A big shoutout to TCM Security for sponsoring this video. Register now to receive a 50% discount on your first month at the TCM Security Academy, potentially making your most significant step toward a career in ethical hacking. Go here: davidbombal.wiki/3vQsqWm Farah works at Meta and shares her amazing story of going from studying mass media, to hacking and now working at Meta. Did you know that Facebook and Meta have a bug bounty program that allows you to legally hack them and get paid? Go here: facebook.com/whitehat // Farah Hawa’s SOCIAL// RUclips: www.youtube.com/@FarahHawa LinkedIn: www.linkedin.com/in/farah-hawa-a012b8162/ X: x.com/farah_hawaa Instagram: instagram.com/farah_hawaa/ // Resources REFERENCE // RUclips videos: 2023 Path to Hacking Success: ruclips.net/video/KXQ_MUe6wKo/видео.html Bug Bounty: Get paid to hack PayPal and TikTok // Featuring Nahamsec: ruclips.net/video/9vaEwycet90/видео.html My updated bug bounty resources: ruclips.net/video/ig5DuM6M2CQ/видео.html RUclips channels: thenewboston: www.youtube.com/@thenewboston Websites: hackerone: www.hackerone.com/ hacker101: www.hacker101.com/ Burp Suite on PortSwigger: portswigger.net/support/burp-suite-software-faqs PortSwigger Web Security Academy: portswigger.net/web-security Firefox Source Docs: developer.mozilla.org/en-US/ Pentester Land: pentester.land/ Infosec: infosec-conferences.com/ Vickie Li Blog: vickieli.dev/ Subfinder: github.com/projectdiscovery/subfinder Sublist3r: github.com/aboul3la/Sublist3r Frida: frida.re/ Meta Bug Bounty Program: facebook.com/whitehat Books: Real World Bug Hunting by Peter Yaworski USA: amzn.to/3JmRven UK: amzn.to/4d3S5M0 Bug Bounty Bootcamp by Vickie Li USA: amzn.to/3xGa4rz UK: amzn.to/49PwPa0 // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal RUclips: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming Up 02:33 - Sponsored Section 04:36 - Intro 05:08 - Farah's Early Life 05:45 - Studying Mass Media 06:58 - Interning for Experience 08:21 - The Value of a CEH Certification 10:00 - Why Cyber Security? 10:35 - Getting a Job in Cyber Security 11:44 - Creating Content 13:30 - Does Social Media Open Doors? 15:28 - Starting Bug Bounty 17:28 - From Unpaid Internship to Paid Internship 18:09 - How long does it take to get into cyber security? 19:20 - Programming Languages to Learn 20:21 - Working at Meta 21:07 - Advice to Someone Starting Today 22:10 - The Value of CTF 22:58 - What's Hot Right Now? 23:48 - Blueprints for Starting 24:29 - Recommended Books 28:10 - When did Farah Start? 30:41 - How to do Bug Bounty for Meta & Facebook 31:18 - Common mistakes and how to avoid them 33:21 - Why Farah stopped Posting on RUclips 33:59 - Experience moving from India to London 34:55 - Work/Life Balance 35:34 - Relocate or Work from Home? 38:47 - Returning to India or staying in London 39:52 - Vickie Li's Blog 41:24 - Dealing with the Imposter syndrome 44:50 - Take people through your journey 45:35 - Mistakes to Avoid 47:01 - Getting started after graduating high school 50:01 - Does one need a degree? 52:07 - How to start with no funds 53:08 - Favourite tools 54:27 - AI trends to jump on 56:42 - Conclusion 56:58 - Outro cybersecurity whitehat burp burpsuite portswigger hackerone hacker1 hacker101 hack hacker hacking facebook meta vr oculus quest bugbounty web app hacking cyber infosec information security xss xss attack xss vulnerability xss vs csrf attack xsssa facebook xsssa kali linux penetration testing ethical hacking bug bounty cross site scripting cross-site scripting red teaming cyber security ethical hacker javascript ajax jquery node js node js hacking portswigger Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #facebook #hack #hacking
Hi David I have a problem I suspect my neighbour has been hacking my WiFi security camera for a year now.. and now my WiFi has been getting disconnected a few times now I use an iPhone 6s recently updated. To go online RUclips check my mining ect ect recently they have been now showing my WiFi network names but on their hidden network I proved this to myself by using aircrack to un hide their hidden network and link their bssid to the hidden network showing my network names I've used for months now . I questioned them recently and they flat out denied it but I have photos proving it showed them too and still denied it . I know my bssid and now my neighbours hidden bssid . I have 2 networks on my router 1 hidden and 1 not the one thats hidden is wpa2 aes and the not hidden is on wpa3 personal. Today they showed many of my network names I could only unhide a couple at a time using a laptop and 2 WiFi cards . My top question after this rant is if my neighbours bssid shows my hidden network name with in their hidden WiFi does that defo confirm they are using kali linux I only have 2 neighbours and in the middle of a field no traffic really close by
