1 00:00:00,120 --> 00:00:06,570 Welcome to Section one and this video, we're going to cover what exactly we're going to go over in 2 00:00:06,570 --> 00:00:13,350 this section, in this section, we're going to go over the foundations of understanding what exactly 3 00:00:13,350 --> 00:00:16,920 is cybersecurity, what exactly is ethical hacking. 4 00:00:16,950 --> 00:00:24,660 I want you to get a foundational big picture understanding of the actual marketplace of the actual type 5 00:00:24,660 --> 00:00:30,510 of careers that are available out there and really get you that understanding that is required in order 6 00:00:30,510 --> 00:00:37,380 for you to be able to step into a lot more in-depth, more specific topics within the cybersecurity 7 00:00:37,380 --> 00:00:39,060 and ethical hacking space. 8 00:00:39,090 --> 00:00:43,290 So let's go over exactly what you're going to learn in this section. 9 00:00:43,290 --> 00:00:49,320 So in Section one, what you're going to learn is exactly how the cybersecurity market looks like at 10 00:00:49,320 --> 00:00:50,550 this particular time. 11 00:00:50,550 --> 00:00:57,540 And what are the cybersecurity salary potentials when starting out and what is the average cybersecurity 12 00:00:57,540 --> 00:01:05,130 salary for somebody with some experience and what you can expect as far as a median salary for the cybersecurity 13 00:01:05,130 --> 00:01:05,690 professional. 14 00:01:05,700 --> 00:01:09,240 And then we're going to go over the common methods of hacking. 15 00:01:09,450 --> 00:01:14,340 What are some of the most common methods that hackers use and what are the things you should look out 16 00:01:14,340 --> 00:01:22,650 for and understand before going into a lot more deeper topics within the cybersecurity field and then 17 00:01:22,650 --> 00:01:24,300 the three types of hackers? 18 00:01:24,480 --> 00:01:30,660 This is really important here because you need to understand the different types of hackers and which 19 00:01:30,660 --> 00:01:35,580 one of these is going to make the most sense for you, because for the most part, you're taking this 20 00:01:35,580 --> 00:01:41,340 course because you want to become an ethical hacker, you want to work for an organization, you want 21 00:01:41,340 --> 00:01:47,030 to work maybe as a freelancer or perhaps you want to down the road, do some kind consulting. 22 00:01:47,280 --> 00:01:53,130 And so it's important for you to understand what three different types of hackers are and which one 23 00:01:53,130 --> 00:01:55,020 is going to make the most sense for you. 24 00:01:55,020 --> 00:02:00,510 And for the most part, it's going to be somebody that is looking to work for some sort of organization 25 00:02:00,510 --> 00:02:04,620 or helping businesses out there with their cybersecurity needs. 26 00:02:04,800 --> 00:02:08,840 And the next thing that we're going to cover are the four elements of security. 27 00:02:09,060 --> 00:02:15,630 This is really important here so that you can understand what these consist of and how you need to navigate 28 00:02:15,630 --> 00:02:18,870 these and go about these four different elements of security. 29 00:02:18,870 --> 00:02:24,180 And then we're going to cover the differences between ethical hacking and cybersecurity. 30 00:02:24,180 --> 00:02:31,440 And you're going to be quite surprised to find out that a lot of times these two get different names 31 00:02:31,440 --> 00:02:34,050 associated with them and different definitions. 32 00:02:34,050 --> 00:02:38,680 But you'll come to find out and realize there's not much of a difference here. 33 00:02:38,700 --> 00:02:43,800 There are little minor differences here and there, but for the most part, there's going to be a lot 34 00:02:43,800 --> 00:02:44,590 of similarities. 35 00:02:44,610 --> 00:02:49,530 So then after that, we're going to cover ethical hacking versus penetration testing. 36 00:02:49,890 --> 00:02:52,090 What is the differences between these two? 37 00:02:52,620 --> 00:02:54,540 What exactly is ethical hacking? 38 00:02:54,720 --> 00:02:58,350 How that comes into play with penetration testing as well. 39 00:02:58,560 --> 00:03:03,160 And then after that, we're going to go over the job opportunities in cybersecurity. 40 00:03:03,180 --> 00:03:09,120 I'm going to show you the type of tiers that are involved, how you can get started as an ethical hacker, 41 00:03:09,120 --> 00:03:13,830 and then the different job opportunities out there that are available for you in the marketplace. 42 00:03:13,840 --> 00:03:16,790 So I'm excited for you to get started here. 43 00:03:16,800 --> 00:03:20,910 I'm excited for you to jump into this section and we'll see you on the next one.