How do you get started in Cybersecurity in 2022? John Hammond shows us the way.
// MENU //
0:00 ▶️ Introduction
0:48 ▶️ First thing to learn
3:55 ▶️ Do something else before that?
5:10 ▶️ Any recommended resources
6:34 ▶️ Still recommend CTFs?
9:30 ▶️ Degrees and certs required in cyber
12:04 ▶️ Recommended certs
16:10 ▶️ This sounds scary... any other certs first
18:10 ▶️ Difficult to answer
19:05 ▶️ Don’t forget this!
20:00 ▶️ David pushing John for a path
21:20 ▶️ What John wishes he knew when he started
22:40 ▶️ Do what you love
John Hammond Playlist:
// Connect with David //
Discord:
Twitter:
Instagram:
LinkedIn:
Facebook:
TikTok: @davidbombal
YouTube:
// Connect with John //
YouTube:
Twitter:
LinkedIn:
// OSCP from Offensive Security //
// GO by example //
// Hack The Box //
HTB Academy:
HTB:
// Try Hack Me //
// Pico CTF //
// MY STUFF //
Monitor:
More stuff:
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@
cybersecurity
cybersecurity jobs
hacking
ethical hacking
hacking jobs
john hammond
hack the box
try hack me
pico ctf
htb
thm
cyber security career
cybersecurity
cybersecurity careers
ceh
oscp
ine
elearn security
ejpt
oscp
oscp certification
ctf for beginners
first job
cybersecurity job
kali
kali linux
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#kalilinux #hacking #cybersecurity
1 view
144
55
9 months ago 01:41:29 1
Le monde et nous. Avec Christine Cotton, biostatisticienne experte pour l’industrie pharmaceutique.
10 months ago 00:53:38 1
Defense Against Cyber Attacks and Other Threats | 60 Minutes Full Episodes
11 months ago 00:26:34 1
So können Handy und Laptop heimlich zuschauen: Unsere App zeigt wie es geht.
1 year ago 00:00:06 1
They knew what they were doing💀
1 year ago 00:00:06 1
True or false💀
1 year ago 00:33:44 1
Best Hacking Laptop 2023
1 year ago 00:27:16 1
Top Hacking Books for 2023
1 year ago 00:07:14 1
Apple’s Unfixable Vulnerability - ThreatWire
1 year ago 00:30:39 1
Прохождение Linux-машины средней сложности SANDWORM HackTheBox | КАК ПРОЙТИ
1 year ago 00:05:34 1
ThreatWire 2024 03 15
1 year ago 00:19:00 1
Best VPNS of 2024 - Do Not Buy Without Watching This Video!
1 year ago 00:12:48 1
Удаленная работа 2022-2023 | Профессии, которые будут актуальны в следующем году
1 year ago 00:35:33 1
How does Computer Memory Work? 💻🛠
1 year ago 00:59:15 1
Palestine to Ukraine: Redefining feminist internationalism
2 years ago 00:31:09 1
How to use Recon-ng : like a Pro !⚡⚡💹
2 years ago 01:16:34 3
Controlled Banking System Demolition? Whitney Webb on CBDCs, WEF & Internet Privacy, CEO Jamie Dimon
2 years ago 00:01:18 11
SWAG Microsoft Most Valuable Researcher 2022 (MSRC SWAG BOX MVR 2022)
2 years ago 00:33:05 1
Using IAST to Unlock the Benefits of DevSecOps • Jeff Williams • YOW! 2022
2 years ago 00:19:07 1
Robot que se expl0t4 sí mismo | Inteligencia Artificial es consciente y sabe que está siendo probada
2 years ago 10:44:10 2
🔥 Artificial Intelligence Full Course 2022 | AI Full Course | AI And ML Full Course | Simplilearn
2 years ago 00:25:22 1
2022 Cybersecurity roadmap: How to get started?
2 years ago 00:19:30 1
Как удалить Linux, оставить Windows на компьютере и восстановить UEFI загрузчик
2 years ago 11:43:38 1
Cyber Security Full Course 2022 | Cyber Security Course Training For Beginners 2022 | Simplilearn