Also like to add is their a possibility that they had their router hacked by someone mobile and a laptop . That keeps messing with their WiFi showing my hidden WiFi names on multiple hidden networks. On their router. Or is it possible a hacker could ssh to their router miles away doing this? Is it possible for the remote hacker to view my networks from the person in question from their router I don't think a router can actually see other WiFi networks near by am I correct only a WiFi card or USB WiFi dongle ect could do this proving my neighbour is hacking my WiFi and showing all my hidden networks I've used over 4 months at least .sorry for the rant i.m 51 years old and have decades of pc experience mac Windows Linux and for 4 years solid use of kali linux and recently kali purple which I need to study more and experiment with I'm not really a hacker and not interested being a hacker more a tool to understand how kali works and what I can do to lesser my chances of being hacked local or proximity.. many thanks David great channel been a fan for a while now always watching your videos has helped me in so many ways such a deep deep subject with many levels of complexity
I was really impressed by the fact that a person with no traditional education in tech is miles ahead of techies with traditional degrees.Subscribed to her channel.She has my respect !
I am yet to see any hands-on person with degree(s) in tech who didn't learn stuff on their own. The university is mostly for networking and bragging rights. From the Ivies to any "University of Nowhere", if one doesn't learn stuff themselves they can't do stuff after obtaining that expensive piece of paper.
Why is it a surprise? Traditional learning doesnt always convert to success when applying that knowlegge. When I was working in a small garage like company, my boss asked a Milk delivery guy to join the company for extra bucks just to help him earn a living. our company also had limited budget. In 3 months the delivery guy turned programmer started picking up coding and he fared better than the rest of us traditional Computer degree holders. In10-12 years he became the VP of a Tech giant in India. This is how programming world is. Here you never know who HAS the skill. Some start seeing the World as a Matrix with 1s and 0s and the rest of me are still seeing it as it is.
this is the field of someone with passion and curiousity shine, nothing related to degree, many people with degree made that desicion when they didn't actually know what to in early age, whoever know their passion at young age and all-in are lucky.
"'Don't overthink what you have done in the past or what you want to do but if you really want to do cyber security then there are ways for you to get in doesn't matter your background " the best line ever in this interview
at 56:00 , i too appreciate how you ask the same questions to different people and get different responses. It's interesting to see different perspectives
I agree. I get experience by being more "hands-on" from my own "guinea pig" lab setup, via H1 Bug Bounty platform, etc in my own company. I also agree with how she works with another company as META, but also has her Security Researcher stuff she does on her own. I do my Security Researcher stuff part of the time, while the regular job as a Field Technician I'm allowed and privileged to work with much emerging technologies from Amazon. I relate to her and both of you resonate with me. Even though I had a degree from college in IT, my experience and knowledge from Security Research came from "hands-on " setup of my own devices (ie phones, laptops, tablets, etc) to practice on via Kali, course and knowledge from IEEE , but now also incorporating A.I. in my efforts. Live the interview, questions and answers💻🤓👍🏾.
