_1352x1191.png 424w, https://substackcdn.com/image/fetch/$s_!l_QP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d8cde40-124e-42b6-a2c7-563a378ee85e_1352x1191.png 848w, https://substackcdn.com/image/fetch/$s_!l_QP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d8cde40-124e-42b6-a2c7-563a378ee85e_1352x1191.png 1272w, https://substackcdn.com/image/fetch/$s_!l_QP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d8cde40-124e-42b6-a2c7-563a378ee85e_1352x1191.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Example: Move a file to another directory</strong></p><p>You&#8217;re in your home directory and want to move a file into a log-analysis folder.</p><pre><code><code>mv suspicious.log /var/log/analysis/</code></code></pre><h3>4. Delete files and directories</h3><p><strong>Command:</strong> <code>rm</code></p><p><strong>Purpose:</strong><br>Delete files or directories from the system.</p><p><strong>Useful arguments:</strong></p><ul><li><p><code>rm file.txt</code><br>Delete a single file.</p></li><li><p><code>rm -i file.txt</code><br>Ask for confirmation before deleting &#8212; <strong>recommended for beginners</strong>.</p></li><li><p><code>rm -r directory/</code><br>Delete a directory and its contents recursively.</p></li><li><p><code>rm -f file.txt</code><br>Force deletion without prompts (dangerous if misused).</p></li></ul><blockquote><p><strong>Warning: There is no built-in &#8220;undo&#8221; for </strong><code>rm</code><strong>.</strong></p></blockquote><p><strong>When to use &#8211; example:</strong></p><p>You created a temporary copy of a file for testing and no longer need it.</p><pre><code><code>rm -i test_copy.log</code></code></pre><h3>5. View file contents</h3><p><strong>Command:</strong> <code>cat</code></p><p><strong>Purpose:</strong><br>Display the contents of a file directly in the terminal.<br>In cybersecurity, this is how you <strong>quickly inspect logs, configs, and scripts</strong>.</p><p><strong>Useful arguments:</strong></p><ul><li><p><code>cat file.txt</code><br>Show the full contents of a file.</p></li><li><p><code>cat -n file.txt</code><br>Display line numbers &#8212; helpful when reviewing scripts or configs.</p></li><li><p><code>cat file1 file2</code><br>View multiple files in sequence.</p></li></ul><blockquote><p><strong>Warning:</strong> Use only for small files</p></blockquote><p><strong>When to use &#8211; example:</strong></p><p>You copied a configuration file and want to quickly check what&#8217;s inside.</p><pre><code><code>cat -n sshd_config</code></code></pre><div class="pullquote"><p>Do you want to learn how to set up a test environment in Docker in under 5 minutes?</p><p>Comment &#8220;Docker&#8221; and I will point you in the right direction.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/top-5-linux-command-for-an-entry/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/top-5-linux-command-for-an-entry/comments"><span>Leave a comment</span></a></p></div><h2>What now?</h2><p>If you know how to use these commands, you&#8217;re no longer &#8220;bad at Linux.&#8221;</p><p>This is how you start. </p><p><strong>You can:</strong></p><ul><li><p>See what files are in the directory</p></li><li><p>Move between directories </p></li><li><p>Copy and move files safely</p></li><li><p>Read short configuration files</p></li></ul><p>That&#8217;s enough to start learning <strong>for real</strong>.</p><p>Linux commands aren&#8217;t something you can memorize. </p><p>You need to practice. </p><p>That&#8217;s how you get better. </p><p>If you want help setting up a <strong>safe practice environment</strong> or learning what to explore next, comment &#8220;Linux&#8221;! </p><p><strong>I&#8217;ll point you in the right direction.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/top-5-linux-command-for-an-entry/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/top-5-linux-command-for-an-entry/comments"><span>Leave a comment</span></a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to <strong>Decoded Security</strong> for Free and become a cybersecurity professional even without a degree!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>Let&#8217;s connect</strong></h3><p>If you want to <strong>collaborate, discuss, or just geek out over virtualization and cloud security</strong>, reach out to me:</p><ul><li><p><strong>Email:</strong> erich.winkler@decodedsecurity.com</p></li><li><p><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/in/winkleri/">Erich Winkler</a></p></li><li><p><strong>Gumroad community: </strong><a href="https://decodedsecurity.gumroad.com/">Decoded Security</a></p></li><li><p><strong><a href="https://open.substack.com/pub/cybersecerich/p/start-here-decoded-security-roadmap?utm_campaign=post-expanded-share&amp;utm_medium=web">Start Here: Decoded Security Roadmap</a></strong></p></li></ul><p><strong>Enjoyed this article?</strong> Like it or drop a comment. I&#8217;d love to hear your thoughts and questions!</p><p>Let&#8217;s learn and grow together!</p><p><br></p>]]></content:encoded></item><item><title><![CDATA[This Is How I Explain DNS To Beginners]]></title><description><![CDATA[DNS is a foundational part of today&#8217;s internet. Like it or not, if you want to become a cybersecurity professional, you need to understand networking. So let&#8217;s break it down.]]></description><link>https://www.decodedsecurity.com/p/this-is-how-i-explain-dns-to-beginners</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/this-is-how-i-explain-dns-to-beginners</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Wed, 04 Feb 2026 21:01:15 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/fcef5240-a1b1-436f-a505-9aae44284cd9_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I have to confess something here. For years, I didn&#8217;t know how DNS (Domain Name Server) actually works.</p><p>I simply went with that one simple sentence: it translates IP addresses to domain names and vice versa. Magic sentence that means nothing. </p><blockquote><p><strong>If that&#8217;s you, give me a like so I know I am not the only one in the world!</strong></p></blockquote><p>And let&#8217;s be honest, it was enough. But then I wanted to switch to cybersecurity, and this lack of knowledge about such a crucial system started to really slow me down.</p><p>DNS components&#8230;no idea.</p><p>DNS record types&#8230;I believe there is something like&#8230; A?</p><p>And the worst part?</p><p>Every time you ask someone how it works, they immediately jump into some random detail.</p><p>Really&#8230; go and ask someone how DNS works.</p><p>The answer will probably look like this:</p><p>&#8220;It translates IP addresses to domain names. And there is a recursive resolver, which can be vulnerable to DNS amplification attacks. That is a huge problem because it can overload the whole infrastructure&#8230;&#8221;</p><p><strong>Do you know how DNS works now?</strong></p><p>No?</p><p>I didn&#8217;t either.</p><p>And the funny thing is, it&#8217;s actually really simple.</p><p><strong>So let me show you. </strong></p><blockquote><p><strong>Warning: CC and CISSP relevant topic!</strong></p></blockquote><h1>DNS - Basic Concept</h1><p>Let&#8217;s start from the beginning. </p><p>DNS is often called the <strong>Internet&#8217;s phonebook</strong>. But what does it mean?</p><p><strong>It&#8217;s simple:</strong> if you want to connect to a website, you need to know its IP address, not its name.</p><p>There is no such thing as Google.com or YouTube.com. </p><p>But imagine you&#8217;d have to type 142.250.74.14 every time you want to connect to Google. That would make things really complicated.  </p><p>DNS simply translates it for us, stupid humans who can&#8217;t remember a bunch of numbers.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eyPV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63deec53-525a-4cd9-b887-0090318485e3_1080x663.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eyPV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63deec53-525a-4cd9-b887-0090318485e3_1080x663.png 424w, https://substackcdn.com/image/fetch/$s_!eyPV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63deec53-525a-4cd9-b887-0090318485e3_1080x663.png 848w, https://substackcdn.com/image/fetch/$s_!eyPV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63deec53-525a-4cd9-b887-0090318485e3_1080x663.png 1272w, https://substackcdn.com/image/fetch/$s_!eyPV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63deec53-525a-4cd9-b887-0090318485e3_1080x663.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eyPV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63deec53-525a-4cd9-b887-0090318485e3_1080x663.png" width="1080" height="663" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/63deec53-525a-4cd9-b887-0090318485e3_1080x663.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:663,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:79203,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecerich.substack.com/i/186845933?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96c1141d-2ecf-491a-9815-a3434a1d1041_1080x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eyPV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63deec53-525a-4cd9-b887-0090318485e3_1080x663.png 424w, https://substackcdn.com/image/fetch/$s_!eyPV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63deec53-525a-4cd9-b887-0090318485e3_1080x663.png 848w, https://substackcdn.com/image/fetch/$s_!eyPV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63deec53-525a-4cd9-b887-0090318485e3_1080x663.png 1272w, https://substackcdn.com/image/fetch/$s_!eyPV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63deec53-525a-4cd9-b887-0090318485e3_1080x663.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p>Did you learn something new? Give me a like so I can teach you more!</p></blockquote><h2>DNS process (simplified)</h2><p>Okay, now we know what DNS is supposed to do. </p><p>Now, let&#8217;s take a look at what actually happens when you type google.com in your browser.</p><p><strong>Here&#8217;s the simplified process:</strong></p><ol><li><p>You type a domain name</p></li><li><p>Resolver checks the HOSTS file</p></li><li><p>Checks cache</p></li><li><p>If not found &#8594; asks DNS server</p></li><li><p>Gets IP address</p></li><li><p>Browser connects</p></li></ol><p>I bet you have a couple of questions now. What is the Resolver? What is the HOSTS file? </p><p>Let me explain that.</p><blockquote><p>Do you find this article interesting? <strong>Give it a like!</strong> It helps me understand what should I focus on! </p></blockquote><h2>DNS lookup (less simplified)</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hLM0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5bf07a-08f0-42ce-9e00-76df5daabc25_2324x1604.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hLM0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5bf07a-08f0-42ce-9e00-76df5daabc25_2324x1604.png 424w, https://substackcdn.com/image/fetch/$s_!hLM0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5bf07a-08f0-42ce-9e00-76df5daabc25_2324x1604.png 848w, https://substackcdn.com/image/fetch/$s_!hLM0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5bf07a-08f0-42ce-9e00-76df5daabc25_2324x1604.png 1272w, https://substackcdn.com/image/fetch/$s_!hLM0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5bf07a-08f0-42ce-9e00-76df5daabc25_2324x1604.