1 00:00:00,240 --> 00:00:02,070 Hello everybody and welcome to this lecture. 2 00:00:02,070 --> 00:00:06,190 And right now we're going to discuss briefly what ethical hacking is. 3 00:00:06,330 --> 00:00:11,610 Now this tutorial is basically for anyone who is pondering whether they want to get into this whether 4 00:00:11,610 --> 00:00:16,650 this is something that they're particularly interested in or whether this is something that they thought 5 00:00:16,650 --> 00:00:21,030 would be interesting but after this video they decide it is not for them. 6 00:00:21,240 --> 00:00:27,090 So first of all we all know about three terms for the Ethical Hacking or most of us know about the three 7 00:00:27,090 --> 00:00:31,820 terms such as the black hat the white hat and the great hat. 8 00:00:31,830 --> 00:00:37,410 Now before we discuss all of those three we want to first define what ethical hacking is. 9 00:00:37,410 --> 00:00:39,450 While an ethical hacker is. 10 00:00:39,630 --> 00:00:45,990 And you should note these are part of the sentence where it says ethical is basically a white hat hacker 11 00:00:46,020 --> 00:00:55,100 who breaks into different systems networks companies in order to prevent the cyber criminals. 12 00:00:55,100 --> 00:01:00,750 The black hat hackers to actually invade and steal some valuable information. 13 00:01:00,750 --> 00:01:05,670 So they're the ones that are actually attacking the system in order to protect it. 14 00:01:05,730 --> 00:01:06,480 OK. 15 00:01:06,570 --> 00:01:10,440 That is the basic idea of an ethical hacker. 16 00:01:10,440 --> 00:01:16,230 It is more and more available to us now in the technologies. 17 00:01:16,230 --> 00:01:22,200 Basically what most companies now do is they hire ethical hackers in order for them to actually attack 18 00:01:22,230 --> 00:01:27,540 their own websites companies or basically any kind of system that they want to protect. 19 00:01:27,690 --> 00:01:33,690 And an ethical hacker should provide them all the vulnerabilities that he or she was able to find if 20 00:01:33,690 --> 00:01:36,540 there were any and how they can protect them. 21 00:01:37,140 --> 00:01:37,790 OK. 22 00:01:38,040 --> 00:01:40,640 Now enough about that. 23 00:01:40,650 --> 00:01:44,580 We want to talk about what black head white hat and gray hat is. 24 00:01:44,580 --> 00:01:51,840 Now the black hat is an evil hacker basically a black hat is someone who breaks into a system without 25 00:01:51,930 --> 00:01:58,500 any approval from the client or from the anyone who owns the system. 26 00:01:58,500 --> 00:02:04,320 Basically they break in just to steal valuable information such as credentials usernames passwords different 27 00:02:04,320 --> 00:02:09,600 types of messages or basically anything that is valuable to someone. 28 00:02:09,600 --> 00:02:16,530 For example we all know about the Sony hack that happened a few years ago where basically the hacker 29 00:02:16,530 --> 00:02:21,870 group hacked entire Sony platform and it didn't really happen once it happened multiple times and that 30 00:02:21,870 --> 00:02:25,350 is just an example of black hat hacking. 31 00:02:25,410 --> 00:02:31,080 Now that is a black hat basically an evil hacker and a white hack is basically an ethical hacker who 32 00:02:31,080 --> 00:02:38,250 hacks for good he basically hacks in order to prevent unauthorized access to the system by hacking it 33 00:02:38,310 --> 00:02:41,220 and then securing it in the proper way. 34 00:02:41,670 --> 00:02:47,280 And the grey head is the mixture of the black hat and white hack and pardon me white hat. 35 00:02:47,280 --> 00:02:55,740 And basically he's the one who does a little bit both from the black hat and from the white hat. 36 00:02:55,950 --> 00:02:56,250 OK. 37 00:02:56,250 --> 00:03:04,440 So basically the Now let's talk about ethical hacking in more detail basically Certified Ethical Hacker 38 00:03:05,810 --> 00:03:13,170 which is CCH which is also certificate for which we're going to talk about later on is basically a it 39 00:03:13,170 --> 00:03:18,000 is also credentialing and training program provided by its council. 40 00:03:18,180 --> 00:03:22,290 It is respected and trusted ethical hacker program in the industry. 