1 00:00:00,150 --> 00:00:06,180 In this video, we're going to go over the cyber security current market, so we're going to go over 2 00:00:06,180 --> 00:00:12,870 essentially some facts and figures here so that you can get a better understanding as to what exactly 3 00:00:12,870 --> 00:00:19,350 is going on right now in the marketplace and how you can essentially take advantage and benefit from 4 00:00:19,350 --> 00:00:26,100 what is going on currently and the amount of potential that is out there for you as a cybersecurity 5 00:00:26,100 --> 00:00:28,110 professional, as an ethical hacker. 6 00:00:28,770 --> 00:00:30,640 And so let's go right ahead and jump in here. 7 00:00:30,660 --> 00:00:36,070 So one of the first things here is that a hacker attack happens every thirty nine seconds. 8 00:00:36,090 --> 00:00:40,620 Just imagine that every thirty nine seconds somebody is getting hacked somewhere. 9 00:00:40,920 --> 00:00:46,740 Somebody is out there getting somebodies information, somebody taking advantage of somebody, you know, 10 00:00:46,800 --> 00:00:49,470 cell phone, their network security. 11 00:00:49,620 --> 00:00:52,140 They're hacking some sort of device, whatever that may be. 12 00:00:52,140 --> 00:00:52,400 Right. 13 00:00:52,420 --> 00:00:55,710 A hacker attack happens every thirty nine seconds. 14 00:00:55,710 --> 00:01:01,760 So you can see just how much of a need there are for professional ethical hackers. 15 00:01:02,340 --> 00:01:11,220 And then since covid-19, FBI has reported over 300 percent increase in reported cyber crime. 16 00:01:11,230 --> 00:01:15,950 So this means that the cyber crimes have increased significantly. 17 00:01:15,960 --> 00:01:20,670 I mean, they've skyrocketed, right, because there's a lot of businesses out there that have shut 18 00:01:20,670 --> 00:01:23,600 down their doors or even shut down temporarily. 19 00:01:23,610 --> 00:01:30,360 And so all of these different things have played into the factors of their systems being more vulnerable 20 00:01:30,720 --> 00:01:34,010 and people, you know, losing jobs, people getting desperate. 21 00:01:34,020 --> 00:01:41,160 And so the increase in reported crimes has skyrocketed because of people, you know, wanting to take 22 00:01:41,160 --> 00:01:46,010 advantage of the situation as far as the unfortunate pandemic. 23 00:01:46,020 --> 00:01:53,820 So especially now the need is going to be increasing substantially for cybersecurity professionals because 24 00:01:53,820 --> 00:02:00,450 these are just going to be increasing even more and there's going to be a huge need for the ethical 25 00:02:00,450 --> 00:02:00,950 hackers. 26 00:02:01,530 --> 00:02:05,960 And so 43 percent of cyber attacks target small businesses. 27 00:02:06,330 --> 00:02:10,740 There's a lot of businesses out there that, you know, have cybersecurity plans. 28 00:02:10,740 --> 00:02:11,760 They have strategies. 29 00:02:11,760 --> 00:02:14,640 And a lot of times these businesses are the larger ones. 30 00:02:14,640 --> 00:02:16,500 Just think about Fortune 500. 31 00:02:16,500 --> 00:02:17,270 One hundred. 32 00:02:17,580 --> 00:02:17,910 Right. 33 00:02:17,940 --> 00:02:21,450 Those businesses that typically have several thousands of employees. 34 00:02:21,450 --> 00:02:21,740 Right. 35 00:02:22,020 --> 00:02:27,660 They have those budgets to be able to spend quite a bit on their security. 36 00:02:28,020 --> 00:02:34,290 And a lot of these smaller businesses just don't have the budgets or just really unaware of how to get 37 00:02:34,290 --> 00:02:34,890 started. 38 00:02:34,980 --> 00:02:42,000 And an example of this is I remember a buddy of mine had talked about that his significant other their 39 00:02:42,000 --> 00:02:49,050 company, you know, small business had actually been taken over through some kind of ransomware where 40 00:02:49,080 --> 00:02:52,020 they were taking over their entire system. 