• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • Masterclass
    • VIP Membership
    • FAQ

    Popular Courses

  • Shop
    • Hardware Bundles
    • Wireless Adapters
    • Pentesting Tools
    • Security
    • Accessories
    • Clothing
    • Books
    • All
  • Competition
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

    VIP Membership Masterclass
    Got a question?
    [email protected]
    RegisterLogin
    zSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • Masterclass
      • VIP Membership
      • FAQ

      Popular Courses

    • Shop
      • Hardware Bundles
      • Wireless Adapters
      • Pentesting Tools
      • Security
      • Accessories
      • Clothing
      • Books
      • All
    • Competition
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

      Hacking & Security

      CyberNews Interview “skilful ethical hackers don’t have to hold college degrees”

      • Posted by Cybernews
      • Date April 8, 2022

      Since the digital transformation and remote work phenomenon, the attack surface for cyber felons grew. For this reason, the need for ethical hackers only increased.

      The very first association with the word “hacker” that comes to mind for most people is probably a cybercriminal. However, not all hackers have bad intentions. Ethical hackers, for instance, are people who legally help companies find vulnerabilities and protect themselves from cyber threats.

      And according to Zaid Sabih, “more and more companies believe that skillful hackers don’t necessarily have to hold college degrees” if they have a passion for hacking. There are many learning resources, including hacking courses, that can pave the way to success.

      That’s why Cybernews invited Zaid Sabih, the CEO of zSecurity – a company that provides various courses, pentesting, training, code review, consulting, and other services. Our guest shared his knowledge about hacking training, career paths, and cybersecurity topics.

       

      How did the idea of zSecurity come about? What has your journey been like?

      Hacking has been my passion since I was 12. Ever since I knew that I can earn money legally working as an ethical hacker I knew that’s what I want to do for the rest of my life.

      I never had the intention of starting my own cybersecurity company. During college, I worked part-time in iSecur1ty (a middle-eastern cyber security company) as a pentester and instructor. The CEO of iSecur1ty advised me to make a recorded course (as we only taught courses live in iSecur1ty), so in my second year of college, I decided to make my first ethical hacking course. Fast forward two years later, I already had a really good job offer at graduation!

      Coming out of college I had two options: A – Accept a dream job as a pentester in Fidelity or B – Employ what I learned so far in college and iSecur1ty and start my own cybersecurity company.

      This was a very tough decision as option A is what I always wanted. But I thought if I was going to take a risk, then this is the best time to do so, especially since my expenses were still very low as I was still living like a college student, and the course that I published during college was enough to help the bills.

       

      Can you introduce us to what you do? What makes your courses stand out?

      When I first started zSecurity, initially we provided very basic cybersecurity services. All we did was pentesting and online courses. As time went by, we worked gradually on expanding our services and course catalog. Currently, we provide a wide range of cybersecurity services, such as pentesting, code review, consulting, teaching, a VPN service, and managed bug bounty programs through bug-bounty.com.

      I think my courses stand out because of the hands-on approach. Everything that is covered in my courses is relevant, I don’t neglect the theory, but at the same time, I don’t teach any useless theory that tends to be boring and just confuse learners instead of helping them.

      Hacking is not easy, a lot of the time a number of things have to be configured exactly right, one small change and everything would fail silently or without informative errors. This could be extremely frustrating to some new learners, therefore we provide 24/7 support with all of our courses and direct access to all of our team through the VIP membership.

       

      Besides hacking training, you also specialize in penetration testing. Why is this practice so important?

      We never did a pentest without discovering any threats or weaknesses! Imagine creating or launching an application without testing its security, even if it was developed by the best developers in the world, we all know humans make mistakes, and even average applications these days rely on a number of sources and contain a lot of code, allowing for more attack surface which will eventually be exploited by malicious hackers, especially if the application handles user data.

      When you get a pentest, the team will approach the application like black-hat hackers, try to discover security weaknesses, and see how far they can exploit them. In the end, you get a report of all of their findings so you can fix the issues they found and protect the application and your users from hackers.

       

      Have you noticed an increased interest in hacking courses as a result of the recent global events?

      Yes, especially because of Covid-19, lots of businesses switched to cyberspace, which increased the need for ethical hackers to help pentest these new features that are being pushed so quickly. This actually was the motivation for bug-bounty.com; the platform that we launched last year. Bug-bounty.com is a managed crowd-source vulnerability disclosure platform in which we act as the middleman between hackers and people that want to improve the security of their platforms, helping ethical hackers earn money by discovering and reporting bugs to the platform owners, and helping the platform owners secure their platforms from blackhat hackers.

       

      What career paths are available for a person who is interested in hacking?

