đ
Getting Into Cyber Security: 5 Skills You NEED to Learn - YouTube
Channel: Cyberspatial
[0]
In this video Iâm gonna take you through
the top 5 skills you need to be learning to
[4]
get into cybersecurity.
[13]
If youâre new to the field or looking for
a career transition, thereâs just so much
[19]
info out there that itâs hard to even get
started.
[20]
You might hear people talk about an alphabet
soup of certifications to take, but Iâm
[24]
here to tell you: THEYâRE NOT THAT IMPORTANT.
[26]
While thereâs some value going through the
process of studying for certs, what IS IMPORTANT
[30]
are your SKILLS and EXPERIENCE.
[32]
Because in this field, what you can DO will
make you so much more successful than what
[36]
you KNOW.
[37]
Solving technical problems is THE way to earning the trust and confidence from people
[42]
you work with.
[43]
Buckle up and letâs dive right in.
[46]
Number 1: Building and using virtual machines.
[49]
Virtual machines, also called VMs, are operating
systems that run on top of your existing or
[53]
âhostâ OS.
[54]
The virtualized OS is commonly referred to
as a âguestâ, and is managed by software
[59]
called a âhypervisorâ.
[61]
The hypervisor lets you manage and allocate
resources like CPU, Memory, and Disk space
[66]
on your guest.
[68]
Popular hypervisors you may have heard of
include Hyper-V by Microsoft, Virtualbox by
[72]
Oracle, VMware, and KVM.
[75]
Often times when you hear the term âcloudâ
it usually means thousands of VMs running
[80]
on specialized hypervisors on someone elseâs
server farm in a datacenter somewhere.
[86]
Virtual machines let you become platform-agnostic,
meaning youâre no longer limited to any
[90]
particular operating system and tools available
for it.
[93]
Many people spend all their time just on one
OS and debate which ones are better.
[98]
Let me tell you: IT DOESNâT MATTER.
[100]
As a pro you should be versed in ALL of them
and comfortable working with any platform.
[106]
This maximizes the scope of your skills and
makes you effective in any situation.
[111]
Virtual machines also give you the flexibility
to train and research in an isolated environment
[116]
without affecting your main driver.
[117]
You can quickly take snapshots of a guest
OS and restore it to an earlier state.
[123]
Opening a suspect file you received?
[124]
Use a VM.
[125]
Want to practice configuring a server?
[127]
Use a VM.
[128]
Slinging exploits at a target?
[130]
Use a VM.
[131]
Moving on toâŠ
[133]
Number 2: LEARN the command line.
[134]
Donât run away but EMBRACE it.
[137]
The command line interface, commonly referred
to as a SHELL, is the simplest and arguably
[141]
the most efficient way to interact with an
operating system.
[145]
For example, if Iâm looking for an entry
in this CSV file, Excel might freeze or crash.
[151]
Running a lightweight shell command gets me
what I need in no time.
[155]
Whyâs it called a shell?
[156]
The important parts of an OS that actually
makes it run is called the KERNEL, because
[161]
it functions at the center of the system.
[164]
The part thatâs exposed to a user is called
the shell, since it wraps around the kernel.
[169]
Itâs just like a car, where the steering
wheel, pedals, and dashboards giving you control
[174]
over the engine or transmission all exist
in the âshellâ of the car.
[178]
The command line gives you the lowest level
access to software functionality that comes
[182]
with an operating system.
[184]
Many of the most useful tools donât have
a graphical interface to point and click.
[188]
Mastering the command line expands your arsenal
and lets you get more done with less.
[193]
It lets you be able to use scripting and automation
to tackle repetitive tasks that would otherwise
[198]
waste lots of time.
[200]
Automating your workflow by learning the command
line makes you a tremendously valuable asset
[205]
to the team.
[206]
I recommend starting out with Bash, or the
âBourne-again Shellâ since it comes default
[210]
with almost every Linux distribution.
[212]
macOS used it in its Terminal app, but has
since changed to Zsh, or âZ-Shellâ, and
[217]
has some nicer features.
[219]
If Bash is like a Toyota, then Zsh is more
like a Lexus.
[222]
Bash is so popular and effective that Microsoft
actually released the Windows Subsystem for
[228]
Linux, or âWSLâ and lets you install several
different Linux flavors to use Bash as a native
[233]
app.
[234]
This is super convenient, since I can access
most of my Linux tools without having to switch
[238]
to a virtual machine.
[240]
Now understand that Powershell is actually
the go-to native shell for Windows.