@@ASa-cg8hx it's not about the creator dude, it's actually not their fault, because in most foreign countries they believe Kashmir is not our part, it's about awareness
Loved this interview, I will ask my teenage children and young ones to listen this interview for informed decisions they need to take for career development plans. Thanks for inviting Farah , she is a great inspiration.
I have the opposite experiences I worked for two company that didn't pay me and it ended biting me in the butt because most company told me they were looking for real experience, meaning paid position. I am working on bug bounty on the side right now and trying to make videos as well!
I am a pentester and Red teamer from India now in Germany. I started as a network engineer, then worked as GCP admin, then landed my first job as pentester. Now I work in Airbus. It took me 2+ years to land on my first job as a pentester after getting my first job as Network engineer. It was hard. Studying everyday and being consistent. It was a fun ride and totally worth it.
Reverse engineering an apk, yes, that can provide much fun. I could connect to and read out stats from hire e-scooters while someone was riding it. You could also send a packet to reset the scooter. It was fun while it lasted, and all you needed was a mobile phone with the correct app once you'd found out the packets required.
Incredible! Makes me to continue to work in IT! When I was a teenager, I was look up on notepad commands that from tricks to dangerous code to understand how it work. Plus, I still have the book of how computers work in hard copy and PDF along with how to install and operate earlier versions of Kali Linux Edit: Thank you David and keep it up!
Just FYI the reason people say you shouldn't do unpaid internships isn't primarily for the person working, although it is also for them. But it hurts society by taking away opportunities for less wealthy but more capable people. It's more a problem of the organization "offering" the free internship. The person who takes the free internship of course benefits, if they ensure they are getting skills and connections, but they might be edging someone else out who is actually more deserving of the role and just not wealthy enough to afford to not make money. Sounds insulting to her, not intended, but that is the root problem with anyone offering or accepting free internships.
Hi David, I have been your subscriber for quiet long and loved watching it. Gained a lot of knowledge. After watching Farah's interview. I would ask the same question which you asked, a person who doesn't have any knowledge in Cyber Security, what are the steps he/she should take to a good job in cyber security. Doing Graduation (MSc in Cyber Security) at the moment but believe me I'm not going to name the Uni, not a proper track has been taught or any information I have gained to get a job in Cyber Security. Honestly a proper guideline is not available, it is so much scattered now. Please, I will be waiting for your answer if you can speak to Farah again or any point based guidance. Many thanks.
Your videos are fascinating, and awesome! Even though I’m not a hacker. I am a computer enthusiast, part-time and always interested in way things work. As people rely more and more on the systems, they have to have knowledge about thei vulnerabilities. Your car hacking one was awesome. I’ll never buy a new car again.😂
Thank you, but you probably shouldn't stop buying a car because of hacks like that. Sam is one of the good guys. Agreed - the world runs more and more on tech and we need people like Farah and Sam to better protect us.
@@davidbombal Being they are incorporating remote shutoff and DUi monitoring in 2026, 2025 is my last year. After that I will rebuild. I do mechanical work tinkering on cars like you people tinkering with hacking. Same interest on how things work. And thank God we have good guys like you people!
Its actually terrible that how work flows and credentials influence the other - cyber security and usual order is an edge case. 11:02 But the one thing that we learned is application and deviation is common so on average - if you want to be in cyber security... Pursue something else first(!) I wonder if this is a security caveat or cyber paradigm.
i am just pass 10th and i have 3 months free time and i learn cehv12 lab manual pdf which is free and i am in chapter 6 it is good or i learn another book
My only guess is that most software engineers create digital assets whereas Ethical Hackers tell you where you need to invest more time and money to bolster security and from a companies perspective, they aren’t too willing to invest in that as much. Just my take and it’s not worth much lol
Ngl these things affect my confidence i'm happy for her as she's young but I'm almost 30 and wanted to switch to this field but seems like it may not be able to as it's too late and i'm also not bright enough.
imagine yamm meta report go through this lady ,it will be a complete abomination ,I've been following yamm and his articles/tweets overlong time .the level of thinking and sophistication he provide only few people on this planet can do that.
