Getting Into Cyber Security: 5 Skills You NEED to Learn - YouTube

Channel: Cyberspatial

[0]
In this video I’m gonna take you through the top 5 skills you need to be learning to
[4]
get into cybersecurity.
[13]
If you’re new to the field or looking for a career transition, there’s just so much
[19]
info out there that it’s hard to even get started.
[20]
You might hear people talk about an alphabet soup of certifications to take, but I’m
[24]
here to tell you: THEY’RE NOT THAT IMPORTANT.
[26]
While there’s some value going through the process of studying for certs, what IS IMPORTANT
[30]
are your SKILLS and EXPERIENCE.
[32]
Because in this field, what you can DO will make you so much more successful than what
[36]
you KNOW.
[37]
Solving technical problems is THE way to earning the trust and confidence from people
[42]
you work with.
[43]
Buckle up and let’s dive right in.
[46]
Number 1: Building and using virtual machines.
[49]
Virtual machines, also called VMs, are operating systems that run on top of your existing or
[53]
“host” OS.
[54]
The virtualized OS is commonly referred to as a “guest”, and is managed by software
[59]
called a “hypervisor”.
[61]
The hypervisor lets you manage and allocate resources like CPU, Memory, and Disk space
[66]
on your guest.
[68]
Popular hypervisors you may have heard of include Hyper-V by Microsoft, Virtualbox by
[72]
Oracle, VMware, and KVM.
[75]
Often times when you hear the term “cloud” it usually means thousands of VMs running
[80]
on specialized hypervisors on someone else’s server farm in a datacenter somewhere.
[86]
Virtual machines let you become platform-agnostic, meaning you’re no longer limited to any
[90]
particular operating system and tools available for it.
[93]
Many people spend all their time just on one OS and debate which ones are better.
[98]
Let me tell you: IT DOESN’T MATTER.
[100]
As a pro you should be versed in ALL of them and comfortable working with any platform.
[106]
This maximizes the scope of your skills and makes you effective in any situation.
[111]
Virtual machines also give you the flexibility to train and research in an isolated environment
[116]
without affecting your main driver.
[117]
You can quickly take snapshots of a guest OS and restore it to an earlier state.
[123]
Opening a suspect file you received?
[124]
Use a VM.
[125]
Want to practice configuring a server?
[127]
Use a VM.
[128]
Slinging exploits at a target?
[130]
Use a VM.
[131]
Moving on to

[133]
Number 2: LEARN the command line.
[134]
Don’t run away but EMBRACE it.
[137]
The command line interface, commonly referred to as a SHELL, is the simplest and arguably
[141]
the most efficient way to interact with an operating system.
[145]
For example, if I’m looking for an entry in this CSV file, Excel might freeze or crash.
[151]
Running a lightweight shell command gets me what I need in no time.
[155]
Why’s it called a shell?
[156]
The important parts of an OS that actually makes it run is called the KERNEL, because
[161]
it functions at the center of the system.
[164]
The part that’s exposed to a user is called the shell, since it wraps around the kernel.
[169]
It’s just like a car, where the steering wheel, pedals, and dashboards giving you control
[174]
over the engine or transmission all exist in the “shell” of the car.
[178]
The command line gives you the lowest level access to software functionality that comes
[182]
with an operating system.
[184]
Many of the most useful tools don’t have a graphical interface to point and click.
[188]
Mastering the command line expands your arsenal and lets you get more done with less.
[193]
It lets you be able to use scripting and automation to tackle repetitive tasks that would otherwise
[198]
waste lots of time.
[200]
Automating your workflow by learning the command line makes you a tremendously valuable asset
[205]
to the team.
[206]
I recommend starting out with Bash, or the “Bourne-again Shell” since it comes default
[210]
with almost every Linux distribution.
[212]
macOS used it in its Terminal app, but has since changed to Zsh, or “Z-Shell”, and
[217]
has some nicer features.
[219]
If Bash is like a Toyota, then Zsh is more like a Lexus.
[222]
Bash is so popular and effective that Microsoft actually released the Windows Subsystem for
[228]
Linux, or “WSL” and lets you install several different Linux flavors to use Bash as a native
[233]
app.
[234]
This is super convenient, since I can access most of my Linux tools without having to switch
[238]
to a virtual machine.
[240]
Now understand that Powershell is actually the go-to native shell for Windows.
[244]
It’s very different from how you would use the Linux command line, but gives you a ton
[248]
of powerful Windows administration abilities.
[251]
If you work in an environment where Windows is the primary OS, definitely learn Powershell
[255]
as well.
[256]
I’m gonna start a series on the Linux command line very soon.
[259]
Comment below to let me know what tools and concepts you’d like to learn!
[265]
Number 3: System Administration.
[266]
All of us with a computer or smartphone, from your grandma to IT wizard is a really sysadmin
[272]
at some level.
[273]
It all depends on what level you’re at.
[275]
System administration involves the configuring and maintaining of computers, whether a personal
[279]
device or hi-powered server.
[281]
When I was first using computers as a kid, I loved to dive down into EVERY SINGLE SETTING
[285]
available on the computer, just to see what it did.
[288]
Reading manuals, online guides, and playing around just drove this curiosity further.
[293]
By doing that, I became the family IT help desk.
[296]
System administration is about knowing your platform and various tools inside and out
[300]
to be able to help others who don’t.
[302]
Whatever your skill, I challenge you to fiddle around and learn by doing.
[306]
Delete some files, and try to recover them.
[309]
Download, open, and monitor old viruses in a virtual machine with tools like Windows
[313]
Sysinternals to see what they do.
[315]
Try to extract files and passwords off a computer without knowing the login info.
[319]
Whatever it is, push the limits of what you already know by reading guides out there and
[324]
following along.
[325]
Practice a little more each day and you’ll level up in no time.
[328]
Next up

