"My parents bought our first computer when I was 7 years old. This was way back in the mid-1990s. I remember that it came with Windows 95 operating system. It was love at first sight. But it was not long until I started messing around with it outside of its functionality. And, of course, I would break it. At first, they took it to the repair shop, but thereafter I would just try fixing it myself. And that’s how I became very familiar with both the hardware and software part of these devices. Cybersecurity was always something of higher interest to me, but it was only a few years back when I took active steps into getting in the field. And now it has my full professional attention."
What brought you to teaching on Cybrary:
"I started watching Cybrary videos probably in 2016, then in 2017 I finished a few courses and got course certificates. I was very intrigued by the level of detail in which these instructors would go with their courses, especially the one about networking. But I was even more intrigued by the fact that it was all for free. Thus, ever since, I kept cybrary.it as a bookmark in sight. Earlier this year, 2019, I saw Cybrary was looking for instructors, so, as someone with a Youtube channel of over 320 videos, it came very naturally to me to want to apply."
"Developing Ethical Hacking Tools with Python shows the beginner programmer, or the ethical hacker with basic programming skills, the power that a programming language like Python can bring to the table, especially in the sense of automation, as well as when it comes to stacking multiple Python modules related to cybersecurity and penetration testing for more efficient assessments. It allows one to take the hands-off the process whenever and wherever possible."
Your Experience in Cyber Security:
"Even though I completed numerous courses in cybersecurity and penetration testing, I can strongly say that most of what I learned came and still comes from hands-on training and practice. I work as a Cybersecurity Analyst and Penetration Tester."
Interests in Cyber Security:
"The bulk of my experience is in penetration testing. And of course, this is one of my active interests. However, I also want to get deeper into reverse engineering for malware analysis, as well as in incident responses."