41 00:03:22,290 --> 00:03:29,040 Now since the inception of a Certified Ethical Hacker in 2003 the credential has become one of the best 42 00:03:29,130 --> 00:03:32,010 options for industries and companies across the world. 43 00:03:32,940 --> 00:03:33,800 OK. 44 00:03:34,050 --> 00:03:40,230 Now today you can find basically Certified Ethical hackers working with some of the finest the largest 45 00:03:40,230 --> 00:03:48,350 companies across industries like for example government financial healthcare energy and many more. 46 00:03:48,410 --> 00:03:53,550 They work for those companies in order to protect them from the black hat hackers who might be able 47 00:03:53,550 --> 00:03:57,470 to break into their system and steal valuable data. 48 00:03:57,480 --> 00:04:04,050 Now some of the questions that you might have are what kind of vulnerabilities does an attacker see 49 00:04:04,530 --> 00:04:07,170 what can attacker do with the information. 50 00:04:07,170 --> 00:04:09,900 What is the best way to fix the vulnerability. 51 00:04:09,990 --> 00:04:15,720 How many people notice the attempted attack and for example what information or system would a hacker 52 00:04:15,780 --> 00:04:16,620 want to access. 53 00:04:16,620 --> 00:04:24,450 Now those are all of the things that you need to actually question once you perform a penetration test 54 00:04:24,450 --> 00:04:30,240 or once you attack a specific target you need to know what can we do with this specific information. 55 00:04:30,270 --> 00:04:35,850 Once we get to it how many people will notice that if we actually attempted the attack or did we actually 56 00:04:35,880 --> 00:04:39,980 went through with the entire attack and managed to actually steal something now. 57 00:04:40,000 --> 00:04:44,910 And the most important thing are what kind of abilities do we see. 58 00:04:44,970 --> 00:04:51,640 So what kind of vulnerabilities can we find only protect that server that we want to hack okay. 59 00:04:51,680 --> 00:05:00,710 Basically the importance of ethical hacking is growing more and more each year like ten years ago. 60 00:05:00,740 --> 00:05:06,530 Most of the people if you would last some random people on the street there would be like Oh that is 61 00:05:07,220 --> 00:05:09,070 not really that necessary. 62 00:05:09,140 --> 00:05:10,640 It's just a hobby. 63 00:05:10,640 --> 00:05:17,770 And right now it is growing in one of the most important careers in fields in the I.T. community today. 64 00:05:17,780 --> 00:05:22,660 Basically everything right now is going over the Internet over. 65 00:05:22,820 --> 00:05:28,820 It is connected to different computers the power plants the nuclear plants everything is connected. 66 00:05:29,090 --> 00:05:34,940 And basically the importance of ethical hacking is growing just because of that because the damage can 67 00:05:34,940 --> 00:05:39,580 be done more than it could have been done 10 years ago for example. 68 00:05:39,680 --> 00:05:48,020 Now if we coming off the internet of things everything else will also be connected to the Internet such 69 00:05:48,020 --> 00:05:52,900 as your microwave your fridge everything. 70 00:05:52,910 --> 00:05:58,920 So you don't really want anyone else besides you to be able to control your own flat. 71 00:05:59,450 --> 00:06:00,200 OK. 72 00:06:00,230 --> 00:06:06,770 So basically these government agencies and businesses organizations today are in constant need of ethical 73 00:06:06,770 --> 00:06:10,410 hackers to combat the growing threat to I.T. Security. 74 00:06:10,430 --> 00:06:14,570 Now a lot of government agencies professionals and corporations now understand that. 75 00:06:14,630 --> 00:06:20,120 Basically if you want to protect the system you cannot do it simply just by locking your doors. 76 00:06:20,120 --> 00:06:26,210 You need to try to attack it and see what are all of the available ways in order for someone to get 77 00:06:26,360 --> 00:06:26,630 in. 78 00:06:27,590 --> 00:06:29,400 OK. 79 00:06:29,480 --> 00:06:35,630 Now there are most the actual terms and improve expressions that you should know as an ethical hacker 80 00:06:35,660 --> 00:06:38,780 but we're not going to talk about that at the moment. 