Short Summary
The video discusses a personal journey of transitioning from a support engineer into a cybersecurity professional, highlighting the steps involved in breaking into the cybersecurity field.
Key Points
- The speaker showcases a Raspberry Pi setup, expressing excitement about technology and learning.
- Reflects on their past as a support engineer and the significant salary increase over the years.
- Proposes a step-by-step roadmap for breaking into cybersecurity.
- First step: Apply for any job at a desired company, such as Facebook, Apple, or Google.
- After getting hired, recommend subscribing to a particular channel and learning about SQL injection.
- Describes using SQL injection to find a cybersecurity employee’s contact information.
- Suggests creating a phishing site and sending a link to the employee, enabling a career switch.
- Encourages viewers to try the suggested method and share their experiences.
Youtube Channel: Loi Liang Yang
Video Published: 2024-09-07T04:09:15+00:00
Video Description:
// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join
// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
, Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/
// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD
// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.