In London is a bad weather??? who said that cloudy it is a bad weather? Great weather the same is here in Seattle it just weather! do not like rain and clouds= Move
11:45 for any Gen Z'er who doesn't want to be a "content creator", you can get a job via other means as well. Just start with IT Servicedesk in a large organisation and get acquainted with the cybersec team there. They will start to notice that you know how to handle cybersec tickets and when to resolve them yourself or when to inform that team.
A big shoutout to TCM Security for sponsoring this video. Register now to receive a 50% discount on your first month at the TCM Security Academy, potentially making your most significant step toward a career in ethical hacking. Go here: davidbombal.wiki/3vQsqWm
Farah works at Meta and shares her amazing story of going from studying mass media, to hacking and now working at Meta. Did you know that Facebook and Meta have a bug bounty program that allows you to legally hack them and get paid? Go here: facebook.com/whitehat
// Farah Hawa’s SOCIAL//
RUclips: www.youtube.com/@FarahHawa
LinkedIn: www.linkedin.com/in/farah-hawa-a012b8162/
X: x.com/farah_hawaa
Instagram: instagram.com/farah_hawaa/
// Resources REFERENCE //
RUclips videos:
2023 Path to Hacking Success: ruclips.net/video/KXQ_MUe6wKo/видео.html
Bug Bounty: Get paid to hack PayPal and TikTok // Featuring Nahamsec: ruclips.net/video/9vaEwycet90/видео.html
My updated bug bounty resources: ruclips.net/video/ig5DuM6M2CQ/видео.html
RUclips channels: thenewboston: www.youtube.com/@thenewboston
Websites:
hackerone: www.hackerone.com/
hacker101: www.hacker101.com/
Burp Suite on PortSwigger: portswigger.net/support/burp-suite-software-faqs
PortSwigger Web Security Academy: portswigger.net/web-security
Firefox Source Docs: developer.mozilla.org/en-US/
Pentester Land: pentester.land/
Infosec: infosec-conferences.com/
Vickie Li Blog: vickieli.dev/
Subfinder: github.com/projectdiscovery/subfinder
Sublist3r: github.com/aboul3la/Sublist3r
Frida: frida.re/
Meta Bug Bounty Program: facebook.com/whitehat
Books:
Real World Bug Hunting by Peter Yaworski
USA: amzn.to/3JmRven
UK: amzn.to/4d3S5M0
Bug Bounty Bootcamp by Vickie Li
USA: amzn.to/3xGa4rz
UK: amzn.to/49PwPa0
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
X: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
RUclips: www.youtube.com/@davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Coming Up
02:33 - Sponsored Section
04:36 - Intro
05:08 - Farah's Early Life
05:45 - Studying Mass Media
06:58 - Interning for Experience
08:21 - The Value of a CEH Certification
10:00 - Why Cyber Security?
10:35 - Getting a Job in Cyber Security
11:44 - Creating Content
13:30 - Does Social Media Open Doors?
15:28 - Starting Bug Bounty
17:28 - From Unpaid Internship to Paid Internship
18:09 - How long does it take to get into cyber security?
19:20 - Programming Languages to Learn
20:21 - Working at Meta
21:07 - Advice to Someone Starting Today
22:10 - The Value of CTF
22:58 - What's Hot Right Now?
23:48 - Blueprints for Starting
24:29 - Recommended Books
28:10 - When did Farah Start?
