Cybersecurity Careers: Hype or Reality? Code Red: Ep. 1
0 views
Aug 6, 2025
Join us for the premium episode of our new live show 'Code Red' as the host, Dr.Naveen Sharma, will discuss Cybersecurity Careers! AGENDA • Cybersecurity Careers: Hype or Reality? • Is cybersecurity a recession-proof career? • What are the hottest jobs in cybersecurity today? • The real-life challenges of cybersecurity professionals. • Audience Q&A: "How do I get started without experience? 📺 CSharp TV - Dev Streaming Destination http://csharp.tv 🌎 C# Corner - Community of Software and Data Developers https://www.c-sharpcorner.com #CSharpTV #CSharpCorner #CSharp #CodeRed #CyberSecurity
View Video Transcript
0:02
[Music]
0:13
[Music]
0:19
[Music]
0:29
[Music]
0:33
welcome to code
0:35
welcome to code
0:35
welcome to code rad we will talk about everything cyber
0:39
rad we will talk about everything cyber
0:40
rad we will talk about everything cyber security wait wait wait wait don't get
0:42
security wait wait wait wait don't get
0:42
security wait wait wait wait don't get afraid don't get scared so hi good
0:45
afraid don't get scared so hi good
0:45
afraid don't get scared so hi good morning I'm your friend again uh Dr nain
0:48
morning I'm your friend again uh Dr nain
0:48
morning I'm your friend again uh Dr nain Sharma appearing on C TV last year we
0:53
Sharma appearing on C TV last year we
0:53
Sharma appearing on C TV last year we did a uh session on side hustle and this
0:57
did a uh session on side hustle and this
0:57
did a uh session on side hustle and this year we have this talk show about cyber
0:59
year we have this talk show about cyber
0:59
year we have this talk show about cyber security
1:01
security
1:01
security uh I have been practicing cyber security
1:05
uh I have been practicing cyber security
1:05
uh I have been practicing cyber security and learning evolving from last 30 years
1:09
and learning evolving from last 30 years
1:09
and learning evolving from last 30 years so uh I think everyone of you now is
1:14
so uh I think everyone of you now is
1:14
so uh I think everyone of you now is aware about the word cyber security
1:17
aware about the word cyber security
1:17
aware about the word cyber security but do you know I'll be asking some of
1:20
but do you know I'll be asking some of
1:20
but do you know I'll be asking some of the questions which we can uh go uh the
1:25
the questions which we can uh go uh the
1:25
the questions which we can uh go uh the you know responses you can type in the
1:27
you know responses you can type in the
1:27
you know responses you can type in the chat box and we might take up the
1:30
chat box and we might take up the
1:30
chat box and we might take up the you know the actual answers next in the
1:32
you know the actual answers next in the
1:32
you know the actual answers next in the next session so first thing do you know
1:36
next session so first thing do you know
1:36
next session so first thing do you know what is information
1:38
what is information
1:38
what is information security and what is cyber security how
1:41
security and what is cyber security how
1:41
security and what is cyber security how they are
1:45
interrelated so let's start from this
1:47
interrelated so let's start from this
1:47
interrelated so let's start from this topic so what is information security so
1:51
topic so what is information security so
1:51
topic so what is information security so information security is everywhere the
1:54
information security is everywhere the
1:54
information security is everywhere the information could
1:56
information could
1:56
information could be so it could be your
2:01
be so it could be your
2:01
be so it could be your uh desk table you know and there some
2:06
uh desk table you know and there some
2:06
uh desk table you know and there some important information noted on the
2:08
important information noted on the
2:08
important information noted on the sticky notes posted on your uh monitor
2:13
sticky notes posted on your uh monitor
2:13
sticky notes posted on your uh monitor or in your journal or diary you write
2:16
or in your journal or diary you write
2:16
or in your journal or diary you write that information can be um
2:20
that information can be um
2:20
that information can be um confidential can be stolen can be looked
2:23
confidential can be stolen can be looked
2:23
confidential can be stolen can be looked upon by
2:24
upon by
2:24
upon by anyone uh there could be some printouts
2:28
anyone uh there could be some printouts
2:28
anyone uh there could be some printouts kept on your desk again or you may might
2:32
kept on your desk again or you may might
2:32
kept on your desk again or you may might have thrown that information or pieces
2:34
have thrown that information or pieces
2:34
have thrown that information or pieces of information uh in your uh garbage bin
2:39
of information uh in your uh garbage bin
2:39
of information uh in your uh garbage bin so it could be
2:42
so it could be
2:42
so it could be anything about where this information
2:45
anything about where this information
2:45
anything about where this information could be
2:47
could be
2:47
could be so physical security there are different
2:50
so physical security there are different
2:50
so physical security there are different controls to that how do we maintain the
2:54
controls to that how do we maintain the
2:54
controls to that how do we maintain the CIA of the security it's not us CIA it's
2:58
CIA of the security it's not us CIA it's
2:58
CIA of the security it's not us CIA it's CIA so we will talk about it in a bit so
3:03
CIA so we will talk about it in a bit so
3:03
CIA so we will talk about it in a bit so information security is the bigger
3:06
information security is the bigger
3:06
information security is the bigger subject and when we talk about connected
3:09
subject and when we talk about connected
3:10
subject and when we talk about connected applications systems uh where
3:13
applications systems uh where
3:13
applications systems uh where information is stored then it becomes
3:15
information is stored then it becomes
3:15
information is stored then it becomes the sub cyber security so it's just a
3:18
the sub cyber security so it's just a
3:18
the sub cyber security so it's just a subdomain of information security that
3:22
subdomain of information security that
3:22
subdomain of information security that sets the context and that sets the
3:25
sets the context and that sets the
3:25
sets the context and that sets the discussion topic so here we will talk
3:28
discussion topic so here we will talk
3:28
discussion topic so here we will talk about cyber security primarily but we
3:31
about cyber security primarily but we
3:31
about cyber security primarily but we will also Venture into different
3:33
will also Venture into different
3:33
will also Venture into different scenarios
3:35
scenarios
3:35
scenarios Etc pertaining to information
3:38
Etc pertaining to information
3:38
Etc pertaining to information security Now we will start this session
3:42
security Now we will start this session
3:42
security Now we will start this session and every session with the disclaimer
3:44
and every session with the disclaimer
3:44
and every session with the disclaimer that all the information which is being
3:46
that all the information which is being
3:46
that all the information which is being shared in this session uh cyber navine
3:50
shared in this session uh cyber navine
3:50
shared in this session uh cyber navine cop anyone associated with the cop will
3:54
cop anyone associated with the cop will
3:54
cop anyone associated with the cop will not be uh held responsible if you misuse
3:59
not be uh held responsible if you misuse
3:59
not be uh held responsible if you misuse this information we are sharing this
4:01
this information we are sharing this
4:01
