Thank you both for the informative talk; insights for many interest levels there, and presented at a good pace. 👍 Thanks for the code too - always learning! ;)
I think Wes makes a great point when he talks about how these programs or processes are eventually exploited by people that have an actual understanding of the low level functionality of the process. It's very true that a lot of the people developing these apps, don't really have any knowledge beyond that or know how it's actually translated to information and actions at the processor level.
I'm a former network engineer, I just graduated a local university in Cyber Security covering linux, pentesting, red team blue team, splunk, kibana, Azure cloud, etc.. etc.. I also just got my Security+, I've built power point presentations, I have done reporting, and I still can't land a job in Cyber Security... I'm getting rejected left and right... And this stuff is way easy compared to my network engineering back ground and yet I still can't land a job...
Have you considered meeting people out there who already work in the Cyber Security area and attending the security conference? Roughly, this kind of job requires trust and communication highly, so get a job in this area is very easy when it's indicating, and you're publicly visible on social networks such as LinkedIn. I sincerely hope you get your dream job asap.
Get your FREE cybersecurity training resources: www.infosecinstitute.com/free
Thank you both for the informative talk; insights for many interest levels there, and presented at a good pace. 👍
Thanks for the code too - always learning! ;)
is Kali linux or Linux destribution necessary or we can use just use windows machine THANK YOUUU ... EXCELLENT VIDEO ✌✌
I think Wes makes a great point when he talks about how these programs or processes are eventually exploited by people that have an actual understanding of the low level functionality of the process. It's very true that a lot of the people developing these apps, don't really have any knowledge beyond that or know how it's actually translated to information and actions at the processor level.
I'm a former network engineer, I just graduated a local university in Cyber Security covering linux, pentesting, red team blue team, splunk, kibana, Azure cloud, etc.. etc.. I also just got my Security+, I've built power point presentations, I have done reporting, and I still can't land a job in Cyber Security... I'm getting rejected left and right... And this stuff is way easy compared to my network engineering back ground and yet I still can't land a job...
Have you considered meeting people out there who already work in the Cyber Security area and attending the security conference?
Roughly, this kind of job requires trust and communication highly, so get a job in this area is very easy when it's indicating, and you're publicly visible on social networks such as LinkedIn. I sincerely hope you get your dream job asap.
Thanks for the vid!
I have a prediction that in the future soft soft is going to have a assistant like ozone 8 or sotNice tutorialng lol
You do great work bro. Keep it up bro.❤❤
like What are the basics you need to learn to produce a , or setup it. Also I need to learn how to add soft notes to a .
when i insert it?
Appreciate your effort and time
awesome informational valuable fascinating interview!!!!!!!
Great info
@regasatyaputra apa nih di bilang...
Instead of reading out the entire intro, just say bullet points and display the entire text on the screen.
Thank you so much! I can not wait to start setuping. I want to create original soft for comrcials and shows alongside my many other