Ex-NSA hacker tells us how to get into hacking! (2022 Edition)

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
- This is what I (laughs) I'm laughing now. This is- - Get on your- - No, no, I can't, I can't. Oh, God! - Come on. Get on it. - So. (energetic music) Hey, everyone, it's David Bombal. Really excited about this, back with Neal Bridges. Neal, it's been years since we met, man. So. - Wow! (Neal laughs) So I think we need to talk about that. How did we meet? - It's been a year. It has been a year. I cannot even believe that literally a year ago, Richard came to me and said, "Do you know David Bombal?" And I said, "I have no idea who that is." (Neal and David laughing) I felt really bad. I had no idea you were. And- - That's okay. - He was like, "David's done some courses for us in the past." You did some Cisco courses, I guess, for INE in the past. - Yeah, like one course, yeah. - Like one course, yeah. He was really impressed with you, and I was like, "Yeah, I'd love to meet the guy." And I remember you and I getting on the conversation that first time and we just, we hit it off just like that. And it was just, I could just tell that there's this like instant chemistry of us being able to just sit down and chat with each other, and I don't even remember what we were trying to talk about during that conversation, but I know the next day you called me up and you were like, "Hey, INE, aside," 'cause I wasn't working for INE at the time. INE said, "Do you wanna do a video together?" And I was like, "Yeah, duh, I'd love "to do a video with you." I was so impressed with the quality of production and I was so impressed with just the conversation we had that I was just humbled. I was incredibly humbled that you'd asked to do a video with me. I thought it was awesome. I don't know what your impression was. (Neal laughs) - No, no, it was great, 'cause I remember at that time I was looking to give advice for people entering, 'cause I got all these questions, and I wanted to find someone, and you met all the criteria. someone who's very experienced, someone who can give a very clear roadmap, and we created that first video about a year ago. I remember it was hilarious because we met on the, I think it was a Tuesday evening, my time. - Yeah. - Then I sent you some messages or something, we communicated, and then on the Wednesday we had an interview, and then on the Thursday, we published that first video. It was great. - It was. And I think that you mentioned the helping people. And I think that that's something that you and I share in common, right? Is that we have a mission to try to bring as much visibility and education and awareness about topics to everybody that we can. I have got to say that INE has never ever paid you a dime, but the fact that you have allowed me to come on this show on your stream, on your YouTube channel multiple times, allowed me to talk about not just myself, my career, what I've got going on at work. this was before I was at INE, when I've been at INE, I couldn't even be more grateful to you, just because we share this common goal of trying to make people smarter and give them as much education as possible. And listen, it's been a year. I can't wait to do more with you in '22. - I'm looking forward to it. - I wanna thank you from the bottom of my heart that you've been a really great friend and a really great partner and collaborator for the last year, and I can't wait to do more stuff with you his year. - Great, Neal. From my point of view, it's so hard to find someone who can articulate and is very knowledgeable and knows what to do to help so many people. And I know you've spoken to a lot of people individually. You have a YouTube channel and I'll link that below for those of you wanna get a lot more information from Neal. It's been fantastic, just to try and extract your knowledge, to help people who are starting out. And I will, I will put a disclaimer, I did create a course as we mentioned, for INE, so I have received payment from INE for that course in royalty payments. But yeah, it's important to say that INE have never paid me for any advertising. These videos are just you and I trying to help people. - Absolutely. - So let's get to it. - Yeah, let's do it. What knowledge would you like to extract today, David? - No, we need to get comments below. What do you want me to ask Neal in 2022? (Neal laughs) But for me, beginning of 2022 now, in the beginning of 2021, I asked you, "Neal, what's a roadmap?" And you articulated that really well. So I've interviewed John Hammond and he kind of like surprised me with, he sort of take on what people should do, but I wanna get your opinion. Have you changed your opinions since last year? Or can you give us Neal's three things, or whatever it's gonna be this time? What should I do if I wanna get into? - It's hard to tell if they've changed or not. This year has been an interesting year, and we've now been on the second side of the COVID argument, right? Or year two of the code COVID argument. Would I say that my opinions have changed? Maybe a little bit, but they may be, may just be different takes on the same ideas. Let me let's talk about it, right? So let's get to the brass tacks, right? Three things that if you wanna be in cybersecurity, that I think you need to do in 2022, if you didn't do them in '21, you can carry over and do a '22. If you're hearing this video for the first time, you can do them again in '22, right? So first and foremost, networking, right? I have seen so many people in the last year since you and I did, since you and I literally out of thin air created the 1,000 Connect challenge. - Yeah. - 1,000 Meaningful Connect Challenge, I've seen so many people become so incredibly successful by doing the 1,000 Connect Meaningful Challenge, so much so that I put a video together that actually articulated steps to do to make meaningful connections, and I wanna harp on that because apparently there's some people out there that got the wrong impression, that thought that we were just chasing numbers with that 1,000 Connect Challenge, and it's always been about finding meaningful connections in a space that you wanna be employed in, and becoming friends with them, making those connections meaningful as you're participating in this journey towards cybersecurity. And so my number one thing, and I believe that more now in the last year that we've got a year's worth of experimentation under our belt since we talked about this last year. - [David] Yeah. - Networking. And I mean using LinkedIn to your advantage to work the system to get you into this career field. I think the second thing, right? That I would talk about that if you wanna get into cybersecurity is do the free stuff first. There