Have you ever wondered how a manual labor worker ends up working with the FBI in cybersecurity? Today, we bring you the fascinating journey of Amanda, who made the remarkable transition from manual labor to cybersecurity, thanks to a career-ending injury and a surprising knack for technology. Join us as she shares her intriguing insights into the world of cybersecurity, the Google Cyber Security course, and how to find your niche in this rapidly evolving field.
In a surprising turn of events, Amanda's journey became even more fascinating when she had to use her newly-acquired Open Source Intelligence (OSINT) techniques to outsmart an online stalker. If you've ever underestimated the power of keen observation and attention to detail, Amanda's real-life experience will make you think twice. She shares how she managed to locate a potential troll from a single photograph, a testament to the power of OSINT.
As the conversation unfolds, we also delve into Amanda's inspiring journey of learning programming and mastering technical concepts, despite not having a technical background. Learn how she grappled with Python, explored different learning methods, and discovered the importance of scripting. But that's not all. We also examine the significant role of privacy and anonymity in social media, the limitations of anonymity, and the possible implications of the power grid and the internet going offline. So, prepare yourself for a thrilling ride as we unravel the world of cybersecurity through Amanda's eyes.
Support the Show.
Merch: https://cyberwarriorstudios.com/store
Youtube: https://youtube.cyberwarriorstudios.com
Twitch: https://twitch.tv/CyberWarriorStudios
Twitter: @CyberWarriorSt1
Discord: https://discord.gg/eCSRzM6mJf
Security Happy Hour: All About Cyber
Security Happy Hour: From 0 to Hero - Becoming a Pentester
Security Happy Hour: Pivoting in Your Career & Cybersecurity Student Experience
Security Happy Hour: New Year's Eve Protecting Your Future
Security Happy Hour: Christmas Eve Extravaganza
Security Happy Hour: Enterprise Vulnerability Management
Security Happy Hour: Social Engineering and Physical Pentesting
Security Happy Hour: Community Outreach with Republic of Hackers
Security Happy Hour: Blue Team, The Journey, Q&A
Security Happy Hour: Identity & Access Management
Security Happy Hour: Threat Intel, SecOps, & Blue Team Training
Security Happy Hour: Cyber Communities & Gatekeeping
Security Happy Hour: Building Your Network to Build Your Career
Security Happy Hour: Building a Security Training and Champions Program
Security Happy Hour: Enterprise Security Monitoring & Security Onion
Security Happy Hour: Is Cybersecurity Right for YOU?
Security Happy Hour: How to Start Securing Your Environment
Security Happy Hour: Burnout, Content Creation, & Leadership
Security Happy Hour: ML and AI in Cybersecurity
Security Happy Hour: The Journey, Women in Cyber, Time Management
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast