Unveiling the complexities of cybersecurity, one video at a time. This channel empowers viewers with the knowledge and tools to navigate today's ever-changing digital threats. Explore in-depth breakdowns of security vulnerabilities, discover cutting-edge solutions, and gain practical strategies to safeguard your data and privacy. Subscribe for actionable insights and stay ahead of the evolving cyber threat landscape.
Why are the job requirements, 10 years of coding, computer science degree and every it certification. The requirements seem completely ridiculous and disjointed to what the job actually is.
@@troyknights3342 I understand this is a hyperbole and I understand your point. It depends on the job. This video is my experience, but it is also the experience I see from a lot of other people. This being said, security analyst positions can vary and those requesting a lot of coding experience is likely more of a web application analyst role
@@ForeverAnonymousI worked in an internship and this was my experience as well. I just don’t understand why I need a bachelors in computer science from almost all further jobs when I was physically already able to do the job without one.
Question: If the attacks are evolving rapidly does that mean there would be a need for experienced soc analysts to train AI models going forward? Lastly I’ll trade a better paying inclusive ugly that stimulates than an ugly that bores me to tears. I love learning so this field up my alley. Great vid btw!
It's technically possible to get the Google Cybersecurity cert for free by just auditing the course materials before paying for anything then taking the exam during the free trial of Coursera, but... It's still not really worth it, lol
Sir, I am a freshgrad that have just got the job offering of SOC Analyst L1 in my dream company. This video really help me to prepare my early days of work, and straight up help me to learn more. Thank you sir, you get 1 new sub. Keep up the good work
I'm going to play The Devil's Advocate here. RU-vid and other social media platforms have been very controlling on content. They have on the platform since 2018 or so. When the old ad apocalypse happened They also don't want advertisers falling out because it's very expensive running data centers and especially real-time video and live video, which RU-vid and TikTok, and Instagram all support. So I understand it can't be very frustrating, getting your video script correct or also understanding what content they want.And they don't. I think a great example of a successful cybersecurity channel is NetworkChuck.
I am not sure if this works, but you can create a blogspot and post it there and just keep these platforms as a means for accessing that information. so whatever you feel like this " information" is something that they would strike on, post it there and reference it here.
@@ForeverAnonymous anything that includes or leads to logical, or rational thought is problematic to their control paradigm. The reasoning that we use to dork information in an osint job is the same reasoning that If understood & applied by the people to the powers that be would bring down the system. This is why the three "R's" were removed & replaced with one "R" a "W" & an "A" Reading, Reckoning (logic) & Rhetoric (the trivium, & base of the liberal arts) have been removed from all public education since well before 1900... Replaced with watered down nonsense & more recently utter nonsense, counter-factual & damaging rhetoric about unlimited genders & identity politics. Youre watching the final throes of capitalist Empire...
You just realised this ? RU-vid is the antithesis of truth content, & the fact theyve now hidden dislikes its harder to identify the fakes, & malicious kind of crap..
I see all types of content posted on RU-vid. Content about war, finance, the state of countries. But digital freedom content, and content bringing awareness to both the good and bad being taken down did surprise me. Especially considering the policies on these platforms specifying against harmful and x-rated content, but we see them
@@ForeverAnonymous If the unsavoury content suits their narrative, it's fine.. untill it isn't. The opacity of their "guidelines" and the mickey mouse fashion in which they are enforced is part of a larger Demoralisation campaign that you are now keenly experiencing. Sucks balls I know..
Thanks for the video! Just wanted you to know that if you do TCM’s bug bounty course (created by TCM and Intigriti) you get invited to apply to Intigriti’s Bug Bounty Platform when you complete the course.
This is great. Thank you for sharing this video, I like to consider myself a technical learner, so I really do appreciate you getting to the nitty gritty rather than goof off or speculate on the day to day like other example videos I've seen other youtubers share. So those portals and consoles you shared, are those SIEM logs proprietary to your company or is it a specific technology liken to SPLUNK? I appreciate you sir. Cheers!
So the images I show are not associated with my company, but a general look at how the typical SOC proprietary software would look. It is a software that aggregates data from Security tools such as Splunk, typically using something like an Amazon S3 Bucket as the intermediary.
Thanks for your videos. I am an older guy who just got into pentesting. I just flashed my F0 to a custom firmware, and it opened up a world i knew nothing about!
So technically speaking, you are saying that I should focus on Comptia Sec+ certificate ( ofcourse not just certificate , learn every thing thoroughly and do many things ). Like just 2-3 days ago I just started google cybersecirty certificate and inshort I have very basic knowledge about cybersecurity. Can you guide me whether should I stop the google cybersecirty certification and focus on comptia secrity + ? ( Also I have seen your SOC related vids which piqued my interest innit, will watch roadmap after this comment. Thank you Brother.
You never installed parrot just configured the VM settings, that’s why there is still a file on ur desktop that says install Parrot and you have no user login. This is the testing desktop all Linux distros offer before fully commuting to installing the OS to the disk. That’s why there is comments asking what happens when u press install, it actually installs it to the disk along with 70k+ files :). Hope you understand
I'm trying to get into hacking I already got the parrot os (thanks by the way) But alot of people say to go with hackthebox or tryhackme and learn and do pathways but a lot of people say to just start doing practices on hackthebox and ctf and search what you need and learn from there. What do you recommend? Please I'm stuck and thanks 🙏 have a good one
proxy chaining and using vpns especially in the usa literally does nothing but hide you from the general public. the NSA sees you tho lmfao. they got control of all the pipelines
As someone who recently became a cybersecurity analyst at my company from desktop support, it took years of experience and grind. People who want to get into cybersecurity need to watch this video, especially if they have no IT experience
What are your thoughts on the CPTS cert? I’m an absolute beginner coming from a totally different field heading towards a cyber security career. I’m hoping to pass the CPTS & then go for the OSCP :) Appreciate your honesty in this video man!
They say the CPTS is more thorough than the OSCP. Unfortunately it is not as known as the OSCP. Jumping straight to the CPTS might be a bit too much for you unless you're really willing to have to research every chapter as you're doing it. I went eJPT, CPTS, then OSCP
@@ForeverAnonymous thank you so much for hitting me back! I’ve read the same about it - I’m diving pretty deep into each topic as I go and taking boatloads of notes haha. Hopefully the CPTS will be more widely recognised soon. How did you feel completing the CPTS exam?