is so much free cyber security training that is out there. I think one of the things that as I harp on it more and more throughout the year when I talk about it there are people who are like, "Neal, do I have to have this cert? "Do I have to have this course? "I don't have the money to pay for this. "Can you give me a free Try Hack Me voucher? "Can you give me a free INE premium pass? "Can you give me free this? "Can you give me for that?" They wanna ask you for the stuff that's paid for, they wanna ask you that for free, but they haven't exactly gone out there and done the free training that is available out there, whether that's INE Starter pass, whether that's watching YouTube videos on different types of tools and techniques, whether that's taking, watching for all the giveaways that you do, all the giveaways that I do, all the giveaways that everybody else does, that's out there. That's a content creator, whether it's looking for that, they're not actually going out there and looking for actively participating in that free stuff. And so my second thing is if you wanna get a career in cybersecurity, you need to be out there taking the free stuff. There's so much free training out there, there's no reason not to do it. I think the third thing I would still say, well, this is a tough one because now like I had that third thing in my mind and then like another one rushed in and said, but wait, Neal, wait, Neal, I wanna be third. I wanna be third. - We can do four, it doesn't matter. You can expand it. - I'll stick with my third one. I think my third one is still getting the hands-on stuff. Now I, my definition of hands-on has changed slightly. And this is a video that I wanted to do. I'll kind of give a preview for it here on your show and kind of talk through it, but I talked last year, I think was about getting your hands on stuff with the Try Hack Me, the Hack The Box, the RangeForce, all the different types of programs that are out there with getting your hands on the tools, the tactics, techniques, procedures that come along with cybersecurity, whether it's Red Team, Blue Team, whatever the case is. A question that I get asked frequently on my stream talks about getting the hands-on experience. And I actually demonstrated to folks on my stream one time, how easy it was to go to bug-bounty platforms, like Bugcrowd, like HackerOne, and actually sign up to be a security researcher or bug bounty hunter for those platforms. And they're like, well, "Neal, I'm never gonna get paid "because I'm never going to find a bug." And I had to remind people, I'm like, "But you're pen-testing real organizations. "You go to HackerOne, you're pen-testing real companies. "Just like any other pen tester, you may not find a bug. "You may not find a vulnerability, "that just makes that pen test an unpaid pen test." - Yeah. - But there are ways that we can hack the LinkedIn system so that you as a security researcher can put your bug bounty experience on there to show that you do have experience, actual real-world working experience doing penetration testing, that doesn't require you to, whether you're a fresher or whether you're an entry-level person, whatever the case is, doesn't require you to get that first job that requires two to three years of experience from those really terrible job postings that we see. And so I think that that if you're looking for, if you're looking for three, I think that those are three things that anybody out there in the world, if you call yourself a hacker, if you want to be a hacker, if you want to be in cybersecurity, those are three things that whether you're Red Team, Blue Team, you can do those three things today. You don't have to wait until next week, you don't have to wait until the next giveaway, you don't have to wait until David's next video or my next live stream. You don't have to wait for anything. You could literally do those things today, and that is the easiest cheapest, most effective way to get started in cybersecurity. eJPT from INE. - [Neal] Mm-hmm. - Some people have said that's not free anymore. Is that true, and is it still free? These starter passes? - So starter a pass is still free. Start a pass is still free. eJPT, which is the certification that comes from Pen Tester Student, so Pen Tester Student is the content that's free in the starter pass, the eJPT is the certification that you get once you take the PTS, that is not free. That is $200 as of now. But the content that you need to take is free. Now, before you go on that, I wanna make, I make that distinguishing point because one of the concepts that I struggle with, right? Is this concept of certifications. If I learned something today and I take a cert tomorrow, I think it is highly unfair and inaccurate to say, you didn't gain that knowledge because you didn't pass the cert. A cert is a trophy that's in our trophy case, and it should be something that helps give you validation, whether that's to yourself or to an employee, that you gained that knowledge. But that doesn't mean you didn't gain that knowledge. Some people can't take tests. Some people get test anxiety. I for one was a terrible test taker coming up this school. And so there's a misconception that I think when I talk to people about this, it's like, well, Neal, I still have to pay for the eJPT. Yeah, but you can get the knowledge for free. And so one of the things I like to remind people is you should chase knowledge, not certs. If you chase knowledge, you will find a job, you will get into this career space. You will be meaningful as a content creator or as a contributor to this community by gaining knowledge. The same can't be said for chasing the cert. - I mean, the problem with assert has been anyone who's done an exam at any point in the lights knows that once you've done that, you often start forgetting things very, very quickly once you get that cert. So, okay. So you've got the starter pass on INE. That's a good place to start, is that right? So if I was starting and I had zero knowledge, would you recommend I go there or do I need to get something before I go there? Maybe I might find the security path on INE Startup Pass difficult, is there something else that can help me with like basic knowledge or what would you suggest? - So there is some basic knowledge on the starter pass. So when we built starter pass, right? We built starter pass with the idea that if you wanted to get into IT in general, you could go to the starter pass and you could play around with the different concepts that INE teaches, right? So we have networking curriculum, which you've been a part of, we've got cyber curriculum now, we've got plowed curriculum. We've made some strategic acquisitions on the cloud side. We're