Empirical Training
Empirical Training
  • Видео 361
  • Просмотров 264 837
How to Find Anyone Using OSINT!
AJ talks through what open source intelligence is and how you can use it to protect yourself online!
---------------------------------------------------
Looking to start your journey into a cybersecurity career?
Please go to our FREE membership site below 👇 which is hosted on Skool.com.
www.skool.com/cybersec/about
What's included:
- Access to Zero-to-Senior Security Analyst pathway course
- Access our “What skills are required for cybersecurity? course
- Network of likeminded individuals and industry experts to help you on your path
- Information on Cyber Security job roles and pay scales
- Access to monthly Q&A sessions
- Regular Updates on the latest Cyber Security News and Trends
- Huge discoun...
Просмотров: 128

Видео

Play Ransomware Group | EP025 | CyberSpace
Просмотров 2112 часов назад
Josh is alone and on the road supporting security teams in south east Asia with incident response exercises. In our first solo episode, Josh dives into the Play ransomware group who recently overtook LockBit as the most prevent ransomware family reported in breaches. Find out more about their tactics, why they are called Play, and suspected links to other ransomware families. Comment below what...
EASY Cyber Security Projects to Get Hired!
Просмотров 177День назад
This week AJ shows you the cybersecurity project he used to get his most recent job! Looking to start your journey into a cybersecurity career? Please go to our FREE membership site below 👇 which is hosted on Skool.com. www.skool.com/cybersec/about What's included: - Access to Zero-to-Senior Security Analyst pathway course - Access our “What skills are required for cybersecurity? course - Netwo...
Get a cybersecurity job with zero experience
Просмотров 23День назад
So this is our free cybersecurity community but it is much more than that! This is what you get: 1️⃣ Currently we have a free pathway course in there to teach you how to build your own pathway towards becoming a cybersecurity analyst. 2️⃣ We also have some certification guides, which are courses that can help you pass some of the most well known certifications in the industry. 3️⃣ We also have ...
Breach Headlines from Verizon DBIR | EP024 | CyberSpace
Просмотров 20День назад
The Verizon Data Breaches and Incidents Report (DBIR) is our hosts favourite cyber security report. The 2024 edition compiles insights from over 10,000 real world breaches with insights that help security novices to experts. Josh talks Robbie, SOC consultant and leader, through the key findings to see how his lived experience matches up with the key findings in the data. Looking to start your j...
Malware Analysis Made Easy: A Quick Guide
Просмотров 7314 дней назад
AJ shows us some ways to peform malware analysis with three different methods. Looking to start your journey into a cybersecurity career? Please go to our FREE membership site below 👇 which is hosted on Skool.com. www.skool.com/empirical-training-cyber-t1-4113/about What's included: - Access to Zero-to-Senior Security Analyst pathway course - Access our “What skills are required for cybersecuri...
How to get a cybersecurity job with zero experience!
Просмотров 8414 дней назад
How to get a cybersecurity job with zero experience!
British Library Ransomware Breach pt. 2 | EP023 | CyberSpace
Просмотров 6414 дней назад
Incident response specialist Andrew Jones dives deeper into the attack sequence of the Rhysida Ransomware family on the British Library, where sensitive data was exfiltrated and leaked on the dark web with countless machines encrypted or destroyed. Host Josh Davies shares details, and fills gaps, in the British Library breach report for an in depth analysis of exactly what happened and how futu...
How to spot any Fake Emails (Ultimate Guide)
Просмотров 8721 день назад
In this video, AJ shows you how to analyse malicious emails! Looking to start your journey into a cybersecurity career? Please go to our FREE membership site below 👇 which is hosted on Skool.com. www.skool.com/empirical-training-cyber-t1-4113/about What's included: - Access to Zero-to-Senior Security Analyst pathway course - Access our “What skills are required for cybersecurity? course - Netwo...
British Library Ransomware Breach pt. 1 | EP022 | CyberSpace
Просмотров 2421 день назад
Josh is joined by Incident Response specialist Andrew Jones, to go through the British Library's cyber incident and lessons learned review. Josh shares the impact of the attack, key timelines, and incident response process while AJ reacts with insights into the realities of real world cyber security incidents, and the lessons business and individuals can take away from this ransomware compromis...
SOC Analyst Masterclass | EP021 | CyberSpace
Просмотров 70Месяц назад
SOC Analyst Masterclass | EP021 | CyberSpace
This cybersecurity project got me a job!
Просмотров 556Месяц назад
This cybersecurity project got me a job!
How to get into Cybersecurity with Zero Experience
Просмотров 113Месяц назад
How to get into Cybersecurity with Zero Experience
Scam Stories from the Wild | EP020 | CyberSpace
Просмотров 60Месяц назад
Scam Stories from the Wild | EP020 | CyberSpace
What is DevSecOps? With CyberCharlie | EP019 | CyberSpace
Просмотров 44Месяц назад
What is DevSecOps? With CyberCharlie | EP019 | CyberSpace
Politics to DevSecOps with CyberCharlie | EP018 | CyberSpace
Просмотров 54Месяц назад
Politics to DevSecOps with CyberCharlie | EP018 | CyberSpace
From Counter Terrorism to Threat Researcher | Morgan Demboski | EP017 | CyberSpace
Просмотров 782 месяца назад
From Counter Terrorism to Threat Researcher | Morgan Demboski | EP017 | CyberSpace
How Defenders Use A.I. | EP016 | CyberSpace
Просмотров 222 месяца назад
How Defenders Use A.I. | EP016 | CyberSpace
Beware of this Discord Scam: How to Stay Safe
Просмотров 712 месяца назад
Beware of this Discord Scam: How to Stay Safe
3 websites to find a cybersecurity job
Просмотров 672 месяца назад
3 websites to find a cybersecurity job
How Hackers Use A.I. | EP015 | CyberSpace
Просмотров 352 месяца назад
How Hackers Use A.I. | EP015 | CyberSpace
How to Detect Mac Viruses Easily in 5 steps
Просмотров 5352 месяца назад
How to Detect Mac Viruses Easily in 5 steps
Security Analysts of the Future with Dr. Stanger | EP014 | CyberSpace
Просмотров 642 месяца назад
Security Analysts of the Future with Dr. Stanger | EP014 | CyberSpace
Get a Cybersecurity Job with no Experience
Просмотров 9 тыс.2 месяца назад
Get a Cybersecurity Job with no Experience
Bridging Cybersecurity Gaps with Dr. Stanger | EP013 | CyberSpace
Просмотров 572 месяца назад
Bridging Cybersecurity Gaps with Dr. Stanger | EP013 | CyberSpace
Top 5 Tips: Secure Your iPhone from Theft
Просмотров 7 тыс.3 месяца назад
Top 5 Tips: Secure Your iPhone from Theft
What is a XSS Attack?
Просмотров 7793 месяца назад
What is a XSS Attack?
Cop Turned Physical Pentester | EP012 | CyberSpace
Просмотров 283 месяца назад
Cop Turned Physical Pentester | EP012 | CyberSpace
Intern to Cybersecurity Security Researcher! James’s Story | EP011 | CyberSpace
Просмотров 1163 месяца назад
Intern to Cybersecurity Security Researcher! James’s Story | EP011 | CyberSpace
Top Tips on the Best Ways to Break into the Cybersecurity | Shane Williams | EP010 | Cyberspace
Просмотров 503 месяца назад
Top Tips on the Best Ways to Break into the Cybersecurity | Shane Williams | EP010 | Cyberspace

