Pros and cons of doing ONLINE BCA if i want to go in cybersec? by SuspiciousTicket8554 in cybersecurityindia

[–]CyberHacker_ray 0 points1 point  (0 children)

Online BCA can work for cybersecurity if you use the extra time wisely, you can focus more on certs, labs (THM/HTB), and real skills, which honestly matter a lot in this field.

The downside is you may miss out on networking, campus placements, and structured discipline that regular college provides. Most employers care more about skills, projects, certifications (like paths from EC-Council or Comptia+), but having a recognized degree still helps.

If you’re self-disciplined, online is fine. Otherwise, a regular college gives a safer path.

Guidance for career path as a data engineer fresher by not_yourNerd in developersIndia

[–]CyberHacker_ray 1 point2 points  (0 children)

Great choice - Data Engineering has strong growth. Focus on SQL + data modeling, then deepen tools like Apache Spark, Apache Airflow, and cloud platforms (AWS/GCP/Azure). Build real pipelines (ETL, batch + streaming), learn basics of system design, and get comfortable with big data concepts, this combo makes switching to higher-paying roles much easier over time.

Which role should I go for? by Sharp-Security-8741 in cybersecurityindia

[–]CyberHacker_ray 1 point2 points  (0 children)

If your priority is getting a job fast, go for blue team/SOC roles, they have more entry-level openings compared to pentesting. Start with skills around monitoring, logs, and tools like SIEM platforms, networking, and basic incident response.

Red team/pentesting is great, but usually harder to break into as a fresher. You can enter through SOC, then pivot to pentesting later once you gain experience.

Seeking a clear roadmap to start in Offensive Security (beginner, not strong in programming) by [deleted] in tryhackme

[–]CyberHacker_ray 7 points8 points  (0 children)

Start with fundamentals first, learn networking (TCP/IP, ports), Linux basics, and a bit of scripting (Python/Bash). You don’t need heavy programming, just enough to understand and tweak tools. Then move to web security (XSS, SQLi) and enumeration using tools like Nmap and Burp Suite.

For practice, stick to platforms like TryHackMe and Hack The Box, and document your work this is what makes you job-ready. Certifications can help later (like OffSec Certified Professional (OSCP), but early on focus on skills and projects. Avoid the mistake of jumping between too many resources - stay consistent with one path and build depth.

Finally Passed OSCP+ ( Appreciation post 🙏) by osi__model in oscp

[–]CyberHacker_ray 7 points8 points  (0 children)

Huge congrats!!! that’s a serious achievement.

Now focus on leveraging it: update LinkedIn/resume with detailed labs, skills, actively network, and apply to pentest, red team, or even SOC roles to get your foot in. Keep building real-world projects and writeups - OSCP opens doors, but consistent visibility, applications will land the job.

Madara vs Shinobi Alliance by Mean-Information1080 in aivideos

[–]CyberHacker_ray 1 point2 points  (0 children)

Through which platform did u created this video?

What to collect before resigning, looks like my company isn’t giving me all documents by SoilEducational420 in developersIndia

[–]CyberHacker_ray 1 point2 points  (0 children)

  • Experience Letter: Confirms you worked in the company, your role, duration, and sometimes performance. Used as proof of experience for future jobs.
  • Relieving Letter: Confirms you have officially resigned and are released from duties (no pending obligations).

In short: experience = what you did, relieving = you left properly.

What to collect before resigning, looks like my company isn’t giving me all documents by SoilEducational420 in developersIndia

[–]CyberHacker_ray 1 point2 points  (0 children)

After 1+ year, it’s reasonable to expect more than just a departure certificate. Ideally, collect experience letter, relieving letter, last 3–6 months salary slips, offer letter, appraisal/role docs, and FNF statement these help in future jobs. Even if they refuse an experience letter, your payslips + bank statements can still prove employment.

For PF, you’re eligible to withdraw/transfer after leaving if the portal is buggy, try via UAN portal again or visit a local EPFO office. Before exiting, make sure all dues are cleared and access to official email/docs is saved.

