Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:01):
And we're back with
another amazing episode of
Security Happy Hour.
That's right, it is me, theCyber Warrior.
This is, of course, cyberWarrior Studios, and we are
coming at you live once again.
You know how we do every Friday, every Friday's day.
We are here, this is the spotto be, and we got huge giveaways
going on this evening.
Look, I got five of thesesigned by Daniel, the author,
(00:26):
and one of these.
So we are going to be givingaway some books, we're going to
be doing some big things and wegot a huge conversation coming
at you with our guests thisevening.
But I promise, if you just hangwith me for about like 10
seconds that's all about ittakes I'll be right back.
(00:52):
And hey, we're back.
And hey, look, check it out.
Oh wait, our guest is here.
Let's bring him in.
And before we get started, justlet's just give this shot.
All right, it's not as loud asit can, but it'll have to do it.
It is the official start ofSecurity Happy Hour.
Thank you all for joining usthis evening.
It's going to be a great show.
Octavius, how you doing,brother?
Speaker 2 (01:11):
I'm doing good, man,
I'm doing great.
How you doing?
Can you hear me?
Speaker 1 (01:14):
I'm doing good, man.
Man, you have me stressing, youhave me waiting till like the
last minute for you to get here.
I was like, actually it waslike the last 30 seconds.
I think you showed up.
Speaker 2 (01:26):
Yeah, I don't know.
Speaker 1 (01:29):
So you're here and
that's what matters.
That's what's important,because this show is all about
you this evening and, of course,our guests, our warriors, as
always in the chat.
I love having them.
It's good to have them hereBefore we get started, because I
got to do five giveaways, sowe're going to try to establish
this early.
I need a hashtag.
(01:50):
Oh wait, actually, I shouldprobably pull up the screen so I
could do this the right way.
I'm going to need a hashtag forthem to enter.
But let's do string yard.
Come on, let's give away.
I think it is Give away.
I think that's the right page.
It is, I'm good, all right, sowe need a hashtag to use for
(02:17):
these drawings.
So what are you thinking?
Speaker 2 (02:23):
You know what?
I just watched one of yourvideos.
It's about two weeks ago.
I think it's my favorite of allthe videos you ever put out so
far and it's called becominggreat.
I think I think we should bebecoming great.
Speaker 1 (02:40):
Becoming great.
All right, so we're going toput that in, start collecting
comments and we're going tothrow that up as a banner so
people know that way theyactually do it right.
That is actually.
Yeah, I like that one.
(03:01):
I like that one.
So there's your hashtag, that'show you get in on the books and
we'll be able to take it fromthere.
Thank everybody for joiningthis evening.
As you will see, if you're onYouTube, I do have the option
for Superchats now, justthrowing it out there, y'all
don't have to.
As always, this is a free show.
Everything is up to you guys,but we're going to keep going
(03:21):
with the show Now.
Octavius, octavius, octavius,octavius, you are in the field
now, if I'm not mistaken.
Am I correct?
Speaker 2 (03:33):
Not yet I feel like
it should be, but I'm still
working.
Speaker 1 (03:39):
All right.
So why don't you give us arundown of where you're at and
how you got there right?
Give us your story a little bit.
Speaker 2 (03:48):
Yeah, so right now
I'm actually working my first IT
job.
So I just got into the IT field.
It hasn't even been two yearsyet.
Before that I was doingpersonal training, weight loss
coaching, group fitness exercise, stuff like that for about
(04:08):
seven years, like right out ofcollege, got a bachelor's degree
in exercise science.
I guess I probably wasinterested in cybersecurity as
soon as I graduated schoolbecause Mr Robot was out about
that time and it's basicallybeen just a journey since then.
(04:32):
Like I got my A-plus in like2017.
Couldn't get anything because Ididn't have experience, kind of
backed off a little bit, wentback to my fitness studies and
then a pandemic came kind ofwoke me up again and I said,
okay, we're going into this ITthing and then into
(04:53):
cybersecurity.
So I got into some like a biglearning program that was big
for me and after that I wasapplying and interviewing, and
applying, interviewing and arecruiter for my current company
finally reached out to me and Ilanded where I'm at right now
as an application supportspecialist.
(05:13):
It's basically like kind oflike a third tier support, from
what I see, kind of like thirdtier support kind of thing.
So, and then I didn't study ina lot of cyber stuff and trying
to get my way into cyber.
Speaker 1 (05:33):
Yeah, and it's going
to take time, I mean, but the
fact that you're still in IT,you're still pushing forward.
That's one of the things thatI've noticed that a lot of
people neglect and it's not outof necessarily choice.
A lot of the people I'veinterviewed recently are
transitioning into cyber laterin their career, so they don't
necessarily have that timeadvantage of being able to come
(05:54):
from IT like help desk, sysadminor anything like that into the
industry.
But they've done their research, they've done their learning,
they know what they're doing andso really getting into the
field is what they're trying todo.
But yes, there is thisdisconnect in certain
organizations where not havingthat IT experience at a bare
minimum overshicc you fromgetting a junior level job.
(06:18):
And then, of course, we see thejob application or the job
descriptions out there that say,hey, you need five years of
experience to be a junior levelcybersecurity person.
Well, what experience?
Oh, you need five yearsexperience with Splunk.
What Pomi I'm just getting in.
I can't have five years ofexperience on something that
(06:39):
I've not been a lot of touch forfive years.
Like I don't get it.
Yeah, most definitely.
Speaker 2 (06:48):
Yeah, for sure.
And like you said, man, it justspoke to me like I don't have
the time.
That's why I work so hard andstudy so much and practice so
much.
I have to catch up with peoplewho got this education a while
ago, so they got the educationand they got the experience over
me.
So just got to catch up, studyas hard as I can.
(07:11):
I can't be sitting around in asupport position for five years.
I got a little faster than that.
Speaker 1 (07:21):
Yeah, and one of the
people when I know you've seen
him on the show, I know you'veseen me talk about him and
things like that KevTech ITsupport.
He came from support and hejust got his first cybersecurity
job recently I believe it wasthis year.
So he's another good one and Italk about him all the time,
like you know, talking to him,doing resume reviews and things
like that, and you know me, youreach out to me, I'll review
(07:43):
your resume, we'll talk about it.
You know those are things thatthat'll really help and I think,
because you already havestarted in that area in IT,
it'll make it a lot easier foryou to transition.