81 00:06:38,800 --> 00:06:41,120 We are just going to mention it. 82 00:06:41,370 --> 00:06:44,680 Uh basically this is of course for our teach you how to get a job. 83 00:06:44,690 --> 00:06:50,060 So I already assume that you know a little bit about ethical hacking or that you are in the process 84 00:06:50,060 --> 00:06:53,740 of studying and you want to see how you can get your first job. 85 00:06:53,780 --> 00:06:56,810 This is not a course where we will actually teach the ethical hacking. 86 00:06:56,810 --> 00:07:01,250 There are a bunch of other courses which I'll show you later on where you can actually learn ethical 87 00:07:01,250 --> 00:07:02,160 hacking. 88 00:07:02,210 --> 00:07:07,460 Now you should already be familiar with some of the terms and expressions if you're an ethical hacker 89 00:07:07,460 --> 00:07:12,710 such as forms malware viruses ransomware and so on and so on. 90 00:07:13,400 --> 00:07:19,300 So if I mentioned them I will actually believe that you already know what they mean. 91 00:07:19,820 --> 00:07:23,320 Now what are the benefits of ethical hacking. 92 00:07:23,330 --> 00:07:29,360 Now the primary benefit of ethical hacking is to prevent data from being stolen and misused by malicious 93 00:07:29,360 --> 00:07:32,900 hackers or attackers such as black heads. 94 00:07:33,090 --> 00:07:41,210 Now what are those uh precious data or valuable data that or however you want to call it basically that 95 00:07:41,210 --> 00:07:48,260 can be of discovering vulnerabilities from the attackers point of view so that weak points can be fixed. 96 00:07:48,260 --> 00:07:54,230 Now that is one of the benefits of ethical hacking but also implementing a secure network that prevents 97 00:07:54,230 --> 00:08:00,010 security breaches that is also a job of an ethical hacker. 98 00:08:00,050 --> 00:08:05,930 Defending national security by protecting data from terrorists is a little bit extreme but it is also 99 00:08:05,930 --> 00:08:11,960 the benefit of being an ethical hacker or of having an ethical hacker in your own company or in this 100 00:08:11,960 --> 00:08:13,740 case in the government. 101 00:08:13,820 --> 00:08:20,630 Government hires ethical hackers in order to prevent their precious data from being stolen by spies 102 00:08:20,630 --> 00:08:25,370 or terrorists or basically anyone that wants to get their hands on the data. 103 00:08:25,370 --> 00:08:31,850 Now also gaining the trust of customers and investors by ensuring the security of their products and 104 00:08:31,850 --> 00:08:32,810 data. 105 00:08:32,810 --> 00:08:37,070 Now you always want to make sure that the website is secure. 106 00:08:37,070 --> 00:08:44,090 Once you actually want to provide that website with your credit card number which are low a physical 107 00:08:44,180 --> 00:08:51,320 address name last name birth and so on and so on all of those valuable information to you need to be 108 00:08:51,320 --> 00:08:53,490 protected by that website. 109 00:08:53,510 --> 00:09:00,050 So that website most likely hydrostatic hackers to test their security and to see whether there are 110 00:09:00,080 --> 00:09:06,820 any vulnerabilities or basically any holes in the system from where the bad guys can get in. 111 00:09:07,550 --> 00:09:13,910 So you want to make sure that your data is secured properly before you actually input your credit card 112 00:09:13,910 --> 00:09:16,080 number next time. 113 00:09:16,160 --> 00:09:20,310 You can also help protect networks with real world assessments. 114 00:09:20,330 --> 00:09:26,600 Now there are multiple types of ethical hacking now you can hack networks websites. 115 00:09:27,040 --> 00:09:32,630 Basically there are even physical hacks such as for example breaking the doors to a company. 116 00:09:32,620 --> 00:09:39,860 Now that is not really a point of of course but I'm just mentioning there are a bunch of different things 117 00:09:39,860 --> 00:09:46,340 that you can do with the actual thought of being an ethical hacker. 118 00:09:46,340 --> 00:09:52,360 It is very interesting once you get in and basically the jobs can also be very interesting. 119 00:09:52,470 --> 00:09:55,020 Now let us talk about types of ethical hacking. 120 00:09:55,020 --> 00:09:57,150 We just mentioned it like right here. 121 00:09:57,150 --> 00:10:00,450 But we are going to talk about them in more detail. 