this information we are sharing this only for educational purposes only so
4:04
only for educational purposes only so
4:04
only for educational purposes only so any episodes we talk about any threats
4:07
any episodes we talk about any threats
4:07
any episodes we talk about any threats or attacks we talk about or we discuss
4:10
or attacks we talk about or we discuss
4:10
or attacks we talk about or we discuss how to do the penetration testing or
4:12
how to do the penetration testing or
4:12
how to do the penetration testing or ethical
4:13
ethical
4:13
ethical hacking uh it will be solely on you and
4:17
hacking uh it will be solely on you and
4:17
hacking uh it will be solely on you and you will be held responsible if you are
4:18
you will be held responsible if you are
4:19
you will be held responsible if you are doing it unethically or you are uh
4:22
doing it unethically or you are uh
4:22
doing it unethically or you are uh trying to breach a system or attack a
4:24
trying to breach a system or attack a
4:25
trying to breach a system or attack a system or doing even the Recon of a
4:27
system or doing even the Recon of a
4:27
system or doing even the Recon of a system where you are not liable for or
4:29
system where you are not liable for or
4:29
system where you are not liable for or you are not
4:31
you are not
4:31
you are not legally uh you know uh asked to do the
4:35
legally uh you know uh asked to do the
4:35
legally uh you know uh asked to do the do so and by the owners of the system
4:38
do so and by the owners of the system
4:38
do so and by the owners of the system not your neighbor cannot say okay can
4:40
not your neighbor cannot say okay can
4:40
not your neighbor cannot say okay can you just uh penetrate the car of the you
4:45
you just uh penetrate the car of the you
4:45
you just uh penetrate the car of the you know person who lives across the road no
4:49
know person who lives across the road no
4:49
know person who lives across the road no so it should be from the owners of the
4:52
so it should be from the owners of the
4:52
so it should be from the owners of the system now now let's uh take another
4:56
system now now let's uh take another
4:56
system now now let's uh take another clue from here so information security I
4:59
clue from here so information security I
4:59
clue from here so information security I talked about CIA so what is
5:02
talked about CIA so what is
5:02
talked about CIA so what is CIA that establishes the core of the
5:06
CIA that establishes the core of the
5:06
CIA that establishes the core of the security practice so CIA means uh C is
5:12
security practice so CIA means uh C is
5:13
security practice so CIA means uh C is confidentiality so any
5:16
confidentiality so any
5:16
confidentiality so any information which is out there in the
5:19
information which is out there in the
5:19
information which is out there in the system it has to remain
5:22
system it has to remain
5:22
system it has to remain confidential confidential to the people
5:25
confidential confidential to the people
5:25
confidential confidential to the people who are not supposed to look at it use
5:30
who are not supposed to look at it use
5:30
who are not supposed to look at it use it consume it or see it in any way
5:34
it consume it or see it in any way
5:34
it consume it or see it in any way possible so that's the one part of it
5:37
possible so that's the one part of it
5:37
possible so that's the one part of it like conflict dentiality so that has to
5:40
like conflict dentiality so that has to
5:40
like conflict dentiality so that has to be maintained on the owner or the
5:43
be maintained on the owner or the
5:43
be maintained on the owner or the authenticated authorized person should
5:46
authenticated authorized person should
5:46
authenticated authorized person should be able to access that information that
5:50
be able to access that information that
5:50
be able to access that information that is uh confidentiality part of it second
5:53
is uh confidentiality part of it second
5:53
is uh confidentiality part of it second is the Integrity so the information
5:57
is the Integrity so the information
5:57
is the Integrity so the information should always be present as it is
6:00
should always be present as it is
6:00
should always be present as it is supposed to be it should not be altered
6:03
supposed to be it should not be altered
6:03
supposed to be it should not be altered in any way it should not be uh updated
6:08
in any way it should not be uh updated
6:08
in any way it should not be uh updated uh you know for example you take my
6:11
uh you know for example you take my
6:11
uh you know for example you take my picture and then you um add a AI Googles
6:15
picture and then you um add a AI Googles
6:15
picture and then you um add a AI Googles or bring some horns on top of my head so
6:19
or bring some horns on top of my head so
6:19
or bring some horns on top of my head so that means you have uh actually uh
6:24
that means you have uh actually uh
6:24
that means you have uh actually uh played with the Integrity of the image
6:26
played with the Integrity of the image
6:26
played with the Integrity of the image and then you made it something else so
6:29
and then you made it something else so
6:29
and then you made it something else so so I of the CIA Triad is integrity we
6:34
so I of the CIA Triad is integrity we
6:35
so I of the CIA Triad is integrity we make sure as a cyber Security
6:37
make sure as a cyber Security
6:37
make sure as a cyber Security Professionals we make sure that the
6:40
Professionals we make sure that the
6:40
Professionals we make sure that the systems Integrity are intact third is a
6:45
systems Integrity are intact third is a
6:45
systems Integrity are intact third is a a means
6:46
a means
6:46
a means availability so all the systems carrying
6:49
availability so all the systems carrying
6:49
availability so all the systems carrying the information should be available when
6:53
the information should be available when
6:53
the information should be available when they are supp supposed to so that means
6:56
they are supp supposed to so that means
6:56
they are supp supposed to so that means uh this uh if the system is supposed to
6:59
uh this uh if the system is supposed to
6:59
uh this uh if the system is supposed to be running 24x7 then there should be no
7:03
be running 24x7 then there should be no
7:03
be running 24x7 then there should be no obstruction no uh restriction and no
7:07
obstruction no uh restriction and no
7:07
obstruction no uh restriction and no such adverse event that would you know
7:10
such adverse event that would you know
7:10
such adverse event that would you know hit its
7:11
hit its
7:11
hit its availability so this is again becomes a
7:14
availability so this is again becomes a
7:14
availability so this is again becomes a very uh important aspect in overall
7:17
very uh important aspect in overall
7:17
very uh important aspect in overall cyber security so if these three points
7:22
cyber security so if these three points
7:22
cyber security so if these three points you keep in mind when you think about
7:25
you keep in mind when you think about
7:25
you keep in mind when you think about information then obviously you will be
7:28
information then obviously you will be
7:28
information then obviously you will be thinking about the overall cyber
7:29
thinking about the overall cyber
7:29
thinking about the overall cyber security picture of the sorry overall
7:32
security picture of the sorry overall
7:32
security picture of the sorry overall information security picture of that
7:34
information security picture of that
7:34
information security picture of that information so this is the CIA Tri now
7:39
information so this is the CIA Tri now
7:39
information so this is the CIA Tri now let's
7:40
let's
7:40