It does have.
It's a lot easier doing it thatway than coming in without any
(08:06):
knowledge at all.
Speaker 2 (08:07):
To be honest, Mm, hmm
, so I'm learning this.
I'm learning this.
I had got free session withcyber, cyber insecurity.
Speaker 1 (08:23):
Oh, a good one, yeah,
yeah.
Speaker 2 (08:25):
Yeah, I got a free 30
minute session with him and he
kind of said some of the samethings that it's going to take a
while for you to begin, but yougot to start already.
You give yourself the knowledgeyou need and you also are in
the IT field.
So he said you got to leg up ona lot of people that's trying
to get in.
But you know good advice.
(08:49):
But I think your work at it andI hope I'm not not even saying
this, but I think your workethic and control how long it
takes you, not saying you couldjust outwork the system, but you
definitely can push yourselfahead.
Like you said in the cominggreat video.
It's about what, what, whatkind of action you're going to
(09:10):
take.
Speaker 1 (09:11):
And that is and we
got a question here from a reach
.
I can't I hope I'm pronouncingthat right.
He's on twitch and I'll get toyou in a second brother.
You know, really everythingcomes down to you, and so when
you're getting intocybersecurity, you have two
options.
You can let negativity holdsyou back and you could, you know
(09:34):
, let the disappointments and,oh, you know, all this stuff
bother you and I'm sorry I gotto respond to a message real
quick, it's.
It's that it's hard to do totry to talk to them also, but
you can.
You can really look at it andand you can let the negativity,
(10:00):
you can let the disappointment,you can let all this stuff gets
you and hold you back, or youcan make the active choice that
you're going to do better,you're going to overcome and
you're going to rise above.
I think that is one of thethings that separates those that
break in and do great versusthose that just want to be a
victim or want to always feellike, oh, I can't get anywhere
(10:21):
because of this.
That are the third.
Look, there's a lot of issuesout there.
Yes, we know this.
We talk about it all the time.
It is a guarantee.
There's a lot of issues in thisindustry in terms of hiring,
especially junior personnel, butultimately it comes down to you
.
It comes down to what you'rewilling to put into it.
Speaker 2 (10:47):
Yeah, man, you have
control, man, it's a, it's a
mindset that you have to believeyou can manifest whatever you
want around you and it's notgonna come because you want it.
Come because you want it andbecause you work for it.
So just take control and workfor it.
I didn't say, you know, Ididn't like my job before, I
(11:09):
wasn't getting paid enough tolive and handle my
responsibilities and, like Isaid, when the pandemic hit, I
just woke up and took controland said okay, this is what I'm
gonna do and this is what I'mgoing to go, and I'm not going
to stop until I get there.
Speaker 1 (11:23):
Yeah, definitely.
So we got a good question here,though, and I know kind of
you're trying to break into, soit'll kind of be both of us
answering this but can a personwho does not have prior
practical experience work as asecurity consultant, or does
this differ on the procedures orrequirements of each
organization?
What is your take on that?
(11:45):
Trying to break in, how do youfeel you know, being a
consultant in the industry woulddiffer from working from an
organization, and do you thinkit's possible to be a consultant
without having any priorexperience?
Really, any practicalexperience, will say, within
companies?
Speaker 2 (12:02):
Mm.
Hmm, you know, from myunderstanding and my research of
the industry and you know thelevels and everything it seems
like being a consultant is notan entry level kind of thing
really, at least you know,unless you just come in and you
(12:22):
really really know what you'redoing and you can prove it off
top.
But it seems like from myresearch that something you kind
of have to work up to,especially in that environment.
Like you said, you're dealingwith multiple customers and
multiple customers, so I imaginethat could be fast paced and
kind of stressful for a newperson.
So unless you just supertalented and you just learn
(12:44):
super fast, my understanding isthat it'll be pretty tough to
break in as a consultant.
But tell me what you thinkabout that.
I'm on the right track.
Speaker 1 (12:53):
Yeah, actually you
are.
So I've been a consultant.
I've been in several differentroles.
It wasn't until this year thatactually became a manager, and
consulting is one of thosethings.
You have to have the experienceto be able to talk to clients.
That's not to say that you cando it, that's just to say very,
very, very, very, very rarelywill you hear of an organization
(13:14):
hiring a junior levelconsultant that has no
experience, because there's adifference between a junior
analyst, a junior engineer, andthen a junior consultant.
And that includes pen testingas well, because pen testing is
even then still a littledifferent.
You can get a junior pen testerwith with no experience.
At least you should be able to.
(13:35):
I know trusted second a fewother organizations that will
hire that way.
You know you have no experiencebut you kind of have the, the
certifications, the background.
You've been doing your, yourlabs, you can talk to it and you
know what you're doing.
But if you're in a trulyconsultant role where your job
is to guide clients, then itbecomes very difficult to guide
(13:59):
clients on something you'venever seen.
And if you don't have theability to speak to any of the
tech stack at all, because allyou know is your certifications
and what they taught you, then Ican't.
I cannot hire a juniorconsultant.
I can hire a junior analyst.
(14:19):
I can hire a junior I mean wecall them consultants where I
work but essentially it'ssomebody that has experience in
the field.
But even as a junior consultant,you need to have experience.
There's a difference betweenconsultant, analysts and
engineer.
There's consultant will alwaysneed some experience in the in
the industry.
So I hope that helps.
(14:41):
Again, I get what you're comingfrom and I know you have it
here.
You have professionalcertifications such as security
plus EJPT, but those will notgive you, those will not give
you the knowledge you need totalk to clients.
Sorry, it just won't, not, notfrom a consultation standpoint.
(15:02):
Again, it took me years to beable to speak to this.
I've been, I've lived thisindustry since I was a kid.
Like I'm 36 years old and Icame up in IT and cybersecurity
and all that stuff.
So it's different for me thanpeople trying to break in.
But that's the only advantage Ihave is like I found IT as a
kid Not as good.
Speaker 2 (15:24):
I've been out there
in the wild and ran across a lot
of stuff.
As a consultant, they're goingto expect you hey, this popped
up and you have to jump in thereand deal with it and it's going
to be stuff from a while thatyour books might not have taught
you.
Speaker 1 (15:39):
And that always comes
down to and this is one of the
things that I love aboutcybersecurity is there are
different areas for everybody.