41 00:02:52,020 --> 00:02:58,380 They took over the entire system and they were requiring that in order for them to release the system, 42 00:02:58,380 --> 00:03:04,350 the network, that they had to pay some sort of fine, that they had to pay some sort of ransom in the 43 00:03:04,350 --> 00:03:07,350 thousands of dollars, I think it was in the tens of thousands. 44 00:03:07,620 --> 00:03:12,450 And so this happens quite often because a lot of these smaller businesses are not prepared. 45 00:03:12,660 --> 00:03:14,280 They don't think they can happen to them. 46 00:03:14,490 --> 00:03:16,920 And lo and behold, it happens to them. 47 00:03:17,160 --> 00:03:18,750 And then now they don't really know what to do. 48 00:03:18,750 --> 00:03:25,410 And then they go try to find an expert or go to develop a cybersecurity strategy after the fact. 49 00:03:25,440 --> 00:03:32,100 So it's important that, you know, a lot of these businesses actually start implementing a strategy 50 00:03:32,100 --> 00:03:34,440 and a plan before it's too late. 51 00:03:35,010 --> 00:03:39,500 And then 95 percent of breach records come from four different industries. 52 00:03:39,510 --> 00:03:40,790 These are the most popular here. 53 00:03:41,550 --> 00:03:45,540 So we have the government, we have retail, tech and financial. 54 00:03:45,540 --> 00:03:47,700 I mean, this is pretty self-explanatory here. 55 00:03:47,820 --> 00:03:49,140 Obviously, with the government. 56 00:03:49,350 --> 00:03:50,610 They're looking to get data. 57 00:03:50,730 --> 00:03:52,590 They're looking to get records retail. 58 00:03:52,800 --> 00:03:55,860 They're looking to get credit card information, payment information. 59 00:03:56,250 --> 00:03:57,420 Same thing with tech, right. 60 00:03:57,450 --> 00:04:00,270 They're looking to get, you know, intellectual property. 61 00:04:00,870 --> 00:04:06,270 And then with the financial obviously being able to get, you know, records and bank account and credit 62 00:04:06,270 --> 00:04:07,110 card information. 63 00:04:07,740 --> 00:04:15,280 And then approximately six trillion dollars is expected to be spent globally on cybersecurity by 2020. 64 00:04:15,690 --> 00:04:17,340 So just think about that for a moment. 65 00:04:17,350 --> 00:04:25,230 Six trillion dollars because of the fact of the increase in reported crimes through the covid-19 and 66 00:04:25,230 --> 00:04:31,980 just how much of the cybersecurity industry has grown and is continuing to grow, there is significant 67 00:04:32,100 --> 00:04:38,090 opportunity for individuals like yourself that are wanting to come in and get started within this industry. 68 00:04:38,100 --> 00:04:39,960 And so here are some additional facts. 69 00:04:40,320 --> 00:04:46,590 Unfilled cybersecurity jobs worldwide will reach an estimated four million, about twenty twenty one. 70 00:04:47,040 --> 00:04:47,820 Think about that. 71 00:04:47,850 --> 00:04:53,370 There's going to be so many jobs available and they're not going to be filled because there isn't going 72 00:04:53,370 --> 00:04:57,120 to be enough of actual supply to fill that demand. 73 00:04:57,120 --> 00:04:57,300 Right. 74 00:04:57,310 --> 00:04:59,940 There's not going to be as many cybersecurity professions. 75 00:05:00,170 --> 00:05:06,500 To fill those holes and then you are going to be one of those individuals, if you're looking to obviously 76 00:05:06,710 --> 00:05:11,840 take this career seriously and you're obviously here because you want to learn cybersecurity, you want 77 00:05:11,840 --> 00:05:13,100 to learn ethical hacking. 78 00:05:13,200 --> 00:05:17,150 So you're going to be one of those ones that is able to take advantage of this. 79 00:05:17,510 --> 00:05:22,300 And then the average cybersecurity engineering salary is one hundred and twenty thousand a year. 80 00:05:22,310 --> 00:05:24,920 I mean, this is a six figure income, right? 81 00:05:25,250 --> 00:05:32,690 This is fantastic for obviously yourself or your family for being able to be on the top 10 percent of 82 00:05:32,690 --> 00:05:37,700 earners in the country, whatever country you are here in the U.S. and this is definitely putting you 83 00:05:37,700 --> 00:05:39,550 in the top 10 percent of earners. 