1 00:00:00,360 --> 00:00:02,760 Everybody and welcome equals lecture. 2 00:00:02,760 --> 00:00:07,990 And right now what we're going to do is we're going to talk about what was my personal path. 3 00:00:08,040 --> 00:00:09,850 I got where I am right now. 4 00:00:09,900 --> 00:00:11,040 What jobs did it take. 5 00:00:11,040 --> 00:00:12,210 What path did I take. 6 00:00:12,240 --> 00:00:14,050 And what was the first thing that I did. 7 00:00:14,070 --> 00:00:20,100 Once I started trying to get the actual career and actual my first job in ethical hacking field. 8 00:00:20,700 --> 00:00:21,270 OK. 9 00:00:21,720 --> 00:00:26,570 So first of all uh I've known ethical hacking since like five years. 10 00:00:26,580 --> 00:00:32,730 Once it started off as a hobby I basically was interested in I watched a lot of movies. 11 00:00:32,850 --> 00:00:39,150 I was actually interested in learning how to do that because it seemed like an actual uh good skill 12 00:00:39,150 --> 00:00:40,110 to have. 13 00:00:40,110 --> 00:00:42,380 It seemed like an actual interesting skill to have. 14 00:00:42,390 --> 00:00:48,600 And therefore uh I didn't really started off because of actually having a career one day in that field 15 00:00:48,910 --> 00:00:52,580 uh or for actually earning any money in that field. 16 00:00:52,590 --> 00:00:54,390 But that's how it turned out. 17 00:00:56,580 --> 00:00:58,830 So I started off as a hobby basically. 18 00:00:59,190 --> 00:01:01,170 I learned something on YouTube. 19 00:01:01,200 --> 00:01:06,360 I basically search for Catalina extend in stock to machines. 20 00:01:06,360 --> 00:01:12,150 Then I learned on different voting machines then bought my first laptop then I installed Linux on it 21 00:01:12,210 --> 00:01:16,500 and basically on programming and learned everything I need in order to become an ethical hacker. 22 00:01:17,010 --> 00:01:25,980 And then around two years ago uh I decided why not try to make some money using these actual field ethical 23 00:01:25,980 --> 00:01:26,960 hacking field. 24 00:01:27,090 --> 00:01:33,190 So what I started off is a little bit interesting because uh it's not really that usual. 25 00:01:33,390 --> 00:01:36,970 And it does really work at least in my case. 26 00:01:37,320 --> 00:01:41,610 I decided why not give private lessons from ethical hacking. 27 00:01:41,610 --> 00:01:48,120 Now that is something that I haven't seen anyone do especially in my country where I usually see math 28 00:01:48,120 --> 00:01:56,190 classes physics classes and some other usual classes that you see every time and then I decided well 29 00:01:56,700 --> 00:02:01,470 maybe people would be interested in order to have an ethical hacking class because that is something 30 00:02:01,470 --> 00:02:06,650 that is still taboo as is for most of the people. 31 00:02:06,750 --> 00:02:14,250 And therefore I decided to print out around 1000 papers saying that I am offering classes and then I 32 00:02:14,260 --> 00:02:22,410 put it in a certain city for each building and on my surprise I set the price to be around twenty dollars 33 00:02:22,410 --> 00:02:23,550 an hour or something like that. 34 00:02:23,550 --> 00:02:29,570 I can't even remember which in my case or in my country is a really high price for an hourly rate. 35 00:02:29,580 --> 00:02:37,010 And I was and I was thinking that not many people will actually reach out to me to have an actual lesson. 36 00:02:37,380 --> 00:02:44,190 Uh and that was basically a mistake once I actually uh put every paper out. 37 00:02:44,610 --> 00:02:50,950 Basically the next day over 30 people already applied to have an ethical hacking lesson. 38 00:02:50,970 --> 00:02:52,620 It was a good investment. 39 00:02:52,770 --> 00:02:57,640 I was giving basically private lessons for uh twenty dollars an hour. 40 00:02:57,990 --> 00:03:04,020 I taught people how they can hack wireless networks how they can hack social media accounts how they 41 00:03:04,020 --> 00:03:08,870 can basically hack systems create back towards coding python and so on and so on. 42 00:03:09,000 --> 00:03:14,790 Now from my personal experience what most people want wanted to if you for example decide that you want 43 00:03:14,790 --> 00:03:18,960 to do this the same way you want to give people private lessons. 44 00:03:19,050 --> 00:03:23,950 Most people will contact you because they want to learn how to hack either wireless networks. 45 00:03:23,970 --> 00:03:30,390 That was one of the most things that people desired or the social media accounts such as Instagram and 46 00:03:30,390 --> 00:03:31,470 Facebook. 