So me, I can research and findanswers quickly, anything I need
, and an Octavius.
I don't know what your learningstyle is, but you know this.
It aided me for a while after Iwent through Army training, for
(16:03):
a bunch of sense training is.
I can learn like this you showit to me, you give me it on
screen, you tell me to do it, Ican do it, I can figure it out
and it'll.
It'll happen in minutes, hours,whatever.
It's not going to take me thatlong.
In this industry, there are jobswhere you have the ability to
take time to learn andunderstand things.
(16:23):
Then there are positions likeconsulting, incident response,
even pen testing at times, whereyou have to be able to learn on
the fly and go.
If you cannot do that, if yourmind and again, it's not, it's
not a blow to anybody, it's notsupposed to be something
negative but if your mind justdoes not click in that way where
(16:45):
you can learn and go quick andliterally like hey, we were
briefed, I need to know what todo, all right, cool, do a real
quick Google search.
Let's figure it out.
Let's figure out what theransomware is.
Let's figure out what happened.
Let's go about our business.
If you can't handle thatenvironment, then you will not
be good in certain roles doesn'tmean you're not good for
(17:06):
cybersecurity.
And when I first broke in, whenI was in the army and actually
getting the certifications, Iwas pissed.
I was like, if you can't learnthis certification, get the hell
out.
Like literally, you have twoweeks ago bounce deuces.
I don't want to see you here.
But then I learned.
Speaker 2 (17:23):
Yeah, that's tough,
different areas.
Speaker 1 (17:25):
Because I came from
military like learning it on my
own and military and everythingelse and then actually
experiencing the field in thecivilian sector completely
different can of worms.
And then as I got older I got abetter understanding and so I
think there are rules foreverybody.
You just have to find yourniche.
Speaker 2 (17:48):
Yeah, that's
interesting.
Speaker 1 (17:49):
Um, OK, we'll save
that one.
Speaker 2 (17:54):
Can you elaborate a
little bit on some of those
different types of roles, likekind of what would they look
like?
So you mentioned incidentresponse.
You're going to have to be ableto jump in there and hit the
ground running and know what todo.
What would be some of those?
Slower pace you get more roomto learn, kind of roles, your
(18:15):
analyst and engineer roles.
Speaker 1 (18:17):
generally speaking,
if you can get into a junior
level engineer and analyst role,it gives you that room to grow
and really expand within theindustry and understanding Even
a junior pentester role.
You're supposed to be cominginto one of those roles, really
never doing it in enterprise,maybe doing some hack the box or
try hacking or something likethat.
(18:37):
But you're not supposed to becoming into something where
you're a red team and you'regoing to get in there quietly
and nobody can ever find you.
No, no, no, a junior pentesterno end map, metasploit and maybe
a few other tools to be able tobreak into things, possibly
even burpsuit and things likethat.
(18:59):
But those hands-on technicalroles of implementing and
analyzing those are generallylike.
You have that time to figure itout, especially as a junior when
you're looking at yourfast-moving things.
(19:22):
Ir is not something you canreally get into as a junior and
B if you can't learn on the fly,because there are so many
different nuances to malwarethat in order for you to figure
out where things started, youneed to be able to figure out
what's going on and be able todo the research, bring a company
(19:43):
back up and running, deliverevidence, do incident handling
Like, you have to either haveall the knowledge already or
know how to find it, because ifyou don't, then you're putting a
company that is already down,they're going to lose more money
because you're taking too muchtime, and so you have to look at
(20:03):
it from that aspect of things.
Speaker 2 (20:06):
OK, one quick
follow-up then, Derek.
So do you think people have theability to say, practice enough
malware analysis and even writeenough malware on their own and
do whatever they can on theirown so they can be in the
headspace to be able to jump inand figure stuff out Like yeah,
(20:28):
they're working from a differentlevel than somebody who hasn't
done all that work.
Speaker 1 (20:33):
Yes, and that is
because think of your brain,
think of the way we think aboutthings as muscle memory.
So if you do something so manytimes, it becomes muscle memory.
You know what triggers the look.
For I have my grant.
I have my reverse engineeringmalware certification from SANS.
If I were to step in in thereverse engineer malware to this
(20:55):
date I'd be lost.
I wouldn't know what to dobecause since I got it, I
haven't touched it.
I learned about it, I studiedit, I figured it out, was able
to pass certification, butbecause I haven't touched it in
so many months or years, Iforget when I got it, I wouldn't
be able to do it right now.
All right, now could I pick upthe books, read and figure out,
(21:17):
know exactly what I'm lookingfor?
Yeah, sure, but that's becauseof the muscle memory that was
ingrained within me.
But I couldn't do it withoutresearch, but I know where to
find the answer.
So if you develop the musclememory to be able to do
something and you can do it welland maybe you step away from it
for a little while, but becauseyou already have that muscle
(21:39):
memory, that's like me steppingback on a football field.
I could step on a footballfield and play linebacker all
day.
My body may not like it, but Icould do it.
But when you have thatingrained within you and it's
been beaten into you so muchbecause you've done it or you've
researched it or you've studiedit, then yes, it's possible.
But you have to develop thatmuscle memory to be able to
(22:01):
react quick, think, know andknow exactly what you're doing.
If you don't develop that, thenno.
But if you work on developingit, it is completely possible.
You just have to develop thatcapability.
It's not something that'simpossible, it's just you have
to learn how to use your musclesin that way, which takes time.
Speaker 2 (22:23):
Yeah, that's good man
.
Speaker 1 (22:27):
So we got another
question here and actually James
asked this to me, but he saideither of you Would either of
you say.
Ultimately, skills that you candemonstrate are more likely to
get you worked in search ordegrees.
Speaker 2 (22:45):
I'm going to let you
go first Octavius, handle that
one homie.
Ok, ok, let me process that oneone time.
Ultimately, skills that you candemonstrate are more likely to
get you work in search ordegrees.
So I think my first idea isfrom all my research and digging
, there are search that give youqualification and at the same
(23:09):
time demonstrate skills likeblue team level one.
I haven't I've taken the blueteam level one and attempted the
exam.
We can talk about that if youwant to, but we got the side of
the thing.
Speaker 1 (23:27):
Did you pass that?
Speaker 2 (23:27):
one.
No, sir, I'm going to just behonest which I failed the twice
on both of my free attempts.
