Learning Library

← Back to Library

Path to Becoming an Ethical Hacker

Key Points

  • The video explores how to prepare for and land an ethical hacking role, building on previous episodes that covered the job description and required tools.
  • Patrick shares his personal journey: starting in college with help‑desk work, which gave him practical computer and customer‑service experience and early exposure to security issues.
  • He then served six years in the Marine Corps, where involvement with Department of Defense information‑assurance teams reinforced offensive‑defensive mindsets and introduced military‑derived cybersecurity concepts.
  • As he transitioned out of the military, Patrick leveraged the GI Bill to earn professional certifications and focused on targeted training to qualify for a career as an ethical hacker.
  • The host emphasizes that while each path is unique, learning from Patrick’s blend of hands‑on IT support, military discipline, and formal certification can guide aspiring ethical hackers.

Full Transcript

# Path to Becoming an Ethical Hacker **Source:** [https://www.youtube.com/watch?v=wLgdhrZMGKE](https://www.youtube.com/watch?v=wLgdhrZMGKE) **Duration:** 00:15:24 ## Summary - The video explores how to prepare for and land an ethical hacking role, building on previous episodes that covered the job description and required tools. - Patrick shares his personal journey: starting in college with help‑desk work, which gave him practical computer and customer‑service experience and early exposure to security issues. - He then served six years in the Marine Corps, where involvement with Department of Defense information‑assurance teams reinforced offensive‑defensive mindsets and introduced military‑derived cybersecurity concepts. - As he transitioned out of the military, Patrick leveraged the GI Bill to earn professional certifications and focused on targeted training to qualify for a career as an ethical hacker. - The host emphasizes that while each path is unique, learning from Patrick’s blend of hands‑on IT support, military discipline, and formal certification can guide aspiring ethical hackers. ## Sections - [00:00:00](https://www.youtube.com/watch?v=wLgdhrZMGKE&t=0s) **Path to Becoming an Ethical Hacker** - In the third video of the series, the host and professional hacker Patrick discuss how to prepare for an ethical hacking career, outlining Patrick’s journey from college help‑desk work to full‑time security consulting. - [00:03:07](https://www.youtube.com/watch?v=wLgdhrZMGKE&t=187s) **From Pen Testing to Red Teaming** - The speaker traces his progression from security analyst to penetration tester and finally to red team specialist, highlighting the specialization ladder and stressing that an inquisitive mindset is essential for ethical hackers. - [00:07:58](https://www.youtube.com/watch?v=wLgdhrZMGKE&t=478s) **Balancing Bootcamps, Degrees, Certifications** - The speaker explains that bootcamps, formal degrees, and certifications each add value to a candidate’s profile, but success hinges on mindset and strategically combining these credentials rather than relying on any single credential alone. - [00:11:28](https://www.youtube.com/watch?v=wLgdhrZMGKE&t=688s) **Stay Curious, Master Terminology** - The speakers emphasize that success in adversarial simulation requires a blend of theoretical and hands‑on knowledge, continual learning of evolving terms and concepts—especially AI—and a proactive effort to stay ahead of industry changes. ## Full Transcript
0:00Welcome back to the third installment in this series on ethical hacking. In the first one, we 0:05took a look at what is the job role in general. And then in the second video, we looked at what 0:11elements go into the job: what kinds of things do you, if you're an ethical hacker, have to do, what 0:16kind of tools and things like that. In this video, we're going to take a look at how you go about 0:22getting a job, how do you, in other words, how do you get prepared for this. The kinds of things that go 0:27into making you possibly able to be an ethical hacker like Patrick, who I brought along with me. 0:33He does this stuff for a living. So, I want to start off, Patrick, asking you: What was your path 0:39getting into this? Now, everyone's going to have a little bit different journey, so you don't need to 0:44exactly map his, but learn from what his experience was. So, how did you get into this field? 0:49What was your path? Sure. Uh, well, I'll skip over the first couple of years, coz maybe they're not quite 0:54so relevant, but uh, I, um, started my sort of IT career when I was in college, working basically help desk 1:00type of work. And that was really good because uh, it gave me a good background in working with you 1:06know computers on day to day and also working with... with customers. Uh, then I joined ... I'm sure that also 1:11showed you how things could break. You know, people are calling you in the help desk, hey, I... I can't get 1:16into my system. And then maybe it's a hacking issue, or maybe it's not, but you got exposed to 1:21both of those. It also gave me an opportunity to play around with how do I optimize this? Can I 1:25improve it? Can I make it better than the way it was designed to be initially? And so it ... it gives you 1:29a good background all ... you