From Debugging to Defending: My Journey into VAPT from Software Development.
Abhijit Mhatre
CEH | Cybersecurity | Web & API Penetration Tester | Software Developer | GenAI | LLM Models | AWS
I'm switching from Software Development to Ethical Hacking!. So the next few months I will be learning more about Cyber Security and then start a new career as VAPT.
Why did I decide to do a career switch?
I've been mostly working as an software developer the past two years. It's been fun and something I've found interesting, but this was my first step to learn how software are build, work before starting the ethical hacking.
I am still working with frontend and backend technologies like MERN, MEVN stack. So developing web applications was never something I was that enthusiastic about, but rather something I found logical to learn. I haven't been able to get rid of the feeling of unimportance in my work. I have been wanting to do something that feels more meaningful, but I never really knew what that would be.
I have become more and more interested in Cyber Security in the past few years but I never really knew how I could start a career doing that. So now I'm going to spend the next 6 months learning more about Cyber Security and I finally feel I'm going to be doing something that is important and meaningful! It is scary to do a career switch at this point where I already had quite a lot of experience as a developer, but I don't think that the time has been wasted. I'm sure my background as a software developer will also help me with my new career.
What will i learning in next few months about ethical hacking ?
As a software developer stepping into the realm of ethical hacking, I'm thrilled to share my roadmap for mastering the art of Vulnerability Assessment and Penetration Testing (VAPT), starting with a deep dive into the world of Vulnerability Assessment.
What is a Vulnerability Assessment?
Vulnerability Assessment serves as the guardian of digital fortresses, identifying weaknesses within computer systems, networks, and software, along with the potential risks they pose. Utilizing specialized tools and manual methods, it not only pinpoints potential issues but prioritizes them based on severity.
Key Features of a Vulnerability Assessment:
领英推荐
How to Perform Vulnerability Assessments?
Executing a vulnerability assessment involves diverse techniques, with automated vulnerability scanning being a widely employed method. The vulnerability scanner digs into databases of known vulnerabilities, scanning applications, systems, and data comprehensively. The generated report acts as a roadmap, detailing uncovered problems and proposing countermeasures.
Vulnerability Assessment Types:
Vulnerability Assessment Methodology:
As I embark on this journey towards ethical hacking mastery, I'll be sharing my progress and insights. Stay tuned for updates on my exploration of web application vulnerability assessment and API vulnerability assessment! Let's secure the digital world together.
There are multiple vulnerability assessment types. As a software developer, I have knowledge about the web application and how build APIs. That's why, I choose web application vulnerability assessment and penetration testing.