Oh, that happens.
I did much better the secondtime.
But yeah, that's another story.
But yeah, I do think there areservice like blue team level one
(23:48):
, that demonstrate skill, whichis kind of why and maybe I
shouldn't have did that, but Ikind of pursued it before
security plus, because when Istarted looking into cyber I
realized where I wanted to gowas a technical, hands-on kind
of route and I knew securityplus was a good foundation of
(24:08):
knowledge.
But I wanted to get my hands onthe keyboard and know how to do
stuff and know how to use thetools and stuff.
So, looking to the search thatdo demonstrate.
And if you can't do that, ifyou're in school or whatever, I
would say, do both.
If I could go back, I wouldmajor in IT, computer science,
(24:33):
and I would do as muchpracticing and learning and
studying outside as I could andtry to get certs.
If it's all out there and youcan do all of it to get ahead of
everybody, why not do that?
Speaker 1 (24:49):
Yeah, definitely.
I think it's a combination ofthe two right?
So, and Griffin InfoSec put itearlier in the YouTube chat, sgt
degrees gets you through someof your HR doors Not all,
especially not if you're looking.
If you talk to me, networkingis really key to doing a lot of
things these days, so that's nota necessity, but if you are
(25:14):
applying to jobs, not networkingto get a job, then yes, it is a
necessity.
There's a lot of systems you'renot going to get through
because you don't have those.
However, it's not an immediatecheck off the box.
It's not going to happen.
I personally will take skillsets.
(25:34):
I will take.
If I am looking for a certaintool set that somebody knows.
I will go out of my way to findsomeone with that tool set.
So, for instance, I recentlyhired someone that I needed to
know New Splunk that is.
I needed to know they knew it.
I have a lot of work coming inthat Splunk work.
(25:55):
I need to know someone thatknew it, backwards and forwards.
So that's what I was lookingfor.
I didn't care aboutcertifications, I didn't care
about degrees, I didn't careabout anything about that.
I needed to know they canmentor people, they can motivate
people and they knew Splunk,that was it.
What work have you done?
Oh, I've done this, this andthis was Splunk, cool bet.
How do you feel about mentoringjuniors?
(26:17):
Oh, I'm all about it.
We could do that, cool bet.
Let's go with it.
Look at their experience, whatthey've done, how they get back
to the community and ask thething as I am looking for the
whole person, and sometimes I'llhave to throw a tool set into
it, depending on where you'regoing to be in the echelon of
things but I'm looking at thewhole person, man.
(26:40):
But again, industry as a whole,it depends on the company
you're looking at.
It truly does.
Different companies will dodifferent things.
Speaker 2 (26:52):
Yeah.
It's awesome, go ahead.
We need more people out therewith that mindset man, not
saying that people should justbe given opportunities with no
skills and no knowledge, butthere's definitely people that
bring more to the table.
(27:12):
Like you said, the intangibleskill set will be able to mentor
and have the motivational andpositive mindset with the team
and for the most part, I believeme or anybody else, can learn
that technical stuff with enoughpractice.
Speaker 1 (27:30):
Yeah, yeah, the
technical side.
There's a lot technical you cando.
That doesn't require anythingmore than practicing at home
KevTech IT support.
I always go back to him becauseof the labs, because of the
videos that he does, and he goesabove and beyond what I do.
(27:51):
And when you look at thingslike that, if somebody were to
come to me and think of like, ohyeah, I did KevTech IT supports
, I went through these videos,these videos, these videos Is
that the third?
I would go look at them.
I'd go figure out exactly whathe taught, so I knew what he was
doing and what they learned.
(28:15):
But when you do things like thatand show me that you're
learning on your own, that doesmore for me.
And there's a reason.
And the reason is because itshows you have the ability to
learn on your own, you have thedrive and the passion to really
carry yourself forward in thisfield, whereas those that are
(28:36):
like, oh yeah, I got my degree,ok, what have you done since
that?
Yeah, ok, so you have noYouTube, no blog, no LinkedIn,
no social media presence and youhaven't worked a job.
So what's your degree mean tome?
Because I know what they teachin degree programs and it's
(28:59):
little to nothing, except forthe bare minimum foundations,
which means I'll pay you $60,000a year to go ahead and be an
analyst.
I hope that's what you'relooking for.
You're not getting six figures.
You're not getting anywherenear right away.
Right, like, what have you done?
I'm going to bring you in thebare minimum and I am going to
(29:20):
ride you just because youthought your degree meant more,
because you haven't done anywork on your own.
Speaker 2 (29:28):
Oh yeah, I'm going to
make you a mastermind set, man.
I love it, I love it and I havea question for you to quickly
follow.
A question on that note.
Right there you mentioned goingthrough the degree.
So I'm in a program right nowwhere I'm taking college courses
, but they're non-credit, withcollege professors, and they
(29:50):
prepared us for somecertifications and stuff, and so
I'm doing my two classes.
I'm very hands on.
I'm taking Lenox, red Hat Lenoxand Cisco CyberOps class.
I love that one, you do, man.
I'm loving it.
Man.
I don't know if it's becausethe stuff is making sense,
because I read the same shitover and over and it's finally
(30:12):
clicking now, but I'm loving theCyberOps.
But my question is how can I, Iguess, without plagiarizing the
content, how can I show handson projects of what I'm doing in
there without giving away thecourse content?
(30:32):
OK, so knowing that I don't wantto, just come out on the end
and say, hey, I finished thisclass.
I want to show what I learnedduring the class.
I want to take in your face.
Speaker 1 (30:41):
Yeah, so a good way
to do something like that.
So if you're learning somethinglike so, ccna, cyberops, cisco
bought Snort, so there's a freeversion of paid version A good
way to go about what you wouldbe learning in a class like that
would be to set up the freeversion of Snort and develop a
(31:06):
blog or post on LinkedIn orYouTube or whatever A way to
show okay, hey, I wrote thisrole to detect this.
I ran a Metasploit thing to dothis.
The role picked up.
It triggered this, like okay,so this is what I'm doing, this
is what I've learned, this iswhat I know.
And this is why learning inpublic is so important, because
(31:28):
it shows not only do youunderstand the tool and the
language that it uses, but howto take an offensive attack and
detect it in that way.
So now you're learning bothsides of the fence.