let's uh get to know why cyber security per se
7:45
uh get to know why cyber security per se
7:45
uh get to know why cyber security per se is important
7:46
is important
7:46
is important so off late like during last 10 years we
7:51
so off late like during last 10 years we
7:51
so off late like during last 10 years we have seen a huge rise in new type of uh
7:56
have seen a huge rise in new type of uh
7:56
have seen a huge rise in new type of uh infections to systems or data
8:00
infections to systems or data
8:00
infections to systems or data or um that is called malware malware
8:04
or um that is called malware malware
8:04
or um that is called malware malware means it's a s piece of software but
8:07
means it's a s piece of software but
8:07
means it's a s piece of software but built for some malicious
8:09
built for some malicious
8:09
built for some malicious activity that's the my definition so
8:13
activity that's the my definition so
8:13
activity that's the my definition so it's it's uh do something uh hideous
8:18
it's it's uh do something uh hideous
8:18
it's it's uh do something uh hideous within your system you never get to know
8:21
within your system you never get to know
8:21
within your system you never get to know that your system has Mal you never get
8:24
that your system has Mal you never get
8:24
that your system has Mal you never get to know how
8:26
to know how
8:26
to know how to uh what damage it is doing it uh and
8:31
to uh what damage it is doing it uh and
8:31
to uh what damage it is doing it uh and there are then different categories of
8:33
there are then different categories of
8:33
there are then different categories of these threads
8:35
these threads
8:35
these threads uh first is the ransomware so you might
8:39
uh first is the ransomware so you might
8:40
uh first is the ransomware so you might have so it gets dropped in your devices
8:45
have so it gets dropped in your devices
8:45
have so it gets dropped in your devices PCS and servers and whatnot and then
8:49
PCS and servers and whatnot and then
8:49
PCS and servers and whatnot and then what it does is it has a one single core
8:52
what it does is it has a one single core
8:52
what it does is it has a one single core purpose to find the very good
8:54
purpose to find the very good
8:54
purpose to find the very good information uh on your uh
8:58
information uh on your uh
8:58
information uh on your uh servers and then encrypt it and they
9:01
servers and then encrypt it and they
9:01
servers and then encrypt it and they then asked for money against it that's a
9:05
then asked for money against it that's a
9:05
then asked for money against it that's a sort of ransomware for you and you
9:08
sort of ransomware for you and you
9:08
sort of ransomware for you and you probably might have heard about
9:10
probably might have heard about
9:10
probably might have heard about different transom Wares like uh uh lock
9:15
different transom Wares like uh uh lock
9:15
different transom Wares like uh uh lock bit no so have you heard about lock bit
9:19
bit no so have you heard about lock bit
9:19
bit no so have you heard about lock bit you can also respond in comments
9:23
you can also respond in comments
9:23
you can also respond in comments um and uh so this is one sort of uh
9:28
um and uh so this is one sort of uh
9:28
um and uh so this is one sort of uh Ransom where where
9:31
Ransom where where
9:31
Ransom where where people uh actually control your systems
9:35
people uh actually control your systems
9:35
people uh actually control your systems from remote and then they encrypt the
9:39
from remote and then they encrypt the
9:39
from remote and then they encrypt the core data which is needed like Erp data
9:42
core data which is needed like Erp data
9:42
core data which is needed like Erp data database files Excel files like they
9:44
database files Excel files like they
9:44
database files Excel files like they they have different mechanism to find
9:47
they have different mechanism to find
9:47
they have different mechanism to find out what is important for you and then
9:49
out what is important for you and then
9:49
out what is important for you and then they encrypt it and then they ask for
9:52
they encrypt it and then they ask for
9:52
they encrypt it and then they ask for money and they don't ask money for cash
9:55
money and they don't ask money for cash
9:55
money and they don't ask money for cash or dollars or something they ask in
9:56
or dollars or something they ask in
9:56
or dollars or something they ask in Bitcoins or the currency which is
10:00
Bitcoins or the currency which is
10:00
Bitcoins or the currency which is untraceable so so
10:03
untraceable so so
10:03
untraceable so so that at one times decentralization money
10:06
that at one times decentralization money
10:06
that at one times decentralization money is a boon but again it's a malicious
10:10
is a boon but again it's a malicious
10:10
is a boon but again it's a malicious sector use these methods to do away from
10:13
sector use these methods to do away from
10:13
sector use these methods to do away from the loot so I think every technology
10:18
the loot so I think every technology
10:18
the loot so I think every technology advancement has a necessity um which uh
10:22
advancement has a necessity um which uh
10:22
advancement has a necessity um which uh it helps us and then it has it has
10:25
it helps us and then it has it has
10:25
it helps us and then it has it has become a eil as well so it's a boon and
10:28
become a eil as well so it's a boon and
10:28
become a eil as well so it's a boon and eil at same time
10:31
anyway this is just to set the context
10:34
anyway this is just to set the context
10:35
anyway this is just to set the context uh uh what is information security what
10:38
uh uh what is information security what
10:38
uh uh what is information security what is cyber security what types of threats
10:41
is cyber security what types of threats
10:41
is cyber security what types of threats out there and now let's talk about what
10:45
out there and now let's talk about what
10:45
out there and now let's talk about what is key takeaway from this talk show so
10:48
is key takeaway from this talk show so
10:48
is key takeaway from this talk show so here in this talk show we will talk
10:50
here in this talk show we will talk
10:50
here in this talk show we will talk about how you can switch into a
10:54
about how you can switch into a
10:54
about how you can switch into a career which is cyber security
10:57
career which is cyber security
10:57
career which is cyber security professional career okay
11:00
professional career okay
11:00
professional career okay and it does not matter if you are
11:04
and it does not matter if you are
11:04
and it does not matter if you are uh uh you know from technical background
11:07
uh uh you know from technical background
11:07
uh uh you know from technical background or you are from other lines of
11:11
or you are from other lines of
11:11
or you are from other lines of graduation because being a security
11:14
graduation because being a security
11:14
graduation because being a security professional needs a separate kind of
11:17
professional needs a separate kind of
11:17
professional needs a separate kind of WID a separate kind of uh analytics
11:20
WID a separate kind of uh analytics
11:20
WID a separate kind of uh analytics power which can be with anyone
11:24
power which can be with anyone
11:24
power which can be with anyone so anyone can become a cyber security
11:27
so anyone can become a cyber security
11:27
so anyone can become a cyber security professional we will establish that here
11:30
professional we will establish that here
11:30
professional we will establish that here okay in a few minutes by this session uh
11:33
okay in a few minutes by this session uh
11:33
