Cybersecurity and Vulnerability Management Strategy - WATCH BEFORE YOUR INTERVIEW

Поделиться
HTML-код
  • Опубликовано: 16 ноя 2024

Комментарии • 68

  • @JoshMadakor
    @JoshMadakor  Год назад +7

    🔒 Josh's Hands-On Cybersecurity / SOC Analyst Training (REAL EXPERIENCE)🔒
    joshmadakor.tech/cyber

  • @Tushaethomas
    @Tushaethomas 16 дней назад +2

    Just finished your course now getting ready start the internship and study for comptia security+. Great course man "hopefully I can help you edit this course".

    • @JoshMadakor
      @JoshMadakor  15 дней назад

      Thank you for saying it! Best of luck :D

  • @PluPerfective
    @PluPerfective Год назад +6

    Loving the new background, TV and Plants, a vibe. Good content. Congrats at 100k. Happy to be "OG" lol.

    • @JoshMadakor
      @JoshMadakor  Год назад

      Thank you so much 🤗. I got a new background now that's pretty good, haha. This one is more permanent :). Appreciate you!

  • @g.rajifuja2047
    @g.rajifuja2047 Год назад +7

    I want to thank you for the level of detail in this video. Everything I found very useful. I would really like another deep dive into that home lab again.If you can find the time that would be great!!

    • @JoshMadakor
      @JoshMadakor  Год назад +4

      Thanks so much! I really appreciate that. I actually did an updated Vulnerability Management Lab video where we use OpenVAS on Azure. It's being edited right now 👍

    • @lifestylewithjoyce4736
      @lifestylewithjoyce4736 Год назад

      @@JoshMadakor Awesome!! I need to create a home lab soon. Thank you for your time

  • @granddeception4290
    @granddeception4290 Год назад +2

    Thanks for the videos. You do a lot for the community of aspiring Cyber professionals.

  • @morufsurakat
    @morufsurakat 9 месяцев назад

    Awesome..thank you so much Josh

  • @jayeverything
    @jayeverything Год назад +2

    💯 Thanks for sharing 🙏🏾

    • @JoshMadakor
      @JoshMadakor  Год назад +1

      My pleasure! Thanks for watching!

  • @frankvega8240
    @frankvega8240 Год назад +1

    As always great job

  • @virgobeautygg
    @virgobeautygg Год назад

    Thank you so much. 😊

  • @PhileoCoffeeVillage
    @PhileoCoffeeVillage 11 месяцев назад

    Came here to learn but your voice is something else 😊😅

  • @50PullUps
    @50PullUps Год назад +6

    At the company I worked at, the network team prohibited the security team from performing vulnerability scanning over the wan because, as they put it, vulnerability scanning ‘clogs up the logs’
    Which is obviously utter nonsense.
    Basically the managers on the IT security team were too chickensh!+ to push back when they should have.
    As a result, we had 20+ local scanning engine servers throughout the org. It was a complete management nightmare.

    • @JoshMadakor
      @JoshMadakor  Год назад +1

      Lol, sounds about right. People always make these excuses as to why they can't scan, but it's usually due to some fundamental design flaw in their infrastructure lol...or something else like this that needs to be fixed.

    • @50PullUps
      @50PullUps Год назад +2

      @@JoshMadakor I strongly disagree. In our case, a fundamental design flaw in the network infrastructure is what the network team was gaslighting/bullying the security team into accepting. The real reason we didn’t scan over the WAN was strictly due to petty political and interpersonal conflicts. Truly pathetic. Thank goodness I’m no longer there.

    • @NinoBrownBoxing
      @NinoBrownBoxing Год назад

      it was nothing to strongly disagree about, he was speaking in general @@50PullUps

  • @jeffu3248
    @jeffu3248 Год назад

    Thank you!

  • @Rb_Laden
    @Rb_Laden Год назад

    I swear i hate dealing with vendors for the very reason you mentioned, they can never just give an actual quote 😭 They like to wait and see what your organization’s budget is so they don’t end up “lowballing” themselves.

  • @wisdomandpeace4897
    @wisdomandpeace4897 4 месяца назад

    Hi Josh. This is a very valuable and very well explained VM process video. Does your Cyber course include VM?