about to release our first cloud certification for that. We got a huge drop that's going to happen in January. Everybody's gonna be excited for that one. We've got data science that we're delving into to development programming, right? And so the idea behind starter pass is that you can kind of go and you can play with these topics, these, I don't wanna call them entry-level topics, but these topics that are kind of at that foundational level of the content, to kind of see where you're at, what you need to learn, is this a topic that you're interested in? And by the way, is INE a platform that you can choose to learn that topic from? And so what I'd say is that if you go to start pass, you're gonna get some networking basics, you're gonna get some programming basics, you're gonna get some cybersecurity based basics via the Pen Tester Student, you're gonna get some cloud basics. And the idea behind that is you can kind of test out the instructors, you could test out the content, you could test out what you do and don't know, and you kind of progress from there. To answer your question more specifically, I struggle with the, is there something I should take before I go to the starter pass? And my style of learning may not be different than your audience's style learning, so I'm gonna explain this from my perspective when I think about my style learning, right? - Yep. - I very much believed that I need to dive into something and figure out what I don't know so that I know where to go from there. Right? So recently I started to move a lot of my Honeypot infrastructure, a lot of my web infrastructure out of DigitalOcean and over into AWS. And this is not a plug for DigitalOcean or AWS. This was, I've been preaching cloud for well over a year now, my shows, and I've decided that I needed to eat my own dog food and start putting a lot of my infrastructure on cloud. And so I pulled my stuff over to AWS. I knew nothing. I didn't go take a course. I didn't take ACP. I didn't go take Amazon's Architecture class or anything like that, I just said, "I'm just gonna start building my infrastructure in Amazon "the same way I would try to build it in DigitalOcean, "and I would see where the path took me, "and I would try to solve those challenges "as the path took me there." And so the biggest, I say that to give a comparison to students that when they ask me, "Should I take some of them to go take eJPT "or Pen Testing Student?" The answer is no. No. Because from my perspective, you should go take what you're interested in at some level, that way you can start to figure out what you don't know, and then you can then reverse-engineer what you don't know and go find the content that helps you fill in those knowledge gaps. Like I don't think A+, Sec+, Net+, I don't think those are good entry-level certs. Right? Because I don't necessarily think that you by default need to take that cert to be good for cybersecurity. I think you should go do Pen Tester Student. And if you don't know anything about TCP/IP, then you should go take the millions of free videos. They should go take your videos, David. Right? - It's a lot out there. A lot's out there. A lot's out there. - And learn about TCP/IP from that. Right? But I don't think you should invariably assume that nobody knows anything about TCP/IP, because what you may learn in ICND 1, I don't know what it's called now, but. - CCNA, yeah, CCNA. - Yeah, yeah. Yeah, yeah. You may not need all of that information to be in cybersecurity regardless of what job you take. - So that's interesting. So you're saying, like if I starting today, I'm gonna go and register for the startup course, take the cyber security course that's free on INE, that will quickly tell me where I need to spend more time learning stuff. Like if I'm asked to configure an IP address and I don't know what that is, then I need to go and do Network+ or something else. If I'm asked to type commands in Linux and I have no idea what I'm doing, then I need to go and get like Network Chucks and Linux course on YouTube, or go and watch free Linux video somewhere, learn a bit about Linux. So you're saying use that as sort of a measuring stick of my knowledge, and then from there dive into something else, yeah? - Yeah, yeah. And I think, and remind everybody, right? Most people who wanna jump into cybersecurity want to be hackers. Hackers love to solve problems. Like that's the whole reason that the term was coined. That's the whole reason that this entire movement about the critical thinking and the solving the challenges has played out over the years, but most people don't wanna solve their own challenge of learning. What they want is they want somebody to give them a roadmap. And while I'm all about giving you a roadmap for your career, there is a piece of the mental puzzle that we have to unlock together to get you there. And so what I think is INE Starter Passes, that mental critical thinking unlocking mechanism, super magical unlocking mechanism, if you will, whereby go and take a piece of content and map, right? And you're asked to put in an IP address and you're like, well, it's 192, 168.1.1, I don't know what that IP address is, I don't know anything about IP addresses, I should go find a course on IP addresses. And then you go to YouTube and you take the free stuff on IP addresses, or you go over to INE, you take the network stuff that's in the starter pass on INE, or you go to Network Chuck, or you go to David Bombal, or you go insert any creator here where got free content available to teach you about IP addresses, because IP addresses has been around for older than you and I, David. Right? (David laughs) - Exactly. And we're old. And we're very old. - Yeah. And so it's like there's no shortage of free information about that stuff that's out there. So why pay somebody for that type of knowledge when it's free? Come back, now IP addresses, let's go do Metasploit. Ah, you don't know the basics of Metasploit? You don't the fundamentals of Metasploit? So you can't do that particular exercise in Pen Tester Student? Cool. Go watch the plethora of free Metasploit videos, 'cause there's, this is what I (laughs) I'm laughing now. This is- - Get on your- - No, no, I can't, I can't. Oh, God - Come on, get on it. So people like to believe, right? That if I take a Metasploit class from INE, or I take a Metasploit class from CBT Nuggets, or, and this is not me bashing or promoting any other training vendor that's out there, whatever, that I'm gonna learn something so special and so unique. And I have to remind people that Metasploit has been around for over a decade now. - Yeah. - There are so many free Metasploit videos that talk about almost every possible thing that you can do inside a