You're learning the offensiveside, because you're learning
how to use things likeMetasploit and Nmap and whatever
other tool, it doesn't matterSQL map and a bunch of others,
(31:53):
and then you're learning how touse Snort, which I believe, if
I'm not mistaken, I believeSnort roles are written in a
similar way as Splunk roles, Ibelieve and I could be wrong on
that In the chat, pleasesomebody correct me.
It's been a while since I'veused both of those, but if they
are now, someone can take it.
(32:14):
What you're doing for Snort,look at it, understand it and be
like, oh shit, this will workfor Splunk, which means now they
know how to write rules forSplunk, which means now, okay,
full circle, but full circle,and that's how it works.
And so by doing these things,that's how you do it, without
(32:35):
giving away the material or thecertification content or
anything like that.
It is by doing it on your own,but using the knowledge they
showed you, if that makes sense,right?
Speaker 2 (32:46):
settle.
Yeah, yeah, yeah, that'sperfect, like set up my own
environment and just replicatewhat I'm learning in there.
Speaker 1 (32:54):
Yeah, yeah and yes,
snort logs can be ingested from
Splunk for sure.
So, yeah, it's what about usinga smith?
Did you type that wrong?
Homie God, paul, I think hetyped that wrong.
Speaker 2 (33:14):
I don't know what a
smith is.
I'm not raising any doubts forme.
Speaker 1 (33:22):
But no.
So it's one of those things.
There's ways that you can do itand I, honestly, in my position
now, when people apply, IGoogle their name, I Google, I
look them up on LinkedIn.
I do all these things.
See, I wanna figure out whatthey're doing, what they've done
and who they are.
Splunk Enterprise is also freefor 60 days.
(33:43):
Oh, skit, all right, cool, hedid the type of that, not smith
skit.
So, yeah, whole cyber humaninitiative community challenge.
Yes, paul puts out challengesfor whole cyber human initiative
.
Holy crap, that's a lot ofwords, homie, You're killing me,
but he does that.
(34:05):
And so, yeah, there's a wholething you can do.
Security Onions another goodone.
Actually, I just talked to anorganization today.
I talked to one of theirfounders and they are doing a
massive security oniondeployment.
So that's another big one youcan get into If you can do.
I have a whole lab on settingit up.
Security Onion has GitHub reposout there to setting up a whole
(34:26):
terraform, like in the cloudlab, security Onion, and we're
talking machines and the wholeoperating infrastructure and
everything.
So there's a lot of differentways you can do it.
Just record it, put it on videoor write about it.
Take screenshots of everythingyou're doing, like, hey, I did
this, this, this and this.
This is what I found.
This is what I did, da da da daand that's how you get seen and
(34:48):
that's how you get thisvisibility.
You know, this episode is allabout going from noob to warrior
.
To go from noob to warrior isputting yourself out there and
actually putting in the work.
You're doing it on Tavius.
It's just a matter of puttingit out there.
Speaker 2 (35:08):
If you understand
what I'm saying.
Oh yeah yeah, neil told me thesame thing, man.
He said just get it out theremore People.
Somebody in the chat said learnout loud if people don't know
what you're doing.
It's good for your ownself-fulfillment, which is the
first thing that matters to me.
(35:28):
But we out here in the worldwhere it takes money to live, so
if nobody knows what you'redoing, then it defeats the
purpose.
You're not getting a job,you're not getting no money,
you're not living the lifestyleyou want, so it's pointless if
people don't know what you'redoing.
Speaker 1 (35:45):
Yeah, precisely, and
that's the biggest thing, and I
love it.
Amanda, I know what Amanda does.
She's a warrior.
I got, I brought her into thefold just about two months ago,
I think it was maybe three.
She said you're Googling peopleand not tagging me in.
She's one of those FBIinvestigators Like not
officially, but she's one ofthose people that can find
anybody doing anything anywhereat any time.
(36:06):
So you know, kind of like mywife, never been trained or
anything and just can findanything they freaking want
anytime they feel like it.
Speaker 2 (36:15):
I don't know how to.
They're natural O-Set people.
Man, I love that kind of stufftoo.
Yep, do you know?
Are there any roles like theyfocus solely around O-Set or
mainly around O-Set, like as theprimary skill set?
Speaker 1 (36:37):
So that's what me and
Amanda have been looking into
Beyond something like lawenforcement.
So you're looking like FBI orstate police, things like that.
I know there are, I just don'tknow where it exists.
Or wouldn't be a career field,right, it wouldn't be a
(36:57):
terminology, it wouldn't O-Setin and of itself wouldn't exist.
I would say potentially, maybesomething like where I work.
If you have, or threat intel,it's another good one, right,
intel would be a good way to getinto O-Set because you're doing
(37:19):
all open source intelligence.
So if you're looking atdifferent organizations, if
you're looking at differentpeople, if you're looking at
corporate espionage, things likethat, yeah, a threat intel
would be a good way to find it.
Understanding the dark web,understanding the dark net two
different things or actuallydeep web and dark web, those are
(37:42):
two different things.
The deep web has no DNS entries, it's all IP addresses.
The dark web is all through Toror I2P, things like that.
That'd be a good way.
Now you really have myattention, a whole cyber human
initiative.
I need to hook you up withAmanda for short.
(38:02):
I can't even fathom what shecan do, like me and her have
talked on many occasions andblows me away.
But, yeah, a threat intel,o-set those go hand in hand.
R&d, malware analysts I don'tknow about that one.
(38:24):
Malware analysts is interesting, misha, what do you mean?
Update today's live?
How about you tell me what Ineed to put in instead?
Okay, that'd be great, but yeah, so that'd be a big one.
But yeah, I mean, it's all overthe place, man.
(38:47):
There's a lot of the things wedo.
We do have another questionhere, though, from Kerry, and I
feel bad because every once in awhile he'll ask questions that
are completely off topic, butthis one is actually very much
on topic Question.
I haven't done much for Sturz,and even though I have the A
plus where I live, they want meto relocate, trying to get into
(39:07):
work at home or anything andnothing.
Actually, that's not exactly aquestion, even though he said it
was a question.
Still love you, homie.
But so if he has his A plus,where would you think he should
start?
Speaker 2 (39:21):
A plus.
Does Kerry have any ITexperience at all right now?
Speaker 1 (39:30):
Have any what IT?
Speaker 2 (39:35):
I know he's done some
side jobs.
Speaker 1 (39:37):
He's done some side
projects, but yeah, I don't know
if he's actually Kerry.
Please chime in if you'veactually worked for an
organization doing IT.
Speaker 2 (39:58):
I would say for Kerry
, if he hasn't gotten any
experience yet, I will just godo kind of.
What we were talking aboutearlier is, though, create that
experience through labs andstuff like that.
So I will start with tech ITand I would be going through I
(40:19):
had me on the side.
When I'm not doing tech IT,yeah, that's what I would be
doing, because, with noexperience, I would say the tech
IT is probably going to berealistic skill sets to build
for the kind of jobs you couldbe looking for right now, and
(40:40):
then to try having me is goingto be like a fun game of fire
way to build the skills to getpast, to start building the
skills to get past.
That that's my teacher, so Iwill do that combination.
Kev Tech organized he said heorganized his hands on stuff
(41:00):
from YouTube into his course onUdemy.
That I got for free a while ago, but I don't think it costs
that much.
But I will do Kerry.
Speaker 1 (41:21):
Yes, pci DSS is a
banned phrase on here.
I'm a mute.
That shit no one's gonna be alot of use.
I so look, check it out.
We got 26 people watching thisright now.
Becoming great.
Hashtag becoming great can andwill get you one of these or
(41:43):
this.
I don't know what order I'mgonna do it in yet, but you need
to put in hashtag becominggreat in order to win one.
I've only got yes, you can ifyou're in YouTube, linkedin,
twitch, facebook, any of those.
I've only got seven entries sofar, which means I've got six
books in seven people.
(42:03):
Six of the seven are gonna win.
So if you all want to win onewith the 20 some people that are
in here, please put in hashtagbecoming great.
Does that take me to eight?
Yep, oh, we're up to 10 now.
All right, so even better, keepit going.
But, yes, so you know,certifications are hard, because
(42:26):
the A plus is a general ITcertification and it does not.
It does nothing more than teachyou the hardware in the very,
very bare minimum and to be anIT support.
But then you have to go outthere, take your A plus and
(42:48):
actually apply it.
So get a job at a small littlemom and pop.
Get a job at a computer repairplace.
Once you're there, go ahead andwork into.
A plus is also a media forensiccert.
Oh, that's a good one, actually, yeah, it is.
Go out there and, you know,find a company that could be IT
(43:08):
help desk or desktop support orhardware support, wherever the
case may be.
There are ways to take that Aplus certification and use it to
your advantage.
And then you say, hey, I wantto get in a networking, get your
network plus.
You get into security, yoursecurity plus things like that.
There's ways to move up.
(43:29):
You just have to be willing toput in the work and do it.
And again, kerry, I know youhave a lot going for you.
I know I know a lot aboutwhat's going on, but you got to
get into somebody's smallerorganizations and put yourself
out there.
That's the best way to do it.
It's just going to take time.
Honestly, county governmentsare a great place to get your
(43:49):
foot in the door.
Very true.
Speaker 2 (43:51):
I was just thinking
that, yeah, I think that's true.
Speaker 1 (43:57):
Why can't I get all
right?
I guess I have nothing startedanymore.
All right, so becoming greatout there, we got 15 minutes.
I'll share this here in alittle bit.
What's another good one?
Speaker 2 (44:14):
man, what other?
Speaker 1 (44:15):
issues you got going
on.
What other comments concernswhat you got, octavius?
Speaker 2 (44:19):
I got a question for
you.
What kind of legal advice canyou give me, without tarnishing
the exam, to help me pass theroutine level?
Speaker 1 (44:41):
BTO 1.
Now it's been a while sincethat came out.
I was actually on the advisoryboard for it.
Speaker 2 (44:48):
I know I saw you in
the release video.
That's where I first saw you.
Then I saw the cyber warriorthing I was like, oh no, this
dude is a whole interesting kindof guy, All right.
Speaker 1 (45:02):
Mike, me and Josh
know each other quite well.
He's doing a lot of big thingsand I love what he's doing, but
as far as doing it, man, I'veseen the content and he's
ultimately putting outeverything you need the entire
training.
The only thing I would suggestis, like we've talked, about
(45:26):
going above and beyond buildingyour own lab, doing it on your
own, finding your own detectionmethods and things like that.
You know what I mean Actuallyusing the tools for what they're
meant for and your ownenvironment.
That would probably be the bestsuggestion I can offer, because
(45:53):
if you do that, then you'resetting yourself up for success.
Speaker 2 (46:01):
Okay, that's awesome.
I definitely Can exhaust somemore options to get better.
Speaker 1 (46:08):
They saw, yeah, I
mean, it's, it's one of those
things, man, it's.
It's.
It was designed to be juniorbut not to be easy, if you if
you understand my meaning rightlike it's yeah, it's stuff you
should know at that level, butit's not easy.
It's not something like asecurity plus or a G-sec or you
(46:29):
know, and even the G-sec and onesays easier, but at least this
is more hands-on.
So it has its advantages anddisadvantages.
But the one thing I will say is, if you have any questions
About the content or about whereyou're struggling, you can
always reach out to me.
We can always talk about it.
We can figure it out.
(46:49):
I'll go back and talk to Josh.
I'll try to look at some oldstuff and see what kind of
direction I can guide you in.
But you know, that's it's been.
That came out I think a year ortwo ago, so it's been a while
so many.
I believe.
Yeah, it's been a while since Ilooked at all the content,
whole cyber human initiative.
(47:10):
If you want to get into somemore research and labs, talk to
them.
Paul's always doing amazingthings, so you you have a great
place to learn with him as well.
It'll help you advance in thatway.
Other than that, what do wehold up?
Who put up a band phrase?
Don't know?
No, no band phrases in thischat, okay, jack.
(47:35):
Has a question for you, though,octavius what role is your goal
and what's your?
Why for getting in a cybersecurity?
Well, thank you, jack.
I love you, homie, my brother,me and then talk on LinkedIn all
the time.
Speaker 2 (47:49):
Okay, jack.
So my role, my role I Guess youcan say it's levels to it.
So I want to be become aconsultant, but I know I have to
work up to that.
So right now I'm just lookingto become a sock analyst and I
know it could be like differentlevels and responsibilities to
(48:12):
the different levels of a sockanalyst.
So I definitely kind of one ofI don't know people say it's
crazy.