84 00:05:39,830 --> 00:05:42,620 So one hundred twenty K is not too bad. 85 00:05:42,620 --> 00:05:43,000 Right. 86 00:05:43,040 --> 00:05:48,720 And then more than 77 percent of businesses do not have a cybersecurity plan or strategy. 87 00:05:48,890 --> 00:05:57,890 Now, remember how I gave you the story of the ransomware where the company was overtaken by some hackers 88 00:05:57,890 --> 00:06:04,820 that wanted to get some ransom because they were looking to get paid and they wanted to only release 89 00:06:04,820 --> 00:06:05,960 that network. 90 00:06:05,960 --> 00:06:08,890 Right, that infrastructure after they got their ransom. 91 00:06:09,170 --> 00:06:16,520 And so this is hyper, critically important here for you to understand that most businesses do not have 92 00:06:16,520 --> 00:06:18,740 a plan in place, a strategy. 93 00:06:18,860 --> 00:06:25,010 And so it's going to be a huge opportunity to be able to have these if you want to go down into the 94 00:06:25,280 --> 00:06:28,220 consulting route, if you want to go into the freelancing route. 95 00:06:28,220 --> 00:06:28,440 Right. 96 00:06:28,460 --> 00:06:35,480 A lot of these businesses are going to start getting more educated and becoming more aware of the need 97 00:06:35,480 --> 00:06:39,470 and the importance of having the cybersecurity plan and strategy. 98 00:06:39,470 --> 00:06:47,090 And then the average time to identify a breach in 2009 was two hundred and six days. 99 00:06:47,390 --> 00:06:50,650 This is was this information was gathered through IBM. 100 00:06:50,900 --> 00:06:53,230 And so just think about this for a moment, right? 101 00:06:53,630 --> 00:06:58,310 You have somebody breaching your network, your information. 102 00:06:58,310 --> 00:06:58,520 Right. 103 00:06:58,520 --> 00:07:04,880 Whatever information you have as far as your I.T. infrastructure, 200 in six days. 104 00:07:04,880 --> 00:07:05,150 Right. 105 00:07:05,150 --> 00:07:07,880 Just under a year time passes. 106 00:07:07,880 --> 00:07:08,210 Right. 107 00:07:08,330 --> 00:07:15,800 Will go by before that individual I.T. department or the individual company is actually going to find 108 00:07:15,800 --> 00:07:18,650 out and know that something has gone wrong. 109 00:07:18,650 --> 00:07:25,940 So that's why a lot of these folks don't have the right type of strategy or plan in place or detection. 110 00:07:25,940 --> 00:07:26,240 Right. 111 00:07:26,570 --> 00:07:32,950 To be able to detect these types of intrusions and be able to stop these before these even begin. 112 00:07:32,960 --> 00:07:39,160 And then finally here, only five percent of company folders are properly protected on average. 113 00:07:39,170 --> 00:07:40,580 So just think about that. 114 00:07:40,580 --> 00:07:50,300 Also, five percent, very, very small percentage of actual company intellectual property, very important 115 00:07:50,480 --> 00:07:51,590 information. 116 00:07:51,740 --> 00:07:55,880 Right, of that individual company is actually properly protected. 117 00:07:55,880 --> 00:08:03,980 So that means that 95 percent of companies folders are actually open and are vulnerable to attacks. 118 00:08:03,980 --> 00:08:04,330 Right. 119 00:08:04,640 --> 00:08:10,220 And this is just as simple as being able to do the ransomware where, you know, a hacker can come in 120 00:08:10,220 --> 00:08:14,090 and take over, you know, a company's folder, very important documents. 121 00:08:14,090 --> 00:08:14,390 Right. 122 00:08:14,390 --> 00:08:21,050 Records, and be able to hold that information ransom for them to get paid in order to release it. 123 00:08:21,050 --> 00:08:21,290 Right. 124 00:08:21,320 --> 00:08:26,750 So these are the cybersecurity marketplace, worldwide facts. 125 00:08:26,770 --> 00:08:32,090 I want you to get an understanding of the potential kind of what these numbers are so that you can be 126 00:08:32,090 --> 00:08:36,050 prepared in your cybersecurity ethical hacking career. 127 00:08:36,230 --> 00:08:37,910 So that's going to be here for this one. 128 00:08:37,910 --> 00:08:39,140 And we'll see you on the next one.