47 00:03:31,470 --> 00:03:34,680 That's also some of the things that people really wanted to know. 48 00:03:34,680 --> 00:03:40,380 Of course you need to make sure to specify to them that all of that stuff is illegal unless you have 49 00:03:40,380 --> 00:03:41,960 actual permission. 50 00:03:42,120 --> 00:03:47,810 You can teach them that but what they do with that knowledge is only on them. 51 00:03:48,000 --> 00:03:53,040 You basically only mentioned that it is illegal that they shouldn't do it and that you are only here 52 00:03:53,040 --> 00:03:58,770 for the educational purposes and therefore what they do with the knowledge that they learn is their 53 00:03:58,770 --> 00:03:59,810 own problem. 54 00:03:59,920 --> 00:04:00,270 OK. 55 00:04:03,640 --> 00:04:06,370 Now you might be asking why didn't really share it online. 56 00:04:06,370 --> 00:04:09,900 Well basically uh in my country. 57 00:04:10,240 --> 00:04:13,270 Most of the private lessons are actually labeled like that. 58 00:04:13,270 --> 00:04:19,660 So someone actually creates a few hundred papers and puts it out somewhere in the public and therefore 59 00:04:19,660 --> 00:04:25,600 he puts his phone number or email addresses and basically basically any contact information and then 60 00:04:25,900 --> 00:04:29,230 these students contact them for private lessons. 61 00:04:29,230 --> 00:04:30,780 That's what I did right here. 62 00:04:30,790 --> 00:04:32,640 And it actually worked really well. 63 00:04:33,190 --> 00:04:40,960 And not that long ago or not that long after that I basically joined a team of our private cybersecurity 64 00:04:40,960 --> 00:04:47,320 company that actually offers cybersecurity packages to different companies or different firms that need 65 00:04:47,320 --> 00:04:48,380 them. 66 00:04:48,400 --> 00:04:51,820 Now that is also another thing that you should do and that you've tried to do. 67 00:04:51,940 --> 00:04:58,390 It is also it's always good to create your own team that will work together and basically you offer 68 00:04:58,510 --> 00:05:04,780 your own knowledge and your own protection within the fields of I.T. Security two different companies. 69 00:05:04,780 --> 00:05:11,080 So how you will do that is simply let me just go to this site right here as it says in Fugard cybersecurity. 70 00:05:11,100 --> 00:05:19,150 This is just an example of a certain website that offers cybersecurity protection and basically different 71 00:05:19,150 --> 00:05:27,120 types of security protection to different companies as we can see right here cybersecurity solutions 72 00:05:27,120 --> 00:05:29,340 and the consulting services we provide. 73 00:05:29,340 --> 00:05:35,130 Threat Intelligence and strategies that protect your vital information and mitigate cybersecurity risks 74 00:05:35,430 --> 00:05:42,000 prevent data breaches by attackers and safeguard your organization 24/7 so you basically offer your 75 00:05:42,000 --> 00:05:47,190 own packages cybersecurity packages or your own help. 76 00:05:47,190 --> 00:05:54,210 In order to protect a different company or different firm now you might be asking why do they need it. 77 00:05:54,210 --> 00:06:01,080 While most of the companies actually have some valuable information or some information that shouldn't 78 00:06:01,260 --> 00:06:05,850 really get into the wrong hands and they really want to secure it therefore they hire these teams. 79 00:06:05,850 --> 00:06:12,360 These cyber security teams that actually secure their entire company and prevent the hackers and the 80 00:06:12,360 --> 00:06:14,440 attackers from getting in. 81 00:06:14,460 --> 00:06:20,610 Therefore you as an ethical hacker or as a cybersecurity expert you want to offer your own help to these 82 00:06:20,610 --> 00:06:23,100 companies in order to protect their own data. 83 00:06:23,520 --> 00:06:25,840 Therefore once I join my own team. 84 00:06:26,490 --> 00:06:33,150 What we had at that moment is basically we had just a team and we created a website where we offered 85 00:06:33,180 --> 00:06:40,260 our own packages of cybersecurity solutions or cyber security help that will prevent hackers from getting 86 00:06:40,290 --> 00:06:41,760 it on company. 87 00:06:41,760 --> 00:06:44,880 So the company actually contact how does it go. 88 00:06:44,880 --> 00:06:47,170 Well basically the company contacts you. 89 00:06:47,220 --> 00:06:53,340 It says I need to secure my own personal space and by personal space I mean inside the company building 90 00:06:53,370 --> 00:06:57,120 you want to secure your father's networks you want the security or machines. 