30:41 - How to do Bug Bounty for Meta & Facebook
31:18 - Common mistakes and how to avoid them
33:21 - Why Farah stopped Posting on RUclips
33:59 - Experience moving from India to London
34:55 - Work/Life Balance
35:34 - Relocate or Work from Home?
38:47 - Returning to India or staying in London
39:52 - Vickie Li's Blog
41:24 - Dealing with the Imposter syndrome
44:50 - Take people through your journey
45:35 - Mistakes to Avoid
47:01 - Getting started after graduating high school
50:01 - Does one need a degree?
52:07 - How to start with no funds
53:08 - Favourite tools
54:27 - AI trends to jump on
56:42 - Conclusion
56:58 - Outro
cybersecurity
whitehat
burp
burpsuite
portswigger
hackerone
hacker1
hacker101
hack
hacker
hacking
facebook
meta
vr
oculus
quest
bugbounty
web app hacking
cyber
infosec
information security
xss
xss attack
xss vulnerability
xss vs csrf attack
xsssa facebook
xsssa
kali linux
penetration testing
ethical hacking
bug bounty
cross site scripting
cross-site scripting
red teaming
cyber security
ethical hacker
javascript
ajax
jquery
node js
node js hacking
portswigger
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#facebook #hack #hacking
One day I will be there on that place to tell me story soon...☄️
Hi David I have a problem I suspect my neighbour has been hacking my WiFi security camera for a year now.. and now my WiFi has been getting disconnected a few times now I use an iPhone 6s recently updated. To go online RUclips check my mining ect ect recently they have been now showing my WiFi network names but on their hidden network I proved this to myself by using aircrack to un hide their hidden network and link their bssid to the hidden network showing my network names I've used for months now . I questioned them recently and they flat out denied it but I have photos proving it showed them too and still denied it . I know my bssid and now my neighbours hidden bssid . I have 2 networks on my router 1 hidden and 1 not the one thats hidden is wpa2 aes and the not hidden is on wpa3 personal. Today they showed many of my network names I could only unhide a couple at a time using a laptop and 2 WiFi cards . My top question after this rant is if my neighbours bssid shows my hidden network name with in their hidden WiFi does that defo confirm they are using kali linux I only have 2 neighbours and in the middle of a field no traffic really close by
Also like to add is their a possibility that they had their router hacked by someone mobile and a laptop . That keeps messing with their WiFi showing my hidden WiFi names on multiple hidden networks. On their router. Or is it possible a hacker could ssh to their router miles away doing this? Is it possible for the remote hacker to view my networks from the person in question from their router I don't think a router can actually see other WiFi networks near by am I correct only a WiFi card or USB WiFi dongle ect could do this proving my neighbour is hacking my WiFi and showing all my hidden networks I've used over 4 months at least .sorry for the rant i.m 51 years old and have decades of pc experience mac Windows Linux and for 4 years solid use of kali linux and recently kali purple which I need to study more and experiment with I'm not really a hacker and not interested being a hacker more a tool to understand how kali works and what I can do to lesser my chances of being hacked local or proximity.. many thanks David great channel been a fan for a while now always watching your videos has helped me in so many ways such a deep deep subject with many levels of complexity
I was really impressed by the fact that a person with no traditional education in tech is miles ahead of techies with traditional degrees.Subscribed to her channel.She has my respect !
I am yet to see any hands-on person with degree(s) in tech who didn't learn stuff on their own. The university is mostly for networking and bragging rights. From the Ivies to any "University of Nowhere", if one doesn't learn stuff themselves they can't do stuff after obtaining that expensive piece of paper.
How do you think I started programming?? On my own. Testing code, etc.
Why is it a surprise? Traditional learning doesnt always convert to success when applying that knowlegge. When I was working in a small garage like company, my boss asked a Milk delivery guy to join the company for extra bucks just to help him earn a living. our company also had limited budget. In 3 months the delivery guy turned programmer started picking up coding and he fared better than the rest of us traditional Computer degree holders. In10-12 years he became the VP of a Tech giant in India.