Metasploit. - Now I'm gonna interrupt you right now because there's a new content creator that I respect and a lot of us respect that's just joined your team. Can you tell us about him and shout out to his channel as well? - Yeah, Alexi, yeah. Alexi made a. We were obviously trying to make, we're making a huge investment on an Instructor Cadre. Red Team instructors, particularly. We reached out to Alexi. He showed some interest in, wanted to come and join the INE team. After chatting with him, his vision and views and desires aligned very, very much with ours. He's a brilliant content creator and yeah, absolutely, when we got to the, to the, we brought Alexis over, and I have to say that it's been absolutely amazing to have him on as a content creator. And it's always awesome to work with content creators that are passionate about creating content, but also share your view about learning. And he just got done recording probably about, I think it's eight to 12 hours worth of Metasploit content alone for the new, for the brand new version of Pen Tester Student that's going to be coming out soon. And while I'm not gonna say that you're not gonna find that content anywhere else, if you like his style, if you like the way he explains things, if you want to see how he has used it in real war pen test, sprinkle in some of Josh Mason's influence, my own influence and things like that, then I think that that's the reason why you would go take courses from a content creator like that because you like their style, you like the knowledge that's in their head, you wanna see that knowledge put out onto some content that you can digest, but I'm not gonna say that, like you're gonna learn how to use some super lit sauce secret narrative that, of Metasploit that is only uncoverable through this video, and I think anybody who tells you that, I think that that's the sign of content that might be blown out of proportion. - Yes, he's got so many videos on his channel anyway, so I'll link that below as well. Go and have a look at these videos as well. There's here's a lot of free stuff out there. So your advice, free content. The good thing about starter pass is it gives you kind of like a structured path rather than just random YouTube videos, and you can jump off that to topics that you're not sure about. Neal, it's very surprising because you last time, made a big, or put a big emphasis on like Hack The Box stuff like that, and now you kind of like, I'm not saying downplaying that, but you're like not emphasizing it as much. Why is that? - I think that there's still value in hands-on training. Absolutely, 100%. I think in this day and age, you can't be marketable without hands-on experience. - So Capture the Flags, yeah? - Yeah, Capture the Flags, Try Hack Me, Hack The Box things like that. I think what I've realized over the last year is that there is a next level that we can take that hands-on piece to, and that's why I've been an advocate for people going to HackerOne and Bugcrowd is signing up and being bug bounty hunters or researchers there. I've given talks on my stream about gig work via some of the big four consulting companies that are out there. And I think that I've taken the hands-on experience piece of it, I think everybody's gotten the message over the last year. I think you and I succeeded, high five. We succeeded in telling everybody that Try Hack Me, Hack Box, hands-on stuff is incredibly important. For '22, if I were to, to enhance that message, I think the enhanced message is there are opportunities for you to find unpaid work out there, gig work out there that I do think gets you experience when you figure out how to hack the system. - To another word you do, you still do Capture the Flags, but you don't just stop there, you go and do bug bounty, you basically provide services. Hopefully you get paid for some of that, but if you're just starting out, you're not gonna resign your job. You're gonna use do this part-time and that's how you're gonna get experience. So that whole thing that we've said before, the some chicken-and-egg thing, how do I get experience without experience? This is sort of a way to get proper real-world experience without having to go through a gatekeeper to get that experience. Is that right? - Absolutely. Absolutely. And I'm not trying to say that the hands-on stuff through Hack The Box and Try Hack Me, I still am an advocate for that and I still am an advocate for putting that on your resume and I'm still an advocate for calling that experience. As a matter of fact, if that works for you and that's the level of commitment that you commit to, totally approve. But I think if we're looking for, like we talk about threes, right? Neal's, what's Neal's three's for this, Neal's three's for that? There's a good, better, best. I think we taught everybody last year that this was good. If you did Try Hack Me, Hack The Box, that was good. I think what I think would like for '22 to be for you and I, David, is to talk about some of the better and the best ways. I think a better way is you need to start putting yourself out there for some of these. And again, I'm not an advocate for unpaid labor. This is not Neal, out that you should take unpaid internships, right? But sometimes there are sacrifices that need to be made. And if you really want to solve that experience problem, there are opportunities out there for you to solve that experience problem. Hopefully you get paid, but if not, I wouldn't turn my nose up at him. I've elaborated a little bit more on my definition of experience, especially on the Red Team side. This is a little bit harder to do on the Blue Team side, but on the Red Team side, for folks who are trying to get into pen testing, it did amaze me, the more I answered this question over the last year, the more I realized that people just weren't aware that their definition of experience might be slightly skewed versus how to manipulate the system to recognize that experience. And I say that very intently, right? Because we talk, we love to be hackers. We all wanna be hackers, but we're afraid to hack the system. Right? My 1,000 Connect Challenge is a way to hack the system. Right? And I do that very intently. I think signing up for bug bounty programs like Bugcrowd and HackerOne where you can immediately gain access to pen testing opportunities under the guise of doing the bug bounties for a company like Bugcrowd and HackerOne, as long as you're following the rules that are laid out, the scope that's been provided for you in those platforms, I'm not advocating for doing anything out of scope, but that is effectively a structured apprenticeship in doing unpaid web application penetration testing by doing those bug bounty programs. And again, back