122 00:10:00,450 --> 00:10:06,930 Now it is not big secret that any system process website device or anything else can be hacked. 123 00:10:06,930 --> 00:10:12,240 Now in order to understand how the hack might happen and what the damage would be ethical hackers must 124 00:10:12,240 --> 00:10:17,970 know how to think like malicious hackers and know the tools and techniques they're likely to use. 125 00:10:17,970 --> 00:10:26,400 So there because of that we actually split ethical hacking in to a few different sections each section 126 00:10:26,520 --> 00:10:33,660 is actually aimed at specific parts such as for example web application hacking is aimed at hacking 127 00:10:33,830 --> 00:10:35,380 websites basically. 128 00:10:36,300 --> 00:10:43,110 Even the word says it it is basically used to hack Web sites to protect websites such as for example 129 00:10:43,190 --> 00:10:47,460 Eskil injection access injection and an injection and so on and so on. 130 00:10:47,460 --> 00:10:52,050 Now for those of you who are not ethical hackers and for those who do some of the terms or some of the 131 00:10:52,050 --> 00:10:55,290 attacks that you can perform on to the website. 132 00:10:55,460 --> 00:11:00,350 Now the next thing is the system hacking which is one of the most important ones. 133 00:11:00,360 --> 00:11:06,810 Basically the system hacking is getting the access to for example your and my machine. 134 00:11:07,290 --> 00:11:13,940 So for example someone can install a backdoor onto my P.C. and monitor everything I do such as control 135 00:11:13,950 --> 00:11:23,640 my keyboard control or run a key logger in order to capture my passwords to run ah that can record my 136 00:11:23,640 --> 00:11:24,540 microphone basically. 137 00:11:24,720 --> 00:11:25,850 They can do anything. 138 00:11:25,860 --> 00:11:34,230 Once the system is hacked or once my computer system is hacked well have web server hacking basically 139 00:11:34,230 --> 00:11:36,400 hacking of the databases. 140 00:11:36,510 --> 00:11:42,600 For example let's say someone hacks into Facebook they enter their database and basically they steal 141 00:11:42,690 --> 00:11:44,730 everyone's usernames and passwords. 142 00:11:44,730 --> 00:11:51,780 Therefore the attacker would have everyone at everyone's Facebook account and you can only imagine what 143 00:11:51,780 --> 00:11:54,090 kind of information that would be. 144 00:11:54,090 --> 00:11:59,490 Now of course it is really hard to hack Facebook and even if you do manage to hack it it would probably 145 00:11:59,490 --> 00:12:02,270 get patched the same day. 146 00:12:02,580 --> 00:12:10,500 If someone finds out of course and the more popular or certain websites or certain company or something 147 00:12:10,500 --> 00:12:16,980 like that is such as Facebook Google Twitter and so on and so on the harder will be to hack them because 148 00:12:16,980 --> 00:12:19,280 they have hard and multiple ethical hackers. 149 00:12:19,290 --> 00:12:27,700 Cybersecurity experts in order to prevent any kind of intrusion to happen on their own platforms. 150 00:12:27,810 --> 00:12:34,320 Now we also have hacking wireless networks now part of its networks are something that can easily be 151 00:12:34,320 --> 00:12:42,330 hacked especially if someone who's set up that part of this network has set up a big pass for it for 152 00:12:42,330 --> 00:12:43,560 that actual part of us. 153 00:12:43,560 --> 00:12:47,230 It can be hacked in a matter of milliseconds in that case. 154 00:12:47,400 --> 00:12:52,680 And once you actually breached you wireless network you can perform different types of attacks such 155 00:12:52,680 --> 00:12:58,000 as monitoring networks and network connections. 156 00:12:58,240 --> 00:13:05,340 And in the middle attacks sniffing different packets see Big Data sniffing passwords and so on and so 157 00:13:05,340 --> 00:13:05,720 on. 158 00:13:05,820 --> 00:13:13,350 You can perform more of spoofing and all of those actual terms that you should know if you're an ethical 159 00:13:13,350 --> 00:13:15,870 hacker if you're not. 160 00:13:15,870 --> 00:13:21,810 Once again don't worry you will learn it later on in some different course if you decide that ethical 161 00:13:21,810 --> 00:13:24,110 hacking is a job for you. 162 00:13:24,180 --> 00:13:32,220 And we also have at the end the social engineering which is these mostly and nothing actually aimed 163 00:13:32,280 --> 00:13:34,890 at the systems or Web sites or something like that. 164 00:13:34,890 --> 00:13:39,720 It's most likely an attack aimed on to a human being. 