📅 Day 1 – Environment Setup & Foundations
🎯 Goal
Build a clean, reproducible cybersecurity lab and a unified knowledge system to support long-term learning and documentation.
âś… What I Did
Virtualization & Environment
- Installed and configured Parallels Desktop Pro
- Created and verified the following virtual machines:
- Windows 11
- Kali Linux
- Ubuntu Linux
- Considered (not yet installed) a Windows Server VM
Knowledge Management
- Installed Obsidian
- Enabled synchronization across all devices
- Created a single root folder:
Cybersecurity/
- Labs
- Daily
- GitHub Portfolio
- Reports
- Templates
- Useful
- Screenshots
Kali Linux – Initial Operations
- Updated and cleaned the system:
sudo apt updatesudo apt full-upgrade -ysudo apt autoremove -y
- Reviewed software installation methods:
- APT (official repositories)
- Snap / Flatpak / AppImage
Accounts Created
- TryHackMe → https://tryhackme.com
- GitHub → https://github.com
âś… What Worked
- Parallels runs all VMs smoothly on macOS
- Kali Linux is stable and ready for labs
- Obsidian folder structure feels scalable and clean
- Understanding install methods reduced blind copy-pasting
❌ What Didn’t
- Software installation methods feel fragmented:
- APT (official repositories)
- Snap / Flatpak / AppImage
- Still unclear when containers are preferable to native installs
đź§ Key Takeaways
- Environment setup is a force multiplier, not busywork
- Kali should remain lean; not every tool belongs system-wide
- Documentation matters as much as execution
- Doing this properly once prevents chaos later
âť“ Questions
- When does a Windows Server VM become truly necessary?
- When should Docker/Podman be preferred over native installs?
- What tools should always exist on Kali vs installed per lab?
📚 Resources
- TryHackMe Learning Paths: https://tryhackme.com/paths
Personal Objective (Why This Exists)
- ⬜ Transition into a remote-capable cybersecurity role
- ⬜ Build habit of continuous learning and documentation
- ⬜ Within 5–7 months:
- Complete and document ≥15 penetration tests
- Identify and fix real vulnerabilities
- Be junior-level hireable, not “enthusiastic but useless”
