Cyber Security Interview Questions and Answers | Encoding, Encryption, and Hashing | Threat vs Risk

แชร์
ฝัง
  • เผยแพร่เมื่อ 3 พ.ย. 2024

ความคิดเห็น • 29

  • @mamacocolilo105
    @mamacocolilo105 3 ปีที่แล้ว +2

    1st comment😛

  • @h1th3r3
    @h1th3r3 3 ปีที่แล้ว +7

    So glad you're making this series, thanks for taking the time to put this all together! I especially like the Answer/Explain mode format, super helpful.

    • @JoshMadakor
      @JoshMadakor  3 ปีที่แล้ว +1

      Thanks so much! Glad you find them useful. I'll do much more :)

  • @imoen00
    @imoen00 3 ปีที่แล้ว +6

    OMG thank you, I've got a second interview coming up Thursday and I just watched your other interview questions video last night to pass the one I had today. So, thank you for your content from a fellow WGU grad!

    • @JoshMadakor
      @JoshMadakor  3 ปีที่แล้ว +1

      omg congrats on passing the first interview! Best of luck on the next one! You got this! I have a bunch more of these type of videos coming out, so stay tuned :P. Thanks again!

    • @imoen00
      @imoen00 3 ปีที่แล้ว

      @@JoshMadakor Sure will! I love your content :)

  • @mahakhan7098
    @mahakhan7098 ปีที่แล้ว +2

    Those were great answer mode. Extremely detailed but straight to the point. I am making notes

  • @OfflineSetup
    @OfflineSetup หลายเดือนก่อน

    I daren't scroll down the comments for fear of coming across so know it all that wishes to point out that a threat can be positive. Ignore these people. You have risks and you have opportunities. The only time you take positive outcomes into account is why you may limit risk mitigation, and even then be careful what you put in writing.

  • @soldiermedic81
    @soldiermedic81 3 หลายเดือนก่อน

    Have an interview tomorrow. Using this as my template!

  • @ngole3
    @ngole3 ปีที่แล้ว

    Awesome Material Josh. I have no experience in cyber security. This really helps.

  • @roberttolito7665
    @roberttolito7665 3 ปีที่แล้ว +3

    Nice explanation. I always got confused on the differences of risk, threat, and vulnerability.

    • @JoshMadakor
      @JoshMadakor  3 ปีที่แล้ว +1

      Yeah, I know exactly what you mean. It's the same for me with "policies, standards, and guidelines". Haha. thanks for watching :)

  • @SeanMcLaughlin-u7s
    @SeanMcLaughlin-u7s ปีที่แล้ว

    Looking forward to the series. Would help to eliminate phrases such as "like" and "kind of".

  • @takaoda5266
    @takaoda5266 3 ปีที่แล้ว +4

    Josh sensei
    Thanks for your sharing. I would like to see the technical interview, which includes some commands test (maybe Linux) or Scripting based on the interviews you still remember or what you would do if you were hiring a manager.
    I think you have both CS (developer) and Cyber security (security) sides. So it is exciting, and I will encounter some when I finish my master's next March and change my jobs.

    • @JoshMadakor
      @JoshMadakor  3 ปีที่แล้ว +1

      Taka-San, Sure ! I can do some questions about coding, or at least questions that I would ask if I was the hiring manager :) GL on the masters, what kinda job you gonna go for?

    • @takaoda5266
      @takaoda5266 3 ปีที่แล้ว

      @@JoshMadakor Josh-sensei Arigatou gozaimasu.
      > what kinda job are you gonna go for?
      I am wondering this, and I was about to ask you to use a mentor system on your website, maybe 30 min one. What do you think?

  • @TechAiExpert
    @TechAiExpert ปีที่แล้ว

    Greatest video and questions keep up the great work

  • @renestevens9085
    @renestevens9085 3 ปีที่แล้ว +2

    Please can you bring up some interview questions on RMF?
    Thank you

    • @JoshMadakor
      @JoshMadakor  3 ปีที่แล้ว

      Sure, I can write this down in my list of videos to make :). Thanks for watching :)

  • @nitish0303
    @nitish0303 ปีที่แล้ว

    Please share a interview video on Mitra attack and cyber kill chain

  • @hiddanek
    @hiddanek 3 ปีที่แล้ว +2

    This was great, thank you Josh. Subscribing
    If I may suggest a question for the next episode, would love to hear your take on:
    What happens when you go to google website?

    • @JoshMadakor
      @JoshMadakor  3 ปีที่แล้ว

      Hey Hiddan, thank you so much! I wrote your question down :). thanks for watching and subbing!

  • @Keyumiz
    @Keyumiz 2 ปีที่แล้ว

    If a host has the IP address information stored in browser or OS cache, it won't be affected by DNS poisoning because it modifies actual cache on the DNS server, right? Do you know how long the browser and OS cache might remain until a host needs to do another dns query?

  • @mawellyankah
    @mawellyankah ปีที่แล้ว

    Help to secure security clearance job and how do I get I switched from aviation to IT now but no job so help

  • @vnsmur31
    @vnsmur31 3 ปีที่แล้ว +1

    Hello. I currently work in I.T. and would like to study cybersecurity. What would you say would be the best approach for me to get started? Books, mentors, video, etc.. thank you

    • @JoshMadakor
      @JoshMadakor  3 ปีที่แล้ว +4

      Hey Vanessa, super cool that you're already in IT, you got the hard part out of the way, haha. I would recommend doing these things, all at once:
      1) Start listening to Darknet Diaries Podcast if you don't already. If you like it, listen to all the episodes, it will open up your brain to Cybersecurity and give you an intuition for the type of things that are possible in this world, as well as give you the ability to speak to these events in interviews: darknetdiaries.com/
      2) Start listening to The CyberWire Daily Podcast. This is a high production news podcast that talks about daily cyber events. Listening to this will improve your cyber vernacular and give you stuff to talk about in interviews: thecyberwire.com/podcasts/daily-podcast
      3) Get CompTIA Security+ (How to pass IT Certs: th-cam.com/video/HMCHOVDoZig/w-d-xo.html )
      4) Start trying to take on cyber-related tasks at your current job. Get involved or help develop incident response playbooks, for example, when a user loses their laptop or their stuff gets compromised, develop some processes/procedures for dealing with it. Or if there is an existing security team at your work, offer to take on some of the grunt work (such as vulnerability remediation, they will love you for this, and is actually what helped me get into cyber).
      Hope this wasn't too overwhelming. There are a lot of ways around the mountain, this is just what I would suggest to do from where you are now. Thanks so much for watching and taking the time to comment, I really appreciate it a lot!