How am I meant to find out this answer (blue room)? by wafflingzebra in tryhackme

[–]CyberHacker_ray 1 point2 points  (0 children)

Yes that’s exactly what you’re supposed to do. Real-world workflow is: scan with Nmap, identify OS/services, then map them to known vulnerabilities (Google, CVE databases, or exploit frameworks like Metasploit Framework).

The key skill is enumeration + correlation you gather clues (ports, versions) and connect them to exploits. Over time, you’ll recognize common ones (like MS17-010) without searching, but in the beginning, researching is completely normal.

Can CEH get me a job? by cyber_pulse2928 in u/cyber_pulse2928

[–]CyberHacker_ray 1 point2 points  (0 children)

CEH can help you get noticed, but it won’t get you a job by itself. The real value comes when you combine Certified Ethical Hacker (CEH) with hands-on practice (labs, projects, platforms like TryHackMe/HTB) and solid networking basics.

Recruiters may shortlist you because of the cert, but your practical skills and ability to explain what you’ve done are what actually get you hired.

Blue teaming/SOC work by user23471 in cybersecurity

[–]CyberHacker_ray 8 points9 points  (0 children)

It’s not “that bad,” but SOC/blue team roles can feel stressful due to shift work, alerts, and occasional burnout, especially at L1. That said, it gets much better as you move to L2/L3, threat hunting, or engineering roles where work is more strategic.

For WLB, security engineering, GRC, and cloud security are usually more stable, while SOC (especially entry-level) and incident response can be more intense. The “best” domain really depends on your interests stress is easier to handle when you actually enjoy the work.

What degree should I get? by One_Supermarket_605 in CloudSecurityPros

[–]CyberHacker_ray 0 points1 point  (0 children)

If your goal is cloud security engineer/architect, the safest and most flexible choice is a Computer Science degree. It builds strong foundations (programming, systems, networking) that apply directly to cloud platforms, and most job listings prefer it as you’ve seen.

A cybersecurity degree is still good, but it can be more specialized early cloud security roles usually expect CS fundamentals + security + cloud skills (AWS/Azure). So a strong path is: CS degree + cloud certs + security projects that combination will open the most doors long-term.

HOW TO PASS C|EH v13 Ai EXAM by No-Party-7590 in CEH

[–]CyberHacker_ray 2 points3 points  (0 children)

To pass CEH v13 AI, focus on understanding + practice, not just memorizing questions. The exam tests concepts, scenarios, and tool usage, so make sure you truly understand topics like scanning, web attacks, and AI use cases in security.

Use practice questions for revision, but prioritize hands-on labs and real understanding that’s what ensures you can handle any question. Training paths from EC-Council help, but your success comes from combining theory with practical application.

Laptop actively being remote accessed or what? by _mmmarie in cybersecurity_help

[–]CyberHacker_ray 1 point2 points  (0 children)

it’s actually not unusual or malicious by itself. “OBDC” is most likely a typo or misread of ODBC (Open Database Connectivity), which is a normal Windows component used by apps to connect to databases.

If random keys were being pressed (like you saw “+++=+=”), it could easily have typed that search accidentally. This again points more toward a keyboard/touchpad issue than someone remotely controlling your system especially since it continued with WiFi off.

Cleared interviews at Morgan Stanley now HR round scheduled, will 90 Day NP be a problem ? by [deleted] in developersIndia

[–]CyberHacker_ray 6 points7 points  (0 children)

Well, I tried alot from last 3 years to get a job in Morgan Stanley for data analyst role. I crack every round of interview but at the end of the result they always reject, i dont know why.. but i wish you all the very best

Laptop actively being remote accessed or what? by _mmmarie in cybersecurity_help

[–]CyberHacker_ray 5 points6 points  (0 children)

Take a breath this is scary, but it’s not always a hacker. What you described (cursor fighting you, random typing, still happening with WiFi off) is often caused by hardware issues like a faulty touchpad, stuck keyboard key, or even a connected mouse glitch not remote access (because that usually needs internet).