I'm gonna learn Basically everystate that could be done in the
side and then come to thecenter and I want to learn hack
into.
It's like I don't have enoughtime to learn all the stuff I
(48:34):
learned.
That's why I have a long termmindset that I'm always gonna
keep doing.
Speaker 1 (48:41):
Yeah, and, and you
start with one right, you start
with one, you keep going.
But again, what is your why?
Speaker 2 (48:48):
my why so?
My why?
Um, well, you know, once again,definitely for career.
It's a career where you canclimb and when you can learn and
you can be rewarded in yourcareer for learning at a skill
(49:11):
sets and Just to dig in, like Ilove finding stuff, I love
putting pieces together.
No, it's just I feel like onceI start studying it, I feel like
I was born for cyber security.
Just my mindset way.
I think my persistence was justdigging into stuff.
(49:35):
I just think it resonates withme.
Once I found it, I was likedamn, I should have been doing
this since I I learned how toread like this is amazing.
So the why it's like what itcan do for me in the world and
what it could do for myself toFeel my, my hunger to learn and
everything like that.
Speaker 1 (49:56):
Yeah, yeah, and I
can't disagree with that.
It is a lifelong learningcareer field and this is one of
the things that and this is whyyou know, when I talk about
cyber security, I talk about itin such a way it's like being I
don't agree with the way theyteach things in some extent,
because you know I you look atdoctors and you look at lawyers
(50:19):
and things like that things arealways changing.
You'll ask that always have tolearn, so nine times out of ten,
you get paid a lot more inthose roles.
Not always, but nine times outof ten, cyber security is
considered IT.
It is is an IT field and so wedon't look at it as you have to
constantly be learning.
But when you're in cyberespecially if you're on a blue
(50:39):
team, red team as well, butmostly as an analyst or an
engineer that is designing siminfrastructure in building tech
stacks and stuff you have tounderstand and know what the
offense is going to be doing.
In order to do that, you haveto constantly be researching.
You have to constantly belooking and digging and
(51:00):
understanding.
This is why, when I talk topeople about things like the
dark net or the dark web, if youdon't know Tor yet, you might
want to make it your best friend, because that is where
Information is sold.
That is where people will comeinto your network and if you're
developing a secureinfrastructure, you may not want
(51:21):
Tor connections Allowed intoyour network and there are
certain firewalls and certainIDS is not.
While not IDS is, ids is willdetect it, but there are certain
IPS is in and networkprotection systems and things
like that that will deny Torconnections and if you are not
denying those Tor connections,that means somebody that is
(51:42):
using the dark net or usingonion or using whatever can get
into your network, and Good lucktrying to figure out who it is.
It's hard number the regularVPN, let alone Tor.
Unless you're the government,you're not tracking down who is
running the torsion or who iscoming through.
Tor knows it's just not happenand so you deny them all.
Speaker 2 (52:05):
In a sense.
So you want to have, you got tohave that knowledge to
explicitly block it or it'sgonna be open, if you didn't
know about it, to go asphysically blue.
Speaker 1 (52:15):
Yeah, not, not just
that, but you have to know what
it is because you're gonna wantto go there when you get into
OSINT, thread intel and thingslike that dark net is where you
should live.
The dark net in the dark webPlease look up the dark web.
There's three layers to theinternet.
There's the clear net, there'sthe dark web and there's the
dark net or deep.
Actually no clear net, deep webin dark net.
(52:37):
Correction the deep web hasliterally no DNS entries out
there.
They do not own Registrar's,they're not on any DNS server.
It is literally by IP,everything is by IP and you need
to know the IP to be able toget into it.
And Then you have the dark net,which is all through torn
proxies and things of thatnature.
So the deep web in the dark netis where you find most of your
(52:59):
malicious information, is whenyou will do a lot of your thread
intel, your OSINT yeah, yourOSINT and in SIGINT and things
like that clear net, the clearweb, google and them catch it
90% of the time before you evenever see it.
A lot of the problems you see,like the people that work for
(53:20):
Google have a lot of mentalhealth issues Because Got you.
So that's the thing.
Well, we got seven minutes left, so before I actually yeah,
seven minutes.
Before we do that, we got let'ssee how many we got in the
giveaway tool 19, 19 entries.
(53:41):
So let me bring this down.
No, come down.
I want a new window and let'sgo back.
I wish I had two monitors here.
Really need a better setup.
So we're gonna do present Sharescreen and we want to share
this.
We want to share, all right,all right, so let's see what
(54:01):
this looks like.
All right works, good for me.
So we have 19 entries forhashtag becoming great.
19, if you want.
I have five of these signed bythe author, cyber arms, or
Daniel Deep Turley I can'tpronounce his last name for life
(54:23):
for me but so I got these and Igot one of these.
What I'm gonna do is I'm gonnado this one first.
So Security testing withraspberry pi is going first.
You have all of ten seconds toput that in.
One, two, three, four, five.
(54:44):
Come on, siri, you're messingwith me.
All right, there it is.
You're done, no more.
Let's go and begin the drawing.
The first one wins theraspberry pi ball.
Security testing with raspberrypi.
Who gets it?
Who gets it?
Who gets it.
Who gets it and Sorry, areInfinite probability, ai.
(55:05):
He wins the first one, homie.
I saw you entered on YouTubealso, so if you win again, I'm
gonna tell you no, you alreadywon once.
That is all homie, that is allyou get.
So you have won.
And you like AI, so it'll work.
You have won this one, meanyou're gonna have a talk.
I know who you are, I'll reachout to you.
So now I got five a basicsecurity testing with Kali Linux
(55:30):
fourth edition, and, yes, theseare all signed by the author.
So let's see who wins thesenext five ones.
So draw again.
Speaker 2 (55:40):
I need one of those
Wow Manifested.
Speaker 1 (55:52):
I'm trying to tell
you our guests a 911 copy of
Basic security testing with KaliLinux fourth edition.
So we got four more.
Speaker 2 (56:02):
Yes, sir.
Speaker 1 (56:03):
Let's go All right.
And the nice thing is theyfixed it, so it pulls your name
out.
So we're gonna draw again.
We got Carrie.
Carrie is now one one of these.
All right, let's draw again.
(56:24):
We're gonna keep it go, keep itgoing.
Speaker 2 (56:29):
Do, do, do, do, do,
do, do do.