okay in a few minutes by this session uh first episode today I will establish
11:36
first episode today I will establish
11:36
first episode today I will establish that I will tell you the evidence and
11:38
that I will tell you the evidence and
11:39
that I will tell you the evidence and you know and then second is if you are
11:43
you know and then second is if you are
11:43
you know and then second is if you are an IT professional but you feel that you
11:46
an IT professional but you feel that you
11:46
an IT professional but you feel that you are your career is staging stagnated you
11:50
are your career is staging stagnated you
11:50
are your career is staging stagnated you don't see anywhere to
11:52
don't see anywhere to
11:52
don't see anywhere to go you can switch into the cyber
11:55
go you can switch into the cyber
11:55
go you can switch into the cyber security obviously different career
11:58
security obviously different career
11:58
security obviously different career stages you may at and uh it will be
12:01
stages you may at and uh it will be
12:01
stages you may at and uh it will be different career path for you but we
12:03
different career path for you but we
12:03
different career path for you but we will Define that okay so we will create
12:06
will Define that okay so we will create
12:06
will Define that okay so we will create a career blueprint for you at a high
12:09
a career blueprint for you at a high
12:09
a career blueprint for you at a high level until unless you want to join our
12:13
level until unless you want to join our
12:13
level until unless you want to join our specific uh cyber security training
12:16
specific uh cyber security training
12:16
specific uh cyber security training course which she shop and um we are
12:19
course which she shop and um we are
12:19
course which she shop and um we are taking uh bringing forward very soon so
12:23
taking uh bringing forward very soon so
12:23
taking uh bringing forward very soon so uh just stay tuned on that as well but
12:26
uh just stay tuned on that as well but
12:27
uh just stay tuned on that as well but this uh episode will give you enough
12:30
this uh episode will give you enough
12:30
this uh episode will give you enough knowledge uh to make way into the cyber
12:34
knowledge uh to make way into the cyber
12:34
knowledge uh to make way into the cyber security at least you will be determined
12:37
security at least you will be determined
12:37
security at least you will be determined yes this is what I want to
12:39
yes this is what I want to
12:39
yes this is what I want to do uh then another key takeaway from
12:43
do uh then another key takeaway from
12:43
do uh then another key takeaway from this episodes will be
12:46
this episodes will be
12:46
this episodes will be U you know securing our devices which
12:50
U you know securing our devices which
12:50
U you know securing our devices which are our mobile phones but mobile phones
12:53
are our mobile phones but mobile phones
12:53
are our mobile phones but mobile phones we know that it's the least protected
12:56
we know that it's the least protected
12:56
we know that it's the least protected devices in like all the devices if I
12:59
devices in like all the devices if I
13:00
devices in like all the devices if I carry laptop I work on office computer I
13:03
carry laptop I work on office computer I
13:03
carry laptop I work on office computer I work on servers I work on any device the
13:07
work on servers I work on any device the
13:07
work on servers I work on any device the least protected device remains mobile
13:10
least protected device remains mobile
13:10
least protected device remains mobile phone
13:12
phone
13:12
phone because uh generally we do not install
13:15
because uh generally we do not install
13:15
because uh generally we do not install any antivirus EDR or other systems on
13:19
any antivirus EDR or other systems on
13:19
any antivirus EDR or other systems on mobile phone we trust that whatever the
13:22
mobile phone we trust that whatever the
13:22
mobile phone we trust that whatever the mobile phone comes with um it comes with
13:26
mobile phone comes with um it comes with
13:26
mobile phone comes with um it comes with you know inbuilt features to secure us
13:30
you know inbuilt features to secure us
13:30
you know inbuilt features to secure us uh just to give you a
13:33
uh just to give you a
13:33
uh just to give you a hint there are there's a group of people
13:36
hint there are there's a group of people
13:36
hint there are there's a group of people who did some research there are close to
13:40
who did some research there are close to
13:40
who did some research there are close to 300 programs within the Android
13:44
300 programs within the Android
13:44
300 programs within the Android operating system which tracks your every
13:48
operating system which tracks your every
13:48
operating system which tracks your every moment 300
13:51
moment 300
13:51
moment 300 processes can you repeat it so close to
13:55
processes can you repeat it so close to
13:55
processes can you repeat it so close to 300 processes which track your movement
13:58
300 processes which track your movement
13:58
300 processes which track your movement if you block one there are still
14:00
if you block one there are still
14:00
if you block one there are still 298 close to that still tracking your
14:04
298 close to that still tracking your
14:04
298 close to that still tracking your activities and movements and what you
14:05
activities and movements and what you
14:06
activities and movements and what you are doing on the
14:07
are doing on the
14:07
are doing on the phone and I think this is uh uh good
14:13
phone and I think this is uh uh good
14:13
phone and I think this is uh uh good learning we will talk about how to
14:15
learning we will talk about how to
14:15
learning we will talk about how to secure these devices how to what are
14:17
secure these devices how to what are
14:17
secure these devices how to what are like common ways to find uh if your
14:21
like common ways to find uh if your
14:21
like common ways to find uh if your device is acting weird uh then you what
14:27
device is acting weird uh then you what
14:27
device is acting weird uh then you what the are the steps you need to take to
14:29
the are the steps you need to take to
14:29
the are the steps you need to take to secure these devices so that is another
14:32
secure these devices so that is another
14:32
secure these devices so that is another key takeaway from these episodes that
14:35
key takeaway from these episodes that
14:35
key takeaway from these episodes that you will get to protect your near dear
14:38
you will get to protect your near dear
14:38
you will get to protect your near dear ones from you improve their cyber
14:41
ones from you improve their cyber
14:41
ones from you improve their cyber hygiene you improve your cyber hygiene
14:44
hygiene you improve your cyber hygiene
14:44
hygiene you improve your cyber hygiene and you protect your uh devices you own
14:49
and you protect your uh devices you own
14:49
and you protect your uh devices you own and uh you promote the safe use of these
14:52
and uh you promote the safe use of these
14:52
and uh you promote the safe use of these devices as well so this is just to set
14:57
devices as well so this is just to set
14:57
devices as well so this is just to set the context today what we will be doing
15:00
the context today what we will be doing
15:00
the context today what we will be doing in this um whole
15:03
in this um whole
15:03
in this um whole series so first of all let's talk about
15:07
series so first of all let's talk about
15:07
series so first of all let's talk about uh as a career because I know most of
15:09
uh as a career because I know most of
15:09
uh as a career because I know most of you would be professionals