to free resources, there are tons of free resources out there that teach you how to run certain automations, look for certain API vulnerabilities, look for certain web vulnerabilities. And I speak especially to the pen testers that are trying to fight that experience side, because I do think it's harder for pen testers than it is for Blue Teamers, and I'll kind of expand upon that one here in a little bit. And so I found it surprising how fewer people could think outside of that box and start to pursue that bug bounty stuff. I do think that the bug bounty stuff is still valuable for Blue Teamers, because I do believe that Blue Teamers benefit from having the education of the adversary of the Red Team, of the attackers. And so I do think that if you're not sure where you wanna go, if you're definitively sure you know you wanna do pen testing and Red Teaming, if you think you want to go Blue Teaming, I would still advise that route because it's good to have that knowledge to those adversaries when you go into that Blue Team job. - There's a few things I wanted to ask you, and I'll put a menu below so people can jump to the specific topics. I wondered, last year, I asked you, and I wanna ask these kinda important questions again, is it necessary for me to give up my job and try and study full-time to break into this field, or can I do it part-time? - Absolutely not. - [David] Yeah. - You can absolutely do it part-time. - And these bug bounty programs are part-time. Is that right? - Absolutely. Absolutely. It's I would never ever advocate for somebody to quit their job to pursue a new career in cybersecurity. Cybersecurity is hard. There's a supply and demand issue in certain career fields, and in cybersecurity, I speak frequently about the supply and demand issue on the pen testing side, right? There is more supply of pen testers than there is demand at most companies for pen testers. Like it or not, that is just the reality of it. In the hierarchy of cybersecurity defense, pen testing represents such a small actual practicum of the overall enterprise cybersecurity defense model. Like it or not, that's the way reality is. And so I think that if you're trying, if you really have your heart set on doing the Red Teaming stuff, you should absolutely not quit because you've got a higher mountain to climb than folks on the blue teaming side. Blue Teaming, GRC, anything else that's not basically pen testing, you've got a higher mountain to climb. And so I don't think that you should quit at all. I think all the things that I recommend are all things that you can do in your own time. And I think that that's a, I wanna kind of make a mention of that, right? People are talking about like, well, you should be doing that anyway. Cybersecurity is the type of career field where I hear this all the time. It's a passion thing. You should do a 24 by seven because you love to do it. You should. And if you extrapolate that, it's like, you should burn yourself out because you love to do it. You should neglect your family because you love to do it. Cybersecurity is ever changing and the adversary is always going to be one step ahead of you, so you should therefore adopt all of these unhealthy tactics, right? As a personal life perspective so that you can be the best of the best of the best of the best of the best in cybersecurity. And that is a toxic mentality in our industry that I do not subscribe to and I do not think is the key to success. Have I done that? Yes. Do I think it makes me more successful? Absolutely not, which is why I'm an advocate for it. I think that that's how we lead to some of the toxic personalities that we have inside of cybersecurity. To just quickly explain red vs blue, and where are the jobs, and why are the jobs there? - So the color wheel has expanded in the last couple of years. And I'm not even gonna be the first to go through the entire, Color Scale of Cybersecurity. So I'm just gonna really talk about kind of like the ones that you'll hear most frequently, right? So Red Teaming is the one that almost everybody's very, very familiar with, which is pen testing, Red Teaming. It's basically the art of impersonating an adversary to test the security controls of an organization. And I wanna make that distinction incredibly clear. It is impersonating the adversary to test the security controls. Most of your adversaries aren't doing what most other pen testing courses are teaching you. There isn't an adversary emulation out there where denial of service is the top of the pyramid of the threat factor. It just, it's not. It's a reality. And so when people are looking to evaluate content, make sure they're evaluating content that is based on real-world pen testing examples and real-world pen testing scenarios, and not based off of, Hey, I saw this cool thing on YouTube or Reddit and I did it, but it has no practical use in a Red Team engagement whatsoever. Blue Teaming is the art of basically cyber defense incident response. When we think about Blue Teamers, we frequently think about these are the soldiers on the frontline of cyber defense day in and day out in an organization. These are your instant responders, your threat hunters, your SOC analysts, right? These are the folks who are actively trying to find the bad guy that is attacking organizations everyday. I didn't realize the value of Blue Team. And I'll say this openly, right? I spent my entire career on the red side, on the offensive side, right? All the way through my military years, I wasn't in charge of my first Blue Team until I built a security operations team for a Fortune 100 company. That was when I truly learned the value of what it's like to command soldiers that are on the front lines of battle every single day. And so mad respect goes out to the Blue Teamers. And I would argue that when you look at just those two categories, there are more jobs still to this day in the Blue Team side of things. And this is what I talked about with supply and demand. When we talk about those, that mystical 3.3 million open jobs across the globe, those are not 3.3 million Red Teamers. And I think that that's what some people read when they see that headline. They're like, Ah, 3.3 million, I'm gonna go do Red Teaming 'cause there are 3.3 million jobs waiting for me. That's such a small, small view of cybersecurity, I think that think that Red Team is the only thing that it means to be in cybersecurity. There are 3.3 million open jobs across the globe, but that is spread out across Blue Team, Red Team, risk and governance, threat hunting, creating policy, IT and cyber audit, right? It's all the things that go into defending an enterprise, where Red Teaming and pen testing is such a small niche. And so I would encourage