Комментарии

  • @abdlmutii
    @abdlmutii 2 дня назад

    Join?

  • @Sampleaccount-yw4el
    @Sampleaccount-yw4el 5 дней назад

    should I delete: daemon , nobody, root ?

  • @MyLifeJournyes
    @MyLifeJournyes 6 дней назад

    JOIN

  • @Mystery_uncut
    @Mystery_uncut 7 дней назад

    Very informative💪🏾🔥..you’ve got ursef a new subscriber here😁 ..pls can you make a video on how to integrate suricata with elastic siem so we can understand how to play with the logs gotten from the network traffic ..thank a lot for the video 🥂

  • @Elliot_alien
    @Elliot_alien 7 дней назад

    Hey bro you got a new subscriber ❤

  • @teja8298
    @teja8298 10 дней назад

    Great project and very informative information 🔥🤍

  • @Bluestripsenclavelove
    @Bluestripsenclavelove 11 дней назад

    Why would you use a Mac???

    • @Codsworth_
      @Codsworth_ 11 дней назад

      Some people prefer Apple's music and video editors. But that's about it from what I know, not worth it imo.

  • @AngeeLopez-th5ls
    @AngeeLopez-th5ls 15 дней назад

    Hi, writing from Panamá asking for help with my situation. All iPhone os hacked (Apple ID, apps, email, password, photos). Technical service told me it is only with Apple Us, that can solve the hacking. But even calls are diverted nor have I been able to communicate to Apple or through the website. Could someone give me a hand on what other option I have to be able to solve this in some way and not lose it after only 5 months of having it? Thanks for this

  • @ThunderChaosX
    @ThunderChaosX 18 дней назад

    Thanks❤

    • @empiricaltraining
      @empiricaltraining 18 дней назад

      You are welcome! Please do join our free community if you wanted to chat with us 😀 -AJ

  • @jonjohn2003
    @jonjohn2003 19 дней назад

    Onion 🧅

  • @lolous-studio
    @lolous-studio 21 день назад

    You don't need AVAST or whatever

  • @7858ben
    @7858ben 21 день назад

    You should at LEAST check task manager, scanning your pc is not enough dude make sure you learn your stuff before making tutorials

    • @Nero1702.
      @Nero1702. 21 день назад

      Scanning your pc in 90% of situations is probably enough, in fact windows defender is honestly really all you need. If you truly are paranoid you can check task manager / download malware bytes for a spot check but, windows defender is fine the majority of the time.

    • @empiricaltraining
      @empiricaltraining 18 дней назад

      Maybe check out our other videos first. Each video we post shows some of the indicators and areas to look into for a possible compromise of a Windows machine -AJ

  • @Kingchez.
    @Kingchez. 21 день назад

    Why has bro got windows on a Mac

    • @lolous-studio
      @lolous-studio 21 день назад

      Virtual Machines

    • @Kingchez.
      @Kingchez. 10 дней назад

      @@lolous-studio oh yeah I forgot cool I’ll try it

  • @cromagnumveritas4209
    @cromagnumveritas4209 22 дня назад

    Thanks for the TIPS!

  • @BFF-zb1qn
    @BFF-zb1qn 23 дня назад

    thanks you

  • @jantinath6384
    @jantinath6384 23 дня назад

    Onion

  • @AbdulRahmanShafi
    @AbdulRahmanShafi 25 дней назад

    Fake dude

  • @PaladinGMS
    @PaladinGMS Месяц назад

    Question so you did mention Red hats and blue hats ,I’m actually taking a cyber security course at the moment Becauese i really want to learn Ethical hacking ,does a Ethical hacker fall in the same category as a blue hat or a red hat ? And also do Ethical hackers do the same job roll as cyber security analyst is it all the same thing such as job rolls or no ? 🤔

    • @empiricaltraining
      @empiricaltraining 25 дней назад

      Ethical hackers are red teamers. They do different jobs from blue teamers and try to attack the applications and systems where as the blue teamers defend! -AJ

  • @chrismadden22
    @chrismadden22 Месяц назад

    What would be the simpliest entry level job title in cybersecurity ?

    • @empiricaltraining
      @empiricaltraining 24 дня назад

      I think it is a cybersecurity analyst as that is where I started! -AJ

  • @Jayden0161
    @Jayden0161 Месяц назад

    Guess what im building one 😉

  • @vrxxx1262
    @vrxxx1262 Месяц назад

    There’s no substitute for Business/IT duo degrees. 🤦🏾

    • @empiricaltraining
      @empiricaltraining 24 дня назад

      Yeah I think certifications and projects can beat that -AJ

  • @W1HURI
    @W1HURI Месяц назад

    Thanks bud

  • @ZaquanCamp
    @ZaquanCamp Месяц назад

    Yall not telling us how to get started like actually showing us where you went to fill out the application yall showing us how to do the work which is great but how do we get here do we have to own our own desktop and what application do we fill out can yall provide that information please.... Please please please

    • @empiricaltraining
      @empiricaltraining 25 дней назад

      Yeah go to the link in the video description and we have a free community and course which will explain this 😀 -AJ

  • @varma9114
    @varma9114 Месяц назад

    Bro can you post a soc analyst course @Empirical Training 💬👀🤝

  • @MoisesVargas-kp3er
    @MoisesVargas-kp3er Месяц назад

    thank you so much, i'm need this information actually. I'm from Brazil, but i want a US carrer. Can you say how much SOC analyst entry-level gain, and talk about the routine of them.