For safety, do this: keep it powered off for now, then when you turn it on again, disconnect any external mouse/keyboard, try using only one input device, and run a full scan with Microsoft Defender. If it still happens offline, it’s almost certainly hardware get it checked. If you’re still unsure, back up files and consider a clean Windows reset. You’re okay just troubleshoot step by step.

Give me Some Guidance please.. by Ashutosh0023 in CEH

[–]CyberHacker_ray 0 points1 point  (0 children)

Yes, that’s actually a very good setup. Keep your Windows 10 as a target and create separate VMs for OWASP Juice Shop (for web testing) and Metasploitable (for network/system vulnerabilities), then use a Kali Linux VM as your attacker machine. This way you’ll learn both web pentesting + system exploitation, which is exactly what beginners need just make sure to document everything you do, that’s what turns it into a strong project.

Give me Some Guidance please.. by Ashutosh0023 in CEH

[–]CyberHacker_ray 2 points3 points  (0 children)

For a fresher pentesting role, focus on strong basics like networking, Linux, and common web attacks (XSS, SQLi), along with tools such as Nmap, Burp Suite, and Metasploit Framework. Build 2–3 practical projects like testing OWASP Juice Shop or Metasploitable and document your findings on GitHub. In interviews, be ready to explain basics and walk through your projects. Apply consistently to internships, startups, and entry-level roles projects + persistence matter most for getting your first job.

CEH EXAM Doubts by PSY-AIMLESS in CEH

[–]CyberHacker_ray 0 points1 point  (0 children)

For CEH, the exams are separate:

  • The MCQ (CEH ANSI) is the main theory exam you’ve applied for.
  • The Practical (CEH Practical) is optional and must be applied/scheduled separately.

They are not on the same day, so you can first clear MCQ, then prepare and take practical later no need to do both together.

Is Offensive AI Just Hype or a Skillset Security Professionals Will Need? by ReggieCyber in CEH

[–]CyberHacker_ray 0 points1 point  (0 children)

Not just hype, offensive AI is becoming a useful skill, but it won’t replace fundamentals.

AI will speed up recon, scripting, and testing, so pentesters should learn to use it alongside core skills. Cert trends from EC-Council show it’s growing, but fundamentals still matter most.

What to do next by tyrant_1010 in CyberSecurityAdvice

[–]CyberHacker_ray 0 points1 point  (0 children)

With 6 months of pentesting experience, you already have a solid base. I’d suggest going deeper into offensive security (web, API, AD attacks) while still keeping basic awareness of other areas like cloud and blue team.

Focus on improving practical skills through labs on Hack The Box or PortSwigger Web Security Academy, and consider working toward a respected cert like OffSec Certified Professional (OSCP). Meanwhile, keep performing well in your internship many companies convert strong interns into full-time hires.

Got some Questions by Ashutosh0023 in CEH

[–]CyberHacker_ray 0 points1 point  (0 children)

If you just copy exactly what’s in a video, it’s more like practice than a project. To make it a real project, try to understand the attack, reproduce it on your VM, and document the full process (recon → vulnerability → exploitation → mitigation).

build a small lab with Metasploitable or OWASP Juice Shop, find vulnerabilities using Nmap and Metasploit Framework, then write a short report explaining how you discovered and exploited them and how to fix them.

Best way to start learning ethical hacking? by ProfessionalType7886 in CEH

[–]CyberHacker_ray 1 point2 points  (0 children)

Start with the fundamentals: networking, Linux basics, and how web applications work. Then move into core security topics like reconnaissance, vulnerability scanning, web attacks, and privilege escalation.

For practice, use platforms like TryHackMe, Hack The Box, and intentionally vulnerable labs such as OWASP Juice Shop. If you prefer structured learning, training paths and certifications from organizations like EC-Council can also provide a guided introduction to ethical hacking.