folks that are looking to get into cybersecurity to consider that. If you're truly passionate about hacking, go forth and be awesome, but you need to consider just like when you hack a network, that you may have to get into a secretary's machine so that you can eventually get to domain admin, you're gonna have to do that with the job market too. We had an awesome guest on the stream this last year. He's agreed to come back quarterly. His name's Joel Fulton. He's the former CISO of Splunk. He now runs a company called Lucidum! Fantastic individual. He's got an amazing perspective on cybersecurity, I highly recommend consuming as much of his content as possible. He brought in his concept to our community called garbage jobs. - Yeah. - And for lack of a better explanation, garbage jobs are the jobs that you don't want to do in cybersecurity, right? Regardless of where your heart stands, they're the jobs that you don't wanna do in cybersecurity. Let's say you wanna get into pen testing. And again, I go back to my supply and demand issue. There is more supply of pen testers than there is demand. You might have to go take a job that you don't want, AKA a garbage job, so that you can get into an organization and get networked, back to point number one that I made when you asked me my top three, you may have to get networked with folks in the cybersecurity team so that you can eventually move over and do pen testing. And so you have to think like a hacker, which is that you may not be able to go directly after the domain controller right up front. Maybe you have to go into a couple other boxes and pivot your way around into that. And it's amazing how people forget that mentality when they're thinking about their careers, but they love to think about that mentality when they're thinking about how to pen test in network. - It's a valid point. You've said that there's oversupply of Red Teamers. So the competition is a lot harder. And if you're just starting, you're making a life even harder trying to go for that. But if it's your passion, it's like you and I, Neal, the very first job we did in our lives was definitely not what we do today. (Neal and David laugh) - Absolutely. 100%. - But, okay. So what's the first kind of jobs would you think I should look of if I'm brand new to this field? Perhaps I've gone through some content, I've done a bit of Hack The Box, Try Hack Me and stuff like that, what kind of stuff do you think I should look for? - I think the easiest roles when you're looking at jobs on LinkedIn or Indeed or whatever job board is that you're looking at, I think the easiest places to find cybersecurity roles are in the SOC analyst, incident response, the Blue Team side of things. Those are where there is the, regrettably. I don't say this with any level of pride, there is the highest rate of burnout on the incident response to the SOC analyst team. Being on the front lines has its disadvantages. That's a very stressful type of job, but it is a fantastic place. You're gonna see more about cybersecurity holistically your first year as a SOC analyst than I think that you'll see in five years as a pen tester in my personal opinion, right? You'll see so much more about security as a SOC analyst. You'll have a greater appreciation for what happens in an enterprise when you go to do enterprise-level cybersecurity. I think if we talk about, what I would consider garbage jobs, I'm definitely not speaking for anything else, I'm just saying what Neal thinks is a garbage job, anything that's an IT audit, like as an auditor, or anything that's like a GRC analyst, governance, risk and compliance analyst, anything that is quality, anything that's on the softer side of things, I think would be fantastic first jobs for folks who are looking to get their foot in the door with a cybersecurity shops on their resume, and then eventually pivot into the roles that they wanna pivot into. - So when we spoke earlier, you said blue, red, and. - Yeah. So purple teaming is another concept that's, I wouldn't say is new, but it's starting to emerge more and more in conversations, and that is kind of this joining of forces between red and blue. There's green teaming, there is, there's yellow teaming. There's again, they really have expanded the color wheel. One of my content creators on my team actually did a video that talked about the colors and as has put that out there, I'll see if I can provide that, that content for you so you can link to that if you want to, but. - That'd be great, yeah. - Yeah, there's- - But red and blue are the two big ones, yeah? - Yeah. Red and blue is all we ever seem to talk about, but there are definitely more colors out there that really encompass all the different aspects of cybersecurity. - You're always a big advocate of LinkedIn, and you spoke about the 1,000 Connect Challenge, and that I think kind of started when you and I first met and we were talking. Can you give some tips about networking? And LinkedIn is a place. What about Twitter? What kind of tips would you give someone? I know for some people who have watched the previous video, some of this is repeated, but I wanna make sure that everything's up to date. So based on the last year, what are your feelings? - Yeah. No, I think that's fair, right? And yeah, folks who watched this last year, this is the stuff that we talked about last year, but I've definitely, I've learned better ways to communicate this message over the last year. For those who aren't aware, we now do monthly Resume and LinkedIn reviews for the community. I've created with the help of two people from our community an actual rubric. I can give you the link to that as well, but there's actual rubric on cyberinsecurity.tv where you can actually go and self-assess both your Resume and your LinkedIn based on the criteria that, not just myself, but I've worked closely with recruiting friends of mine to determine what makes a good, better, best version of your LinkedIn profile and your resume. And so in the last year, for those who heard this speech last year, I was really just kind of spit-balling with David about what I thought made a good LinkedIn profile, what I thought made a good resume profile. In the last year, not only have we matured that, but we've created a model that is repeatable and given it back out to the community so you all can self-assess your own LinkedIn profile as well as your own resume if you want. So I'll give you those resources. When you look at the criteria that we've put together for your LinkedIn profile, and I've got an entire branding video for hacking your LinkedIn, where it talks about the idea of personally branding yourself. And I remind people, like I've had people come into my DMs and they're