    • @empiricaltraining
      @empiricaltraining 25 дней назад

      Hey, it’s hard to say how much they will earn, it all depends on where you get a job -AJ

  • @shunaamtaran9672
    @shunaamtaran9672 Месяц назад

    These are some scary stories 🤣🤣🤣

  • @user-lq5zk4vh9x
    @user-lq5zk4vh9x Месяц назад

    I could not find an example of your trifecta online. Per Forbes "The Trifecta Of Cybersecurity: Threat Intelligence, Security Validation And Expert Services." You say no experience, but you had an IT degree and help desk experience. Totally different than the video title, in my opinion.

  • @cranglin3096
    @cranglin3096 Месяц назад

    I finish my google cybersecurity course last month

    • @nilutpalbose
      @nilutpalbose Месяц назад

      hows your experience in m planing to start this month

    • @empiricaltraining
      @empiricaltraining 24 дня назад

      Go to the free cybersecurity analyst course in the video description! -AJ

  • @gilfernando7623
    @gilfernando7623 Месяц назад

    All he is saying is garbage. He is irrelevant things people already know

    • @empiricaltraining
      @empiricaltraining 24 дня назад

      This makes no sense. I have worked in cybersecurity for the last 8 years so I would say it is relevant. -AJ

  • @rizwanfarooq-gf1no
    @rizwanfarooq-gf1no Месяц назад

    I've been in cloud computing for 2 years now. Mainly dealt with aws since the beginning. What should I do in that case? I've heard going for the security+ cert & then going for aws security specialist to help... What sort of role should I look for?

    • @user-lq5zk4vh9x
      @user-lq5zk4vh9x Месяц назад

      If you are already in cloud, go for cloud security! Legacy (Non Cloud) Engineers can't even get into cloud!

    • @empiricaltraining
      @empiricaltraining 24 дня назад

      Yeah I would say go for the AWS security specialist and apply for Cloud Security jobs! -AJ

  • @TechDripX
    @TechDripX Месяц назад

    Thanks for sharing your expirence!

    • @empiricaltraining
      @empiricaltraining Месяц назад

      You are welcome! We have a cybersecurity community if you were interested in joining?

  • @OnceUponaTimeIn-qp9sx
    @OnceUponaTimeIn-qp9sx Месяц назад

    3.5 million unfilled jobs for experienced professionals. But they should narrow that down for entry level positions.

    • @empiricaltraining
      @empiricaltraining Месяц назад

      Cybersecurity isn’t really a entry level industry. We think analysts are the most entry level but you still need a solid set of skills to get in -AJ

    • @ultravioletiris6241
      @ultravioletiris6241 Месяц назад

      @@empiricaltraining I wish people would be more specific when they throw around things like “entry level” and “skills”. I know experienced people who cant learn new things for sh$$, and by the same token I know some EXTREMELY skilled college students looking for their first internship. Unfortunately there are no cheat codes to breaking into cyber - by the same token there are no cheat codes to determining how skilled someone is going to be in their job. In the USA children are often taught not to “judge a book by its cover” for this exact life lesson.

    • @empiricaltraining
      @empiricaltraining Месяц назад

      @@ultravioletiris6241 yeah I agree it all depends on the person but you can clearly see how skilled someone is in an interview if you ask them to perform the task required to do the job -AJ

    • @ultravioletiris6241
      @ultravioletiris6241 Месяц назад

      @@empiricaltraining If it were that simple, everyone would be doing it.

    • @empiricaltraining
      @empiricaltraining Месяц назад

      I think sometimes people don’t put in enough work. Because it’s clearly possible to get into cybersecurity but it’s just knowing the right pathway and sticking to it. I failed about 30 interviews until I finally got accepted -AJ

  • @Soulhealer1111
    @Soulhealer1111 Месяц назад

    So how do I get someone off my phone who hacked it by adding a ghost eSIM to it with my own number??