  • @D-Unique774
    @D-Unique774 Год назад +1

    Ive been following you channel for a while now and am interested in taking your course. I am lookin at a few options now. I have Sec + and PCI DSS training. Is this a class schedule or self paced course? Love the knowledge here!

    • @JoshMadakor
      @JoshMadakor  Год назад +1

      Hey! It's self-paced labs conducted in Azure, but there is a discord with an active community with me and 1100+ students if you have questions or want to collab with others ^^

    • @D-Unique774
      @D-Unique774 Год назад

      @@JoshMadakor Thanks! That’s great! I want this but wanted to see how my current job schedule would coincide with this

  • @davidpetrell1791
    @davidpetrell1791 Год назад +3

    How can I build my sql skills as I don't have a VM of sql but use it for work but need to learn more queries

    • @JoshMadakor
      @JoshMadakor  Год назад +1

      You can use this and then click "Try it yourself" -> www.w3schools.com/sql/

  • @drdre3293
    @drdre3293 Год назад

    Thanks for the information it was very helpful. but I've not been able to download the first two documents.
    CISSP Practice questions and the CompTIA security plus practice questions. Thanks.

  • @cottonhill4264
    @cottonhill4264 Год назад +6

    Ho yeah Bobby

  • @sergilao5677
    @sergilao5677 7 месяцев назад +1

    How are you handling vulnerabilities that does not have any patch available yet?

    • @JoshMadakor
      @JoshMadakor  6 месяцев назад +1

      Those are Zero Days. One way to protect against Zero Day vulnerabilities is to minimize your attack surface as much as possible and don't use stuff that you don't need. For example, say you are running a server with old FTP server software installed, but that server doesn't even need to run FTP. Then a Zero Day comes out with an RCE capability for that version of FTP Server. You are now vulnerable. This could have been prevented by not even having the FTP software installed that you didn't need.
      Another way is to implement defense in depth. Even though the server is running vulnerable, outdated FTP software, it becomes less critical the more protected/isolated/segregated/segmented-away the server is, if that makes sense (vs it being on the network edge exposed to the internet).
      Hope this makes sense, just my 2C though, ask ChatGPT for more scenarios :)

  • @teea388
    @teea388 Год назад +2

    Hi Josh,
    You mentioned a discount code in your video. But i don't see it in the description or chat.
    Can you help please.
    Thanks

    • @JoshMadakor
      @JoshMadakor  Год назад +1

      Oh shoot, sorry!
      Discount Code: JOSH10

  • @user-gened
    @user-gened Год назад +1

    Can you point me to a video or will you be making a video in the future about aquiring experience. Most employers are asking for 2 years exp or a Bachelors degree.

  • @ainurkhairullin6723
    @ainurkhairullin6723 Год назад +1

    For me, the most problematic step is to provide scanner access to the assets. Then you need to take accounts for internal testing for vulnerabilities, but you just won’t get them because the administrator responsible for this is gouging and doesn’t know even half of the data from devices

  • @gideonmomodu279
    @gideonmomodu279 7 месяцев назад +1

    I am just getting into VM in Cybersecurity with Qualys. i have a couple questions that i'd appreciate answers to. How long do you think it will take me to finish the total VM course in order to get a job. also how long does it usually take to get a job as a VM? Anyone please and thanks.

    • @JoshMadakor
      @JoshMadakor  7 месяцев назад +2

      I'll make a video about this, but I would say around 300 hours to develop a good Cybersecurity Base, and another 1-200 hours practicing vulnerability management. This answer requires a lot of explaining, but you can basically watch this video, but think about applying it to vulnerability management: ruclips.net/video/7PPsufbJHhU/видео.htmlsi=NTmqTw1vcE81ubcT

    • @gideonmomodu279
      @gideonmomodu279 7 месяцев назад

      @@JoshMadakor thanks so much. I’ll get back to you when I’m done for job application procedures lolz. Appreciate 🙏🏾🙏🏾🙏🏾

  • @Techcram
    @Techcram Год назад +2

    If you have a non tech related bachelors degree (Psychology), do you recommend getting another bachelors degree from WGU in IT management or going straight to the masters degree in cybersecurity?

