1 00:00:00,150 --> 00:00:08,160 Hello, everyone, this is a descriptor and we have reached to one more lesson, and this is where you 2 00:00:08,160 --> 00:00:12,080 would really need to understand why to really learn ethical hacking. 3 00:00:12,630 --> 00:00:20,190 I mean, as of now, we have learned a lot about how how how ethical hacking really works. 4 00:00:20,550 --> 00:00:29,340 And I mean, in terms of the components of it, what makes an ethical hacker different from a hacker 5 00:00:29,670 --> 00:00:30,330 and hackers? 6 00:00:30,370 --> 00:00:30,670 Sorry. 7 00:00:30,990 --> 00:00:40,140 And in fact, we have also we have also seen why corporates or businesses higher and ethical hackers. 8 00:00:40,360 --> 00:00:47,400 OK, so now at this moment of time will understand what what could really motivate you to be an ethical 9 00:00:47,400 --> 00:00:47,820 hacker? 10 00:00:47,850 --> 00:00:56,760 I know you might have a whole lot of reason that brought you here, but I'll tell you some honest reason 11 00:00:56,760 --> 00:01:07,200 which might give you another exploration of any other, you know, visibility across this country in 12 00:01:07,200 --> 00:01:07,500 a way. 13 00:01:07,890 --> 00:01:18,990 So first thing is that ethical hacker, ethical hacking or the or give you an visibilities is basically 14 00:01:18,990 --> 00:01:20,760 value learning, ethical hacking. 15 00:01:20,760 --> 00:01:22,110 You will never get bored. 16 00:01:22,140 --> 00:01:29,430 Trust me, you will never get bored because the content, the way you have seen the technology, the 17 00:01:29,430 --> 00:01:34,230 way you have been using the technology, you can feel like you are hacking it. 18 00:01:34,500 --> 00:01:36,360 That's really going to excite you. 19 00:01:36,660 --> 00:01:43,950 And for sure, I have seen, you know, you might have seen while while we were discussing or whatever 20 00:01:43,950 --> 00:01:50,700 a lot of other components about Windows, Linux, mobile devices, when you see them getting hacked, 21 00:01:50,700 --> 00:01:52,170 that really going to excite you. 22 00:01:52,290 --> 00:01:52,670 All right. 23 00:01:52,950 --> 00:02:01,620 And there's one more stuff, which is when you when you start exploring this world, you will you will 24 00:02:01,620 --> 00:02:05,070 be finding vulnerabilities that has never been discovered. 25 00:02:05,370 --> 00:02:09,180 And that made you a globally recognized person. 26 00:02:09,180 --> 00:02:09,560 Right. 27 00:02:09,810 --> 00:02:16,500 And that's how you get a whole lot of fame and rewards recognition all across the world as well. 28 00:02:16,510 --> 00:02:17,910 And this is really possible. 29 00:02:17,940 --> 00:02:23,060 Trust me, and this is this could be one more reason why you should really learn ethical hacking. 30 00:02:23,490 --> 00:02:30,990 And one more thing is which is very much important to at least to be a driving factor for your for your 31 00:02:30,990 --> 00:02:37,770 career, is that there are plenty of opportunities out there in the market to open any portal. 32 00:02:37,950 --> 00:02:39,510 You open any job portal. 33 00:02:39,510 --> 00:02:41,550 You know, if I talk about indeed. 34 00:02:41,730 --> 00:02:47,850 You talk about any any any sort of portal, in fact, you will find a thousand, at least thousands 35 00:02:47,850 --> 00:02:53,460 of job open for cybersecurity consultant ethical hackers. 36 00:02:54,000 --> 00:03:02,700 The position could not be directly ethical hacking, just that common words for all those cybersecurity 37 00:03:02,700 --> 00:03:03,630 related profiles. 38 00:03:03,960 --> 00:03:08,850 But you will find the cyber security related job everywhere. 39 00:03:09,510 --> 00:03:11,160 And this is really in demand. 40 00:03:11,160 --> 00:03:13,140 And this is really a growing in demand. 41 00:03:13,380 --> 00:03:21,060 And we have seen what are the reason why, why why the jobs requirement or why the businesses are really 42 00:03:21,360 --> 00:03:27,840 hiring people who are into cybersecurity or who are either into the hacking as well. 43 00:03:28,170 --> 00:03:38,580 And the down the main reason or I would say the beauty of this this profile would be would also be if 44 00:03:38,580 --> 00:03:45,270 you learn ethical hacking, you also may get a, you know, opportunity to work in Fortune 500 as well. 45 00:03:45,450 --> 00:03:45,930 Who knows? 46 00:03:46,560 --> 00:03:53,460 You may get an opportunity to work on maybe Amazon, Microsoft, Google, Walmart and everywhere. 47 00:03:53,460 --> 00:03:59,700 I mean, this is something which is open for everyone that these companies are after. 48 00:03:59,700 --> 00:04:08,910 Everyone who has the unique capability of finding the vulnerabilities and who has the mind so open that 49 00:04:08,910 --> 00:04:12,060 they can be able to learn and do the hacking. 50 00:04:12,060 --> 00:04:20,070 And they are able they are eager to explore research and find the weaknesses into their network before 51 00:04:20,070 --> 00:04:21,330 the real hacker could do. 52 00:04:21,760 --> 00:04:22,200 All right. 53 00:04:22,350 --> 00:04:31,890 So I hope this this this idea really makes sense to you and you might be having your own reason to be 54 00:04:31,890 --> 00:04:32,880 into the hacking. 55 00:04:32,880 --> 00:04:39,820 But this this is something which really be a very great driving force for your career as well. 56 00:04:40,230 --> 00:04:40,680 All right. 57 00:04:40,830 --> 00:04:43,680 So I hope you'll like this lecture so far. 58 00:04:43,890 --> 00:04:45,180 We'll catch you in the next one. 59 00:04:45,390 --> 00:04:45,870 Thank you.