15:11
you would be professionals
15:11
you would be professionals or um you know fresh graduates uh who
15:15
or um you know fresh graduates uh who
15:15
or um you know fresh graduates uh who are watching me in this video and who
15:17
are watching me in this video and who
15:17
are watching me in this video and who would be watching after the you know it
15:20
would be watching after the you know it
15:20
would be watching after the you know it is put on the cop TV website or YouTube
15:23
is put on the cop TV website or YouTube
15:23
is put on the cop TV website or YouTube and whatnot so idea is uh who
15:27
and whatnot so idea is uh who
15:27
and whatnot so idea is uh who can uh cyber security career why it is
15:31
can uh cyber security career why it is
15:31
can uh cyber security career why it is important I said there are
15:33
important I said there are
15:33
important I said there are threats
15:35
threats
15:35
threats and companies are losing millions
15:38
and companies are losing millions
15:38
and companies are losing millions billions trillions of money and uh last
15:42
billions trillions of money and uh last
15:42
billions trillions of money and uh last year 2024 the hacker economy was $1
15:46
year 2024 the hacker economy was $1
15:46
year 2024 the hacker economy was $1 trillion
15:48
trillion
15:48
trillion economy this year it is expected to grow
15:52
economy this year it is expected to grow
15:52
economy this year it is expected to grow tfold close to1 trillion do you know
15:55
tfold close to1 trillion do you know
15:55
tfold close to1 trillion do you know what that means it means that a tax will
15:59
what that means it means that a tax will
15:59
what that means it means that a tax will keep on becoming more
16:02
keep on becoming more
16:02
keep on becoming more complicated the uh attacks will uh keep
16:07
complicated the uh attacks will uh keep
16:07
complicated the uh attacks will uh keep on uh you know uh making more and more
16:10
on uh you know uh making more and more
16:10
on uh you know uh making more and more companies organizations their
16:13
companies organizations their
16:13
companies organizations their victims so in one conference I heard it
16:16
victims so in one conference I heard it
16:16
victims so in one conference I heard it was a very senior cyber security
16:19
was a very senior cyber security
16:19
was a very senior cyber security researcher and he said that it is just
16:24
researcher and he said that it is just
16:24
researcher and he said that it is just the uh you know it is just the matter of
16:28
the uh you know it is just the matter of
16:28
the uh you know it is just the matter of time time when one business gets
16:31
time time when one business gets
16:31
time time when one business gets attacked because most of all the
16:34
attacked because most of all the
16:34
attacked because most of all the businesses are exposed in one way or
16:36
businesses are exposed in one way or
16:36
businesses are exposed in one way or another I am looking at lots of messages
16:42
another I am looking at lots of messages
16:42
another I am looking at lots of messages uh uh
16:44
uh uh
16:44
uh uh Deepak
16:46
Deepak
16:46
Deepak Simon Nikki and BBY blogs and Technical
16:50
Simon Nikki and BBY blogs and Technical
16:50
Simon Nikki and BBY blogs and Technical class okay um so everyone says hello so
16:55
class okay um so everyone says hello so
16:55
class okay um so everyone says hello so I say hello namashkar good morning uh um
17:00
I say hello namashkar good morning uh um
17:00
I say hello namashkar good morning uh um so coming back to the topic so this
17:03
so coming back to the topic so this
17:03
so coming back to the topic so this hacker economy is on Rise and companies
17:08
hacker economy is on Rise and companies
17:08
hacker economy is on Rise and companies are paying Hefty amount to keep them
17:12
are paying Hefty amount to keep them
17:12
are paying Hefty amount to keep them secure that is first investment they do
17:16
secure that is first investment they do
17:16
secure that is first investment they do is to secure the systems and securing
17:19
is to secure the systems and securing
17:19
is to secure the systems and securing systems means they buy lots of software
17:23
systems means they buy lots of software
17:23
systems means they buy lots of software lots of appliances uh to detect the
17:26
lots of appliances uh to detect the
17:26
lots of appliances uh to detect the anomalies to report the anomalies to
17:29
anomalies to report the anomalies to
17:29
anomalies to report the anomalies to detect get the intelligence from
17:32
detect get the intelligence from
17:32
detect get the intelligence from different sources that's the one sort of
17:35
different sources that's the one sort of
17:35
different sources that's the one sort of investment second investment go if they
17:37
investment second investment go if they
17:37
investment second investment go if they have a attack they manage the reputation
17:41
have a attack they manage the reputation
17:41
have a attack they manage the reputation they pay to the often pay to the
17:43
they pay to the often pay to the
17:43
they pay to the often pay to the ransomware groups as well and they keep
17:46
ransomware groups as well and they keep
17:46
ransomware groups as well and they keep it under the carpet so that no no one
17:49
it under the carpet so that no no one
17:49
it under the carpet so that no no one get to know in the market otherwise
17:51
get to know in the market otherwise
17:51
get to know in the market otherwise their share price will go down their uh
17:55
their share price will go down their uh
17:55
their share price will go down their uh investors in trust will go down their
17:58
investors in trust will go down their
17:58
investors in trust will go down their customers
17:59
customers
17:59
customers uh will move away their Market
18:01
uh will move away their Market
18:01
uh will move away their Market reputation branding reputation will go
18:04
reputation branding reputation will go
18:04
reputation branding reputation will go down lots of uh things which are
18:07
down lots of uh things which are
18:07
down lots of uh things which are interrelated now with just one Cyber
18:11
interrelated now with just one Cyber
18:11
interrelated now with just one Cyber attack and just making it to the public
18:14
attack and just making it to the public
18:14
attack and just making it to the public that there is a Cyber attack
18:17
that there is a Cyber attack
18:17
that there is a Cyber attack right so this is this is uh important to
18:22
right so this is this is uh important to
18:22
right so this is this is uh important to to know the all the integrity and
18:25
to know the all the integrity and
18:25
to know the all the integrity and relationships of the things before uh we
18:27
relationships of the things before uh we
18:27
relationships of the things before uh we venture into the
18:29
venture into the
18:29
venture into the um discussion that how do we secure it
18:33
um discussion that how do we secure it
18:33
um discussion that how do we secure it and what type of careers are there
18:36
and what type of careers are there
18:36
and what type of careers are there so so companies are paying Hefty amount
18:40
so so companies are paying Hefty amount
18:40
so so companies are paying Hefty amount investing into remaining secure and even
18:42
investing into remaining secure and even
18:42
investing into remaining secure and even after the security incident they are
18:44
after the security incident they are
18:44
after the security incident they are paying much to diagnose those incidents
18:47
paying much to diagnose those incidents
18:47
paying much to diagnose those incidents or paying to the r groups or something
18:50
or paying to the r groups or something
18:51