    • @JoshMadakor
      @JoshMadakor  Год назад +3

      Hey! If you already have a degree, I actually strongly recommend you to get a couple certs, do some (a lot of) technical practice/labs, build your portfolio, and start applying. I'm not telling you to buy my course, but I've had MANY people with zero background get an entry-level job in like 2 months. Cyber takes a bit longer, but the principles still apply. I'd definitely check out these videos:
      Do you really need a Bachelor's Degree: ruclips.net/video/qYoqn6owDeI/видео.html
      Interview, Zero background to SOC Analyst: ruclips.net/video/bkdZcYVmPC8/видео.html

    • @artur_tx
      @artur_tx Год назад +3

      Hello ,
      I have a bs in psychology and currently working in cyber. Started in help desk and worked my way up to cyber.
      I would follow Josh instructions.
      Get some certs and experience , after that apply to Georgia tech masters in cyber . I’m currently doing the policy concentration .

    • @Techcram
      @Techcram Год назад

      @@artur_tx thanks for the great advice!

    • @Techcram
      @Techcram Год назад

      @@JoshMadakor Sounds like a great plan. thank you!

  • @jaya2821
    @jaya2821 6 месяцев назад

    Hey Josh the discount code isn't working anymore. Is there anyway you can update it? I'd love to get started with your course.

    • @JoshMadakor
      @JoshMadakor  6 месяцев назад

      send me a message in my linkedin or IG ^^

  • @artur_tx
    @artur_tx Год назад

    Josh do you currently have a course on this ? Or in the future see you going to give us a course in vulnerability management ?
    Going in depth hands on .

  • @Cr0ss9o
    @Cr0ss9o Год назад +1

    I'm curious. Would you say your course can help persons outside of the US get jobs? Ofcourse no guarantees expected.

    • @JoshMadakor
      @JoshMadakor  Год назад

      My course can definitely help get a better understanding of things and have something nice on your resume and help with interview, but I really have no idea about requirements and stuff like this outside of the US :(

  • @love46311
    @love46311 Год назад

    Thank you for creating this. I’ve been struggling to break ground and this reignited my passion. 🫵🏾 da man!

  • @shawnhumphreys3504
    @shawnhumphreys3504 Год назад

    A bit off topic question if you don't mind,
    I currently work in IT and been stuck between cloud and software engineering with some possible interest in AI for my future. I am considering a degree at WGU, but I am trying to decide between getting a BS/MS in IT as Ill have some of the CompTIA degrees by then and will have a faster return on investment or take the time to do the BS in computer science is that will be more versatile no matter what I want to do in tech. What are your thoughts?

  • @Superstarshy
    @Superstarshy Месяц назад

    Great informative video.

  • @iamprinceefe
    @iamprinceefe 7 месяцев назад

    Hello Josh thank you for this. I’ve just completed a Course on Cybersecurity and I’m very interested in Vulnerability Management as my path. Do you have any idea the right resource that will give me full details and preparation to be an Entry Level Vulnerability Management Analyst? And also, how can i join your discord channel? I’d really appreciate your reply 🙏🏼

    • @JoshMadakor
      @JoshMadakor  7 месяцев назад +1

      I have another video where I do a lab with Nesses. You could get the latest software from there and try to set it up and run some scans. I'm going to be creating a new community which will include vulnerability management course. It's not setup yet though :)

  • @emmanuelkehindei
    @emmanuelkehindei Год назад +1

    Is your course subscription based or lifetimes access? New viewer here

    • @JoshMadakor
      @JoshMadakor  Год назад +1

      Thanks for watching! Lifetime access ^^

  • @rolan2dr
    @rolan2dr Год назад

    I want a vulnerability management job and have a CISSP and can’t get a job! Help!

    • @dannya1130
      @dannya1130 Год назад

      Really? Even with a CISSP?

  • @Whyte_fundz
    @Whyte_fundz Год назад

    Hi sir, I wanted to ask if vulnerability management requires coding, and their is also the talk of pci dss paying a lot of money, does that also require coding too and what do u think is the highest cybersecurity paying job out there

    • @AFlyingMayMay
      @AFlyingMayMay Год назад

      I wouldn’t worry about it too much being that your writing skills are poor.

  • @coreyperry3596
    @coreyperry3596 Год назад +1

    🔥

  • @frezerdugasa7937
    @frezerdugasa7937 Год назад +1

    Hi josh ,I rally like your content always checked your new blogs. But you talk to fast and difficulty to catch what you are talking about.

  • @ozzythebest333
    @ozzythebest333 Год назад +1

    Third to comment :)