Introduction

In 2026, I started learning Ethical Hacking and Information Security with a simple curiosity:

How do cyberattacks actually happen?

Like many students, I once believed that hacking always meant something illegal. But as I began studying cybersecurity in a structured way, I realized something important:

Ethical Hacking is not about breaking systems. It is about protecting them.

This shift in understanding completely changed my mindset.

๐Ÿ” What Is Ethical Hacking?

Ethical hacking is the process of testing systems, networks, or applications with proper authorization to identify security weaknesses before malicious attackers can exploit them.

It is legal. It is professional. And it follows strict ethical rules.

The most important principles I learned are:

  • Always take written permission
  • Work within a defined scope
  • Follow ethics and responsibility
  • Report findings honestly

Cybersecurity is built on trust. Without ethics, there is no security.

๐ŸŽฏ Understanding How Cyber Attacks Really Happen

One of the most interesting concepts I studied is the Cyber Kill Chain โ€” a model that explains how most cyberattacks unfold step by step.

Cyber attacks are not random events. They follow a pattern.

Typically, the process includes:

  1. Information gathering
  2. Preparing attack tools
  3. Delivering malicious payload
  4. Exploiting vulnerabilities
  5. Installing backdoors
  6. Gaining control of the system
  7. Stealing data or causing disruption

As a student, this helped me understand something powerful:

If we understand the attack pattern, we can break it.

Defense becomes stronger when we think like attackers โ€” but act ethically.

๐Ÿšจ Common Cyber Threats I Studied

Before this course, these terms sounded complex and technical. Now, I understand their real-world impact.

Some major threats include:

  • Phishing emails that trick users into revealing credentials
  • Malware that infects systems
  • SQL Injection attacks targeting databases
  • Man-in-the-Middle attacks intercepting communication
  • Denial of Service attacks disrupting availability
  • Zero-day vulnerabilities exploiting unknown weaknesses

Each attack uses either technical flaws or human mistakes.

Cybersecurity is not just about tools โ€” it is also about awareness.

๐Ÿค– AI in Cybersecurity: The New Battlefield

Artificial Intelligence is transforming the cybersecurity landscape.

On the Attack Side:

  • AI-generated phishing emails
  • Automated password guessing
  • Malware that adapts to avoid detection

On the Defense Side:

  • Detecting unusual login behavior
  • Blocking suspicious traffic in real time
  • Automated patch management
  • Intelligent email filtering

This made me realize something very clear:

Cybersecurity is no longer optional. It is essential in the digital era.

๐Ÿง  What I'm Developing Beyond Technical Skills

This journey is not only about learning tools or attack techniques.

It is helping me build:

  • Analytical thinking
  • Risk assessment skills
  • Ethical responsibility
  • Structured problem-solving

Cybersecurity is a mindset.

As an aspiring cybersecurity professional, I plan to continue exploring:

  • Penetration testing
  • Vulnerability assessment
  • Defensive security strategies
  • Security operations (Blue Team practices)

I am excited about this learning journey and the growth it brings.

Final Reflection

The biggest lesson I've learned so far is this:

Security is not about fear. It is about preparation.

The more we understand how systems can be attacked, the better we can defend them.

If you are also learning cybersecurity or planning to start, keep going. The field is challenging, but it is also one of the most impactful careers of this generation.

Let's continue learning and growing together.

#CyberSecurity #EthicalHacking #BlueTeam #InformationSecurity #StudentJourney #Learning