šŸš€ Launching My Cybersecurity Journey: Day One with CompTIA Security+

Today marks the official start of my deep dive into cybersecurity, and I couldn’t be more energized. I’ve set my sights on earning the CompTIA Security+ certification—a foundational credential that opens doors to high-impact roles in security engineering, incident response, and cloud architecture. The goal? Complete all training material by the end of September and sit for the exam with confidence and precision.

šŸ” Day One: Fundamentals of Security (Objectives 1.1 & 1.2)

I kicked things off by exploring the bedrock principles that define cybersecurity. These aren’t just buzzwords—they’re the DNA of every secure system.

🧬 CIANA: The Pillars of Security

  • Confidentiality – Keeping sensitive data private and protected from unauthorized access.
  • Integrity – Ensuring data remains accurate and unaltered unless by authorized means.
  • Availability – Making sure systems and data are accessible when needed.
  • Non-repudiation – Guaranteeing that actions or communications can’t be denied later.
  • Authentication – Verifying identity before granting access.

Together, these form the CIANA model—a framework that’s already reshaping how I think about system design and risk mitigation.

šŸ” AAA: The Access Control Triad

  • Authentication – Who are you?
  • Authorization – What are you allowed to do?
  • Accounting – What did you do?

This trio is essential for tracking user behavior, enforcing permissions, and maintaining audit trails. It’s the backbone of secure access management.

šŸ›”ļø Security Controls: Categories & Types

I also explored how organizations implement safeguards through:

  • Control Categories: Managerial, Operational, and Technical
  • Control Types: Preventive, Detective, Corrective, Deterrent, and Compensating

Understanding these distinctions helps clarify how layered defenses work in practice—and how to evaluate their effectiveness.

🧱 Zero Trust & Gap Analysis

The Zero Trust model was a standout concept: ā€œNever trust, always verify.ā€ It’s a mindset shift that assumes breach and demands continuous validation. Paired with Gap Analysis, which identifies where current security measures fall short, I’m already thinking like a security architect—spotting weaknesses and planning improvements.

šŸŽÆ What’s Next?

This journey is more than just passing an exam. It’s about building a strategic foundation for a career in cybersecurity—one that blends technical mastery with operational insight. I’ll be tracking my progress, sharing key takeaways, and reflecting on how each concept fits into the broader security landscape.

By the end of September, I aim to be exam-ready. But more importantly, I want to be role-ready—prepared to contribute meaningfully to any security team I join.

Stay tuned. The grind has begun. šŸ’»

Share

Ivan Windon

Ivan Windon is a Senior Linux Administrator at Metric5. Ivan is actively engaged in Cloud Technologies with Oracle Gov Cloud, and Azure. Ivan has extensive experience with Linux and Windows administration, DNS, Networking, IDM, and Security. In his free time, he enjoys being with his wife and two children.

You may also like...

Leave a Reply