165 00:13:39,720 --> 00:13:46,740 So for example you can hack people such as asking them simply what the password deals let's say you 166 00:13:46,740 --> 00:13:49,390 want to hack our wireless network in a cafe. 167 00:13:50,040 --> 00:13:56,070 And the easiest way you can do that is to ask the waiter there what the password is. 168 00:13:56,100 --> 00:14:00,600 There is no need for you to brute force anything you could simply just ask for password and if they 169 00:14:00,600 --> 00:14:01,940 give it to you they give it to you. 170 00:14:01,940 --> 00:14:08,770 If they don't then simply you perform different types of the attacks aimed for wireless networks. 171 00:14:08,940 --> 00:14:13,870 Also let's say you want to steal some precious data once you're in the network. 172 00:14:14,100 --> 00:14:22,360 You need to make sure that the you need to meet the person that you want to hack to input some were 173 00:14:22,370 --> 00:14:23,570 you their password. 174 00:14:23,590 --> 00:14:25,890 Well they shouldn't really input it. 175 00:14:25,890 --> 00:14:31,860 So basically then you clone the Facebook page let's say you clone it to look exactly like the real Facebook 176 00:14:31,950 --> 00:14:38,640 you sent today you send it over the local network with the are spoofing and with the demand in the middle 177 00:14:39,060 --> 00:14:46,200 attack and basically then the actual target will input their password into a fake Facebook page and 178 00:14:46,200 --> 00:14:51,520 therefore that is a type of these social engineering attack because you are we managed to make up human 179 00:14:51,530 --> 00:14:53,530 beings input their password. 180 00:14:53,590 --> 00:14:55,280 They shouldn't. 181 00:14:55,300 --> 00:15:01,210 They basically believe that that page of Facebook page is a real Facebook page and therefore they typed 182 00:15:01,210 --> 00:15:07,450 their email address or username and also their password and therefore they therefore you managed to 183 00:15:07,450 --> 00:15:11,680 hack their account by getting their password. 184 00:15:11,900 --> 00:15:19,440 Okay now we already talk about types of hackers such as black hat white hack and grey hat hackers now 185 00:15:19,620 --> 00:15:20,660 there. 186 00:15:20,740 --> 00:15:23,630 Now let's talk about the faces of ethical hacking. 187 00:15:23,630 --> 00:15:28,870 Now there are different stages in the penetration testing process such as First of all. 188 00:15:28,870 --> 00:15:32,500 The step number one is deep planning and precautions. 189 00:15:32,500 --> 00:15:38,710 Basically the first step in an ethical hacking is to define the scope and goals of a test as well as 190 00:15:39,070 --> 00:15:41,100 the testing methods to be followed. 191 00:15:41,110 --> 00:15:47,530 It also addresses intelligence to understand the potential probabilities and how a target works. 192 00:15:47,530 --> 00:15:53,350 Basically you will not have every time same target some targets get run different things and then different 193 00:15:53,350 --> 00:15:58,100 programs different software and all of those targets should be approached differently. 194 00:15:58,410 --> 00:15:59,000 Okay. 195 00:15:59,110 --> 00:16:03,180 Now the prospective footprint is made through search engines. 196 00:16:03,520 --> 00:16:11,100 Web services social network sites DNS e-mail network and so on and so on by simply using foot printing 197 00:16:11,120 --> 00:16:12,680 tools you can. 198 00:16:12,700 --> 00:16:18,070 There are a bunch of other tools that help you actually discover more more about a certain company or 199 00:16:18,070 --> 00:16:21,430 a certain target that you want to hack. 200 00:16:21,490 --> 00:16:27,460 You simply can use just google different search engines and so on and so on in order to plan out your 201 00:16:27,460 --> 00:16:29,600 attack and in order to find out. 202 00:16:29,650 --> 00:16:34,120 Most of the things about the company as well as the people working there. 