Speaker 1 (56:36):
Rakeem ray 마음.
Um, I don't know you, homie,you're gonna have to leave a
comment and I get a hold of meon discord, twitch, facebook,
something.
Please get a hold of me withinthe next by the time Hopefully
by the time this ends.
I've got everything in thedescription how to reach out to
me.
Please reach out to me, becauseI do not know who you are, but
I want you to win this, so thatis number Three, that's number
(56:59):
three.
I got two more.
I that go.
I don't know who you are either.
So, please, you've got until 10minutes after the show ends to
(57:20):
reach out to me, or I'll begiving these away next week.
I really don't care.
Twitch, linkedin, instagram,twitter, facebook I'm all over
the place.
Please reach out to me withyour name.
We will get it sorted out.
Let's go again.
So that's three, right three,or is that for three?
Speaker 2 (57:42):
I Was just asking
myself.
Speaker 1 (57:45):
Actually, no, this is
it.
That's all six.
All six books, if I'm notmistaken.
So we had a Deco, we had Raheem, we had you Octavius, we have
Jack.
Am I missing one?
Infinite, infinite AI infiniteAI won the raspberry pie book,
(58:11):
so I do think I need one more.
Do I need one more?
Everybody Tell me, cuz I lostcount.
Do I need one more, one more?
Speaker 2 (58:17):
Thank you, buddy.
Speaker 1 (58:17):
I Carry was the other
one at one Okay.
Speaker 2 (58:24):
Yeah, that's all five
, yeah.
Speaker 1 (58:25):
All right, let's say
my entries went down to 14.
I know I called six numbers,all right, so we have six books
all given away.
Please get a hold of me.
Let me know, octavius, we aregonna talk.
Oh, I'm still going.
Kev Tech I ain't done yet.
We still got a few minutes forthe top of the hour.
We're still rolling with it,but yeah, so we're gonna go back
(58:48):
to here and we're gonna keep itgoing.
So, everybody, please contactme.
Actually you can contact me,andrea Myler, or Actually
anybody.
If you know anyone in this chat, please get a hold of them and
then get a hold of me or find away.
I want these to be mailed outby the end of next week.
So I will mail them out byFriday of next Friday.
(59:13):
So please get a hold of me,octavius, I know who you are.
Name of books, name of books,name of art.
So the first one Basic securitytesting with Collie Linux,
fourth edition by Daniel doubleW.
I can't pronounce that lastname, but cyber arms at cyber
(59:34):
arms is how to do it.
And then the other one, thatSarin AR one, is this one
Security testing with raspberrypi, which is right up his alley,
because he does, of course, ai,and Raspberry Pi is good with
AI.
So Sarin AR, of course, won thefirst one.
Oh that mother panter.
(59:57):
Twice that pain in my ass.
He's lucky.
I love him.
Speaker 2 (01:00:06):
Right.
Speaker 1 (01:00:08):
There's a bit.
Look everybody.
Please seriously get a hold ofme on LinkedIn under Derek
Schiller Jr, the cyber warrior.
Look me up, you can find it.
Andrea Myler, monawa, bill Lackall these people everybody in
chat knows me.
Please get a hold of them onwhatever platform.
Get a hold of me, we'll figureit out.
(01:00:28):
Otherwise, look, octavius, weare at the top of the hour.
What have you been drinkingtonight?
I gotta ask, cuz I see awhiskey glass.
I gotta know what you'redrinking.
Speaker 2 (01:00:41):
It's a little out
those.
Speaker 1 (01:00:44):
Okay, okay, okay, you
know me, I gotta do my beer.
Me and beer just get along sowell.
But Otherwise, look, if youhave advice for anybody Trying
to get into this field and Iknow you're still working on
getting in and in chat please inchat, go ahead and give your
(01:01:07):
advice as well.
If you have any advice to giveto somebody trying to break him
up, would you say I Would sayDon't just want to get into
cybersecurity.
Speaker 2 (01:01:19):
Do some research on
what you want to do in
cybersecurity, because I thinkit'll speed up the process of
you getting in, because you canhone in all your practice and
learning on that area and justbranch yourself in that area and
get in Studded, being kind ofscatterbrained, and just be
(01:01:42):
relentless and your work ethicand it's cool to be a nerd, it's
cool to study, it's cool toCommit yourself to learning for
the rest of your life, whetherit's for work or for spiritual
development or Any areas in lifethat could benefit from
(01:02:03):
continuous learning.
So, yes, always learn and don'tI mean I don't know people in
different situations, but Iwould say don't be in a rush,
look at a longer scale of timewith what you're doing and
expected.
Work for something to get thereand expect to work to stay
(01:02:25):
there and that's it.
Speaker 1 (01:02:28):
Yeah, definitely.
Look, first and foremost, skullcheers Pros, whatever you want
to say to everybody out there,look, I love you all.
Here's the thing.
Octavia said it best.
All right, you got to work forit, you got to want it, you got
to earn it.
Do your research, understandwhat you're getting into.
Please do not go up to someonethat you wish to be your mentor
(01:02:49):
and say I want to get intocybersecurity.
How do I do it?
Where?
What do you know?
What have you researched?
I don't want you to come at meand be like, oh well, I want it
for the money.
Cool, you're never gonna findwhat you enjoy that way.
But all right, we'll go with it.
But I love you all.
(01:03:09):
You have all been amazing.
Again, before I go, from now on,super chats are at the bottom.
You can also go to any video.
There are ways to give thanks,there are ways to donate to the
cause.
It's all in the descriptionbelow, as well as in the live
chat.
I love you all.
Take care, enjoy yourselves,have a fantastic weekend.
And one more thing, octavia'swhile you're here, we have one
(01:03:32):
more week of men's mental healthawareness month.
I want to say to you and to anyother men in chat.
I'm taking this beyond a month.
We're gonna start doing thismore frequently, more often.
If you need someone to reachout to, please reach out to me.
I am here for everybody.
Burnouts real.
Mental health is real.
All these issues are real.
They're not going away anytimesoon.
It's going to take a hugechange in a huge ship.
(01:03:52):
So if you need to talk tosomebody, please reach out to me
.
I will always here for whoeverneeds it.
Otherwise, look, I love you all.
You're all my warriors, you'reall my family and I will see you
next week with another amazingepisode of security.
Happy out, you.