or paying to the r groups or something and doing the damage control part of it
18:53
and doing the damage control part of it
18:53
and doing the damage control part of it now uh why the question arises why these
18:58
now uh why the question arises why these
18:58
now uh why the question arises why these attack tax are on
19:00
attack tax are on
19:00
attack tax are on Rise so one another question I asked you
19:05
Rise so one another question I asked you
19:05
Rise so one another question I asked you why what do you think you can uh respond
19:08
why what do you think you can uh respond
19:08
why what do you think you can uh respond in comments why do you think these
19:10
in comments why do you think these
19:10
in comments why do you think these attacks are on continence R
19:15
so first first and the foremost uh you
19:21
so first first and the foremost uh you
19:21
so first first and the foremost uh you can say that there are lots of evolving
19:24
can say that there are lots of evolving
19:24
can say that there are lots of evolving Technologies like Ai and attackers mware
19:29
Technologies like Ai and attackers mware
19:29
Technologies like Ai and attackers mware malicious seor thread actors group are
19:31
malicious seor thread actors group are
19:31
malicious seor thread actors group are using these Technologies obviously like
19:34
using these Technologies obviously like
19:34
using these Technologies obviously like we have chat GPD there is a hacker GPD
19:36
we have chat GPD there is a hacker GPD
19:36
we have chat GPD there is a hacker GPD there's a if you use SAS software as a
19:39
there's a if you use SAS software as a
19:39
there's a if you use SAS software as a service there's a malware as a service
19:42
service there's a malware as a service
19:42
service there's a malware as a service and there's a you know nice rate card of
19:46
and there's a you know nice rate card of
19:46
and there's a you know nice rate card of dark web services so like for example
19:50
dark web services so like for example
19:50
dark web services so like for example you can buy an um bank account
19:54
you can buy an um bank account
19:54
you can buy an um bank account information which will have minimum
19:56
information which will have minimum
19:56
information which will have minimum $10,000 and you can get it in like $400
20:00
$10,000 and you can get it in like $400
20:00
$10,000 and you can get it in like $400 $500 so there are enormous types of
20:05
$500 so there are enormous types of
20:05
$500 so there are enormous types of threats which exist today but they are
20:08
threats which exist today but they are
20:08
threats which exist today but they are on continuously On The Rise one reason
20:11
on continuously On The Rise one reason
20:11
on continuously On The Rise one reason one prominent reason is there are too
20:14
one prominent reason is there are too
20:14
one prominent reason is there are too few people to stop
20:17
few people to stop
20:17
few people to stop them so that is basically we don't have
20:22
them so that is basically we don't have
20:22
them so that is basically we don't have enough uh people or the strength with
20:27
enough uh people or the strength with
20:27
enough uh people or the strength with the right set of skills to stop these
20:30
the right set of skills to stop these
20:31
the right set of skills to stop these attacks so I think this is the one and
20:34
attacks so I think this is the one and
20:34
attacks so I think this is the one and the most prominent reason uh that we
20:38
the most prominent reason uh that we
20:38
the most prominent reason uh that we don't have a working professionals with
20:41
don't have a working professionals with
20:41
don't have a working professionals with dedicate knowledge who can prevent these
20:44
dedicate knowledge who can prevent these
20:44
dedicate knowledge who can prevent these tax so it's like very small fraternity
20:47
tax so it's like very small fraternity
20:47
tax so it's like very small fraternity at this moment and there is a huge skill
20:49
at this moment and there is a huge skill
20:50
at this moment and there is a huge skill deficit within the industry for cyber
20:54
deficit within the industry for cyber
20:54
deficit within the industry for cyber security so even if you go to shine.com
20:58
security so even if you go to shine.com
20:58
security so even if you go to shine.com today and you just write cyber security
21:02
today and you just write cyber security
21:02
today and you just write cyber security it's a job portal in India right so you
21:04
it's a job portal in India right so you
21:04
it's a job portal in India right so you would find close to 300,000 jobs are
21:08
would find close to 300,000 jobs are
21:08
would find close to 300,000 jobs are available in cyber security just in
21:11
available in cyber security just in
21:11
available in cyber security just in India and that is just with one portal
21:15
India and that is just with one portal
21:15
India and that is just with one portal there would be no cre there would be
21:17
there would be no cre there would be
21:17
there would be no cre there would be like other portals as well so what I'm
21:21
like other portals as well so what I'm
21:21
like other portals as well so what I'm trying to say is there is a need of
21:25
trying to say is there is a need of
21:25
trying to say is there is a need of cyber security professionals so if you
21:27
cyber security professionals so if you
21:27
cyber security professionals so if you are thinking
21:29
are thinking
21:29
are thinking first you are thinking about becoming a
21:32
first you are thinking about becoming a
21:32
first you are thinking about becoming a cyber security professional you are very
21:34
cyber security professional you are very
21:34
cyber security professional you are very much on the right path your thought
21:36
much on the right path your thought
21:36
much on the right path your thought process is proven by the different facts
21:40
process is proven by the different facts
21:40
process is proven by the different facts and reports second uh if you now would
21:45
and reports second uh if you now would
21:45
and reports second uh if you now would ask like for cyber security can I be
21:49
ask like for cyber security can I be
21:49
ask like for cyber security can I be from like technical background no you
21:52
from like technical background no you
21:52
from like technical background no you don't need to be technical background so
21:55
don't need to be technical background so
21:55
don't need to be technical background so in the audience uh we have uh one
21:58
in the audience uh we have uh one
21:58
in the audience uh we have uh one learner from my existing batch which is
22:01
learner from my existing batch which is
22:01
learner from my existing batch which is um Akil so Akil is the person with no uh
22:08
um Akil so Akil is the person with no uh
22:08
um Akil so Akil is the person with no uh eyesight he is uh he will graduate right
22:12
eyesight he is uh he will graduate right
22:12
eyesight he is uh he will graduate right now do the graduation but at this moment
22:16
now do the graduation but at this moment
22:16
now do the graduation but at this moment he is already a cyber security
22:19
he is already a cyber security
22:19
he is already a cyber security researcher he is already a YouTuber and
22:22
researcher he is already a YouTuber and
22:23
researcher he is already a YouTuber and influencer for cyber security he
22:25
influencer for cyber security he
22:25
influencer for cyber security he conducts session here and there and uh
22:28
conducts session here and there and uh
22:28
conducts session here and there and uh uh Hills from a very modest background
22:31
uh Hills from a very modest background
22:31
uh Hills from a very modest background in Gujarat so I