This is how programming world is. Here you never know who HAS the skill. Some start seeing the World as a Matrix with 1s and 0s and the rest of me are still seeing it as it is.
this is the field of someone with passion and curiousity shine, nothing related to degree, many people with degree made that desicion when they didn't actually know what to in early age, whoever know their passion at young age and all-in are lucky.
@@aham-mumukshu-asmi bro now you are in which company and post
"'Don't overthink what you have done in the past or what you want to do but if you really want to do cyber security then there are ways for you to get in doesn't matter your background " the best line ever in this interview
Great 👍 Informative ❤ Thanks David ! Hunt & bring more Next Gen Hackers on the Show..❤❤❤
at 56:00 , i too appreciate how you ask the same questions to different people and get different responses. It's interesting to see different perspectives
Incredible guest David! Her journey is so inspiring!
Glad you enjoyed the video!
I agree. I get experience by being more "hands-on" from my own "guinea pig" lab setup, via H1 Bug Bounty platform, etc in my own company. I also agree with how she works with another company as META, but also has her Security Researcher stuff she does on her own. I do my Security Researcher stuff part of the time, while the regular job as a Field Technician I'm allowed and privileged to work with much emerging technologies from Amazon. I relate to her and both of you resonate with me. Even though I had a degree from college in IT, my experience and knowledge from Security Research came from "hands-on " setup of my own devices (ie phones, laptops, tablets, etc) to practice on via Kali, course and knowledge from IEEE , but now also incorporating A.I. in my efforts. Live the interview, questions and answers💻🤓👍🏾.
wow amazing great informative video again thx david
Glad you enjoyed it! 😀
34:04 That India map is rediculas sir, that's not correct, Kashmir is our integral part and it should be in the map
I see this misinformation a lot and wonder if I should report it
It's just a map, grow up and cry more.
@@ASa-cg8hx it's not about the creator dude, it's actually not their fault, because in most foreign countries they believe Kashmir is not our part, it's about awareness
@@gUm_bY745 like you did when your girlfriend left you ?
😂😂
Loved this interview, I will ask my teenage children and young ones to listen this interview for informed decisions they need to take for career development plans. Thanks for inviting Farah , she is a great inspiration.
Very inspiring, even her closing words are on another level. Thank you very much for the insights
Farah is amazing! What an adventurous and wonderful person. Another great guest David!
I have the opposite experiences I worked for two company that didn't pay me and it ended biting me in the butt because most company told me they were looking for real experience, meaning paid position. I am working on bug bounty on the side right now and trying to make videos as well!
Even with the shortage, you couldn't get a job😮?
Amazing topic thanks so much David
You're very welcome!
Love TCM super beginner friendly and easy to understand and follow
Very Inspiring !!! Thank you David
Thanks for keeping us updated, the video is very informative.
thank you and Farah for sharing your experience.
Personal opinion - Best video/guest after OTW!
Superb journey ! She is an inspiration for many of us!
Bravo continue ❤❤❤
Lots more content coming :)
Just wow!!!......like really wow
What a being🎉
Fantastic talk!
This was a great talk with great guest
Wow! Amazing interview
I am a pentester and Red teamer from India now in Germany. I started as a network engineer, then worked as GCP admin, then landed my first job as pentester. Now I work in Airbus.
It took me 2+ years to land on my first job as a pentester after getting my first job as Network engineer. It was hard. Studying everyday and being consistent. It was a fun ride and totally worth it.
bro whats the package you have now in airbus can you plz tell me estimation plz as i am also planning for germany
Great person featured on Great channel 🙇🙇
I am a penetration tester i have been doing 3 year. waching from India Love u David ♥️
Wow.. great job🖤
Farah is amazing!
I really love how you interrogate your guests, very awesome..
David, thank you for your questions it does inspire me to start learning on the side.
Finally! I have been waiting for this video when she shared in her story. Thank you so much!