[330]
Number 4: Computer Networking.
[331]
THIS is the heart and soul of it all, what I like to call the cyberspatial “laws of
[336]
physics”.
[337]
It’s understanding how devices interact with each other and how data gets from point
[340]
A to point B. A strong foundation in networking will make you a rockstar troubleshooter, whether
[345]
you’re red teaming, defending, or running day-to-day IT ops.
[349]
There’s two conceptual models that govern computer networking: TCP/IP and OSI.
[354]
They group all your different networking and telecommunication protocols into “layers”.
[358]
TCP/IP is older and uses four layers: network access, internet, transport, and application
[364]
layers.
[365]
OSI stands for the Open System Interconnection, which is developed by the International Organization
[370]
for Standardization, or ISO.
[372]
These guys define everything from country codes to time and date formats.
[376]
OSI is newer and uses seven layers: physical, datalink, network, transport, session, presentation,
[383]
application layers.
[385]
All these layers are just a way to describe “what’s happening where”.
[389]
So if you’re receiving a package from someone in a different country, it’s gonna get passed
[392]
between envelopes, boxes, vehicles and planes, each with their own addressing method and
[398]
operating procedures.
[399]
When the post office tells you there’s an airline issue, you know where it is in the
[402]
transportation system that’s delaying your delivery.
[405]
Likewise, the networking layers all have different functions, but as a whole work together to
[410]
let you stream videos from a server in a rack to a device in your hands.
[414]
Knowing what’s happening at each layer lets you “see the matrix” and be much more
[418]
skilled at your craft.
[421]
Number 5: Personal digital security.
[423]
This is an area I’ve been particularly passionate about because it affects our families, friends,
[427]
and organizations.
[429]
The cybercrime industry is booming.
[431]
You don’t have to scroll far to see what the online black market place looks like.
[435]
As technology becomes more intertwined with our lives, from Internet-connected cars to
[440]
refrigerators, the vulnerabilities and attack vectors are gonna increase more and more.
[444]
If you want to go deep into cybersecurity, there’s no better place to start than with
[448]
yourself.
[450]
From passwords, encryption, to secure comms, stay up-to-date with the latest security news
[455]
and best practices.
[456]
You might just be the subject-matter expert in your office that others go to for advice.
[461]
And that advice might just protect your company from becoming front page news.
[465]
But most importantly is living it out yourself as well!
[468]
You wouldn’t believe the number of times I’ve seen cyber intrusions originate from
[472]
the security operations or IT department simply because people didn’t understand or practice
[476]
basic digital hygiene.So that’s it for this video Thanks so much for tuning in, don’t
[481]
forget to subscribe for more content just like this, AND if you have any further questions
[486]
please let me know.
[487]
See you soon!