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hLM0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5bf07a-08f0-42ce-9e00-76df5daabc25_2324x1604.png" width="1456" height="1005" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2f5bf07a-08f0-42ce-9e00-76df5daabc25_2324x1604.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1005,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hLM0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5bf07a-08f0-42ce-9e00-76df5daabc25_2324x1604.png 424w, https://substackcdn.com/image/fetch/$s_!hLM0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5bf07a-08f0-42ce-9e00-76df5daabc25_2324x1604.png 848w, https://substackcdn.com/image/fetch/$s_!hLM0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5bf07a-08f0-42ce-9e00-76df5daabc25_2324x1604.png 1272w, https://substackcdn.com/image/fetch/$s_!hLM0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5bf07a-08f0-42ce-9e00-76df5daabc25_2324x1604.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>DNS process:</strong></p><h4><strong>Step 1: Check the HOSTS file </strong></h4><ul><li><p><strong>HOSTS file: </strong>This is a small local text file with manual mappings.</p></li><li><p>Example: 192.168.1.50   example.com</p></li><li><p><strong>If found: </strong></p><ul><li><p>process stops</p></li><li><p>no DNS request</p></li><li><p>browser connects immediately</p></li></ul></li></ul><h4><strong>Step 2: Check local DNS cache (Not important now) </strong></h4><p>If the desired information isn&#8217;t in the HOSTS file, then the system checks the DNS Cache. </p><h4><strong>Step 3: Query sent to recursive resolver</strong></h4><p>You type <strong>example.com</strong>.</p><p>The request goes to a <strong>DNS resolver</strong></p><p>The resolver sends requests to the DNS servers, not you. </p><h4><strong>Step 4: Resolver asks a root nameserver</strong></h4><p>The resolver contacts a <strong>root nameserver (.)</strong>.</p><p>Root servers don&#8217;t know the IP.</p><p><strong>They only know:</strong> Which Top-Level Domain (TLD) server to ask next?</p><h4><strong>Step 5: Root responds with the TLD server</strong></h4><p>The root server replies:</p><blockquote><p>&#8220;Ask the .com nameserver.&#8221;</p></blockquote><p>So now the resolver knows where to go next.</p><h4><strong>Step 6: Resolver asks the TLD nameserver</strong></h4><p>The resolver queries the <strong>.com TLD server</strong>.</p><p>This server manages all <strong>.com domains</strong>.</p><p>It still doesn&#8217;t know the final IP.</p><h4><strong>Step 7: TLD returns authoritative nameserver</strong></h4><p>The TLD replies:</p><blockquote><p>&#8220;The authoritative nameserver for example.com is ns1.example.com.&#8221;</p></blockquote><p>Now we&#8217;re getting closer.</p><h4><strong>Step 8: Resolver asks the authoritative nameserver</strong></h4><p>The resolver contacts the <strong>authoritative nameserver</strong>.</p><p>This is the server that actually owns the domain&#8217;s records.</p><p>This server finally knows the answer.</p><h4><strong>Step 9: The Authoritative server returns the IP</strong></h4><p><strong>It responds:</strong></p><pre><code><code>example.com &#8594; 93.184.216.34
</code></code></pre><p>This is the real IP address.</p><h4><strong>Step 10: Resolver returns the answer to your browser</strong></h4><p>The resolver:</p><ul><li><p>sends the IP back to your computer</p></li><li><p>caches it for future use</p></li></ul><p><strong>Your browser now knows where to connect.</strong></p><p>DNS lookup is DONE! </p><h2>Super short recap of the process</h2><p><strong>Here&#8217;s the entire lookup again in 10 seconds:</strong></p><ol><li><p>Check the HOSTS file</p></li><li><p>Check cache</p></li><li><p>Ask resolver</p></li><li><p>Root &#8594; TLD</p></li><li><p>TLD &#8594; authoritative server</p></li><li><p>Get IP</p></li><li><p>Browser connects</p></li></ol><p>Done.</p><p>Milliseconds.</p><p>Thousands of times per day.</p><p>You just never noticed.</p><h2>Conclusion</h2><p>Congratulations! Now you understand how DNS works! Well, at least the basics! </p><p>There are many topics we need to go through! </p><p>Next time, we will go through different kinds of DNS and why it all matters from a cybersecurity perspective! Because, like it or not, you need to know these things to become a cybersecurity professional.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe today for FREE and get the <a href="https://decodedsecurity.gumroad.com/l/InterviewGuide">Cybersecurity Interview Cheat Sheet</a> for FREE as a welcome gift!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Start Here: Decoded Security Roadmap]]></title><description><![CDATA[Confused about cybersecurity careers or certifications? This guide helps you start, choose the right path, and move faster toward your first or next role in cybersecurity.]]></description><link>https://www.decodedsecurity.com/p/start-here-decoded-security-roadmap</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/start-here-decoded-security-roadmap</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Fri, 30 Jan 2026 09:42:18 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/7381d942-e5e4-4147-8cfe-e6512c898096_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bTmR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4f60ab5-2e31-4527-9ac1-6278b661c84d_1800x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bTmR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4f60ab5-2e31-4527-9ac1-6278b661c84d_1800x600.png 424w, https://substackcdn.com/image/fetch/$s_!bTmR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4f60ab5-2e31-4527-9ac1-6278b661c84d_1800x600.png 848w, https://substackcdn.com/image/fetch/$s_!bTmR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4f60ab5-2e31-4527-9ac1-6278b661c84d_1800x600.png 1272w, https://substackcdn.com/image/fetch/$s_!bTmR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4f60ab5-2e31-4527-9ac1-6278b661c84d_1800x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bTmR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4f60ab5-2e31-4527-9ac1-6278b661c84d_1800x600.png" width="1456" height="485" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e4f60ab5-2e31-4527-9ac1-6278b661c84d_1800x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:485,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:394676,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.decodedsecurity.com/i/186084799?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4f60ab5-2e31-4527-9ac1-6278b661c84d_1800x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bTmR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4f60ab5-2e31-4527-9ac1-6278b661c84d_1800x600.png 424w, https://substackcdn.com/image/fetch/$s_!bTmR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4f60ab5-2e31-4527-9ac1-6278b661c84d_1800x600.png 848w, https://substackcdn.com/image/fetch/$s_!bTmR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4f60ab5-2e31-4527-9ac1-6278b661c84d_1800x600.png 1272w, https://substackcdn.com/image/fetch/$s_!bTmR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4f60ab5-2e31-4527-9ac1-6278b661c84d_1800x600.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>Cybersecurity is one of the best career opportunities today.</strong></p><p>But starting is confusing.</p><p>Too many roles.<br>Too many certifications.<br>Too many opinions online.</p><p><strong>Decoded Security exists to make cybersecurity understandable and help you move forward faster.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe today for FREE and get the <a href="https://decodedsecurity.gumroad.com/l/InterviewGuide">Cybersecurity Interview Cheat Sheet</a> for FREE as a welcome gift!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p>Here you&#8217;ll find practical guidance, career insights, and learning resources that help you:</p><ul><li><p>Break into cybersecurity</p></li><li><p>Choose the right career path</p></li><li><p>Prepare for interviews and certifications</p></li><li><p>Understand complex topics in plain English</p></li><li><p>Connect with others entering the field</p></li></ul><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/start-here-decoded-security-roadmap?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Do you know anyone who might find this useful? Send it their way!</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/start-here-decoded-security-roadmap?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/start-here-decoded-security-roadmap?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h3>Who Is Decoded Security For?</h3><p><strong>Decoded Security helps:</strong></p><p>&#9989; People trying to break into cybersecurity<br>&#9989; Professionals preparing for their first cybersecurity job<br>&#9989; Software developers switching to cybersecurity<br>&#9989; Certification candidates (CC, Security+, CISSP and others)<br>&#9989; Anyone wanting practical cybersecurity knowledge without academic fluff</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to Decoded Security and take your first step into cybersecurity today.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Where should I start?</h3><p>Your starting point depends on your goal. Here are recommended entry points.</p><h4><strong>If you&#8217;re new to cybersecurity</strong></h4><p><strong>Start with Foundation:</strong></p><ol><li><p><a href="https://cybersecerich.substack.com/p/threat-risk-vulnerability-why-cissp?r=4abibl">Threat &#8800; Risk &#8800; Vulnerability: Why CISSP Basics Matter More Than You Think</a></p></li><li><p><strong><a href="https://cybersecerich.substack.com/p/my-first-week-of-cissp-prep-what?r=4abibl">My First Week of CISSP Prep &#8211; What I&#8217;ve Learned So Far</a></strong></p></li><li><p><a href="https://cybersecerich.substack.com/p/security-policies-standards-and-procedures?r=4abibl">Security Policies, Standards, and Procedures: The Boring Stuff That Actually Saves You</a></p></li><li><p><strong><a href="https://cybersecerich.substack.com/p/cybersecurity-controls-from-zero?r=4abibl">Cybersecurity Controls from Zero to Hero</a></strong></p></li></ol><h4>If you're a software developer switching careers</h4><p>Avoid starting from zero:</p><ol><li><p><a href="https://cybersecerich.substack.com/p/5-specific-steps-for-software-developers?r=4abibl">5 Specific Steps For Software Developers To Get a Job in Cybersecurity In 6 Months Without Starting Over</a></p></li><li><p><strong><a href="https://cybersecerich.substack.com/p/how-to-choose-the-right-cybersecurity?r=4abibl">How to Choose the Right Cybersecurity Role Before You Waste Time and Money on the Wrong Certifications</a></strong></p></li><li><p><strong><a href="https://cybersecerich.substack.com/p/why-good-engineers-fail-the-cissp?r=4abibl">Why good engineers fail the CISSP exam - and managers don&#8217;t</a></strong></p></li></ol><h4><strong>If you want your first cybersecurity job</strong></h4><p>Prepare smarter:</p><ol><li><p><a href="https://cybersecerich.substack.com/p/3-things-you-need-to-know-for-your?r=4abibl">3 Things You Need To Know For Your First Cybersecurity Interview</a></p></li><li><p><a href="https://cybersecerich.substack.com/p/6-myths-that-are-killing-corporate?r=4abibl">6 Myths That Are Killing Corporate Cybersecurity</a></p></li><li><p><a href="https://cybersecerich.substack.com/p/how-to-choose-the-right-cybersecurity?r=4abibl">How to Choose the Right Cybersecurity Role Before You Waste Time and Money on the Wrong Certifications</a></p></li></ol><h4>If you're preparing for certifications</h4><p><strong>Useful for CC, Security+, CISSP and similar exams:</strong></p><ol><li><p><a href="https://cybersecerich.substack.com/p/the-8-security-principles-every-cissp?r=4abibl">The 8 Security Principles Every CISSP Candidate Thinks They Understand (Until They Don&#8217;t)</a></p></li><li><p><a href="https://cybersecerich.substack.com/p/15-laws-every-cissp-candidate-must?r=4abibl">15+ Laws Every CISSP Candidate Must Know: The Only Legal Guide You Need</a></p></li><li><p><a href="https://cybersecerich.substack.com/p/gdpr-explained-the-privacy-law-that?r=4abibl">GDPR Explained: The Privacy Law That Follows Your Data Everywhere</a></p></li><li><p><a href="https://cybersecerich.substack.com/p/the-final-goodbye-how-to-dispose?r=4abibl">The Final Goodbye: How to Dispose Data So It Never Comes Back</a></p></li></ol><p>These are just starting points. Explore and follow topics that match your goals!