[244]
Itâs very different from how you would use
the Linux command line, but gives you a ton
[248]
of powerful Windows administration abilities.
[251]
If you work in an environment where Windows
is the primary OS, definitely learn Powershell
[255]
as well.
[256]
Iâm gonna start a series on the Linux command
line very soon.
[259]
Comment below to let me know what tools and
concepts youâd like to learn!
[265]
Number 3: System Administration.
[266]
All of us with a computer or smartphone, from
your grandma to IT wizard is a really sysadmin
[272]
at some level.
[273]
It all depends on what level youâre at.
[275]
System administration involves the configuring
and maintaining of computers, whether a personal
[279]
device or hi-powered server.
[281]
When I was first using computers as a kid,
I loved to dive down into EVERY SINGLE SETTING
[285]
available on the computer, just to see what
it did.
[288]
Reading manuals, online guides, and playing
around just drove this curiosity further.
[293]
By doing that, I became the family IT help
desk.
[296]
System administration is about knowing your
platform and various tools inside and out
[300]
to be able to help others who donât.
[302]
Whatever your skill, I challenge you to fiddle
around and learn by doing.
[306]
Delete some files, and try to recover them.
[309]
Download, open, and monitor old viruses in
a virtual machine with tools like Windows
[313]
Sysinternals to see what they do.
[315]
Try to extract files and passwords off a computer
without knowing the login info.
[319]
Whatever it is, push the limits of what you
already know by reading guides out there and
[324]
following along.
[325]
Practice a little more each day and youâll
level up in no time.
[328]
Next upâŠ
[330]
Number 4: Computer Networking.
[331]
THIS is the heart and soul of it all, what
I like to call the cyberspatial âlaws of
[336]
physicsâ.
[337]
Itâs understanding how devices interact
with each other and how data gets from point
[340]
A to point B. A strong foundation in networking
will make you a rockstar troubleshooter, whether
[345]
youâre red teaming, defending, or running
day-to-day IT ops.
[349]
Thereâs two conceptual models that govern
computer networking: TCP/IP and OSI.
[354]
They group all your different networking and
telecommunication protocols into âlayersâ.
[358]
TCP/IP is older and uses four layers: network
access, internet, transport, and application
[364]
layers.
[365]
OSI stands for the Open System Interconnection,
which is developed by the International Organization
[370]
for Standardization, or ISO.
[372]
These guys define everything from country
codes to time and date formats.
[376]
OSI is newer and uses seven layers: physical,
datalink, network, transport, session, presentation,
[383]
application layers.
[385]
All these layers are just a way to describe
âwhatâs happening whereâ.
[389]
So if youâre receiving a package from someone
in a different country, itâs gonna get passed
[392]
between envelopes, boxes, vehicles and planes,
each with their own addressing method and
[398]
operating procedures.
[399]
When the post office tells you thereâs an
airline issue, you know where it is in the
[402]
transportation system thatâs delaying your
delivery.
[405]
Likewise, the networking layers all have different
functions, but as a whole work together to
[410]
let you stream videos from a server in a rack
to a device in your hands.
[414]
Knowing whatâs happening at each layer lets
you âsee the matrixâ and be much more
[418]
skilled at your craft.
[421]
Number 5: Personal digital security.
[423]
This is an area Iâve been particularly passionate
about because it affects our families, friends,
[427]
and organizations.
[429]
The cybercrime industry is booming.
[431]
You donât have to scroll far to see
what the online black market place looks like.
[435]
As technology becomes more intertwined with
our lives, from Internet-connected cars to
[440]
refrigerators, the vulnerabilities and attack
vectors are gonna increase more and more.
[444]
If you want to go deep into cybersecurity,
thereâs no better place to start than with
[448]
yourself.
[450]
From passwords, encryption, to secure comms,
stay up-to-date with the latest security news
[455]
and best practices.
[456]
You might just be the subject-matter expert
in your office that others go to for advice.
[461]
And that advice might just protect your company
from becoming front page news.
[465]
But most importantly is living it out yourself
as well!
[468]
You wouldnât believe the number of times
Iâve seen cyber intrusions originate from
[472]
the security operations or IT department simply
because people didnât understand or practice
[476]
basic digital hygiene.So thatâs it for this
video Thanks so much for tuning in, donât
[481]
forget to subscribe for more content just
like this, AND if you have any further questions
[486]
please let me know.
[487]
See you soon!
You can go back to the homepage right here: Homepage