203 00:16:34,120 --> 00:16:42,110 Sometimes the easiest way to get in or to hack something is simply just by hacking a human being. 204 00:16:42,910 --> 00:16:50,840 There is always that example of an older woman working in an beef company that is very well secured. 205 00:16:50,860 --> 00:16:57,280 Basically let's say there is no other way to get in and simply then hacker just finds out that the older 206 00:16:57,310 --> 00:17:06,430 woman likes cats and then one once she's at the job the attacker sends an email with the cat image which 207 00:17:06,520 --> 00:17:12,850 has a virus attached to it and then the older woman opens the cat image and the virus is ran and basically 208 00:17:12,850 --> 00:17:18,700 now you are in the company even though you didn't really breach any security measures in order to get 209 00:17:18,700 --> 00:17:19,540 there. 210 00:17:19,990 --> 00:17:25,750 Your target was an older woman that likes cats and just because she worked there that you managed to 211 00:17:25,750 --> 00:17:29,100 hack the entire company. 212 00:17:29,320 --> 00:17:34,210 Now the next part of this step two in the penetration test is the scanning. 213 00:17:34,210 --> 00:17:40,030 Now the second step or step or basically scanning is performed to understand how Target's reacts to 214 00:17:40,030 --> 00:17:42,860 various intrusion attempts. 215 00:17:42,990 --> 00:17:47,740 Basically in two ways when the application is called static and when the application code is functioning 216 00:17:48,300 --> 00:17:54,520 basically you scan a target and once you actually scan it you can see how different open ports react 217 00:17:54,550 --> 00:17:56,480 to a certain scan. 218 00:17:56,500 --> 00:18:01,690 What they are running what version of sore throat they're running and where you should plan your next 219 00:18:01,690 --> 00:18:08,590 attack as well as the step 3 which is decon access and this is a crucial step for developing nation 220 00:18:08,590 --> 00:18:15,190 is attacked using SSL injections for example cross-eyed scripting back doors or basically anything else 221 00:18:15,190 --> 00:18:20,830 in order to find the vulnerabilities and then exploit them by stealing intercepting traffic and interfering 222 00:18:20,830 --> 00:18:27,250 privileges in order to understand what can you do to that specific target. 223 00:18:27,250 --> 00:18:32,590 And once you actually gained access and managed to actually exploit the target you want to maintain 224 00:18:32,590 --> 00:18:34,240 that access. 225 00:18:34,260 --> 00:18:39,370 Now in this type of penetration testing the vulnerability is used as a persistent presence for a long 226 00:18:39,730 --> 00:18:46,170 duration in the infected system in order to for example stay in sensitive information or to spread inside 227 00:18:46,180 --> 00:18:51,730 and that quickly gaining access to different machines different servers and anything else. 228 00:18:52,390 --> 00:18:55,720 And the last part is the final stage of the analysis. 229 00:18:56,050 --> 00:19:02,560 And basically this final stage of a penetration test e e stage to compile the result by analysing and 230 00:19:02,560 --> 00:19:07,360 commenting about the vulnerabilities exploited or some of the access to the data that you shouldn't 231 00:19:07,360 --> 00:19:13,840 have access to and the basically amount of time that the tester can remain unnoticed in the system. 232 00:19:13,900 --> 00:19:14,650 OK. 233 00:19:15,520 --> 00:19:22,690 So basically the last step is nothing really focused on the ethical hacking or on the penetration test 234 00:19:22,690 --> 00:19:28,600 you basically just write everything you found everyone ability if you know how to fix them you also 235 00:19:28,600 --> 00:19:33,580 write how you should fix them what approach they should take in order for that attack not to happen 236 00:19:33,580 --> 00:19:34,430 anymore. 237 00:19:34,630 --> 00:19:37,900 And basically that is the last step of the analysis. 