22:33
in Gujarat so I
22:33
in Gujarat so I think his story is the example that
22:37
think his story is the example that
22:37
think his story is the example that anyone can do cyber security and anyone
22:40
anyone can do cyber security and anyone
22:40
anyone can do cyber security and anyone can become a good cyber security
22:43
can become a good cyber security
22:43
can become a good cyber security professional you can read more about it
22:46
professional you can read more about it
22:46
professional you can read more about it his story uh at my LinkedIn post connect
22:49
his story uh at my LinkedIn post connect
22:49
his story uh at my LinkedIn post connect with him get to know him better but idea
22:52
with him get to know him better but idea
22:52
with him get to know him better but idea is again
22:53
is again
22:53
is again cop uh we know that cop Corner we are a
22:56
cop uh we know that cop Corner we are a
22:56
cop uh we know that cop Corner we are a community we promote we promote uh you
23:00
community we promote we promote uh you
23:00
community we promote we promote uh you know uh people to uh you know become a
23:04
know uh people to uh you know become a
23:04
know uh people to uh you know become a leader in itself and then these
23:06
leader in itself and then these
23:06
leader in itself and then these leadership qualities you bring more
23:09
leadership qualities you bring more
23:09
leadership qualities you bring more people to join this community and there
23:10
people to join this community and there
23:10
people to join this community and there are lots of benefits you gain
23:13
are lots of benefits you gain
23:13
are lots of benefits you gain recognition you get validation you get
23:16
recognition you get validation you get
23:16
recognition you get validation you get uh you know um yourself uh branding by
23:20
uh you know um yourself uh branding by
23:20
uh you know um yourself uh branding by on the cop corner and this is the core
23:23
on the cop corner and this is the core
23:23
on the cop corner and this is the core purpose of and then information sharing
23:26
purpose of and then information sharing
23:26
purpose of and then information sharing and knowledge sharing is like another
23:28
and knowledge sharing is like another
23:28
and knowledge sharing is like another aspect and there that was a core purpose
23:31
aspect and there that was a core purpose
23:31
aspect and there that was a core purpose why my started SE corner and then more
23:34
why my started SE corner and then more
23:34
why my started SE corner and then more and more people now we are a very good
23:36
and more people now we are a very good
23:37
and more people now we are a very good Global Community now so coming back to
23:40
Global Community now so coming back to
23:40
Global Community now so coming back to the original topic of the day u career
23:45
the original topic of the day u career
23:45
the original topic of the day u career in cyber security so that is evident I
23:47
in cyber security so that is evident I
23:47
in cyber security so that is evident I have given you fact figures as well that
23:50
have given you fact figures as well that
23:50
have given you fact figures as well that you are on right track and how we will
23:55
you are on right track and how we will
23:55
you are on right track and how we will explore Leaf by Leaf of the all the
23:58
explore Leaf by Leaf of the all the
23:58
explore Leaf by Leaf of the all the cyber security um be it technology how
24:02
cyber security um be it technology how
24:02
cyber security um be it technology how things work or be it uh how in as a
24:06
things work or be it uh how in as a
24:06
things work or be it uh how in as a cyber security professional what you are
24:08
cyber security professional what you are
24:08
cyber security professional what you are expected to do so we will explore in
24:11
expected to do so we will explore in
24:11
expected to do so we will explore in next episodes but I I'll I'll see you
24:15
next episodes but I I'll I'll see you
24:15
next episodes but I I'll I'll see you there I'll appreciate if you share this
24:18
there I'll appreciate if you share this
24:18
there I'll appreciate if you share this uh video or the link to this video to
24:21
uh video or the link to this video to
24:21
uh video or the link to this video to your friends who you think are worthy of
24:24
your friends who you think are worthy of
24:24
your friends who you think are worthy of having this information and uh we all
24:26
having this information and uh we all
24:26
having this information and uh we all know that at uh C Corner TV we we we uh
24:31
know that at uh C Corner TV we we we uh
24:31
know that at uh C Corner TV we we we uh keep on uh promoting this fact that
24:33
keep on uh promoting this fact that
24:33
keep on uh promoting this fact that sharing is caring so just keep
24:37
sharing is caring so just keep
24:37
sharing is caring so just keep sharing in the last section I just want
24:39
sharing in the last section I just want
24:39
sharing in the last section I just want to give one more uh information so we
24:43
to give one more uh information so we
24:43
to give one more uh information so we did a random survey in the universities
24:47
did a random survey in the universities
24:47
did a random survey in the universities in India so close to thousand people
24:50
in India so close to thousand people
24:50
in India so close to thousand people were uh surveyed uh and out of thousand
24:54
were uh surveyed uh and out of thousand
24:54
were uh surveyed uh and out of thousand students 70% of them said that they want
24:58
students 70% of them said that they want
24:58
students 70% of them said that they want to become a ethical
25:01
to become a ethical
25:01
to become a ethical hacker interesting very you know
25:04
hacker interesting very you know
25:04
hacker interesting very you know interesting that everyone wants to
25:06
interesting that everyone wants to
25:06
interesting that everyone wants to become ethical hacker but so when I ask
25:11
become ethical hacker but so when I ask
25:11
become ethical hacker but so when I ask further do you know what an ethical
25:13
further do you know what an ethical
25:13
further do you know what an ethical hacker does like eight hours of the day
25:16
hacker does like eight hours of the day
25:16
hacker does like eight hours of the day when company hires you as a cyber
25:20
when company hires you as a cyber
25:20
when company hires you as a cyber security professional and ask you to do
25:22
security professional and ask you to do
25:22
security professional and ask you to do ethical hacking so he says yes uh it
25:26
ethical hacking so he says yes uh it
25:26
ethical hacking so he says yes uh it would be ethical hacking so that is
25:28
would be ethical hacking so that is
25:28
would be ethical hacking so that is where people go wrong and all these
25:30
where people go wrong and all these
25:30
where people go wrong and all these YouTube channels all the you know media
25:33
YouTube channels all the you know media
25:33
YouTube channels all the you know media hype and whatnot there is so much
25:37
hype and whatnot there is so much
25:37
hype and whatnot there is so much misinformation and disinformation about
25:40
misinformation and disinformation about
25:40
misinformation and disinformation about these careers about these roles so we
25:42
these careers about these roles so we
25:42
these careers about these roles so we will again
25:43
will again
25:43
will again demystify everything for you uh we will
25:48
demystify everything for you uh we will
25:48
demystify everything for you uh we will uh layer by layer we will go into each
25:50
uh layer by layer we will go into each
25:50
uh layer by layer we will go into each of the role and we'll tell how a typical
25:54