You're welcome! I hope you enjoyed the video :)
Such an inspiration!
Seeing an indian with david sir made me feel proud❤🇮🇳🇮🇳
Reverse engineering an apk, yes, that can provide much fun. I could connect to and read out stats from hire e-scooters while someone was riding it. You could also send a packet to reset the scooter. It was fun while it lasted, and all you needed was a mobile phone with the correct app once you'd found out the packets required.
Incredible! Makes me to continue to work in IT!
When I was a teenager, I was look up on notepad commands that from tricks to dangerous code to understand how it work. Plus, I still have the book of how computers work in hard copy and PDF along with how to install and operate earlier versions of Kali Linux
Edit: Thank you David and keep it up!
For real i started learning about ethical hacking
NICE BOI. Are you into hacking? You did not continue your learning on Linux and hacking?
Very interesting video,i like it❤
Glad you liked it!
@@davidbombal you are a legend,iam interesting in cyber security field but I worried about ai
Love from India ❤❤
Just FYI the reason people say you shouldn't do unpaid internships isn't primarily for the person working, although it is also for them. But it hurts society by taking away opportunities for less wealthy but more capable people.
It's more a problem of the organization "offering" the free internship.
The person who takes the free internship of course benefits, if they ensure they are getting skills and connections, but they might be edging someone else out who is actually more deserving of the role and just not wealthy enough to afford to not make money. Sounds insulting to her, not intended, but that is the root problem with anyone offering or accepting free internships.
Cool video!
Glad you enjoyed it!
She is cool (kewl) you have to fight for what's right (keep up the good work)
Hi David,
I have been your subscriber for quiet long and loved watching it. Gained a lot of knowledge. After watching Farah's interview. I would ask the same question which you asked, a person who doesn't have any knowledge in Cyber Security, what are the steps he/she should take to a good job in cyber security.
Doing Graduation (MSc in Cyber Security) at the moment but believe me I'm not going to name the Uni, not a proper track has been taught or any information I have gained to get a job in Cyber Security.
Honestly a proper guideline is not available, it is so much scattered now.
Please, I will be waiting for your answer if you can speak to Farah again or any point based guidance.
Many thanks.
as occupy the web say "the best cyber security channel in you-tube " ,thanks mr david ,i always thanks for your endless to make good next gen
Thank you :)
Hello, dear Mr. Bumble. ❤ Can you please post a picture of your bookshelf? I want to see the books you are reading.
❤❤❤ thank you.
Your videos are fascinating, and awesome! Even though I’m not a hacker. I am a computer enthusiast, part-time and always interested in way things work. As people rely more and more on the systems, they have to have knowledge about thei vulnerabilities. Your car hacking one was awesome. I’ll never buy a new car again.😂
Thank you, but you probably shouldn't stop buying a car because of hacks like that. Sam is one of the good guys. Agreed - the world runs more and more on tech and we need people like Farah and Sam to better protect us.
@@davidbombal Being they are incorporating remote shutoff and DUi monitoring in 2026, 2025 is my last year. After that I will rebuild. I do mechanical work tinkering on cars like you people tinkering with hacking. Same interest on how things work. And thank God we have good guys like you people!
is IELTS exam required to work in the facebook uk?
by the way i love this video
いつも見てます!
TCM Security!!!!
You have inspired me I was almost giving up in cyber security so thank you are you giving away those books
Don't give up on your dreams.
ahan i really needed this videooo
so the road map majorly is networking basics operating basics php java ppythhon and c + penetration basics
+ protocols
Its actually terrible that how work flows and credentials influence the other - cyber security and usual order is an edge case.
11:02 But the one thing that we learned is application and deviation is common so on average - if you want to be in cyber security... Pursue something else first(!)
I wonder if this is a security caveat or cyber paradigm.