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Start your Cybersecurity Journey Today!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Who am I? </h3><p>I&#8217;m Erich, a <strong>CISSP-certified</strong> Cybersecurity Manager.</p><p>One of my biggest accomplishments is becoming a Cybersecurity Manager at 26 for an international company.</p><p>However, like most people, I didn&#8217;t start my career in cybersecurity with a <strong>perfect roadmap</strong>. </p><p>I used to be a Software Developer, having no idea how to break into such a complex field.</p><p>But over time, I started noticing patterns, and now that I know both sides of the hiring process, I am sharing my insights on how to speed up your career.</p><p>And now, I have decided to write about this journey and share things I wish I had known at the beginning.</p><p>And no, you don&#8217;t need a master&#8217;s degree for that.</p><p>Learn more <a href="https://cybersecerich.substack.com/about">here</a>.</p><div class="community-chat" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/cybersecerich/chat?utm_source=chat_embed&quot;,&quot;subdomain&quot;:&quot;cybersecerich&quot;,&quot;pub&quot;:{&quot;id&quot;:4708911,&quot;name&quot;:&quot;Decoded Security&quot;,&quot;author_name&quot;:&quot;Erich Winkler&quot;,&quot;author_photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!zLJJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb404eb9a-cceb-4d1d-86d2-e362bdf449fc_1024x1024.png&quot;}}" data-component-name="CommunityChatRenderPlaceholder"></div><h3>Decoded Security Story</h3><p>It&#8217;s been almost a year since I started this newsletter. Over time, I have published 60+ articles on cybersecurity topics, from the basics to advanced concepts. </p><p>But I didn&#8217;t stop there, I started sharing the insights that helped me become a cybersecurity manager at 26 years old - interview tips, frequent interview topics, and specific advice I wish I knew a couple of years back.</p><p>Once people started asking questions, I decided to help even more. I started creating quizzes, templates, and actionable checklists to help you solve the challenges people in cybersecurity face. </p><h3>What happens if I subscribe to Decoded Security?</h3><p>Decoded Security is primarily a free newsletter. </p><h3><strong>Free Subscription</strong></h3><ul><li><p>1 - 2 articles a week directly to your inbox about the following topics: </p><ul><li><p>Cybersecurity concepts that you need to know to get your first job in cybersecurity</p></li><li><p>Complex cybersecurity topics in plain English</p></li><li><p>Certification and interview tips</p></li><li><p>Real-world insights from the world of cybersecurity</p></li></ul></li><li><p>Various discounts on Decoded Security products</p></li><li><p>Cybersecurity quizzes where you can test your knowledge </p></li><li><p>Access to the Subscriber&#8217;s chat where I answer all your questions. </p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to Decoded Security for Free!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>Paid Subscription</strong></h3><h4>What you get:</h4><p><strong>&#128640; Exclusive Discord Community</strong><br>Connect with like-minded people, share progress, and learn faster together.</p><p><strong>&#128218; 50% discount on all Decoded Security products</strong><br>Get structured resources, templates, and guides at a fraction of the cost.</p><p><strong>&#9889; Free and early access to new materials</strong><br>Be the first to access new checklists, guides, and tools before anyone else.</p><p><strong>&#128172; Priority access to personal guidance (limited)</strong><br>Get direct support from me when you&#8217;re stuck.</p><ul><li><p>Ask career-related questions</p></li><li><p>Get direction on what to learn next</p></li><li><p>Avoid common mistakes that slow people down</p></li></ul><p><em>(Async support, limited capacity to ensure quality responses)</em></p><h3>Earn money with Decoded Security: Affiliate Program </h3><p>Earn <strong>30% commission</strong> on every product you promote.</p><ul><li><p>Share cybersecurity guides, templates, and courses</p></li><li><p>Get paid for every sale</p></li><li><p>No limits on earnings</p></li></ul><p>&#128073; <strong>Start here:</strong> <a href="https://www.decodedsecurity.com/p/invite-friends-earn-rewards">https://www.decodedsecurity.com/p/invite-friends-earn-rewards</a></p><h3>Decoded Security Materials</h3><p>I&#8217;ve created ebooks, templates, quizzes, and roadmaps to help people move faster in cybersecurity careers.</p><p>You can find all materials here: </p><ul><li><p><a href="https://decodedsecurity.gumroad.com/">Gumroad</a> </p></li><li><p><a href="https://cybersecerich.substack.com/p/test-your-cybersecurity-knowledge">Quiz hub</a> </p></li></ul><h3><strong>Let&#8217;s connect</strong></h3><p>If you want to <strong>collaborate, discuss, or just geek out over virtualization and cloud security</strong>, reach out to me:</p><ul><li><p><strong>Email:</strong> erich.winkler@decodedsecurity.com</p></li><li><p><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/in/winkleri/">Erich Winkler</a></p></li><li><p><strong>Gumroad community: </strong><a href="https://decodedsecurity.gumroad.com/">Decoded Security</a></p></li></ul><p><strong>Enjoyed this article?</strong> Like it or drop a comment. I&#8217;d love to hear your thoughts and questions!</p><p>Let&#8217;s learn and grow together!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/start-here-decoded-security-roadmap/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/start-here-decoded-security-roadmap/comments"><span>Leave a comment</span></a></p><p></p><p></p><p></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[The Incident Response Mistakes That End Interviews Early]]></title><description><![CDATA[If you&#8217;re preparing for CC or CISSP, incident response is one of those topics everyone thinks they understand, until the exam or interview question forces you to explain it clearly.]]></description><link>https://www.decodedsecurity.com/p/the-incident-response-mistakes-that</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/the-incident-response-mistakes-that</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Thu, 29 Jan 2026 06:01:30 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f5c7be70-c9df-45fa-a11c-1d8891e54a74_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you&#8217;re preparing for CC or CISSP, <strong>incident response</strong> is one of those topics everyone <em>thinks</em> they understand, until the exam or <strong>interview question</strong> forces you to explain it clearly.</p><blockquote><p>&#128216; Essential for anyone preparing for the <strong>ISC2 CC or CISSP exam.</strong></p></blockquote><p>CISSP doesn&#8217;t test tools. <strong>Interviews don&#8217;t care about dashboards.</strong></p><p>They test whether you understand <strong>the purpose, importance, and structure of incident response</strong> at a professional level.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5WiT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e7ac765-1bf3-4477-b80d-8f3b1bc94509_1034x368.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5WiT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e7ac765-1bf3-4477-b80d-8f3b1bc94509_1034x368.png 424w, https://substackcdn.com/image/fetch/$s_!5WiT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e7ac765-1bf3-4477-b80d-8f3b1bc94509_1034x368.png 848w, https://substackcdn.com/image/fetch/$s_!5WiT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e7ac765-1bf3-4477-b80d-8f3b1bc94509_1034x368.png 1272w, https://substackcdn.com/image/fetch/$s_!5WiT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e7ac765-1bf3-4477-b80d-8f3b1bc94509_1034x368.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5WiT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e7ac765-1bf3-4477-b80d-8f3b1bc94509_1034x368.png" width="1034" height="368" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e7ac765-1bf3-4477-b80d-8f3b1bc94509_1034x368.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:368,&quot;width&quot;:1034,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:40766,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://cybersecerich.substack.com/i/186065526?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e7ac765-1bf3-4477-b80d-8f3b1bc94509_1034x368.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!5WiT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e7ac765-1bf3-4477-b80d-8f3b1bc94509_1034x368.png 424w, https://substackcdn.com/image/fetch/$s_!5WiT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e7ac765-1bf3-4477-b80d-8f3b1bc94509_1034x368.png 848w, https://substackcdn.com/image/fetch/$s_!5WiT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e7ac765-1bf3-4477-b80d-8f3b1bc94509_1034x368.png 1272w, https://substackcdn.com/image/fetch/$s_!5WiT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e7ac765-1bf3-4477-b80d-8f3b1bc94509_1034x368.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">CC - official chapter</figcaption></figure></div><p>And I will get you ready for those questions!</p><h2>What Is Incident Response?</h2><p>Incident response (IR) is the <strong>structured approach an organization uses to detect, analyze, contain, eradicate, and recover from security incidents</strong>.</p><p>But that definition misses the point.</p><p>At its core, incident response exists to answer one question:</p><blockquote><p><em>&#8220;How do we stay in control when something has already gone wrong?&#8221;</em></p></blockquote><p>It assumes failure. It assumes compromise.<br>And it focuses on <strong>damage control, decision-making, and recovery</strong>, not prevention.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to Decoded Security to get interview-ready in 3 months!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>The Purpose of Incident Response</h2><p>The purpose of incident response is <strong>not</strong> to prevent incidents.</p><p>That&#8217;s a common misunderstanding.</p><p>Incident response exists to:</p><ul><li><p>Limit <strong>business impact</strong></p></li><li><p>Protect <strong>critical assets and data</strong></p></li><li><p>Preserve <strong>evidence and accountability</strong></p></li><li><p>Enable <strong>fast, informed decisions under pressure</strong></p></li><li><p>Restore <strong>trustworthy operations</strong></p></li></ul><p><strong>In other words:</strong></p><blockquote><p>Incident response turns chaos into a managed situation.</p></blockquote><p><strong>Without it, every incident becomes an improvisation, and improvisation under stress is how small incidents become disasters. &#8594; I need you to remember this!!