1 00:00:00,930 --> 00:00:03,240 All right, so welcome back, everyone. 2 00:00:03,270 --> 00:00:07,820 This is Rajneeshee again, and I must say, I just love you guys. 3 00:00:08,430 --> 00:00:11,370 The reason is what I what we discussed. 4 00:00:11,380 --> 00:00:13,850 You are in the journey of your consistency. 5 00:00:14,400 --> 00:00:16,580 You have reached to the second lesson. 6 00:00:17,010 --> 00:00:23,460 Now, this is where we'll will be talking about ethical hackers, as we promise will be understanding 7 00:00:24,150 --> 00:00:33,180 what is hacking and basically what makes and what makes an ethical hacker different from hacker. 8 00:00:33,400 --> 00:00:37,560 OK, and to be really honest, there's a whole lot of difference. 9 00:00:38,310 --> 00:00:39,250 Let's get started. 10 00:00:39,690 --> 00:00:41,980 The first thing that our hacker. 11 00:00:42,810 --> 00:00:50,310 The first thing that basically a hacker would do as a part of hacking it, it finds the vulnerabilities 12 00:00:50,310 --> 00:00:55,110 or in a simple word, it finds a weakness in the target system. 13 00:00:55,270 --> 00:00:58,560 So that's the first thing that any any hacker would do. 14 00:00:58,810 --> 00:01:00,180 OK, and we are target. 15 00:01:00,390 --> 00:01:03,000 We are talking about Hacker first, OK? 16 00:01:03,510 --> 00:01:07,550 We will be discussing the ethical hacking in the next life. 17 00:01:08,010 --> 00:01:12,290 But at this moment, let's talk about what the bad guys are basically after. 18 00:01:12,300 --> 00:01:16,410 OK, so they find flaws, the weaknesses of the target system. 19 00:01:17,100 --> 00:01:22,650 Then basically they try to get the unauthorized access to the target system. 20 00:01:23,310 --> 00:01:23,820 You got it. 21 00:01:24,160 --> 00:01:30,900 And now once you get the unauthorized access to the system, it try to perform all those crazy stuff. 22 00:01:31,620 --> 00:01:32,750 You got my point right. 23 00:01:32,940 --> 00:01:36,810 They try to try to perform all those malicious activity. 24 00:01:36,840 --> 00:01:38,160 Could be data breach. 25 00:01:38,400 --> 00:01:44,610 It could be getting the data out of their network and show it to all the net, all the people out there 26 00:01:45,030 --> 00:01:45,870 for any any. 27 00:01:45,870 --> 00:01:47,880 And then it could be financial intelligence. 28 00:01:47,880 --> 00:01:55,100 Well, it could be maybe a competition, a competition and wizardry kind of attack as well. 29 00:01:55,110 --> 00:02:03,870 It could be of financial crime or any sort of crime, but it all part of malicious activity. 30 00:02:04,140 --> 00:02:10,190 And at the end, what is really important is, is to know it's an illegal activity. 31 00:02:10,230 --> 00:02:13,740 It is completely illegal to hack any network. 32 00:02:14,460 --> 00:02:17,960 Now, let's understand to think here. 33 00:02:18,480 --> 00:02:23,970 We know for sure a hacker is completely into an illegal activity. 34 00:02:24,270 --> 00:02:31,200 Whatever he's doing, it is completely being, you know, illegal kind of stuff. 35 00:02:31,590 --> 00:02:35,400 But can we really make this job legal? 36 00:02:36,930 --> 00:02:37,860 Don't get surprised. 37 00:02:37,860 --> 00:02:43,340 But it is I mean, an ethical hacker is completely into an illegal activity. 38 00:02:43,500 --> 00:02:52,560 And what makes his job legal is because whenever he hacks, he hacks with the permission, and that's 39 00:02:52,560 --> 00:02:53,250 consent. 40 00:02:53,460 --> 00:03:00,960 When you hack with the permission of the targeting target environment, that's where your job becomes 41 00:03:01,260 --> 00:03:03,650 completely a professional job. 42 00:03:03,660 --> 00:03:07,750 And that's what makes you completely different from the other side of the house. 43 00:03:08,470 --> 00:03:18,070 So the security expert, technical expert and solution experts are, you know, free into the ethical 44 00:03:18,090 --> 00:03:24,330 hackers are basically hired by the corporate bigged woman to find their own vulnerabilities, to find 45 00:03:24,330 --> 00:03:26,190 their own weaknesses into the system. 46 00:03:26,550 --> 00:03:33,240 And once they find it those vulnerabilities, they they spend money to fix those weaknesses. 47 00:03:33,600 --> 00:03:40,680 Now, when you when you look at those in woman the systems, this this all activities are done in the 48 00:03:40,680 --> 00:03:47,580 very precautionary environment so that, you know, whenever those activity is done, the malicious, 49 00:03:47,970 --> 00:03:49,750 malicious intent is not there. 50 00:03:50,100 --> 00:03:57,500 So an ethical hacker is the one who do the same activity as a hacker, but without any malicious intent. 51 00:03:57,510 --> 00:03:59,450 And that's what makes the job. 52 00:03:59,760 --> 00:04:07,680 That's what makes an ethical hacker so, so much into demand for large corporate out there. 53 00:04:07,920 --> 00:04:08,280 All right. 54 00:04:08,580 --> 00:04:12,080 So this is all about learning and ethical hacking so far. 55 00:04:12,270 --> 00:04:14,160 I hope you got the idea so far. 56 00:04:14,400 --> 00:04:18,450 And if you have any questions, you can I can be there for you in the Q&A. 57 00:04:18,810 --> 00:04:23,490 But so far, this is this is this is ethical hacking. 58 00:04:23,490 --> 00:04:24,930 And we'll catch you in the next lecture. 59 00:04:25,170 --> 00:04:25,650 Thank you.