TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: How can I become a competent Network Engineer?

12 pointsby 5ESSover 3 years ago
I wish to become a professional network engineer (in particular: telecommunications). I’ve been doing intermediate level programming and sysadmin projects since I was a teenager (23 now) but I stil feel like a total noob. I enrolled in university to get my bachelors in “Network Engineering and Cybersecurity” but the field is so extremely vast and complex that I fear this course alone won’t be nearly enough. I am asking for suggestions on how I can learn, from the ground up, how to go from level 1 to a master network engineer. Can you please give me any project ideas, books, links, or advice that will help me? Thankyou for reading.

2 comments

runjakeover 3 years ago
An easy way: get a CCNA. I like the Lammle CCNA study book but YMMV.<p>It’s not required but it’s useful for network noobs and is an easy way to get your foot into the door.<p>Then, get an entry-level job, and keep upgrading jobs every year or two until you are at desired pay and job roles.<p>Consider acquiring equipment for a test or home lab to play with and try new things.<p>Get used to feeling overwhelmed&#x2F;out of your league. It’s normal and if you don’t give up, you’ll manage.<p>Learn Python so that you can automate menial tasks. Love it or hate it, it’s the most common language you’ll see in the network engineer world.<p>Download Wireshark and sniff traffic. Explore different protocols and what types of headers they use. Explore how TCP connections are created and destroyed. Do the same with TLS. Being half-decent with Wireshark will have you looking like a mage in today’s world.<p>If you get to a point where you’ve been doing it 20-25 years like me: don’t stop learning and encourage curiosity in your colleagues (especially those curious mid-20s kids).<p>Extra-credit: Go through the TCP&#x2F;IP Illustrated Vol 1 book by W Richard Stevens. After you get your CCNA, read the Routing TCP&#x2F;IP Cisco Press book.<p>Source: Am well-paid net engineer.
elevationover 3 years ago
I&#x27;m not a network engineer. I studied CS and write software and I&#x27;m not looking to transition -- but following things have given me a better understanding of networks to a point where the &quot;mastery&quot; you seek seems attainable:<p>* iterating in a homelab * consuming industry conference talks, mailing lists * connecting with professionals in forums and IRL<p>Homelab V1: My first homelab was a PC router with 4-5 $10 nics running pfsense, a 48 port 1u Cisco switch and a linksys AP. I had my laptop and a couple PCs and a networked printer, and I got comfortable with ipv4 playing with it. I renumbered hosts all around rfc1918 space with varying masks til subnetting was intuitive. I used Wireshark on my laptop and tcpdump on my router to debug network issues and to see layer 2 traffic (ARP, DHCP, various vendor layer2 discovery protocols.) I used the switch&#x27;s CAM table to indicate which physical port had originated frames with a particular source MAC address. I configured the same mac address into a couple devices and learned how ARP table poisoning works (accidentally!) I put multiple NICs in a PC on the same subnet, and when I had issues, I learned how the routing table works. I setup pfsense as an L2 deny-by-default firewall briging the wifi and the wired lan; this was a fantastic exercise as I had to whitelist DHCP before clients could get addresses, whitelist their addresses before they could talk to the router, whitelist ICMP, DNS, NTP, HTTP&#x2F;S, SSH, IRC, etc before my laptop would function as well as it had on the unfirewalled wifi. As I picked up more hardware, I started playing with vlans, STP, DHCP snooping. I played with VPN into L2TP, OpenVPN, IPSEC, SSH tunnels, and QoS schemes. I had to move my VPN port to 80 because IHOP wifi didn&#x27;t allow any other ports out. I searched &quot;ARP security&quot;, &quot;DHCP attacks&quot;, etc and read up on attacks and security strategies for every protocol I used, learning about 802.1X port security and Radius Severs to prevent DHCP exhaustion, for instance. I pointed security and configuration scanners at my network services, and watched tons of security conference videos on youtube in my spare time to see how things get pwn&#x27;d. I played with multimode fiber, jumbo frames. I setup multiple routers such that packets from my living room to upstairs would take one route, while the response packets would take another route. I applied my designs across multiple brands of hardware (like setting up vlans to interoperate between different brands of switches.) I got HTTPS working everywhere, first with self signed certs, then with an experimental CA. I bought a 42U rack, patch panels, a UPS. I got comfortable documenting my setups.<p>Homelab v2: I wanted to learn ipv6 and nothing about it made sense, so I started by watching youtube videos on it, then moved to conference talks with war stories of people deploying it. Once I was confident I could make sound technical decisions (have to let go of the ipv4 poverty mindset and be okay with just letting hosts SLAAC a &#x2F;64!) then I built a wifi network that was ipv6-only. I loaded OpenBSD on another dual-nic PC, connected one nic to my homelab lan and the other to a new wifi AP. I applied for a Hurricane Electric Tunnel, and setup OpenBSD to send an RA for the HE &#x2F;48 on the wifi nic, and forward all ipv6 traffic from the wifi NIC to the tunnel broker via the homelab lan. I tweaked my RAs, I learned about NDP, DHCPv6, DHCP-PD, and setup DNS64&#x2F;NAT64, (so ipv6 hosts can access the ipv4 web.) Then I started connecting windows, apple, android, ubuntu clients and using wireshark to diagnose issues when they wouldn&#x27;t work. I added an 8-port router to drop ipv4 traffic by default and put wifi, printers, wired hosts, etc on their own segments. Turns out I could run my whole house this way!<p>Homelab v3: Lately I&#x27;ve been interested in getting my own ASN. I&#x27;ve read news articles and NANOG discussions for years about BGP security failures, blogs from small ISPs and network engineers setting up their own networks and recommending what used gear to buy on eBay. After looking into ARIN fee schedules, I formed an LLC an I&#x27;m seriously considering applying for my own ASN and some ipv6 space, augmenting cheap fiber in my neighborhood with a connection from a local WISP who agreed to let me peer with them. For more money monthly than I can probably justify, my ISP will give me an L2 path to a nearby IX so I could peer over fiber instead of tunnelling to my nearest HE tunnel broker POP.<p>All along the way, I&#x27;ve shared my work in forums and chat rooms (IRC) and got helpful feedback. Mentioning my homelab in conversation helped me make friends with folks who share my interest, including senior technical staff in local ISPs, major hardware vendors, pen testing firms, and multi-campus IT departments. This professional network could help me transition to network engineering if I ever left software development for something more network related.<p>A homelab won&#x27;t prepare you fully for a job. Depending on the position (multi-campus corporate IT? CTO of a CDN? Datacenter Architect? ISP?) you might be working with microwave links, 400Gbps routers (can&#x27;t really firewall at that speed!), MPLS, SDN, SD-WAN, or even application stuff like k8s. However, a firm grasp of the fundamentals and a few friends in the industry will make most of those things accessible for you.