</strong></p><div class="pullquote"><p>There is no quicker way to learn than connecting with people who are already where you want to be!</p><div class="community-chat" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/cybersecerich/chat?utm_source=chat_embed&quot;,&quot;subdomain&quot;:&quot;cybersecerich&quot;,&quot;pub&quot;:{&quot;id&quot;:4708911,&quot;name&quot;:&quot;Decoded Security&quot;,&quot;author_name&quot;:&quot;Erich Winkler&quot;,&quot;author_photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!zLJJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb404eb9a-cceb-4d1d-86d2-e362bdf449fc_1024x1024.png&quot;}}" data-component-name="CommunityChatRenderPlaceholder"></div></div><h2>The Phases of Incident Response - Structure</h2><p>For CC and CISSP, incident response is understood as a <strong>lifecycle</strong>, not a single action.</p><p>Each phase has a <strong>specific purpose</strong>, and mixing them up is a common exam and interview mistake.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ikp4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33314c75-c82d-461c-8245-147f0d1d6110_1024x1195.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ikp4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33314c75-c82d-461c-8245-147f0d1d6110_1024x1195.png 424w, https://substackcdn.com/image/fetch/$s_!ikp4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33314c75-c82d-461c-8245-147f0d1d6110_1024x1195.png 848w, https://substackcdn.com/image/fetch/$s_!ikp4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33314c75-c82d-461c-8245-147f0d1d6110_1024x1195.png 1272w, https://substackcdn.com/image/fetch/$s_!ikp4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33314c75-c82d-461c-8245-147f0d1d6110_1024x1195.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ikp4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33314c75-c82d-461c-8245-147f0d1d6110_1024x1195.png" width="1024" height="1195" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/33314c75-c82d-461c-8245-147f0d1d6110_1024x1195.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1195,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1584669,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecerich.substack.com/i/186065526?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1d0c7c2-6e23-4e91-9f37-3ef39a1e4f33_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ikp4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33314c75-c82d-461c-8245-147f0d1d6110_1024x1195.png 424w, https://substackcdn.com/image/fetch/$s_!ikp4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33314c75-c82d-461c-8245-147f0d1d6110_1024x1195.png 848w, https://substackcdn.com/image/fetch/$s_!ikp4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33314c75-c82d-461c-8245-147f0d1d6110_1024x1195.png 1272w, https://substackcdn.com/image/fetch/$s_!ikp4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33314c75-c82d-461c-8245-147f0d1d6110_1024x1195.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h3>1. Detection &amp; Identification</h3><p>This phase answers one question:</p><blockquote><p><em>&#8220;Do we have an incident?&#8221;</em></p></blockquote><p>Detection can come from:</p><ul><li><p><strong>Technical sources</strong> (SIEM, EDR, monitoring systems)</p></li><li><p><strong>Human sources</strong> (employees, administrators)</p></li><li><p><strong>Third parties</strong> (partners, service providers)</p></li></ul><p><strong>At this stage:</strong></p><ul><li><p>You <strong>do not fix anything</strong></p></li><li><p>You <strong>do not jump to conclusions</strong></p></li><li><p>You confirm that an event qualifies as a security incident</p></li></ul><p>&#128204; <strong>Exam trap:</strong> Detection is not a response. Identifying an incident does not mean containing it.</p><h3>2. Response</h3><p><strong>This phase answers:</strong></p><blockquote><p><em>&#8220;How do we stop the damage from spreading?&#8221;</em></p></blockquote><p>Containment focuses on:</p><ul><li><p>Isolating affected systems</p></li><li><p>Preventing further compromise</p></li><li><p>Limiting business impact</p></li></ul><p>Speed matters more than perfection.</p><p>&#128204; <strong>CISSP mindset:</strong> Temporary containment is acceptable if it prevents escalation.</p><h2>3. Mitigation</h2><p><strong>This phase answers:</strong></p><blockquote><p><strong>&#8220;How do we properly eliminate the threat?&#8221;</strong></p></blockquote><p>Mitigation focuses on <strong>removing adversarial control</strong> from affected systems.</p><p><strong>It includes:</strong></p><ul><li><p>Removing malware</p></li><li><p>Eliminating persistence mechanisms</p></li><li><p>Closing exploited vulnerabilities</p></li></ul><p>The mitigation phase ends <strong>when affected systems, while still isolated from production networks, are free from adversarial control</strong>.</p><p>&#128204; <strong>Key exam point:</strong> Clean systems are not yet trusted systems.</p><blockquote><p>Do you know anyone struggling with these concepts? Send it their way and help them out!</p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/the-incident-response-mistakes-that?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/the-incident-response-mistakes-that?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h3>4. Reporting</h3><p>This phase answers:</p><blockquote><p><strong>&#8220;What must be documented, and who needs to know?&#8221;</strong></p></blockquote><p>Proper reporting ensures legal, regulatory, and executive readiness.</p><p>An incident report includes:</p><ul><li><p>Summary of the incident</p></li><li><p>Indicators of compromise</p></li><li><p>Related incidents</p></li><li><p>Actions taken</p></li><li><p>Chain of custody for all evidence</p></li><li><p>Impact assessment</p></li><li><p>Identification and comments of incident handlers</p></li><li><p>Next steps to be taken</p></li></ul><p>&#128204; <strong>Interview insight:</strong> If it&#8217;s not documented, it didn&#8217;t happen.</p><h3>5. Recovery</h3><p>This phase answers:</p><blockquote><p><strong>&#8220;Can we trust these systems again?&#8221;</strong></p></blockquote><p>Recovery aims to restore <strong>full, trustworthy functionality</strong>.</p><p>It requires:</p><ul><li><p>Significant testing</p></li><li><p>Verification that affected systems are truly trustworthy</p></li><li><p>Proper configuration to support business processes</p></li><li><p>Confirmation that no compromises exist in those processes</p></li></ul><p>Recovery is complete only when systems are <strong>both operational and trustworthy</strong>.</p><p>&#128204; <strong>Exam trap:</strong> Availability alone does not equal recovery.</p><h3>6. Remediation</h3><p>This phase answers:</p><blockquote><p><strong>&#8220;How do we make sure this never happens again?&#8221;</strong></p></blockquote><p>Remediation focuses on <strong>long-term risk reduction</strong>.</p><p>It includes:</p><ul><li><p>Identifying control gaps</p></li><li><p>Deciding which controls must be implemented or modified</p></li></ul><p>Remediation occurs in two phases:</p><ol><li><p>Controls are put in place</p></li><li><p>Controls are later reviewed to determine if they should become permanent</p></li></ol><p>&#128204; <strong>CISSP principle:</strong> Remediation addresses root causes, not symptoms.</p><h3>7. Lessons Learned</h3><p>This phase occurs <strong>once the incident is closed</strong>.</p><p>It answers three questions:</p><ul><li><p>What happened?</p></li><li><p>What did we learn?</p></li><li><p>How can we do it better next time?</p></li></ul><p>Lessons learned drive:</p><ul><li><p>Process improvements</p></li><li><p>Training updates</p></li><li><p>Policy and control enhancements</p></li></ul><p>&#128204; <strong>Professional mindset:</strong> Every incident should reduce future risk.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Breaking into cybersecurity? Let me help you one concept at a time!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Conclusion</h2><p>If you&#8217;re reading this, congratulations! </p><p>You&#8217;ve just taken another solid step in your cybersecurity journey!</p><p>Incident response is one of those topics that looks simple on the surface, but quickly exposes gaps in understanding during exams and interviews. </p><p>By now, you should have a clear mental model of <strong>why incident response exists, how the phases fit together, and how ISC&#178; expects you to think about it</strong>.</p><p>Of course, knowing the theory alone won&#8217;t pass the exam or land you the role, but it puts you in a much stronger position than most candidates.</p><p>Remember: Clarity builds confidence.</p><p>And confidence, especially in exams and interviews, is often the deciding factor.</p><blockquote><p>And if you want a complete guide on how to prepare for your first interview and land a job in cybersecurity I got you covered again: <a href="https://decodedsecurity.gumroad.com/l/CybersecurityBlueprint/DecodedSecurity">The 90-Day Cybersecurity Job Blueprint</a>. (<strong>Secret discount</strong> for Decoded Security subscribers already applied!)</p></blockquote><p>Thank you for reading <strong>Decoded Security</strong>.<br>I&#8217;m looking forward to your questions, comments, and discussions below.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to Decoded Security to get more interview tips!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Exam &amp; Interview tips</h2><p><strong>For exams and interviews, remember this:</strong></p><ul><li><p><strong>Detection &#8800; Response</strong></p></li><li><p><strong>Containment &#8800; Eradication</strong></p></li><li><p><strong>Recovery &#8800; Remediation</strong></p></li><li><p><strong>Lessons learned &#8800; Blame</strong></p></li></ul><p>Incident response is about <strong>controlled decision-making under pressure</strong>, not technical heroics.</p><h3><strong>Let&#8217;s connect</strong></h3><p>If you want to <strong>collaborate, discuss, or just geek out over virtualization and cloud security</strong>, reach out to me:</p><ul><li><p><strong>Email:</strong> erich.winkler@decodedsecurity.com</p></li><li><p><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/in/winkleri/">Erich Winkler</a></p></li><li><p><strong>Gumroad community: </strong><a href="https://decodedsecurity.gumroad.com/">Decoded Security</a></p></li></ul><p><strong>Enjoyed this article?</strong> Like it or drop a comment. I&#8217;d love to hear your thoughts and questions!</p><p>Let&#8217;s learn and grow together!</p><h2><strong>Ready to level up your cybersecurity skills?</strong></h2><ul><li><p><strong>&#128172;Comment below</strong> and tell me what your experience with SLAs is</p></li><li><p><strong>&#10067;Take the quiz</strong> to test your understanding: <a href="https://cybersecerich.substack.com/p/test-your-cybersecurity-knowledge?utm_source=chatgpt.com">CybersecErich: Quiz Hub</a></p></li><li><p><strong>&#128240;Subscribe</strong> (free or paid) to get new posts straight to your inbox.</p></li><li><p><strong>Share</strong> this with a friend studying for CISSP, or anyone curious about cybersecurity</p></li></ul>]]></content:encoded></item><item><title><![CDATA[3 Things You Need To Know For Your First Cybersecurity Interview]]></title><description><![CDATA[Breaking into cybersecurity? These three concepts show up in interviews again and again. Master them, understand how hiring managers think, and avoid the mistakes that end interviews early.]]