1 00:00:00,060 --> 00:00:06,180 So let's jump into this and go over quickly, what exactly is cybersecurity and ethical hacking? 2 00:00:06,690 --> 00:00:12,780 You know, so cybersecurity just put simply, is the act of taking certain measures to ensure that a 3 00:00:12,780 --> 00:00:15,240 network and its information is safe. 4 00:00:16,170 --> 00:00:21,780 So just protecting your network, protecting your assets, protecting your data, that new computers, 5 00:00:22,170 --> 00:00:25,750 that's all really cybersecurity is at a very broad and high level. 6 00:00:26,790 --> 00:00:34,710 Some examples of implementing cybersecurity that you might have heard of would be using a firewall requiring 7 00:00:34,710 --> 00:00:38,130 strong passwords to log into the computers. 8 00:00:38,370 --> 00:00:44,210 Installing antivirus software is also another example of implementing cyber security. 9 00:00:44,250 --> 00:00:46,350 So we're talking about ethical hacking. 10 00:00:46,650 --> 00:00:53,220 Ethical hacking is the act of attempting to break into a network to uncover vulnerabilities that may 11 00:00:53,220 --> 00:00:53,860 be present. 12 00:00:54,480 --> 00:01:02,940 So when we say break into not in an illegal way, ethical hacking is a very professional and approved 13 00:01:02,940 --> 00:01:03,120 way. 14 00:01:03,120 --> 00:01:04,920 You don't do anything without permission. 15 00:01:05,130 --> 00:01:12,150 And we're trying to break into a quote unquote so we can figure out where the holes in the cybersecurity 16 00:01:12,150 --> 00:01:14,110 are so that we can fix them. 17 00:01:14,400 --> 00:01:16,820 That's the whole goal of ethical hacking. 18 00:01:17,010 --> 00:01:23,400 So even though it's technically hacking, you know, it's legal because all the testing is done according 19 00:01:23,400 --> 00:01:25,860 to previously agreed upon rules. 20 00:01:26,070 --> 00:01:27,950 And those are called rules of engagement. 21 00:01:27,960 --> 00:01:30,770 You can go ahead and look this up on your own if you're interested in it. 22 00:01:30,930 --> 00:01:34,380 But that's very important when it comes to ethical hacking, because you want to make sure that all 23 00:01:34,380 --> 00:01:39,370 the liabilities, you know, are laid out, make sure that you know what you're doing. 24 00:01:39,400 --> 00:01:43,470 Make sure that your client is exactly what you're doing and what you're not allowed to do. 25 00:01:43,470 --> 00:01:47,670 What IP addresses, what computers you can touch, different things like that. 26 00:01:47,850 --> 00:01:53,340 So if we had to, you know, talk about the difference, then, you know, what would it be? 27 00:01:53,370 --> 00:01:58,290 So cybersecurity as a whole just focus on protecting the network from potential attacks and dangers. 28 00:01:58,290 --> 00:02:05,130 Like I said before, and this includes offensive actions like ethical hacking and defensive action, 29 00:02:05,130 --> 00:02:09,300 which people like to call blue teaming as well. 30 00:02:09,960 --> 00:02:16,980 Ethical hacking falls under the umbrella of cybersecurity and is also an integral part of any cybersecurity 31 00:02:16,980 --> 00:02:17,550 program. 32 00:02:18,180 --> 00:02:20,370 Ethical hacking is a part of cybersecurity. 33 00:02:20,370 --> 00:02:23,130 It just tests the network's defenses against tax. 34 00:02:23,400 --> 00:02:28,980 And hackers would be launching, you know, so that we can, you know, fix those vulnerabilities that 35 00:02:28,980 --> 00:02:30,710 are there before the hackers get to it.