1 00:00:00,240 --> 00:00:05,760 So let's go over your instructors for this ethical hacking mastery course, and so let me go ahead and 2 00:00:05,760 --> 00:00:07,370 quickly introduce myself. 3 00:00:07,380 --> 00:00:11,170 My name is Juan and I'm going to be one of your instructors in this course. 4 00:00:11,220 --> 00:00:18,630 My background is in I.T. networking, I.T. infrastructure, where I used to work at a company called 5 00:00:18,630 --> 00:00:25,730 Zones, and I used to provide cybersecurity products and services to businesses all across the U.S. 6 00:00:25,770 --> 00:00:31,320 And then shortly after that, I started to build websites for businesses and help them keep their sites 7 00:00:31,320 --> 00:00:36,060 safe from spam, viruses, malware, different types of attacks. 8 00:00:36,360 --> 00:00:45,060 And then I founded Security Élodie Dotcom, which is a cyber security agency that focuses in working 9 00:00:45,060 --> 00:00:49,260 with cybersecurity businesses to help them increase their customer base. 10 00:00:49,270 --> 00:00:51,870 So that's essentially my background. 11 00:00:52,050 --> 00:00:57,420 And now we're going to shift it over to Anthony and he's going to walk you through a little bit about 12 00:00:57,420 --> 00:00:58,410 himself as well. 13 00:00:58,620 --> 00:00:59,760 Let me show you my credentials. 14 00:01:00,030 --> 00:01:05,000 So, first of all, I have a little bit more than eight years of experience in cybersecurity. 15 00:01:05,190 --> 00:01:08,900 I got a bachelor's degree in information technology from George Mason University. 16 00:01:09,540 --> 00:01:16,350 I got my master's degree in cybersecurity and information assurance as well from Western Governors University. 17 00:01:16,940 --> 00:01:20,430 I have the or a certified ethical hacker certification. 18 00:01:20,550 --> 00:01:24,310 And I also have my computer hacking forensics investigators certification. 19 00:01:24,330 --> 00:01:28,650 Now, these are both certifications from SC counsel that you can look into if you want to let in a little 20 00:01:28,650 --> 00:01:34,140 bit more, you know, about hacking and computer computer topics in general and cybersecurity and also 21 00:01:34,140 --> 00:01:39,800 have a top tier security plus certification, which is pretty standard in the cybersecurity industry. 22 00:01:40,320 --> 00:01:46,680 So just to go over a few of the different positions that I've held myself, I've been a mobile security 23 00:01:46,680 --> 00:01:47,190 analyst. 24 00:01:47,400 --> 00:01:49,470 I've been an information security analyst. 25 00:01:49,620 --> 00:01:51,750 I've been a senior cybersecurity engineer. 26 00:01:51,780 --> 00:01:58,860 And I currently hold a cybersecurity engineering position and I am also a substitute assaults among 27 00:01:58,950 --> 00:02:00,540 company Anthony Timber's LLC. 28 00:02:01,260 --> 00:02:04,500 And I do a lot of ethical hacking and penetration testing for my clients. 29 00:02:04,510 --> 00:02:06,480 So it's perfect that I'm teaching this course. 30 00:02:06,480 --> 00:02:10,560 I want to show you guys some of the things that, you know, I run into on a regular basis, some of 31 00:02:10,560 --> 00:02:14,480 the techniques that I know well what I'm doing, penetration test and such. 32 00:02:14,910 --> 00:02:16,920 So we're excited for you to join us. 33 00:02:16,920 --> 00:02:23,850 And we look forward to providing you as much value as possible within this course and helping you start 34 00:02:23,850 --> 00:02:27,720 your cybersecurity career in whichever direction you'd like to go. 35 00:02:27,720 --> 00:02:29,640 So that's going to be here for this one. 36 00:02:29,640 --> 00:02:31,020 And we'll see you on the next one.