></description><link>https://www.decodedsecurity.com/p/3-things-you-need-to-know-for-your</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/3-things-you-need-to-know-for-your</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Fri, 23 Jan 2026 13:02:40 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/84f7afaf-5539-4868-af5e-ec6c96648767_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Struggling to figure out <strong>what actually matters</strong> for a cybersecurity interview?</p><p><strong>Here&#8217;s a hard truth from the hiring side:</strong></p><blockquote><p>You don&#8217;t fail interviews because you don&#8217;t know enough.<br>You fail because you focus on the wrong things.</p></blockquote><p>I can&#8217;t teach you everything in one post, but I <em>can</em> give you <strong>three topics that come up again and again</strong> in real interviews.</p><p>Knowing the rules won&#8217;t get you the job.<br><strong>Not knowing them will almost certainly cost you the interview.</strong></p><p>That&#8217;s why this article focuses on what interviewers <em>expect you to understand</em></p><blockquote><p>&#128216; Essential also for anyone preparing for the <strong>ISC2 CC exam.</strong></p></blockquote><div class="pullquote"><p>Are you searching for a job in cybersecurity? Let me know in the comments, and let&#8217;s connect!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/3-things-you-need-to-know-for-your/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.decodedsecurity.com/p/3-things-you-need-to-know-for-your/comments"><span>Leave a comment</span></a></p></div><h2>1. The CIA Triad</h2><blockquote><p><em>&#8220;What are the core security objectives in any system?&#8221;</em></p></blockquote><p>3 letters, crucial concept. </p><p>The CIA Triad defines the <strong>three core objectives</strong> of information security:</p><ul><li><p><strong>Confidentiality</strong> &#8211; making sure information is only accessible to those who are authorized.</p></li><li><p><strong>Integrity</strong> &#8211; ensuring that data hasn&#8217;t been tampered with or altered without permission.</p></li><li><p><strong>Availability</strong> &#8211; making sure systems and data are accessible when needed.</p></li></ul><p>Why does it matter so much?</p><p> Protecting information systems means ensuring the CIA (Confidentiality, Integrity, Availability) of all assets in our information systems.</p><p>Every control, every procedure should exist in order to support one of the core objectives. </p><p>The good news is, the concept is quite easy, and all you need is one picture!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ffsx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1efdb4c7-ff28-4936-8485-55ba2a110e3c_2015x1172.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ffsx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1efdb4c7-ff28-4936-8485-55ba2a110e3c_2015x1172.png 424w, https://substackcdn.com/image/fetch/$s_!ffsx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1efdb4c7-ff28-4936-8485-55ba2a110e3c_2015x1172.png 848w, https://substackcdn.com/image/fetch/$s_!ffsx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1efdb4c7-ff28-4936-8485-55ba2a110e3c_2015x1172.png 1272w, https://substackcdn.com/image/fetch/$s_!ffsx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1efdb4c7-ff28-4936-8485-55ba2a110e3c_2015x1172.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ffsx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1efdb4c7-ff28-4936-8485-55ba2a110e3c_2015x1172.png" width="1456" height="847" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1efdb4c7-ff28-4936-8485-55ba2a110e3c_2015x1172.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:847,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ffsx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1efdb4c7-ff28-4936-8485-55ba2a110e3c_2015x1172.png 424w, https://substackcdn.com/image/fetch/$s_!ffsx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1efdb4c7-ff28-4936-8485-55ba2a110e3c_2015x1172.png 848w, https://substackcdn.com/image/fetch/$s_!ffsx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1efdb4c7-ff28-4936-8485-55ba2a110e3c_2015x1172.png 1272w, https://substackcdn.com/image/fetch/$s_!ffsx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1efdb4c7-ff28-4936-8485-55ba2a110e3c_2015x1172.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>However, if you&#8217;d like to know more about it, make sure to check one of my previous articles: <a href="https://open.substack.com/pub/cybersecerich/p/my-first-week-of-cissp-prep-what?utm_campaign=post-expanded-share&amp;utm_medium=web">CIA Triad - Introduction</a>. </p><div class="pullquote"><p><em>There is no quicker way to learn then connecting with people who are already where you want to be!</em></p><div class="community-chat" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/cybersecerich/chat?utm_source=chat_embed&quot;,&quot;subdomain&quot;:&quot;cybersecerich&quot;,&quot;pub&quot;:{&quot;id&quot;:4708911,&quot;name&quot;:&quot;Decoded Security&quot;,&quot;author_name&quot;:&quot;Erich Winkler&quot;,&quot;author_photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!zLJJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb404eb9a-cceb-4d1d-86d2-e362bdf449fc_1024x1024.png&quot;}}" data-component-name="CommunityChatRenderPlaceholder"></div></div><h2><strong>Threat &#8800; Risk &#8800; Vulnerability</strong></h2><blockquote><p><em>&#8220;Could you please explain the difference between Threat, Risk and Vulnerability to me?&#8221;</em></p></blockquote><p>I hear people use these terms interchangibly all the time. </p><p>In reality, there is a huge difference. And knowing this difference shows that you are aware how risk management works.</p><p>Let me give you a definition of each term:</p><ul><li><p>A <strong>threat</strong> is any potential danger that is associated with the exploitation of a vulnerability.</p></li><li><p>A <strong>vulnerability</strong> is a weakness in a system that allows a threat source to compromise its security.</p></li><li><p>A <strong>risk</strong> is the likelihood of a threat source exploiting a vulnerability and the corresponding business impact.</p></li></ul><p>Still confused about the difference? </p><p><strong>Let me show the relationship between the terms in one simple example.</strong></p><p>Imagine a house with a broken window (vulnerability). There&#8217;s a burglar in the neighborhood (threat). The risk is that the burglar might notice the window and break in.</p><p>Now, installing a camera or alarm system won&#8217;t stop the burglar from existing. It won&#8217;t fix the window either. But it might discourage the burglar or notify you quickly if something goes wrong.</p><p>That&#8217;s it! All you need is one very simple example, and you already look like a pro!</p><blockquote><p>If you&#8217;re interested in more details about this topic, I recommend reading one of my previous articles: <strong><a href="https://open.substack.com/pub/cybersecerich/p/threat-risk-vulnerability-why-cissp?utm_campaign=post-expanded-share&amp;utm_medium=web">Threat &#8800; Risk &#8800; Vulnerability</a>.</strong></p></blockquote><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gnn1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e8986a-480a-421a-aab6-ff9b06e85fcc_1068x1145.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gnn1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e8986a-480a-421a-aab6-ff9b06e85fcc_1068x1145.png 424w, https://substackcdn.com/image/fetch/$s_!gnn1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e8986a-480a-421a-aab6-ff9b06e85fcc_1068x1145.png 848w, https://substackcdn.com/image/fetch/$s_!gnn1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e8986a-480a-421a-aab6-ff9b06e85fcc_1068x1145.png 1272w, https://substackcdn.com/image/fetch/$s_!gnn1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e8986a-480a-421a-aab6-ff9b06e85fcc_1068x1145.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gnn1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e8986a-480a-421a-aab6-ff9b06e85fcc_1068x1145.png" width="1068" height="1145" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/11e8986a-480a-421a-aab6-ff9b06e85fcc_1068x1145.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1145,&quot;width&quot;:1068,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gnn1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e8986a-480a-421a-aab6-ff9b06e85fcc_1068x1145.png 424w, https://substackcdn.com/image/fetch/$s_!gnn1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e8986a-480a-421a-aab6-ff9b06e85fcc_1068x1145.png 848w, https://substackcdn.com/image/fetch/$s_!gnn1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e8986a-480a-421a-aab6-ff9b06e85fcc_1068x1145.png 1272w, https://substackcdn.com/image/fetch/$s_!gnn1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e8986a-480a-421a-aab6-ff9b06e85fcc_1068x1145.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Looking for more interview tips? Let&#8217;s get you ready one step at a time!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>Security Policies, Standards, and Procedures</strong></h2><p>This might sound boring to you, especially if you&#8217;re a technically oriented person, but like it or not, even as a cybersecurity specialist, you are still part of an organization, and you need to understand the bigger picture of what you are doing.</p><p>That&#8217;s why hiring managers often want to make sure you are willing to learn the basics of cybersecurity governance.</p><p>Again, let me give you definitions first:</p><p><strong>Policy:</strong></p><blockquote><p>A high-level statement that defines <em>what</em> must be done and <em>why</em>. It reflects management&#8217;s intent and direction.</p></blockquote><p><strong>Standard:</strong></p><blockquote><p>A mandatory rule that defines <em>what exactly</em> must be used or followed &#8212; tools, technologies, or configurations.</p></blockquote><p><strong>Procedure:</strong></p><blockquote><p>A detailed set of <em>steps</em> that explain <em>how</em> to implement a policy or standard in practice.</p></blockquote><p><strong>Guideline:</strong></p><blockquote><p>An optional recommendation or best practice. They help us to cover the grey areas and provide the necessary flexibility.</p></blockquote><p>It didn&#8217;t hurt that bad, did it? </p><p>The whole concept is actually pretty easy, and I will give you one simple picture that will help you to remember it. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!B2O7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8ea711-e741-4629-bd75-e9e00f95f533_698x527.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!B2O7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8ea711-e741-4629-bd75-e9e00f95f533_698x527.png 424w, https://substackcdn.com/image/fetch/$s_!B2O7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8ea711-e741-4629-bd75-e9e00f95f533_698x527.png 848w, https://substackcdn.com/image/fetch/$s_!B2O7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8ea711-e741-4629-bd75-e9e00f95f533_698x527.png 1272w, https://substackcdn.com/image/fetch/$s_!B2O7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8ea711-e741-4629-bd75-e9e00f95f533_698x527.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!B2O7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8ea711-e741-4629-bd75-e9e00f95f533_698x527.png" width="698" height="527" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6f8ea711-e741-4629-bd75-e9e00f95f533_698x527.