Please sir I'm having problems mounting a flash drive. It's giving me errors. Please help me
i really admire girls into IT, including myself 🎉❤
Be the inspiration for the next generation 😀
Please make video with otw more than others🙏🙏🙏🙏🙏🙏
Zap is free and can do most of burpsuite pro if i remember correctly ?
Since you have machine learning surveiling the net it is impossible to hack
cool video
Big fan of both of you. Never thought you guys would be together. Really enjoyed watching your work. Love from India 🇮🇳 thanks for inviting an Indian.
C and assembly to work with computer memory
👍
What type of wired earbuds would you recommend?
protecting agaist what!?? ALL OPEN!
❤❤
i am just pass 10th and i have 3 months free time and i learn cehv12 lab manual pdf which is free and i am in chapter 6 it is good or i learn another book
she mentioned something about Crypto ; what was the tool or website she said?
Why ethical hackers don’t get paid as much as software engineers?
My only guess is that most software engineers create digital assets whereas Ethical Hackers tell you where you need to invest more time and money to bolster security and from a companies perspective, they aren’t too willing to invest in that as much. Just my take and it’s not worth much lol
I would agree. Without the one that actually creates or builds the later wouldn’t have a purpose
Ngl these things affect my confidence i'm happy for her as she's young but I'm almost 30 and wanted to switch to this field but seems like it may not be able to as it's too late and i'm also not bright enough.
Do ppl over 30 have a future in this in the midst of AI etc ?
Make a full tutorial video to learn ethical hacking or cyber security.. until that any one can give me suggestion to learn kali properly
Wait!?, David Bombal is from South Africa😭😭
❤
1:18 Doesn't that mean that anyone could also install their own firmware?
farah❤
what is hacking here with default wifi info ?
Gogle says that 0 day is worth word NICE, very very motivating
To all my C code developers have a lovely day 👌🏿🤘🏿
😂😂😂🙏
Nasha computer haking fact❤
What is Farah's exact job title in Meta?
Is ai completely replace ethical hacker job
No, Never! It can only automate scans and predefined vulnerabilities.
Its unpossible 😅
Year 3000 maybe 😂
😂 nice
Ai can be replace by ethical hackers😅
imagine yamm meta report go through this lady ,it will be a complete abomination ,I've been following yamm and his articles/tweets overlong time .the level of thinking and sophistication he provide only few people on this planet can do that.
Enjoying the process is the key to curiosity as an added package
Is that an American Siren at 42:00?
Confession: i too went from hacking wifi and IRC nuking. I'm giving away my age eh?
does the certification really matter.? like the CEH. and how much should i need to know to start dug bounty?
Yes, certification always matters. You'll have more chance to get a job. That's all where it matters.
$500 monthly salary wow.
👍😃
Zero day hacks waiting
Only trees can protect the environment 🌲🌳🌲🌳
IDK what to say!! Pretty face?
In London is a bad weather??? who said that cloudy it is a bad weather?
Great weather the same is here in Seattle it just weather!
do not like rain and clouds= Move
11:45 for any Gen Z'er who doesn't want to be a "content creator", you can get a job via other means as well. Just start with IT Servicedesk in a large organisation and get acquainted with the cybersec team there. They will start to notice that you know how to handle cybersec tickets and when to resolve them yourself or when to inform that team.
FARAH!!! 🖤
Hello
Oh god, please...
No One Protect The World lol
I think she is indian or Pakistani?
Indian
@@raghavgupta3168 woo
does that matter all i know she is a bold and go for getter girl awesome at least more females joining the field. Bigup David
I dont mean to be rude but when did hackers become good looking like this , 😂😂😂, remmber kevn mitnick RIP , this is a new meta for real.
わぁ
The camera had root login over telnet with the same hardcoded password ? WTF
With no password on root 😱
@@davidbombal even worse, amazing. Well, I guess you aren't leaking a password in cleartext on the 'wire' 🙂 So that's kind of a positive LOL
@@autohmae 😂
One woman finally (smart and pretty) ...