Breaking Into Cybersecurity w/ Host Prof Roger + Francois B. Arthanas

  Рет қаралды 909

François B. Arthanas

François B. Arthanas

Күн бұрын

Пікірлер: 3
@GenXXXX70
@GenXXXX70 3 ай бұрын
The more I watch Francois's videos, I'm able to gain a truthful insight to my current occupation in IT.
@KukuDjamasi
@KukuDjamasi Жыл бұрын
interesting discussion. One question Francois, you mentioned that you received some valuable nuggets ref response from a LinkedIn connection. Please can you share these nuggets with me? Appreciated
@Francois-B-Arthanas
@Francois-B-Arthanas Жыл бұрын
The nuggets were from HD More. The creator of Metasploit...... Let me copy and past what I asked him and what he responded: ME--> Hello Mr. Moore, thanks for connecting on LinkedIn. I understand you have tremendous demands on your time, and if you don’t have time to respond, no problem. But if you do, even a sentence would mean a lot to me. I am a n00b into the world of PenTest & in disparately looking for some guidance. If you would to start all over again in Cybersecurity (Pentester) where would you begin? How would you go by getting that first Pentest job? HIM --> Hello! Thanks for reaching out. Most security roles depend on having extensive skills elsewhere first; I started off writing lots of (bad) web applications and continue to balance development work and system administration with security work, as you can't do security work without the dev/admin experience, and its hard to be good at dev/admin work without security experience as well. If you are looking for a pentest job, the route depends on what you already know. If you can write code, start to focus on code auditing, and identifying common security issues. If you do admin/devops/etc work, focus on auditing cloud environments and identifying common mistakes with key management or AD configurations. If you dont do networking, admin, or development work today -- you are going to have a hard time with security work, as every task you work on assumes you know how something was built and how it is operated first. I see the certificate alphabet in your profile - certs (outside of GPEN/OSCP/CREST) are mostly worthless for interviews with pentest firms. They help with broader consulting orgs (E&Y, etc), but folks like NCC and Atredis care what you can do and want to see proof of that (open source, previous advisories, writeups, etc), not a list of certs. Anywho - feel free to reach out by email if you have additional questions (REMOVED IT) - Bug bounties are a great place to start these days if you don't have an existing portfolio or experience doing pentests.
Сестра обхитрила!
00:17
Victoria Portfolio
Рет қаралды 958 М.
99.9% IMPOSSIBLE
00:24
STORROR
Рет қаралды 31 МЛН
Quilt Challenge, No Skills, Just Luck#Funnyfamily #Partygames #Funny
00:32
Family Games Media
Рет қаралды 55 МЛН
It works #beatbox #tiktok
00:34
BeatboxJCOP
Рет қаралды 41 МЛН
The Complete CompTIA Security+ SY0 701 Crash Course
2:01:50
François B. Arthanas
Рет қаралды 18 М.
Building the Ultimate Cybersecurity HomeLab for Cyber Pros
1:40:04
François B. Arthanas
Рет қаралды 15 М.
Session 02 - October 26, 2024 | CompTIA Security+ FREE 701 Live Training
1:44:37
François B. Arthanas
Рет қаралды 2,2 М.
Ralph Echemendia Keynote at SINFO 26 - To hack or be hacked
42:42
The Ethical Hacker
Рет қаралды 13 М.
Mind-Blowing Humanoid Robot Walked Outside (The Internet Exploded)
13:51
Tactics of Physical Pen Testers
44:17
freeCodeCamp Talks
Рет қаралды 942 М.
How to Become a Cyber PCI QSA in Just 90 Days - Is It Really Possible?
26:05
Сестра обхитрила!
00:17
Victoria Portfolio
Рет қаралды 958 М.