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:527,&quot;width&quot;:698,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!B2O7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8ea711-e741-4629-bd75-e9e00f95f533_698x527.png 424w, https://substackcdn.com/image/fetch/$s_!B2O7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8ea711-e741-4629-bd75-e9e00f95f533_698x527.png 848w, https://substackcdn.com/image/fetch/$s_!B2O7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8ea711-e741-4629-bd75-e9e00f95f533_698x527.png 1272w, https://substackcdn.com/image/fetch/$s_!B2O7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f8ea711-e741-4629-bd75-e9e00f95f533_698x527.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Make sure you can understand the difference and prepare real-world examples of each. </p><p>Not sure where to start? Well, I got you covered again.</p><blockquote><p>If you want a practical scenario + quiz, read: <strong><a href="https://open.substack.com/pub/cybersecerich/p/security-policies-standards-and-procedures?utm_campaign=post-expanded-share&amp;utm_medium=web">Security Policies, Standards, and Procedures: The Boring Stuff That Actually Saves You</a>. </strong></p><p><em><strong>You can find a real world scenario there and a quiz that will help you determine if you&#8217;re ready for the interview!</strong></em></p></blockquote><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/3-things-you-need-to-know-for-your?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Do you know anyone struggling with these concepts? Send it their way and help them out!</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/3-things-you-need-to-know-for-your?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/3-things-you-need-to-know-for-your?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h1>Conclusion</h1><p>If you&#8217;re reading this, congratulations! You just made another step on your cybersecurity journey! </p><p>Of course, simply knowing these topics isn&#8217;t enough to land a job in the field, but it is a great start!</p><p>I know interviews are stressful, but from my experience, knowing what to focus on not only increases your chances of getting hired but also gives you more confidence.</p><p>And confidence is often the key ingredient in the mix!</p><blockquote><p>And if you want a complete guide on how to prepare for your first interview and land a job in cybersecurity I got you covered again: <a href="https://decodedsecurity.gumroad.com/l/CybersecurityBlueprint">The 90-Day Cybersecurity Job Blueprint</a>.</p></blockquote><p>Thank you for reading Decoded Security, and I am looking forward to your comments!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Breaking into cybersecurity? Let me help you one concept at a time!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p></p><h3><strong>Let&#8217;s connect</strong></h3><p>If you want to <strong>collaborate, discuss, or just geek out over virtualization and cloud security</strong>, reach out to me:</p><ul><li><p><strong>Email:</strong> erich.winkler@decodedsecurity.com</p></li><li><p><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/in/winkleri/">Erich Winkler</a></p></li></ul><p><strong>Enjoyed this article?</strong> Like it or drop a comment. I&#8217;d love to hear your thoughts and questions!</p><p>Let&#8217;s learn and grow together!</p><h2><strong>Ready to level up your cybersecurity skills?</strong></h2><ul><li><p><strong>&#128172;Comment below</strong> and tell me what your experience with SLAs is</p></li><li><p><strong>&#10067;Take the quiz</strong> to test your understanding: <a href="https://cybersecerich.substack.com/p/test-your-cybersecurity-knowledge?utm_source=chatgpt.com">CybersecErich: Quiz Hub</a></p></li><li><p><strong>&#128240;Subscribe</strong> (free or paid) to get new posts straight to your inbox.</p></li><li><p><strong>Share</strong> this with a friend studying for CISSP, or anyone curious about cybersecurity</p></li></ul>]]></content:encoded></item><item><title><![CDATA[How to Choose the Right Cybersecurity Role Before You Waste Time and Money on the Wrong Certifications]]></title><description><![CDATA[A practical map of cybersecurity careers, because guessing costs years and certifications don&#8217;t fix bad direction.]]></description><link>https://www.decodedsecurity.com/p/how-to-choose-the-right-cybersecurity</link><guid isPermaLink="false">https://www.decodedsecurity.com/p/how-to-choose-the-right-cybersecurity</guid><dc:creator><![CDATA[Erich Winkler]]></dc:creator><pubDate>Wed, 14 Jan 2026 11:11:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!hrEi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c9060ba-5ff4-4778-95c3-3f399d0dfdda_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Do you want to break into cybersecurity, but feel confused by all the different roles?</p><p>If yes, this article is for you.</p><p>I&#8217;m going to give you a clear tour of the field and show you <strong>four very different paths</strong> you can take in cybersecurity&#8212;and how they actually relate to each other.</p><p>Why should you care?</p><p>Because choosing the wrong path can easily cost you <strong>years of effort and thousands of dollars</strong> in certifications, courses, and wasted preparation.</p><p>Cybersecurity is a demanding field.<br>And having direction puts you far ahead of people who are just &#8220;trying to figure it out.&#8221;</p><p>Most people don&#8217;t fail in cybersecurity because they aren&#8217;t smart enough.</p><p>They fail because they never had a plan.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Do you want to break into cybersecurity? Subscribe to Decoded Security and get specific insights from someone who has done it before you!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Cybersecurity isn&#8217;t one job. It&#8217;s a system</h2><p>Most people imagine security as a collection of isolated roles. </p><p>Pentester here.<br>SOC analyst there&#8230;<br>Cybersecurity manager somewhere at the top..</p><p>If we want to succeed, we have to change this mindset. </p><p>Cybersecurity is a <strong>living system</strong> with 5 main components. </p><p>Once you know these components, everything is much clearer.</p><p>Let&#8217;s go!</p><div class="pullquote"><p>Not only people with cybersecurity roles have cybersecurity responsibilities. Cybersecurity is everyone&#8217;s responsibility. I covered this in one of my previous articles!</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;7145855a-41cc-4aa3-8b0e-3ba56910cfd0&quot;,&quot;caption&quot;:&quot;Ever confused by all those abbreviations? CEO, CFO, CIO, CPO, CSO&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;What does CEO have to do with cybersecurity, and who CPO even is? &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:259197825,&quot;name&quot;:&quot;Erich Winkler&quot;,&quot;bio&quot;:&quot;Cybersecurity Manager | CISSP Associate | Writing about cybersecurity as a decision and accountability problem, not a tools problem.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb266f24-2019-4782-ae49-794e9eda299d_4912x4912.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-07-14T05:00:57.293Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/45656842-74a1-4c58-963f-4b8cc543fd3d_420x300.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://cybersecerich.substack.com/p/what-does-ceo-have-to-do-with-cybersecurity&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:167653294,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:12,&quot;comment_count&quot;:3,&quot;publication_id&quot;:4708911,&quot;publication_name&quot;:&quot;Decoded Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!hqdo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8809eb-cbfe-4d76-a2e7-af1df277c77a_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hrEi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c9060ba-5ff4-4778-95c3-3f399d0dfdda_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hrEi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c9060ba-5ff4-4778-95c3-3f399d0dfdda_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!hrEi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c9060ba-5ff4-4778-95c3-3f399d0dfdda_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!hrEi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c9060ba-5ff4-4778-95c3-3f399d0dfdda_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!hrEi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c9060ba-5ff4-4778-95c3-3f399d0dfdda_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hrEi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c9060ba-5ff4-4778-95c3-3f399d0dfdda_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4c9060ba-5ff4-4778-95c3-3f399d0dfdda_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:531393,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecerich.substack.com/i/184030241?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c9060ba-5ff4-4778-95c3-3f399d0dfdda_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hrEi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c9060ba-5ff4-4778-95c3-3f399d0dfdda_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!hrEi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c9060ba-5ff4-4778-95c3-3f399d0dfdda_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!hrEi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c9060ba-5ff4-4778-95c3-3f399d0dfdda_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!hrEi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c9060ba-5ff4-4778-95c3-3f399d0dfdda_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"></div></div></a></figure></div></div><h2>1. Offensive Security</h2><p><strong>Someone has to think like an attacker and ask:</strong></p><ul><li><p>How could this system be abused?</p></li><li><p>Where are the weak points?</p></li><li><p>What assumptions are we making that might be wrong?</p></li></ul><p>These roles actively probe for weaknesses, but unlike malicious hackers, they do it to help organizations improve their security.</p><p><strong>What roles are we talking about?</strong></p><h3><strong>Penetration Tester</strong></h3><p><strong>Required Seniority:</strong> Mid &#8594; Senior</p><p>I started with this role on purpose, because you probably heard about it the most. The first question I get when I say I work in cybersecurity is: &#8220;Can you hack my computer?&#8221;</p><p>PS: No, I can&#8217;t. I am not a penetration tester.</p><p>But what is the official goal of this role?</p><p>Penetration testers focus on <strong>controlled attacks</strong> against specific systems.</p><p>Basically, you tell him to break into a system under specific conditions and a time frame, and they do everything in their power to do so. </p><p>A good penetration tester doesn&#8217;t just find vulnerabilities.<br>They explain <strong>why they matter</strong> and <strong>how they can realistically be abused</strong>.</p><p>This role suits people who enjoy:</p><ul><li><p>Structured testing</p></li><li><p>Technical depth</p></li><li><p>Clear objectives and reporting</p></li></ul><p><strong>But here&#8217;s the important part:</strong></p><blockquote><p>Penetration testing is <strong>not beginner-friendly</strong>.</p></blockquote><h3><strong>Red Team Engineer</strong></h3><p><strong>Required Seniority:</strong> Senior</p><p>Red Team Engineer takes it a little further. </p><p>Instead of testing individual systems, red teams simulate <strong>real-world attacks across the entire organization</strong>.