know, in every aspect. Sure. Uh, but from there I ... I decided to join the military. So, 1:36I spent the next about six years in the Marine Corps. Thank you for your service I appreciate 1:42that. Um, and it was maybe uh, not quite so related to work, but I ... I had the opportunity to ... to maybe spend some 1:48time with like DoD information assurance folks and get some background. So it was, you know, some 1:53OJT, but basically uh, that was a little bit of a break in my overall IT career. Sure. And there's a 1:58lot of carryover from the mindset of military is obviously about offense and defense. And 2:05we're in the same kind of battle just analogously when we're talking about IT. So, I'm sure some of 2:12the lessons learned in the battlefield and those kind of areas can also apply here. Absolutely. And 2:18in fact, a lot of the ... the terminology we've used over these past couple of videos are things that have 2:23been derived from the military. For whatever reason, cybersecurity loves to pull their 2:26terminology a... and concepts from, you know, military-type things. Yeah. So what did you do after that? So, 2:32as I was getting ready to leave the military, uh, I started working on some certifications. I was able 2:37to use my GI Bill to go uh, take a lot of training, which was ... was awesome, uh, but I got my first real 2:43InfoSec job as a security analyst. Okay, gotcha. And what was involved in that? So, I ... I like to tell 2:50people this was my, you know, let me say really my starting because it was very generic. It was a 2:56jack of all trades. So we did everything from well, generic-type security assessments—so think 3:01vulnerability scanning and ... and analysis—all the way up to IT audit and risk assessment. Okay, gotcha. 3:07And then from there you end up here. That's right. Well, there was one more step. I guess you could 3:12think of it as a continuing spec ... specialization. So, as a security analyst, one of the things that I had 3:18an opportunity to do was penetration testing. Uh, and so, my next job was a ... uh, focused 3:24purely on penetration testing. Yeah. Yeah. Okay. All right. So that's uh, an aspect of ethical hacking. And 3:31then ... Definitely. So, after I spent some ... some, let's say, maybe seven years doing penetration testing, I 3:37had an opportunity to move over to RED teaming, which is again, maybe just a further 3:41specialization in ... in the overall field. Yeah, yeah. So, in fact, we talked about it in the other two 3:46videos, a ... a triangle where it began with vulnerability testing, pen testing and then RED 3:52teaming. And so now you're doing adversarial simulations and things of that sort. Okay, Patrick, 3:57so that was your path. But what was your preparation? What kinds of things did you have to 4:02do in order to get to this point in the first place? Uh, let's start off talking about sort of the 4:08mindset, the aptitudes and things like that. What do you think are important about those that you'd 4:14be looking for in an ethical hacker? Certainly. And you can imagine that we have people with lots of 4:21different types of atti ... aptitudes and backgrounds. But overall, what I look for is someone who has that 4:26inquisitive sort of ...of mindset. Somebody who maybe as a child was the type of person to take a toy 4:32apart and maybe even put it together in a different way, so it would achieve some different 4:36objective. Yeah, that was me as a kid for sure. Uh, everything I got, I wanted to know how it worked 4:41and I'm still that way. I want to know how things work, and I think if you have that kind of 4:46curiosity, that's going to be an important start. It's not sufficient, but it's a really good place 4:52to start. I agree, and you tend to find that people who have that mindset are very passionate about 4:56this type of work, tends to drive them to, you know, how they have to take the thing apart. I have to 5:01know. And they'll ... they'll ... they'll keep going until they figure it out. Yeah. And I think also the 5:06uh, mindset—again, I've ... I've made some, uh, some facetious comments about just joyriding and like, this thing 5:12is a ... is a big video game. There is a lot of fun in this, but there's also a lot of work in this. And if 5:18someone just thinks this is going to be like playing video games, they're going to be really, uh, sore 5:23... sorely uh, disappointed. So, the mindset also has to involve having some discipline, uh, knowing 5:30where the limits are, pushing those limits, but knowing where to stay on the side of those, ethics, 5:36a lot of those kinds of things, uh being responsible and so forth. That's the reason they're paying you. 5:41So, I think that's going to be cri ... critical here as well. Definitely. And, you know, we think about 5:47uh, mindset. We ... We have to think about we're also on a team. So we have people who rely on us. Like you 5:51said, we have to have a ... a deliverable; we're giving that to a client. That's what they're going to pay 5:55us for. Uh, we also have to think ... you know, cybersecurity is ... is changing, is maturing and growing. And I once had a 6:01friend told me uh, that probably one of the most fun things the human can do is exploit their uh, uh, uh, 6:07So the first time you ... you actually accomplish that is very satisfying. But