of the role and we'll tell how a typical
25:54
of the role and we'll tell how a typical work day in office for a cyber security
25:57
work day in office for a cyber security
25:57
work day in office for a cyber security professional looks like you will not be
26:00
professional looks like you will not be
26:00
professional looks like you will not be doing pen testing you will not be doing
26:02
doing pen testing you will not be doing
26:02
doing pen testing you will not be doing ethical hacking all the time that will
26:05
ethical hacking all the time that will
26:05
ethical hacking all the time that will be just 10% of your job profile 90% you
26:09
be just 10% of your job profile 90% you
26:09
be just 10% of your job profile 90% you have to do something else which you are
26:11
have to do something else which you are
26:11
have to do something else which you are not aware of and where uh the core
26:15
not aware of and where uh the core
26:15
not aware of and where uh the core leadership skills and your professional
26:18
leadership skills and your professional
26:18
leadership skills and your professional skill development comes into place you
26:20
skill development comes into place you
26:20
skill development comes into place you need to be a good speaker you need to be
26:22
need to be a good speaker you need to be
26:22
need to be a good speaker you need to be a good collaborator you need to be a
26:24
a good collaborator you need to be a
26:24
a good collaborator you need to be a good presentation maker you need to be a
26:26
good presentation maker you need to be a
26:26
good presentation maker you need to be a good convincer uh you need to be a good
26:29
good convincer uh you need to be a good
26:29
good convincer uh you need to be a good uh you know um research guy who can find
26:33
uh you know um research guy who can find
26:33
uh you know um research guy who can find some anomalies in the logs so you need
26:36
some anomalies in the logs so you need
26:36
some anomalies in the logs so you need to be good at 100 things before you
26:39
to be good at 100 things before you
26:39
to be good at 100 things before you become the ethical
26:41
become the ethical
26:41
become the ethical hacker so so we will demystify all this
26:44
hacker so so we will demystify all this
26:45
hacker so so we will demystify all this stuff uh I think today's um like kickoff
26:49
stuff uh I think today's um like kickoff
26:49
stuff uh I think today's um like kickoff session was like that and hope you have
26:51
session was like that and hope you have
26:51
session was like that and hope you have enjoyed this talk and we'll keep in
26:53
enjoyed this talk and we'll keep in
26:53
enjoyed this talk and we'll keep in enjoying and bring more people and
26:56
enjoying and bring more people and
26:56
enjoying and bring more people and audience to this platform and with this
26:59
audience to this platform and with this
26:59
audience to this platform and with this I uh take another two minutes for you if
27:03
I uh take another two minutes for you if
27:03
I uh take another two minutes for you if you have any questions you can write in
27:05
you have any questions you can write in
27:05
you have any questions you can write in the comment box and I can read them and
27:11
um respond
27:23
here so guys I have uh uh another um
27:28
here so guys I have uh uh another um
27:28
here so guys I have uh uh another um good professional in audience Jes so Jes
27:31
good professional in audience Jes so Jes
27:31
good professional in audience Jes so Jes is also a part of the current cohort and
27:35
is also a part of the current cohort and
27:35
is also a part of the current cohort and he is a like 20 plus experience into ID
27:39
he is a like 20 plus experience into ID
27:39
he is a like 20 plus experience into ID and very nice professional and uh he
27:41
and very nice professional and uh he
27:41
and very nice professional and uh he takes care of the software assets which
27:43
takes care of the software assets which
27:43
takes care of the software assets which is again is a very very crucial part to
27:46
is again is a very very crucial part to
27:46
is again is a very very crucial part to know when you are a cyber security
27:48
know when you are a cyber security
27:48
know when you are a cyber security professional we will do a whole session
27:50
professional we will do a whole session
27:50
professional we will do a whole session on that topic and uh in going forward
27:54
on that topic and uh in going forward
27:54
on that topic and uh in going forward next topics I might be um uh attending
27:59
next topics I might be um uh attending
27:59
next topics I might be um uh attending arranging more in you know uh uh I'll be
28:03
arranging more in you know uh uh I'll be
28:03
arranging more in you know uh uh I'll be sending some invites and you will see
28:05
sending some invites and you will see
28:05
sending some invites and you will see more guests are here uh who will talk
28:08
more guests are here uh who will talk
28:08
more guests are here uh who will talk about um their core field in uh detail
28:13
about um their core field in uh detail
28:13
about um their core field in uh detail so to give you a depth of the field that
28:15
so to give you a depth of the field that
28:15
so to give you a depth of the field that what exactly we are talking
28:20
about so I ask is there any demo in this
28:23
about so I ask is there any demo in this
28:23
about so I ask is there any demo in this series yes there will be lots of demos
28:27
series yes there will be lots of demos
28:27
series yes there will be lots of demos so today was the context setting there
28:30
so today was the context setting there
28:30
so today was the context setting there will be lots of
28:31
will be lots of
28:31
will be lots of demos and uh we will be exploring doc
28:35
demos and uh we will be exploring doc
28:35
demos and uh we will be exploring doc webs we will be going through different
28:38
webs we will be going through different
28:38
webs we will be going through different um you know platforms we'll be um
28:43
um you know platforms we'll be um
28:43
um you know platforms we'll be um exploring ways of doing uh vulnerability
28:47
exploring ways of doing uh vulnerability
28:47
exploring ways of doing uh vulnerability assessment how to V do the vulnerability
28:50
assessment how to V do the vulnerability
28:50
assessment how to V do the vulnerability assessment of a application versus
28:52
assessment of a application versus
28:52
assessment of a application versus application versus a code as a developer
28:55
application versus a code as a developer
28:55
application versus a code as a developer I think which is the largest audience we
28:57
I think which is the largest audience we
28:57
I think which is the largest audience we have and cop they are developers so they
29:00
have and cop they are developers so they
29:00
have and cop they are developers so they need to understand that they are
29:01
need to understand that they are
29:01
need to understand that they are building a secure code so so all of this
29:05
building a secure code so so all of this
29:05
building a secure code so so all of this um I bid um you know to today and uh I
29:10
um I bid um you know to today and uh I
29:11
um I bid um you know to today and uh I think it's uh nice to have uh
29:15
think it's uh nice to have uh
29:15
think it's uh nice to have uh kickstarted this uh series it is very
29:17
kickstarted this uh series it is very
29:17
kickstarted this uh series it is very close to my heart and it's very
29:19
close to my heart and it's very
29:19
close to my heart and it's very interesting topic nowadays so I'll see
29:22
interesting topic nowadays so I'll see
29:22
interesting topic nowadays so I'll see you there
29:26
[Music]
#Computer Security
#Hacking & Cracking
#Jobs