like, Neal, don't you find it terrible that we as hackers are supposed to be in the shadows and in the basements and with our hoodies on and everything else, why on earth would we ever, ever, ever have a social media? - Exactly. Oh, no! (David laughs) And I have to remind people, I'm like, "Well, you want a job, don't you?" - Yep. - And they're like, "Well, yeah, I want a job." And I'm like, "Where do you think most recruiters are?" I think I found a statistic when I did my 1,000 Connect Challenge video, that 80% of recruiters find candidates via LinkedIn. So you're going to make yourself invisible from 80% of the recruiting workforce in cybersecurity. That's a fantastic strategy to get you a job. - I think this is the disconnect, perhaps between video, a movie, should have say, versus reality. And we're not advocating like hacking into companies. We are advocating pen testing, Red Teaming. So you want a job. (David laughs) You wanna be paid to do this stuff. That's the whole point. There was, some people were saying the 1,000 Connect Challenge thing is not a good idea, but you kind of clarified it in your video. You specifically said, meaningful connections. So can you explain, how do I get a meaningful connection? What does that mean? - Absolutely. And I wanna say that I think this is what we meant last year when we said this, we said, we meant meaningful connections. I didn't realize I bad on me for assuming that the internet would take anything that we say and immediately think the most positive of it. I don't know what I was thinking out there. But yes, meaningful connections is what we've always meant by that, right? It's not a number. You shouldn't be racing to 1,000. It's not, who can get there the fastest? As a matter of fact, the thing with David and I did it last year, we said, "You've got a year to do it." Take the year to make meaningful connections. But when we talk about making meaningful connections, and I outlined this in my video, there are three things that you can do to really decide what it is makes a meaningful connection. Find companies that you want to work for. I'm sure we've all got companies where it's like, God, I'd love to work for Apple, I'd love to work for Google, right? I'd love to work for Cisco, right? I'd love to work for some company. If you find companies that you want to work for, find people in those companies that you admire. Right? And so just using those two rules right there, you can find apple and you can find the CISO. You can find the head of security operations. You can find the head of malware development. You can find the head of pen testing. You can find the head of incident response. You can find all these people all the way from the CISO, all the way down to the tactical level that you can make connections with. And these connections, hopefully these people have content, if they're producing content for LinkedIn, and that gives you an idea of what their day-to-day life is like. That gives you an idea of what they're watching on the news. When they like something, LinkedIn is gonna tell you, and then you're gonna be like, okay, good, the head of incident response at apple loved this article, maybe I should read it. Maybe there's something interesting for me to understand and gleam from knowing the same thing that the Head of Incident Response at Apple knows. Right? - Yeah. And so you follow a pen tester, pick one of your, I'll pick my mentor when I started teaching for SANS, Bryce Galbraith, right? Fantastic hacker, fantastic pen tester, one of the OGs in this space, right? If I'm following Bryce and Bryce makes a post about a vulnerability, right? Or if he makes a post about a piece of code that he puts up on GitHub, or if he makes a post about, insert topic here, right? That should be a key in my mind that I should go consume that content because it's probably beneficial to my knowledge, especially if I'm emulating them. So find companies, find people that you're interested in being with or emulating or working for and things like that. And then the third thing that I talk about when you're looking for meaningful connections is find other people in the industry that you admire because they produce content, right? Because they produce meaningful content, and make connections with them, because if they're producing content and you admire their content, then you should probably be in tune with their professional acumen so that you can then follow and adhere to their professional acumen as well. And so using that formula three, I think it's really easy for you to scour LinkedIn and find people that you genuinely want to convey the message to. Now, on the same video that I do, and this is, I think this is what was lost on people when we talked about the 1,000 Connect Challenge, I talked about how do you make the connection meaningful? And I actually give a good, better, best way to make the connection meaningful, and I wanna elaborate on this just a little bit, right? - Yup. - People get mad when they receive connection requests that don't have a message. And that floors me. That floors me. As a recovering introvert, if you will, right? To know that you're so open to say, if you can't get over your own, introvertedness to put a message in a connect, I want nothing to do with you. Could you imagine if you or I said that to our audience? Could you or I imagine that said that, I don't want you connecting with me unless you send me a personalized message? - I think I can understand why it helps. - Understand why it helps. - I don't agree that you should never accept a connection if it hasn't got a message, but it does mean a lot more when someone does write a message. So if you wanna get paused my gatekeepers or get to me, you're gonna get, I will connect, the chances of me connecting with you is gonna be that much higher if you wrote something in your connect, in your message. - Which is why am I video, I did a good, better, best. - Yeah. - And I talked about, listen, the best form of a meaningful connection is a personalized message. And I go through in my video and I show, how do you just, it's very brief. It's not very in-depth, but it's like, how do you look at a profile? How do you figure out what you can do to say to make that connection meaningful? That is truly the best version of that meaningful connection. I go through a good version of a meaningful connection. But I also say, you know what? It's not ideal, but if you're new to LinkedIn, if you're new to breaking out of your shell, if you're new to breaking out of your comfort zone, if you're trying, good is okay, don't let anybody in this industry tell you that good is not okay, because everybody's at a different point in that social breakout. - It's easy when you look