uh, that's getting harder, 6:12you know. Computers are getting harder to break into and so you have to mature with it. Yeah, 6:16absolutely. And I ... I like that idea of teamwork because the ... the image is often of a hacker of any 6:22sort as this lone wolf just off doing their own thing, you know. It's somebody where they've got a 6:27job where, you ... you know, you ... you close the door, you slide pizzas under the door, and then they give you code 6:32out the other end or reports or whatever. Uh, that's not really how it works so much in the 6:37real world. We've got to work as a team in order to ... to accomplish this stuff. You can pay me in 6:42pizzas, but I suggest it's probably not the best approach. I ... I would agree. Uh, so how about in terms of 6:48some of the other preparation. Do I need a college degree in order to do this? Not 6:53necessarily. Uh, I, you know, what we really look for when we're ... we're finding our uh, someone to hire or bring on to 7:00the team is: Do they have the true capability? Can they, you know, not just talk the talk? Can they 7:06walk the walk? Can they show us that they can do the things that we need them to be able to do? Now, uh, 7:11often we find that a degree does help; it's a very helpful sort of thing. Uh, my degree is in 7:16business. Yeah. Uh, and I will tell you that uh, especially in the first 5–10 years of my career, when I 7:21would run into really strong computer science guys, I was very jealous because they were so far 7:25ahead of me on the power curve. So, it can ... it can certainly if you have this, it can advantage uh, you 7:31toward it. So, for me, I did my degree in computer science. So I felt like I was, you know, well 7:37trained in a wide variety of things. But again, the point is there's not one path, there's not one 7:43single answer. You were able to go out and get some more hands-on skills earlier in your career 7:48that we're able to ... to supplement that and ... and make it so that you can do that. But I'm an adjunct 7:54professor. So, I'm always going to say, yeah, a degree is important because I believe in that. 7:58That's what I'm spending my time on. But that said, it's not for everyone. Some people do bootcamps. 8:05Uh, what's your experience with ... with that? Do you think that qualifies someone? Not necessarily. I think it 8:11goes back to the aptitude and mindset, which is, people who are very passionate and drawn to this 8:16type of work, the people who like to take things apart. They can use bootcamps to teach them core 8:20skills that they can use to make them very effective. But the ... it's not just a supplement; it's not 8:24a checkbox that will get you a job necessarily. Yeah. So again, each one of these things, I ... I ... think, 8:29you have to look at them in total; they're all adding up. So a bootcamp could be a way, for 8:34instance, to enhance your degree that you've already done. Or you could do it the other way 8:38around where you start off with a bootcamp and you get some of the basics, you s ... get an entry-level job. 8:43Then you want to move up, you want to get past the glass ceiling that might be blocking you, and 8:49the degree helps you do that. So, you could do this in a number of different orders. Uh, another thing 8:54that I think uh, hiring organizations are looking for are certifications. So, what ones of those 9:01are particularly important, do you think, in this space? Sure. And you know, one thing I'll mention on 9:05the certifications is it's a great way to show an employer that you do have some skill because it's 9:09basically showing that you took a test and verified that you're capable of something. And 9:13certainly, certain certifications are going to be more useful earlier in your career versus maybe 9:18later on, but maybe some really well-known ones I would start off with would something like 9:22Network Plus. Yeah, Network Plus is ... is a good one that ... that's well known. And like you said, the point of 9:28these certs would be to demonstrate to an employer who doesn't have time to ask you all the 9:34things and find out what all you've done. But obviously a degree is one way of uh, providing a 9:40credential for that. This is another. What are some of the others that ... that relate here? Another good one 9:44is CCNA. So if you're familiar with you know, Cisco networking ... And just like Network Plus, I think 9:50this is a really uh, cool one because it's not just saying, hey, I want to go learn how to hack; it's 9:55saying, hey, I'm interested in understanding how this technology works at its core level, and I'm 9:59actually capable of going and implementing it. Yeah, well, I've heard a ... a lot of people in this 10:04space have is the Certified Ethical Hacker—Sure— certification as well. Yeah. CEH is a well-known 10:09one that, um, you know, it gives you a good uh, shared uh, knowledge base and ... and language so that you can show hey, 10:16I actually understand what these tools are, how they work, and maybe uh, how not to mayb ... maybe break a system by 10:21using them. Yeah, sure. And how about this one OCSP? Uh, OSCP. OSCP. Yes. 10:28Yeah. That's a ... that's a great one. This is the one that ... that I like because it's so hands-on and it 10:33really focuses on can you actually perform these skills in a live environment. You actually need to 10:38be, you know, to be able to demonstrate that you really understand these things at a fundamental 10:41level. And it's also testing whether you're dyslexic or not. And—Ha-ha-ha!