</p><p>But, for the purposes of this article, read teaming is very similar to penetration testing. </p><p>Not all companies use Red teaming, as it is very expensive.</p><p>Additionally, it is highly unlikely to become a Red Team Engineer without prior experience as a penetration tester. </p><blockquote><p>Do you find this article useful? Let me know in the comments!</p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/how-to-choose-the-right-cybersecurity/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/how-to-choose-the-right-cybersecurity/comments"><span>Leave a comment</span></a></p><h2>2. Security Operations (SOC) Roles</h2><p>If you don&#8217;t know what SOC is, it is the <strong>central team responsible for continuously monitoring, detecting, and responding to cybersecurity threats</strong> across an organization.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gSHy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed0031b9-889e-4ddd-a916-ef3df4479232_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gSHy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed0031b9-889e-4ddd-a916-ef3df4479232_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!gSHy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed0031b9-889e-4ddd-a916-ef3df4479232_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!gSHy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed0031b9-889e-4ddd-a916-ef3df4479232_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!gSHy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed0031b9-889e-4ddd-a916-ef3df4479232_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gSHy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed0031b9-889e-4ddd-a916-ef3df4479232_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed0031b9-889e-4ddd-a916-ef3df4479232_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1840714,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecerich.substack.com/i/184030241?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed0031b9-889e-4ddd-a916-ef3df4479232_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gSHy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed0031b9-889e-4ddd-a916-ef3df4479232_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!gSHy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed0031b9-889e-4ddd-a916-ef3df4479232_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!gSHy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed0031b9-889e-4ddd-a916-ef3df4479232_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!gSHy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed0031b9-889e-4ddd-a916-ef3df4479232_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"></div></div></a></figure></div><blockquote><p>A SOC operates 24/7 (or close to it), because attackers don&#8217;t work office hours.</p></blockquote><h3>Security Analyst</h3><p><strong>Required Seniority:</strong> Junior &#8594; Mid</p><p>The security analyst is the <strong>front line</strong>.</p><p>This role is about:</p><ul><li><p>reviewing security alerts</p></li><li><p>investigating suspicious behavior</p></li><li><p>deciding what is real and what is noise</p></li></ul><p>Most alerts are false positives.<br>Some are not.</p><p>Your job is to tell the difference.</p><p>When something looks wrong, the analyst digs deeper to understand:</p><ul><li><p>what happened</p></li><li><p>how serious it is</p></li><li><p>whether it needs immediate action</p></li></ul><p>It is also one of the <strong>best entry points into cybersecurity</strong>, because it forces you to learn how attacks actually appear in real systems, not just in textbooks.</p><h3>Incident Responder</h3><p><strong>Required Seniority:</strong> Mid &#8594; Senior</p><p>When an alert becomes a confirmed threat, the incident responder takes over.</p><p>This is the <strong>crisis role</strong>.</p><p><strong>Incident responders focus on:</strong></p><ul><li><p>containing active attacks</p></li><li><p>limiting damage</p></li><li><p>removing attacker access</p></li><li><p>coordinating with other teams</p></li></ul><p>They work under pressure, often with incomplete information, while systems are already compromised.</p><p><strong>The key challenge here is balance:</strong></p><ul><li><p>move too slowly, and the attacker causes more damage</p></li><li><p>move too fast, and you might break critical business systems</p></li></ul><p>Incident responders don&#8217;t just clean up messes.</p><blockquote><p><strong>They also document what happened and feed that knowledge back into the SOC so the same attack is detected faster next time.</strong></p></blockquote><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/how-to-choose-the-right-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Do you know anyone who is trying to break into cybersecurity? Send it their way!</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/how-to-choose-the-right-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/how-to-choose-the-right-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h2>3. Security Architecture and Engineering</h2><p>SOC teams detect problems.<br>Offensive teams expose weaknesses.</p><p>But none of that matters if systems are <strong>poorly designed</strong> in the first place.</p><p>Security architecture and engineering exist to answer a different question:</p><blockquote><p><em>&#8220;How do we build systems that are secure by design, not secure by luck?&#8221;</em></p></blockquote><p>These roles focus on <strong>prevention, resilience, and scale</strong>.</p><blockquote><p>Instead of reacting to incidents, they reduce how often incidents happen at all.</p></blockquote><h3><strong>Security Architect</strong></h3><p><strong>Required Seniority:</strong> Senior</p><p>Their job is to design how security fits into the organization as a whole.</p><p>They ask questions like:</p><ul><li><p>Where should trust exist&#8212;and where shouldn&#8217;t it?</p></li><li><p>How do identity, network, application, and data security fit together?</p></li><li><p>What happens when this system grows, changes, or fails?</p></li></ul><p>A security architect doesn&#8217;t usually configure tools day-to-day.<br>They design the <strong>blueprint</strong> others follow.</p><p><strong>Typical responsibilities include:</strong></p><ul><li><p>Designing security architectures for networks, applications, and cloud environments</p></li><li><p>Defining security standards and patterns</p></li><li><p>Evaluating new technologies and their security implications</p></li><li><p>Ensuring security supports the business instead of blocking it</p></li></ul><p>This is probably one of the most crucial technical cybersecurity roles in the organization. </p><h3><strong>Security Engineer</strong></h3><p><strong>Required Seniority:</strong> Mid &#8594; Senior (Junior roles are available)</p><p>If security architects design the blueprint, <strong>security engineers build it</strong>.</p><p>This is the hands-on role responsible for turning ideas, policies, and architectures into real, working defenses.</p><p>Security engineers focus on:</p><ul><li><p>implementing security controls across systems and applications</p></li><li><p>configuring and maintaining security tools</p></li><li><p>integrating security into existing infrastructure</p></li><li><p>automating repetitive security tasks</p></li></ul><p>They work closely with IT, DevOps, and development teams to make sure security actually works in practice, not just on paper.</p><p>Typical responsibilities include:</p><ul><li><p>deploying and managing endpoint, network, and identity security controls</p></li><li><p>hardening operating systems and applications</p></li><li><p>integrating security into CI/CD pipelines</p></li><li><p>validating that security controls are effective</p></li></ul><blockquote><p>TIP: Very convenient for SW developers who want to break into cybersecurity!</p></blockquote><p>Many people move into security engineering from SOC or general IT roles, which is why junior positions do exist.<br><strong>Experience with real systems matters more than theory here.</strong></p><div class="pullquote"><p>Are you a SW developer who is struggling with Cybersecurity? Let me help you!</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d91dc2bc-af71-4d37-b3a6-5630e0cb7642&quot;,&quot;caption&quot;:&quot;I don&#8217;t know your story, but let me guess why you opened this article..&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;5 Specific Steps For Software Developers To Get a Job in Cybersecurity In 6 Months Without Starting Over&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:259197825,&quot;name&quot;:&quot;Erich Winkler&quot;,&quot;bio&quot;:&quot;Cybersecurity Manager | CISSP Associate | Writing about cybersecurity as a decision and accountability problem, not a tools problem.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb266f24-2019-4782-ae49-794e9eda299d_4912x4912.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-01-07T13:02:09.384Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/520e0e23-ea1b-4bd2-8f07-cb9922a82646_1536x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://cybersecerich.substack.com/p/5-specific-steps-for-software-developers&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:183768217,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:12,&quot;comment_count&quot;:6,&quot;publication_id&quot;:4708911,&quot;publication_name&quot;:&quot;Decoded Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!hqdo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8809eb-cbfe-4d76-a2e7-af1df277c77a_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div></div><h3><strong>Cloud Security Engineer</strong></h3><p><strong>Required Seniority:</strong> Mid &#8594; Senior</p><p>Imagine everything that a security engineer does, but for a cloud. </p><p>Cloud environments are:</p><ul><li><p>highly dynamic</p></li><li><p>heavily automated</p></li><li><p>built around APIs and identity</p></li></ul><p>Most cloud breaches don&#8217;t happen because of advanced exploits.<br>They happen because of <strong>simple misconfigurations</strong>.</p><p>Cloud security engineers exist to prevent exactly that.</p><blockquote><p>Have you chosen your path? Let me know in the comments and let&#8217;s discuss it!</p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/p/how-to-choose-the-right-cybersecurity/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.decodedsecurity.com/p/how-to-choose-the-right-cybersecurity/comments"><span>Leave a comment</span></a></p><h2>4. Governance, Risk, and Compliance</h2><p>This is where we get from highly technical roles to business and strategic roles.</p><p>These roles focus on <strong>risk, rules, and decision-making</strong>, not tools.</p><p>They make sure security:</p><ul><li><p>aligns with business goals</p></li><li><p>meets legal and regulatory requirements</p></li><li><p>focuses on real risk instead of security theater</p></li></ul><h3><strong>Security Auditor</strong></h3><p><strong>Required Seniority:</strong> Junior &#8594; Mid</p><p>Security auditors verify whether security controls actually exist, and whether they work as intended.</p><p>Their job is not to break systems, but to <strong>check reality against promises</strong>.</p><p>They focus on:</p><ul><li><p>reviewing security controls and processes</p></li><li><p>assessing compliance with standards and regulations</p></li><li><p>identifying gaps between policy and practice</p></li><li><p>documenting findings for management and regulators</p></li></ul><p>Auditors are detail-oriented and methodical.