  • @DartmoorPaul
    @DartmoorPaul Месяц назад

    It’s a feature that I turned on my iPhone 12 but a word of warning if you then trade it in, when you have to Turn Off “FindMy” the Apple Store will tell you, possibly, to come back in an hour as that’s how long it takes with this feature turned on. Thankfully though the person that served me had a way around it via my iCloud account in store. Just a caution 👍

  • @user-ul1ku1ds9d
    @user-ul1ku1ds9d Месяц назад

    Listen you may not need a degree but you have to have the certifications. At least security plus and. Network plus. If you don’t it will take you forever a job in cyber. Yes there are a lot of openings but they will stay opened with certs. I am finishing up on my first and doing my second. My mentor has been in cyber for 20 years and getting me a job after I am done with my second cert. good luck and ai hope you all get into the field…it will only be growing and growing and with AI more and more cyber security specialist will be needed. Something like 8 million openings by 2025. That’s not to long away. The certs cost around 500 to 2200 depending on what type you choose teaching wise. Use Comp Tia and they will get it done for you. Also there are free study guides live online so you don’t need the expense live class lessons that cost 2200 bucks. Let your path by glorious and filled with happiness.

  • @The_cyber_vampires
    @The_cyber_vampires Месяц назад

    I have wanna cry 💀

  • @tnaplastic2182
    @tnaplastic2182 Месяц назад

    Nah, wasn't NK.

  • @TheAwillz
    @TheAwillz Месяц назад

    First Welsh cyber security video I’ve seen. Good luck mate!

    • @empiricaltraining
      @empiricaltraining Месяц назад

      Much appreciated! If there are any videos you want to see, let me know -AJ

  • @Roadsiderevelationsnyc
    @Roadsiderevelationsnyc Месяц назад

    Network +, Security + , AZ-900, Splunk. Get a project done , GitHub Start applying

  • @TheITCornerbyJR
    @TheITCornerbyJR Месяц назад

    Good Stuff man. ✌🏽😎

    • @empiricaltraining
      @empiricaltraining Месяц назад

      Much appreciated! If there is any content you'd like to see, let me know :D

  • @chiranjibtarafdar9685
    @chiranjibtarafdar9685 Месяц назад

    Hello Dear Sir, How are You? I Saw Your Content Very nice. But I Saw your video SEO score is very low so that Video Engagement is Very Low. For Growing your Channel and Increasing Video Views, likes, and Organic traffic, Perfect Video SEO is very Important. Also, Lots of Problems with Your Channel if You Give me a chance I Can Solve It.I am waiting for your reply. Thanks a lot.

  • @Fabi-uc3gb
    @Fabi-uc3gb Месяц назад

    If ur on windows just keep your firewall on, use an anti virus prefarebly avg, avira or eset, dont Download random stuff, bewarr of file extantions like .cmd .bat .vbs .exe .sys, dont join unknowm Websites, check your ip traffik and use or code tools that check your system or note when you system starts. Also check for windows backdoors. Also do reguarly scanns. Also save your data. If you have malware what do i do? Thats a good question It always depends on the malware Most malware like viruses and trojans can be removed with anti viruses and start in save mode. Spyware and keyloggers can be removed with anti spyware tools Ransomwares and Rootkits are almoust impossible to remove Worms are also very hard to remove and you should inform your contacta and imediantly turn off your wifi But 99% of All malware you can get rid of with a system reset What anti virus should i use and why? You should use 1 or 2 of These anti viruses: Avg It has a great 0 day exploid protection Avira The best anti virus in my opinion Eset Great Internet Security Please dont Download anti viruses while Downloading another Programm. Please Download them from the real Website.

  • @prasanamad4645
    @prasanamad4645 Месяц назад

    Bro i have a question?

  • @airwaffle
    @airwaffle Месяц назад

    how can i get an ip adress in the first place?

    • @JudeAlex1912
      @JudeAlex1912 Месяц назад

      Use cmd, angry ip, nmap. For cmd you could do arp -a or ipconfig /all. For nmap, input your ip for example 1.1.1.0/5 and that will scan around 4000 hosts.

  • @Theresa1057
    @Theresa1057 Месяц назад

    :(

  • @Bugplanet8840
    @Bugplanet8840 2 месяца назад

    the four most-used passwords are: love, sex, secret, and... god.

  • @tfyeboah
    @tfyeboah 2 месяца назад

    Nice to meet your team

  • @Poison2859
    @Poison2859 2 месяца назад

    And what can I do with this information ?

  • @paultrewin5871
    @paultrewin5871 2 месяца назад

    My iphone does not have a heading "face ID and passcode" in settings. Why could this be? I do have face ID set up

  • @nickpmusic
    @nickpmusic 2 месяца назад

    Very informative video. Good tips.