      There are many exciting career paths for ethical hackers. The most obvious is pentesting, where you get hired to test the security of systems. You can also work as a consultant, trainer, or security researcher. There are also lots of freelance opportunities for ethical hackers, from pentesting to consulting or everyone’s favorite these days – bug hunting. Bug hunting has become very popular because of the freedom it offers, as hackers are not tied to specific working hours or companies while being quite lucrative if you are skilled.

       

      What tips would you give to someone looking to break into the cybersecurity industry?

      These days there are so many ways to break into the industry, especially because more and more companies believe that skillful hackers don’t necessarily have to hold college degrees. Becoming a hacker boils down to three main steps:

      1. Obtain the skills – you can’t work as a hacker if you don’t know how to hack. Luckily, this has become very easy and obtainable to everybody, from online courses or free resources to full college courses.
      2. Practice the skills – this used to be very difficult but thanks to all the online labs and bug bounty platforms, you can legally practice hacking and even possibly earn money if you discover bugs in bug bounty programs.
      3. Prove that you have the skills – this is only needed to pass the HR barrier. These days, showing your abilities is much easier as you can build a good reputation and experience through bug bounty programs or/and by completing cybersecurity certifications.

       

      Unfortunately, many organizations take action only after an incident occurs. Why do you think people are reluctant to keep up with cybersecurity?

      Simple, the goal of most businesses is to increase revenue. Cybersecurity is expensive and unfortunately, if it’s done right, the benefits are invisible! You simply won’t get hacked, which is misinterpreted a lot of the time as “we probably didn’t need this, should have spent that money on marketing which would have resulted in more profits!”

      Another issue is a lot of the time businesses think they are secure because they haven’t been breached, which is false. In many cases, they haven’t been breached because they have not been targeted yet.

       

      In your opinion, what cybersecurity practices are a must these days, both for individuals and for businesses?

      Education is vital for both individuals and businesses, especially since lots of breaches involve an element of human interaction or social engineering.

      Businesses should also at least get a pentest done whenever new features or major updates are done. Ideally, they should get a pentest, get the code reviewed and have an ongoing bug-bounty program. This way, even if anything is missed after the pentest or the code review, the bug hunters around the world will find it and report it.

      Having a bug bounty program is extra useful because unlike pentesting and code review when the work is only done once or periodically, in a bug bounty program, the system will always be tested by ethical hackers around the world helping you stay on top of new discoveries or vulnerabilities that might not have existed at the time of the pentest or the code review.

       

      Would you like to share what’s next for zSecurity?

      The plan is to continue to grow all the platforms and services that we offer. I’m really excited to grow our latest platform bug-bounty.com to help bridge the gap between hackers and business owners, ultimately making the Internet a safer place.

      • Share:
      Cybernews
      Cybernews

      Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

      Previous post

      GitColombo
      April 8, 2022

      Next post

      Hacking Windows in Seconds Using BadUSB
      April 10, 2022

      You may also like

      secrets_370x208
      Unlocking Secrets: How to Crack SHA256 Passwords with Hashcat
      30 March, 2023
      domain-controllers_370x208
      Identifying Domain controller in a network
      24 March, 2023
      storm-braker_370x208
      Access Location, Camera & Mic of any Device 🌎🎤📍📷
      23 March, 2023

      Leave A Reply Cancel reply

      You must be logged in to post a comment.

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • Hardware
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Privacy
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Download Custom Kali
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact
      • Vulnerability Disclosure

      Support

      • FAQ
      • Forums

      Copyright © 2022 Z IT SECURITY LTD t/a zSecurity. All rights reserved.

      • Privacy
      • Shipping
      • Refunds
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Enroll in this course to access this lesson!

      All of our courses include:

      ✔ Lifetime, unlimited access to course materials & training videos.

      ✔ Watch online or download lectures for offline use.

      ✔ Verifiable certificate of completion from zSecurity, signed by the course instructor, Zaid.

      ✔ Get answers from our Support Team within a maximum of 15 hours.

      ✔ Unlimited Updates.

      Get free 1 month VIP membership per course with:

      ✔ Live mentorship and Q&A session with the course instructor, Zaid.

      ✔ Instant support from community members through our private discord channel.

      ✔ Daily updates with the latest tutorials & news in the hacking world.

      ✔ Daily resources like CTFs, bug bounty programs, onion services and more!

      ✔ Access our VIP community & connect with like-minded people.

      ✔ Discounts on other zSecurity products and services.

      We are using cookies to give you the best experience on our website. This includes but is not limited to:

      • Storing your settings and preferences.
      • Remember your access information
      • Track website performance and make our website more relevant to you.

      You can find out more about which cookies we are using or switch them off in settings.

      Privacy Overview

      This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

      Strictly Necessary Cookies

      Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

      3rd Party Cookies

      This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

      Keeping this cookies enabled helps us to improve our website.

      Please enable Strictly Necessary Cookies first so that we can save your preferences!

      Powered by  GDPR Cookie Compliance