—so there's that. Uh, and then uh, 10:47something else uh, would be we've talked about Network Plus - Security Plus. There's a lot of 10:52people that can't get this ultimate cert in cybersecurity, the CISSP, which is kind of considered 10:58the gold standard of certificates But they don't, they're not really ready for that yet with ... in terms of 11:04knowledge or experience. And there is a... a five-year requirement for experience. But this cert can be 11:11one that's uh, an entry level that leads you then to the CISSP. Definitely. And the ... the two things I would 11:18say about these is uh, they're really great in that they give uh, you all the ... the terminology and concepts 11:24that you need to sort of maybe move to the next step. So they give you the foundation you need. 11:28Because one of the things that you may run into in interviews is, hey, do you understand this 11:32concept or this terminology? if you've never heard it before, you're going to be at a loss. Yeah, 11:36exactly. And it's interesting how some of these tend to be, you know, uh, a more hands-on and some of 11:43them tend to be more theoretical and conceptual. But it's not that one is enough. You need to 11:49really understand both if you're really going to succeed in this field. That's right. You can't 11:53write the report if you don't understand the words. Okay, Patrick, you've reached the highest 11:58level in your field in this area of adversarial simulation and ethical hacking. So, what kind of 12:04advice, if you were able to go back into a time machine and talk to your younger self, what would 12:11you tell yourself? Well, one of the key things that uh, I would always try to ... try to you know, impart to anybody, 12:18particularly my younger self, is always keep an eye on what you need to know y ... next, because the 12:24field is changing quickly and ... and um, it's hard to keep up sometimes. I'm sure you ... you've probably talked a lot 12:29about AI over the past year or two. Um, you know, knowing what the ... what's coming around the corner 12:35is a really key element to staying afloat in this industry. Yeah, I think so. You've got to stay 12:40curious. You've got to keep learning. If you're comfortable, well, then h ... you're going to be 12:46uncomfortable very soon. And AI is a really good example of that. When you see those new 12:51technologies coming along, uh, don't say, uh, I'm not interested in that. When you see that light, you 12:56want to run to the light, because guess what, the bad guys are going to be using this to try to 13:01break in. If I'm going to defend against that, I need to understand it at least as well as they do, 13:07if not better. Uh, anything else you would tell your former self? Yeah. Never be the smartest person in 13:12the room. I like to surround myself with people who are more knowledgeable than me, so I can learn 13:16from them and rely on them and make sure that we're, you know, moving uh, uh, forward together. Yeah, that ... that goes 13:23to that element of teaming as well. And I think what is critically important is being a lifelong 13:29learner. You don't ever want to say, I'm comfortable with this. Uh, again, I'm looking for 13:35flexibility, I'm looking for curiosity, I'm looking for someone who enjoys learning. If you don't 13:40enjoy learning, you're in the wrong field with cybersecurity, because this field is always moving. 13:45But to me, that's what makes it really fun. I agree. Yeah. So, so, there's a little bit of advice 13:51and, uh, you know, maybe I would tell myself to not wear that shirt that I used to have. Maybe get rid 13:58of that, because that's not going to uh, hold up well. But anyway, there's ... there's a little bit. One more question 14:04for you, Patrick, though. I just want to know, can you get me a job? Well, unfortunately, Jeff, I am 14:11not in charge of the hiring. I'm not involved in hiring, so I can't actually help you out. Uh, however, I 14:17would suggest you keep your eyes open. Look at places like LinkedIn, or if you want to come work 14:21at IBM, check out ibm.com/jobs. Yeah, this is where we post all of the job postings at this company. 14:28But there's a lot of jobs out there. So don't ... uh, don't just uh, ask a ... a stranger or someone that you 14:35don't know for that. Build your ... your credentials and start working with people. Do internships. Do 14:42things like that that put you in a place where you now know the people. You need to build a 14:47network of people, and people that actually know you and have observed your work. They are the ones who 14:53can serve as references for you. So, there's a lot of jobs happening out here and a lot of 14:58opportunity in this space. The one thing the bad guys do is they never sleep, it seems. So they're 15:04always creating new opportunities for folks like us. And that's ... that's quite a ... a gift. I guess we 15:10should look at it as ... it one way. So, in this series—I hope you've enjoyed it—we've looked at the role, 15:16we've looked at the job overall and some of the career advice that you can follow in order to 15:21become an ethical hacker.