Skip to main content

100 Reps

Response: Start new industry from scratch

Personal response to Alex Hermozi's encouragement:

TL;DR;

Ultimate goal: Earn enough cred to be worth chatting to Acquisition.com (3-5 years)


Hello Mr Hermozi,
I am a software dev with no knowledge of cybersecurity.
I hope you don't mind me using you and Acquisition.com as the focus of my pursuit.
I want to change my life and starting afresh.

Ultimately, I'd like to run a business that helps protect from cybersecurity threats.
At present, I have no tangible/marketable skills in this area, but I have 2 hours/night while the kids are sleeping to create "a new me".
This is my journal to showcase the reps I put in to become "undeniable".
I've dabbled with a few things on the topic to make sure that this is the path I'd like to take.
I'm counting this as Day 0.
I hope to meet you and your team in 3-5 years.

Keeping this blog default and shitty so I don't get distracted and maximise the time with the reps.
Wow you with the work. Not the design.

First milestones: Learn and Do

I can't sell what I don't have.

Milestone 1: Start doing reps solo. (Read books, practice skills, log progress)
Milestone 2: Find an activity in cybersecurity that 1. I can do repeatedly 2. I can enjoy doing long term.
Milestone 3: Find people I can help out with this one single task.
Milestone 4: Do reps of complementary skills.
Milestone 5: Develop routine of reps.

Current Snapshot

No skills in cybersecurity. New field.
Background: Experience in software engineering.
Limitations: Keep job to pay bills.



Comments

Popular posts from this blog

Linux Admin: Managing Users

I read through Chapter 2 of Linux Admin for Absolute Beginners by Martin Stevenson Key Learnings: Add Users Passwords User groups How to add users The flags of adduser varies across different version of Linux, so consult the man pages for more info. I am practising on Kali Linux, the simplest command is: sudo adduser --comment "Gym Owner Terry Crews" tcrews You will need root access for this. So using the root user or adding sudo will work. Sometimes you'll see another command useradd instead. The recommendation is to always use adduser. adduser is a wrapper for useradd.  adduser is more user friendly and interactive than its back-end useradd . There's no difference in features provided. Why is this important? This is how we can create an account for users to access Linux servers. If you have a new employee at your company or student who enters the university, they'll need access to the shared drive, a private drive for themselves etc. Groups Groups keep users i...

PicoCTF: Low Level Binary Intro Playlist

Mochi's Tale Mochi's Tale is a really cool little game that teaches you how to "find things out" through experimentation. I found it a really helpful way to get you into the rhythm of learning rules without being told what they are in the first place.

PicoCTF: The Debugger

GDB baby step 1  Can you figure out what is in the eax register at the end of the main function?  For Mac, gdb can be installed via homebrew: brew install gdbGDB baby step 2 Learn how to disassemble a program from binary file. Here we can see that in line 15, 0x86342 is copied into eax. The output here seems to reverse the arguments.