<br>They care about evidence, consistency, and repeatability.</p><p>Without audits, organizations often discover weaknesses <strong>only after a breach</strong>.</p><blockquote><p>Do you think you&#8217;re the only one who is struggling with breaking into cybersecurity? </p><p>WRONG!</p><p>We all have been there. So let&#8217;s face it together! Join the community of nearly 600 cybersecurity enthusiasts and professionals!</p></blockquote><div class="community-chat" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/cybersecerich/chat?utm_source=chat_embed&quot;,&quot;subdomain&quot;:&quot;cybersecerich&quot;,&quot;pub&quot;:{&quot;id&quot;:4708911,&quot;name&quot;:&quot;Decoded Security&quot;,&quot;author_name&quot;:&quot;Erich Winkler&quot;,&quot;author_photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!CJ9P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb266f24-2019-4782-ae49-794e9eda299d_4912x4912.jpeg&quot;}}" data-component-name="CommunityChatRenderPlaceholder"></div><h3><strong>Risk Manager</strong></h3><p><strong>Required Seniority:</strong> Mid &#8594; Senior</p><p>Risk managers think in probabilities and impact.</p><p>Their role is to help the organization understand:</p><ul><li><p>What could go wrong</p></li><li><p>How likely it is</p></li><li><p>How bad it would be if it did</p></li></ul><p>They focus on:</p><ul><li><p>identifying and prioritizing security risks</p></li><li><p>analyzing business impact</p></li><li><p>defining risk treatment strategies</p></li><li><p>supporting leadership decision-making</p></li></ul><p>Risk managers translate technical issues into <strong>business language</strong>.</p><p>Without effective risk management, organizations often:</p><ul><li><p>overspend on low-impact issues</p></li><li><p>Ignore critical risks</p></li><li><p>make emotional instead of informed decisions</p></li></ul><div class="pullquote"><p>If you&#8217;re interested in what a risk manager does, check one of my previous articles!</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;1c6cad0c-fb19-4990-ab0d-ff010aabb5bb&quot;,&quot;caption&quot;:&quot;Here&#8217;s something you should know about cybersecurity:&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Quantitative Risk Analysis: Let The Numbers Do All The Talking&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:259197825,&quot;name&quot;:&quot;Erich Winkler&quot;,&quot;bio&quot;:&quot;Cybersecurity Manager | CISSP Associate | Writing about cybersecurity as a decision and accountability problem, not a tools problem.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb266f24-2019-4782-ae49-794e9eda299d_4912x4912.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-11-19T13:24:56.928Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dae9fefa-f65a-4f42-b8d7-df607fa43848_1456x1048.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://cybersecerich.substack.com/p/quantitative-risk-analysis-let-the&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:178733052,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:4708911,&quot;publication_name&quot;:&quot;Decoded Security&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!hqdo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8809eb-cbfe-4d76-a2e7-af1df277c77a_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div></div><h3><strong>Compliance Specialist</strong></h3><p>Required Seniority: Junior &#8594; Mid</p><p>Compliance specialists focus on <strong>rules, frameworks, and regulations</strong>.</p><p>They ensure the organization:</p><ul><li><p>understands regulatory requirements</p></li><li><p>implements necessary controls</p></li><li><p>documents processes correctly</p></li></ul><p>Their responsibilities typically include:</p><ul><li><p>interpreting security regulations and standards</p></li><li><p>translating requirements into internal processes</p></li><li><p>helping teams understand what is required of them</p></li><li><p>preparing for audits and assessments</p></li></ul><p>Basically, the goal of this role is to translate external obligations to everyone who is affected. </p><h2>5. Management and Leadership (This will take a while)</h2><p>At some point, cybersecurity stops being about tools and systems.</p><p>It becomes about <strong>people, priorities, and strategy</strong>.</p><p>Management and leadership roles exist to coordinate efforts, allocate resources, and ensure security delivers real value to the organization.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ki_p!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19290c94-60d9-4bd9-89de-941be822653f_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ki_p!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19290c94-60d9-4bd9-89de-941be822653f_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!Ki_p!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19290c94-60d9-4bd9-89de-941be822653f_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!Ki_p!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19290c94-60d9-4bd9-89de-941be822653f_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!Ki_p!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19290c94-60d9-4bd9-89de-941be822653f_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ki_p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19290c94-60d9-4bd9-89de-941be822653f_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19290c94-60d9-4bd9-89de-941be822653f_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1749875,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://cybersecerich.substack.com/i/184030241?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19290c94-60d9-4bd9-89de-941be822653f_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Ki_p!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19290c94-60d9-4bd9-89de-941be822653f_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!Ki_p!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19290c94-60d9-4bd9-89de-941be822653f_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!Ki_p!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19290c94-60d9-4bd9-89de-941be822653f_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!Ki_p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19290c94-60d9-4bd9-89de-941be822653f_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"></div></div></a></figure></div><h3>Security Program Manager</h3><p><strong>Required Seniority:</strong> Mid &#8594; Senior</p><p>Security program managers keep security initiatives moving.</p><p><strong>They focus on:</strong></p><ul><li><p>planning and tracking security projects</p></li><li><p>coordinating between teams</p></li><li><p>managing timelines and dependencies</p></li><li><p>ensuring initiatives deliver measurable results</p></li></ul><p>They don&#8217;t usually configure tools or respond to incidents.<br>They make sure <strong>things actually get done</strong>.</p><p>Without program management, security efforts often stall or fail due to poor coordination, not technical limitations.</p><h3>Security Director</h3><p><strong>Required Seniority:</strong> Senior</p><p>Security directors lead security teams and operations.</p><p>They sit between hands-on security work and executive leadership.</p><p>Their responsibilities include:</p><ul><li><p>managing security teams</p></li><li><p>setting operational priorities</p></li><li><p>overseeing budgets and resources</p></li><li><p>ensuring alignment with business objectives</p></li></ul><p>A strong security director provides clarity and direction.<br>A weak one creates chaos, even with talented teams.</p><h3><strong>Chief Information Security Officer (CISO)</strong></h3><p><strong>Required Seniority:</strong> Executive / Senior</p><p>The CISO owns the organization&#8217;s <strong>security vision and strategy</strong>.</p><p>This role is about:</p><ul><li><p>defining long-term security direction</p></li><li><p>communicating risk to executives and the board</p></li><li><p>balancing security needs with business goals</p></li><li><p>building and leading mature security programs</p></li></ul><p>A CISO doesn&#8217;t manage firewalls or alerts.</p><p>It is a C-suite role that sits at the highest level of the organization and makes sure that the overall security strategy is aligned with the business goals.</p><p>Without effective CISO leadership, security becomes fragmented, reactive, and misaligned with reality.</p><h2>Conclusion</h2><p>A lot of roles, right?</p><p>Don&#8217;t worry, you don&#8217;t have to decide everything today.</p><p>What <em>does</em> matter is that you understand the <strong>five main paths in cybersecurity</strong>, because that decision will shape everything that comes next.</p><p>Certifications.<br>Skills.<br>Entry roles.<br>Even how long your journey will take.</p><p><strong>For example:</strong><br>If your goal is to become a penetration tester, it makes no sense to start with leadership-focused certifications like CISSP and position yourself as a security manager.</p><p>That mismatch costs people <strong>years of effort and thousands of dollars</strong>.</p><p>Choosing a path first makes your journey:</p><ul><li><p>faster</p></li><li><p>cheaper</p></li><li><p>and far less frustrating</p></li></ul><p>And here&#8217;s the good news:</p><p>In the next article, I&#8217;ll break down <strong>specific, realistic certifications for each of the five cybersecurity paths</strong>, so you know exactly what makes sense for <em>your</em> goal, and what doesn&#8217;t.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.decodedsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Make sure you won&#8217;t miss it!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1><strong>What Should You Learn Next?</strong></h1><p>If you&#8217;re starting your cybersecurity journey, focus on fundamentals.</p><p>You don&#8217;t need to learn everything at once.</p><p>Start with:</p><ul><li><p><a href="https://open.substack.com/pub/cybersecerich/p/top-5-most-important-network-protocols?utm_campaign=post-expanded-share&amp;utm_medium=web">Network protocols</a></p></li><li><p><a href="https://open.substack.com/pub/cybersecerich/p/why-most-beginners-dont-understand?utm_campaign=post-expanded-share&amp;utm_medium=web">IP addressing</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/this-is-how-i-explain-dns-to-beginners?r=4abibl">DNS</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/diffie-hellman-explained-like-youre?r=4abibl">Encryption</a></p></li><li><p><a href="https://www.decodedsecurity.com/p/what-are-the-things-that-keep-our?r=4abibl">Network Devices</a></p></li></ul><p>These concepts appear everywhere in cybersecurity.</p><p>And if you master them, you will already be ahead of most beginners.</p><h2><strong>Ready to level up your cybersecurity skills?</strong></h2><ul><li><p><strong>&#128172;Comment below</strong> and tell me what your experience with SLAs is</p></li><li><p><strong>&#10067;Take the quiz</strong> to test your understanding: <a href="https://cybersecerich.substack.com/p/test-your-cybersecurity-knowledge?utm_source=chatgpt.com">CybersecErich: Quiz Hub</a></p></li><li><p><strong>&#128240;Subscribe</strong> (free or paid) to get new posts straight to your inbox.</p></li><li><p><strong>Share</strong> this with a friend studying for CISSP, or anyone curious about cybersecurity</p></li></ul>]]></content:encoded></item></channel></rss>