All right, All right. Welcome, everybody to the introduction to ICTY. Cybersecurity course can undergo master instructor a cyber. And I'm here with my famous famous world famous cohort, Joe Perry. Hello, everyone. I'm joking. I'm the director of research here. It's I bury, and I am lucky enough to be included in a video made by Ken thing,
as we noticed from the fact you've got to face is on your screen instead of one.
We're trying a new format for this class because of the fact that Ken and I kind of have different experiences and different backgrounds. We've actually set this class I have to instructors covering the first and last course. And then Ken and I are going to switch back and forth a little bit during the for the actual courses in the middle. Just kind of help people get a sense of, you know,
these were our experiences lie and really give you a bit more personal
approach to the class in the material.
Absolutely. Absolutely. So let's go ahead, just jump right into it. And when we know you guys are excited to be here, so we're gonna go ahead, just jump right into a little bit of background about Joe myself. So again, I'm Joseph Perry. I am the director of research at Sai Buri by trade. I'm a vulnerability analyst in Explain Developer.
But really, I just do sort of all around cybersecurity research. I look into basically
every aspect of sort of about the offensive and defensive lifestyle or life cycles rather looking for for weaknesses, to improve or looking for, sort of, you know, new approaches, that sort thing. My history of employment. Before Cyberia worked in United States federal government in the intelligence community, it was developer, an engineer. The Navy Navy Cyberwarfare Development Group
I was in the government for for about 67 years came out, came private sector
in terms of education. A lot of it came through sort of the Navy in the government programs, joint cyber analysis course, computer network operations, fellow program. Basically, my entire adult life. I have been in and around cybersecurity, usually for the government in some capacity.
Nice, nice eso Are you like a super secret spy, Joe? That's why I can talk about your live stream three to the audiences because I'm very impressive.
Perfect. All right, Well, let's not know my background, no super secret spy stuff here. But as I meant to the master instructor, it's Ibori. My expertise is our 10 testing and which is basically ethical hacking as you hear it in the news on the digital forensics agent professor digital forensics.
Much of my background is actually health care. So I started out as a clinician,
working as a nurse and working through that angle. And then I jumped into the I T side and then eventually into the cyber security side as well. Um, I hold both the started ethical hacker as well as the computer hacking forensic investigator certifications. Those make more sense as you kind of break off into your chosen career path.
And, ah, that being said, I've also created questions for the CH. If I exam, the latest version is out
a zealous, revealing content for the CH. Both of those are by an organ organization called Easy Council.
Holding a master to is, if you've ever taken a class or a test or a certification or anything in this field can probably wrote it taught you about it.
maybe not all of them, but it but I get amount of stuff. And hopefully you enjoyed the questions. Yes.
Ah, And then also my my of course, formal education, the masters of science and cybersecurity and information assurance from Western Governors University. That's actually where I picked up the two certifications along with an undergraduate in Cyber Security Management slash information systems from Strayer University.
So we're gonna go ahead, just kind of jump into the rest of the course here. If you guys have any questions at all,
we're gonna open up a Q and A at the end of the session. Today s so feel free and the chat to ask any questions that you want. There's no dumb question at all, so we're gonna jump right into it.
So the course overview. What are we gonna be covering? Sort of. What's the point of this course? So those of you have taken Cyberia life course in the past, Probably kind of familiar with our general structure. You know, we have our slide decks. We have sort of the structured outclasses we're gonna do over some period of time. This one's a little bit different. Besides the fact that you have both Ken and my mugs on your screen.
There's also the fact that we're really doing this as an initial approach. So this course is really designed for
for people just starting the field. People are really interested in 19 cybersecurity who don't really know anything about it. Recruiters who are looking to better understand sort of the jobs they're hiring for a swell as managers help been some of these skill sets and talents. So we're gonna be going through four career paths
system administrator, that work engineer, the forensics and incident response and the offensive Security in clandestine.
We're gonna talk about the responsibilities of those roles we're gonna talk about, sort of what they do for a living and why their you know what, their days or lake. We're gonna talk about the tools you're gonna using those A lot of these horses are gonna be spent give you sort of a basic understanding of these tools. We're gonna talk about the certifications you're gonna want to pursue to be successful in these fields,
and then we're gonna talk about sort of all of those things encompassed in the career path on Sai Buri and sort of give you a sense of how our learning is structured. And if you choose to go through these career paths with us, sort of a sense of what that's gonna look like this is both sort of the outline for what we're gonna touch on lightly today in our course today is sort of an overview of all four.
And then each of the course, the reach of the classes after this
will be sort of these topics again, but in a much deeper, more sort of fleshed out way.