How I Got Started In Cybersecurity

HackerSploit

How I Got Started In Cybersecurity by HackerSploit

The speakers in this video share their diverse journeys towards becoming cybersecurity professionals. They started by exploring the internet and learning about operating systems before delving into Linux and development. They gained experience as system administrators and gradually moved towards offensive security, which led to their interest in pen testing. Some of the speakers started their own cybersecurity companies, while others focused on providing free cybersecurity training through YouTube. Despite their different paths, they all emphasize the importance of testing security measures and maintaining a balance between defensive and offensive security.

00:00:00

In this section, the speaker talks about how he got started in the field of technology and cybersecurity. He began by exploring the internet and learning about the operating system on his home computer during high school and university. He then got his first computer, which came pre-installed with Ubuntu, and began learning about Linux through Google searches and forums. Although he had previous experience with Windows, he found Linux to be more interesting and did not feel the need to switch to Windows. He learned about the command line, file system, processors, user space, and kernel and gained experience in reinstalling operating systems and managing installs.

00:05:00

In this section, the speaker talks about how he started developing his skills in cybersecurity. His journey started with experimenting with different kernels and getting his hands dirty with system administration. This led to his interest in development, focusing on scripting to automate tasks and later learning C and C++ development. He also delved into Android development and learned basic hacking with tools like Nmap and strace. He then got introduced to security through Backtrack Linux, which he set up to dual-boot with Ubuntu.

00:10:00

In this section, the speaker discusses how they got started in cybersecurity by playing around with Linux and learning about security assessment tools. They got interested in development primarily in C++ and then went on to become a Linux system administrator for two different companies and learned a lot about infrastructure, DevOps, compliance standards, and operating systems. By the end of their two to three years as a system administrator, they had automated and streamlined their workflows and could easily spin up a server with a few bash scripts.

00:15:00

In this section, the speaker explains how he got started in cybersecurity. He was responsible for technical aspects of enterprise environments and learned about project management, handling client requests, and managing client expectations. The speaker was then put in charge of securing infrastructure, primarily windows and Linux systems, against attacks with no prior security background. He was introduced to the offensive security side of things when the company started consulting with a pen testing company, and he had his first rude awakening into scope and the implications of performing a pen test. This experience opened his eyes to the two ways of handling cybersecurity: the blue team handles securing and hardening infrastructure, while the red team confirms or validates the security mechanisms that were put in place.

00:20:00

In this section, the speaker shares their journey towards offensive cybersecurity while working for a company and learning from a pen testing team. They learned that pen testing was crucial, as it helped identify vulnerabilities and misconfigurations that remediation didn't necessarily fix. This sparked a keen interest in offensive security, and the speaker began learning about it through online searches and courses offered by vendors such as SANS and Security+. The speaker also shadowed pen testing teams through assessments to learn reconnaissance, enumeration, and other aspects of penetration testing. The speaker was later offered a role as a junior pentester and learned extensively about operating systems and how Active Directory works.

00:25:00

In this section, the speaker talks about their experience in cybersecurity, starting with learning about infrastructure and active directory and moving on to offensive security, which includes performing pen tests and reporting the data within a report for the company. They then go on to talk about how they learned about red teaming services and the birth of adversary emulation, which allowed them to essentially emulate an adversary and all of their behaviors. The speaker then shares their experience as a pen tester, learning about reverse engineering, malware analysis, and web app pen testing. They eventually realized that the pen testing framework was becoming ineffective, leading them to start their own cybersecurity company that provides services in both red and blue teaming, including adversary emulation and helping companies set up their digital infrastructure securely.

00:30:00

In this section, the speaker discusses how they got started in cybersecurity, which began with system administration and conducting assessments for financial institutions and identifying tactics by groups targeting the finance industry. The speaker also saw that there was a gap in cybersecurity training, and thus began a YouTube channel, Hack Exploit, to provide vendor-agnostic cybersecurity training to the community. The speaker emphasizes that their objective was not to become famous through YouTube but to offer free training and build a content library to help others get started in cybersecurity.

00:35:00

In this section, the speaker explains how he got interested in cybersecurity. At first, his focus was on testing his defensive security mechanisms and finding out whether he had done a good job. He was impressed with the idea of legally and ethically testing an organization's security and verifying whether their defenses could withstand an attack. He highlights the importance of testing one's security measures and explains that defensive security alone is not enough. The speaker mentions that he will be making more videos to offer advice to viewers and answer their questions. He will also have guests to share their experiences and discuss pertinent cybersecurity topics.

More from
HackerSploit

No videos found.

Related Videos

No related videos found.

Trending
AI Music

No music found.