238 00:19:37,930 --> 00:19:42,790 There are different certificates that you can take which we're going to talk about later on but for 239 00:19:42,790 --> 00:19:44,560 now let's just mention them. 240 00:19:44,560 --> 00:19:52,160 There is a certificate for example certified network defender that's program focuses on creating networks 241 00:19:52,160 --> 00:19:58,190 and ministries administrators who are trained in protecting detecting and responding to threats on the 242 00:19:58,190 --> 00:19:59,310 network. 243 00:19:59,310 --> 00:20:05,660 Now the course contains handsome lab based in major network through the course online would most likely 244 00:20:05,660 --> 00:20:12,210 contain the hands on laps based on major network security tools and techniques which will provide network 245 00:20:12,240 --> 00:20:19,100 with threat administrators real world expertise on current network security technologies and operations. 246 00:20:19,100 --> 00:20:25,130 Now another certificate that you most likely have heard of is these certified ethical hacker or CCH 247 00:20:25,800 --> 00:20:32,930 basically DCH uh creates individuals in specific net network security discipline on ethical hacking 248 00:20:32,930 --> 00:20:35,060 from a vendor perspective. 249 00:20:35,180 --> 00:20:39,950 And this is the world's most advanced certified online ethical hacking training. 250 00:20:42,120 --> 00:20:48,580 What they will teach you everything from hacking systems from web application hacking from social engineering 251 00:20:48,670 --> 00:20:53,690 and all those different types of attacks that you can perform on your target. 252 00:20:53,770 --> 00:20:58,450 There are different steps in sort of radical hackers such as practical attacks. 253 00:20:58,690 --> 00:21:02,950 And once again at the end you have the master certificate. 254 00:21:03,390 --> 00:21:08,580 Where basically they will teach you everything at once. 255 00:21:08,590 --> 00:21:13,630 There are also some of the more advanced certificates that are certified threat intelligence analysts 256 00:21:14,020 --> 00:21:19,960 and certified security analysts such as the practical certified security analyst. 257 00:21:20,760 --> 00:21:21,580 OK. 258 00:21:21,610 --> 00:21:29,230 And at the end you can get LPT or the licensed penetration tester and therefore you will actually be 259 00:21:29,230 --> 00:21:33,530 able to go and get hired by some company. 260 00:21:33,530 --> 00:21:36,310 Now all of these certificates are not really a must. 261 00:21:36,310 --> 00:21:42,610 You don't really need to have any of them in order to get a job in the ethical hacking community. 262 00:21:42,610 --> 00:21:48,160 It is always important to have the knowledge and to be willing to get the knowledge it is more important 263 00:21:48,160 --> 00:21:55,120 to you to actually be interested in the field itself and to think like a hacker than to actually have 264 00:21:55,120 --> 00:21:57,510 any of these certificates. 265 00:21:57,550 --> 00:22:00,090 Basically they are not needed for you to get the job. 266 00:22:00,460 --> 00:22:06,570 But for mentioned and later on and talk about a little bit more about them as that is something that 267 00:22:06,570 --> 00:22:11,380 you that will help you get the job but it really isn't needed. 268 00:22:11,380 --> 00:22:14,730 So that would be basically about it for this video. 269 00:22:15,160 --> 00:22:19,450 What we talked about Fred here is basically what ethical hacking is. 270 00:22:19,450 --> 00:22:21,560 What types of ethical facts are there. 271 00:22:21,690 --> 00:22:27,850 Why I should basically what kinds of ethical hackers are there such tech had great had white hat and 272 00:22:28,060 --> 00:22:33,920 what types of penetration tests can we perform which targets can we attack and so on and so on. 273 00:22:34,600 --> 00:22:39,760 So after this video you should have a pretty good knowledge into whether this is something that you 274 00:22:39,760 --> 00:22:42,800 wish you could be interested in or not. 275 00:22:42,970 --> 00:22:46,300 If it is you can proceed with this course and you can. 276 00:22:46,300 --> 00:22:51,850 And I will show you later on which online with the courses you can start you can start with in order 277 00:22:51,850 --> 00:22:58,990 to start learning ethical hacking so coping you this story all and I hope I will see you in the next 278 00:22:59,110 --> 00:23:00,400 lecture by.