
and its only purpose is to advise to improve security
in the computational systems of the viewer."
Welcome all, friends, to a new Hackwise episode!
Today we'll talk about the different types of hackers
and how some of them make a living out of ethical hacking.
Wisers, since some time ago I've been seriously thinking
about making this video, and explaining
about the different kinds of hackers out there
and how some of them make a living by
hacking systems ethically.
The purpose of this video is for you to know in detail
some of the paths available to an ethical hacker
in case you're interested in this world
and you're thinking about
dedicating yourself to the wonderful world of Information Security.
But first, I'd like to talk to you about
the origin and meaning of the word "hacker".
As incredible as it may sound,
in the beginning the word "hacker" was used for lumberjacks
that dedicated themselves to cutting lumber with an axe
and making furniture with it.
Essentially, "Hacker" meant (in that time)
one who could build something in a clever way.
As time passed and with the arrival of Internet,
users emerged that weren't content with just
using information systems,
but they also wished to understand them thoroughly
and surpass the average user.
Around the 1960's, in the world of IT
the term "hacker" started to be used to describe users
capable of breaking the security of systems
with creativity and in cunning ways.
Presently, we divide hackers into two groups:
On one hand we have "black hat hackers"
or as we call them in spanish, "de sombrero negro";
all those hackers that can be considered criminals,
since they tend to steal information
to sell it to the highest bidder, among other IT crimes.
Lastly, we have the "white hat hackers"
or "de sombrero blanco".
All those who strive to find flaws in systems
to improve Internet, our systems and our privacy.
If you're interested in ethical hacking you must understand
you'll have to read a lot and practice everything you learn.
Personally, something I like to do is browsing
the Eleven Paths website, where you can find reports
that will help you understand the newest topics in cybersecurity.
The saying goes: "A hacker must always be hungry for knowledge
and practice everything he reads and learns."
Remember, practice makes perfect.
That's why I say, if you like hacking,
it's good that you put a lab together in your computer
so you can perform tests in all systems
with all the techniques you learn
in a controlled environment.
I'll talk about some websites I frequent
to stay up to date in the world of cybersecurity.
The first one is the Eleven Paths blog,
which is rather useful for reading cybersecurity news
since they're presented in a clear and understandable way.
And for an enterprise focus, another site I can recommend
is ItBusinessSolutions [http://www.itbusiness-solutions.com.mx]
where you can find a large collection of articles
on topics ranging from "What is a botnet?" to
"Strategies to minimize vulnerabilities in apps".
As an ethical hacker, there are multiple paths you can take.
But I like to group these paths in four categories:
First one is dedicating yourself to being a system administrator
or, as commonly called in English, sysadmin.
They're mainly devoted to keeping systems online
and safe, protecting them from any malicious user.
Then, we have the security consultants.
They tend to help organizations with improving their processes
by implementing solutions or practices
that help improve or maintain security in their systems.
In third place we have the well known "pentesters".
They're hackers that dedicate themselves to finding
security flaws in the platforms of companies that hire them
to prevent malicious users from using these security breaches,
thus securing their systems.
This is one of the ways in which white hat hackers
hack in an ethical way and are well paid for it.
Lastly, I'd place programmers in fourth place;
people dedicated to creating code for the new apps
of some companies but keeping focus on security,
analyzing the code and preventing
any flaws that could be exploited.
They usually write their code following the best practices
of coding to guarantee their customers' security.
Now, you know some of the paths that you,
as an ethical hacker, can follow.
I'd like to ask you which one is your favorite.
Pentester, sysadmin, security consultant or programmer?
Why don't you leave me your answer in a comment?
By the way, before I forget:
Recently I found an e-book where you can
find out more about the cybersecurity environment
in a global level.
And I consider it could help you.
I'll leave you a link to the e-book in the description
together with the links to the sites I recommended.
If you have a friend that might be interested
in hacking share this video with them.
It'll probably help them.
And well, my friends, this is all for today's video.
I hope you liked it.
Remember that my name is César Gaytán
@mrebola on Twitter, hackwisemx on Facebook,
mr.ebola on Instagram,
until next time!
Hackeando cualquier Webcam como en Mr Robot No Ribed!! NO Hoax!! Cara Cepat Dapat poin Kubik Como Hackear WIFI desde Android con Evil Twin Kali Linux en tu Celular como en Mr.Robot (Pwn Phone) Cómo ocultar fotos al estilo Mr. Robot - Hacking KeepTruckin Empezando su viaje en libro electronico Andrea Valdiri habla de sus escándalos en La Red Como crecer en Instagram y cualquier red social. El SECRETO para ganar en INSTAGRAM y ser MÁS VISIBLE Como ser mas seguro de si mismo- Incrementa tu seguridad en 5 minutos con este tip