91 00:06:57,120 --> 00:07:04,380 For example one company actually had only Windows XP installed which is actually really bad considering 92 00:07:04,380 --> 00:07:06,800 it was only two years ago. 93 00:07:07,320 --> 00:07:12,870 The entire company running 80 percent of Windows XP is really dangerous especially as there are many 94 00:07:12,870 --> 00:07:19,440 reliability issues with Windows XP and therefore the entire company needed an upgrade to the newer Windows. 95 00:07:19,440 --> 00:07:26,400 And basically we installed just we understand you installed the antivirus is the firewalls and everything 96 00:07:26,400 --> 00:07:32,310 that the company requires from you it is mostly something uh really easy such as for example securing 97 00:07:32,310 --> 00:07:37,830 their PCs with an antivirus that would prevent different types of threats. 98 00:07:37,890 --> 00:07:45,030 Then you need to actually secure the wireless networks which is also something that they search for 99 00:07:45,420 --> 00:07:54,600 and by secure you simply just specify to them don't use Open Net folks don't use WPP use WPA to basically 100 00:07:54,690 --> 00:07:59,880 search for our good password and a strong password and don't share it to anyone. 101 00:08:00,150 --> 00:08:06,780 So once you actually have a team or if you choose to take that path and create a team which will offer 102 00:08:06,780 --> 00:08:14,400 some help you simply just can create different types of packages that you will offer to different companies 103 00:08:14,400 --> 00:08:21,240 such as for example system security as a package while security I have known that for I.T. Security 104 00:08:21,240 --> 00:08:26,670 basically you need to make sure that the that their network structure or I.T. structure inside that 105 00:08:26,670 --> 00:08:33,090 building is completely secure that there are not any holes that there is not a vulnerable machine inside 106 00:08:33,240 --> 00:08:38,880 that specific net because if you for example find one vulnerable machines it is a really good chance 107 00:08:38,880 --> 00:08:44,940 that you will be able to infect the entire network inside that specific building. 108 00:08:44,940 --> 00:08:48,940 Now of course it doesn't have to be on the security inside that building you can simply just take and 109 00:08:48,950 --> 00:08:52,170 simply just remove to secure their own website. 110 00:08:52,170 --> 00:08:58,890 So for example you can have someone in your team that is a expertise in the website penetration testing. 111 00:08:58,890 --> 00:09:04,140 And therefore once they are it is best to actually test their Web site for the security issues and mobility 112 00:09:04,320 --> 00:09:06,880 codes you can pass. 113 00:09:06,910 --> 00:09:13,560 You can hire someone from your team to perform that specific test and to see whether that company or 114 00:09:13,560 --> 00:09:19,680 that company's website has any security issues as we can see right here the first security issue for 115 00:09:19,680 --> 00:09:24,230 this actual website would be that it is not even a shitty P.S. as it says right here. 116 00:09:24,240 --> 00:09:26,340 It is not security CTP. 117 00:09:26,430 --> 00:09:33,030 Therefore if you have any actual information that is going over this Web site such as for example this 118 00:09:33,030 --> 00:09:40,020 right here it can be sniffed very very easily by anyone that is intercepting connections over our own 119 00:09:40,020 --> 00:09:40,800 network. 120 00:09:40,880 --> 00:09:44,680 Simply fight this type my name and everything right here and send the request. 121 00:09:44,760 --> 00:09:51,180 The attacker would be able to read it in plain text just because this website is not a HDP s and doesn't 122 00:09:51,180 --> 00:09:58,380 have a cell encryption that basically encrypts your own data and doesn't let anyone see it in plain 123 00:09:58,380 --> 00:09:59,610 text. 124 00:09:59,620 --> 00:09:59,970 OK. 125 00:10:01,560 --> 00:10:08,550 So uh that is also something that you can do and that is also something that I did uh which can be a 126 00:10:08,550 --> 00:10:09,190 side thing. 127 00:10:09,210 --> 00:10:12,180 You don't really need to put everything into that team. 128 00:10:12,460 --> 00:10:21,450 Uh simply in my personal example I work basically like one or two days a week and it is not really that 129 00:10:21,450 --> 00:10:22,560 stressful. 