back and you have experience, it looks obvious, but when you starting, stuff's not obvious. - Yeah. - So that's what I really appreciate you sharing your thoughts and your. It's amazing, it's a year and you've already changed some opinions and you've learned things along the way. Life is about learning. You never stop learning, and the industry changes all the time, so it's great to get your input. What about creating content if you're brand new? Would you recommend that or not? - Absolutely. Absolutely. No, I didn't include this, right? As something to do, because this is different for everybody. I consider this to be like, if we go back to Neal's like good, better, best, right? I think you can be good enough not producing content. And actually there's a ton of people out there that are good enough not producing content. I do think that content creation is a differentiator, and I think that that content creation differentiator means more at different areas of your career progression and different career fields. Like GRC, you're probably not gonna get the mileage out of content creation out of producing GRC content. Now, that's not to say don't produce GRC content, but you're probably not gonna see the same mileage as somebody who aspires to be a Red Teamer and you're producing Red Team content, right? You may see a mileage may vary if you're entry-level versus if you're on your way to being a CISO. I can tell you that I've, most of the CISO interviews and things like that that I've done, they could care two craps lefts about my content, right? And so mileage may vary, but that's why I think it is a differentiator. And so yes, if you're in the pen testing space, if you're in the Blue Teaming space, if you're in the GRC space to an extent, if you're in any of the tactical roles, I think that a good differentiator for you is to produce content. Now, when we talk about producing content, it is, it can be YouTube videos, it doesn't have to be, it can be writing articles, it doesn't have to be, it can be blog posts, it doesn't have to be, produce what you're comfortable with from a content perspective. Don't find a medium that's popular. I think this is one of the misconceptions about content creations. - I'm gonna do TikTok, man, come on. (Neal laughs) - Yeah. The TikTok thing has been interesting, over the last year. - TikTok is like the, has overtaken Google now. - It has. It really has. - That's interesting. And I think I've seen TikTok videos that are doing amazingly well. - [Neal] Yeah. - Whether that leads to connections is dependent, I think. I've seen some people do really well there and some not. But anyway, go on. I interrupted you. - No, no. No, no. And, yeah. But I think the point is is like I think I would start content creation not necessarily based on which platform was popular, but based on which content delivery mechanism brought the most value out of me as a person and allowed me to be consistent. I'll give you an example, right? When you and I produce content, right? For YouTube, streaming, whatever it is, it is a lot of time that we have to put in to produce content. Right? - Yup. - But it might be easy for us to turn around and say, well, it'd actually only take me 10 minutes to just brain-dump an article out onto LinkedIn and write an article about, or something like that. Right? - Yeah. - So you should find an outlet that allows you to be consistent and gets that creativity out on you and gets it out there for the world to consume. - It's interesting. For me, it's like video is so much easier. I find writing hard, 'cause I find that people are a lot more forgiving on me speaking incorrectly versus writing incorrectly. People sometimes are really hard on like simple grammar mistakes. So for me personally, video is a preferred medium. And I think that's the thing. You've gotta find what works for yourself. Some people write better, some people speak better. Just do what you, what you can. Neal, any like last thoughts? Or we can go on for hours, but I wanted to like open it for you in the next few minutes, give us your best advice. - No, I think your best advice is if you're listening to this video, you're starting in the right place. Right? Consume content, right? I'll be here, David will be here, there's tons of content creators out there, they're all awesome. I hold no ill regard for any content creator that's out there. I don't care whether it's somebody who's just jumping into cyber for the first time or somebody who has been into cyber 10 or 20 years. I think we're all bringing something valuable. I think we're all trying to do the right thing. I don't think that there's a need to stress about, well, is this content better than this content? Is this better than that content? I think you should go out there and you should consume all the content. I do. I think that there's, if somebody who wants to have all the knowledge of things that are out there, go consume it. You'll decide, you'll quickly know for yourself, whether it's good content or bad content, you'll know whether that content creator resonates with you, you'll know whether that learning mechanism resonates with you. Maybe you prefer more cognitive-based learning versus hands-on-based learning. Maybe you prefer being lectured all day long. Who knows? Right? You have to figure that out for yourself. Nobody else out there can tell you what's right or wrong, and that's when I tell people to go consume as much as they can. - So Neal, that's fantastic. Thanks so much for like sharing your knowledge again. I really appreciate it. You put yourself out there by sharing this stuff, and you don't have to. So I really thank you for sharing your knowledge and experience with all of us. - Thank you as always, David. I appreciate it. - So just for everyone, once again, I'll put Neal's YouTube links and other links below. Please, make sure that you go and subscribe and go look at his stuff. There is so much free content out there, so make the most of it. Neal, cheers! - Cheers! (energetic music)
Info
Channel: David Bombal
Views: 570,161
Rating: undefined out of 5
Keywords: hacking, hackers, nsa, ethical hacker, ethical hacking, hacker, hacking course, hacking tutorial, black hat hacking, learn hacking, ethical hacking course, ethical hacking tutorial, ceh, oscp, kali linux, oscp certification, elearnsecurity, ine, ctf, ethical hacking tutorials for beginners, ethical hacking full course, how to become a hacker, ethical hacking career, ctf for beginners, how to hack, learn ethical hacking, cyber security course, cybersecurity, neal bridges, david bombal
Id: 1ffv507slWM
Channel Id: undefined
Length: 50min 6sec (3006 seconds)
Published: Fri Jan 14 2022
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.