130 00:10:22,600 --> 00:10:28,290 You can simply just have it on a side while you have your own projects or on Main projects that you 131 00:10:28,290 --> 00:10:35,540 do besides that now of course once I actually got into the team and actually started doing tests for 132 00:10:35,540 --> 00:10:41,240 the different companies that actually require our own help I stopped giving private lessons because 133 00:10:41,240 --> 00:10:44,070 I didn't really see any point in doing that. 134 00:10:44,150 --> 00:10:50,060 Therefore I started searching online jobs on different freelancing platforms that they showed you in 135 00:10:50,060 --> 00:10:55,520 the previous video and therefore there is also not work which I started not long ago. 136 00:10:55,520 --> 00:10:59,590 I basically started it off by a few months ago. 137 00:11:00,410 --> 00:11:06,920 And there I managed to find my first job which was to actually be an instructor as an ethical hacker 138 00:11:06,950 --> 00:11:12,790 which is also something that you can do it is similar to the private classes that take it before this 139 00:11:12,830 --> 00:11:16,720 an English language and it is online but doesn't really matter. 140 00:11:16,820 --> 00:11:23,000 You can always have that opportunity in front of you once you learn some skill you can always be an 141 00:11:23,000 --> 00:11:28,580 instructor or a professor or someone that gives private lessons regarding that specific field because 142 00:11:28,580 --> 00:11:35,450 you have knowledge from that field and therefore right now because of up work you're basically watching 143 00:11:35,450 --> 00:11:41,840 this course because currently on my upper profile you will see the time working as an actual instructor 144 00:11:41,840 --> 00:11:47,210 for the Ethical Hacking courses and therefore for this course as well which will teach you how you can 145 00:11:47,210 --> 00:11:52,130 get your first career or pardon me or you can get your first job in this ethical hacking field. 146 00:11:52,680 --> 00:11:53,370 Okay. 147 00:11:53,630 --> 00:11:56,320 So basically let us sum everything up. 148 00:11:56,420 --> 00:12:00,950 There are a few ways you can go you can create your own team you can join a team that already exists 149 00:12:01,250 --> 00:12:06,110 that provides their cybersecurity and ethical hacking skills in order to protect different companies 150 00:12:06,110 --> 00:12:09,110 from different threats and real abilities. 151 00:12:09,780 --> 00:12:11,750 That's always a good thing to do. 152 00:12:11,750 --> 00:12:16,750 It doesn't take too much of your time especially because you're in a team at least in my case. 153 00:12:16,820 --> 00:12:22,610 And then next to it you can always have an actual freelancing platforms and your online accounts where 154 00:12:22,610 --> 00:12:28,430 you will apply for different jobs whether those are full time jobs part time jobs longer or shorter 155 00:12:28,430 --> 00:12:29,120 jobs. 156 00:12:29,120 --> 00:12:34,520 It doesn't matter you can take anything you really like and you'd think that you can do and therefore 157 00:12:35,870 --> 00:12:36,930 you will be good to go. 158 00:12:36,950 --> 00:12:41,570 And soon enough you will find your first job and from there you will find your second job and you will 159 00:12:41,570 --> 00:12:43,270 create a career for yourself. 160 00:12:46,100 --> 00:12:52,370 Now another important thing to do is to keep everything on the legal side because sometimes on this 161 00:12:52,440 --> 00:12:57,470 up for platforms and on these freelancing platforms you can find clients that will actually require 162 00:12:57,470 --> 00:13:03,720 you to perform some illegal stuff especially in the ethical hacking field. 163 00:13:04,580 --> 00:13:09,080 Now another thing how you can actually recognize those clients is you can simply just go right here 164 00:13:09,080 --> 00:13:11,060 onto the upper page. 165 00:13:11,060 --> 00:13:13,650 You can go right here and now. 166 00:13:13,850 --> 00:13:20,240 This doesn't have to mean but once the payment is not verified it means that the client basically probably 167 00:13:20,240 --> 00:13:25,720 just made the account fade here on up for work and search for someone that will do its job. 168 00:13:26,270 --> 00:13:32,120 Now also another thing from my personal experience is that as soon as the client actually asks for your 169 00:13:32,120 --> 00:13:39,100 Skype account or basically for the communication outside of the platform they will most likely want 170 00:13:39,320 --> 00:13:45,990 to actually have you do something illegal and by legal they most likely want you to hack some websites 171 00:13:46,010 --> 00:13:51,620 that they do not own or that they do not have permission to actually tell you that you need to hack 172 00:13:51,620 --> 00:13:52,340 it. 173 00:13:52,340 --> 00:13:58,280 Therefore if you encounter something like that you should keep away because most likely they will actually 174 00:13:58,340 --> 00:14:01,250 want something from you that you shouldn't really do. 175 00:14:01,840 --> 00:14:02,210 OK. 176 00:14:02,360 --> 00:14:06,540 So basically that will be about it for this lecture. 177 00:14:06,560 --> 00:14:11,720 I hope you enjoyed it and I hope I will see you in the next one by.