Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,980 --> 00:00:02,520
‫Now, as I promised you,
2
00:00:02,520 --> 00:00:05,370
‫this course is going to be highly practical.
3
00:00:05,370 --> 00:00:08,763
‫But I also promised that I will not neglect the theory.
4
00:00:09,900 --> 00:00:11,610
‫Now, what we mean by hacking
5
00:00:11,610 --> 00:00:15,280
‫is being able to gain access to a system
6
00:00:15,280 --> 00:00:18,170
‫that you're not supposed to have access to.
7
00:00:18,170 --> 00:00:21,240
‫So for example, logging into an email account
8
00:00:21,240 --> 00:00:23,700
‫that you're not supposed to have access to
9
00:00:23,700 --> 00:00:26,003
‫is considered hacking that account.
10
00:00:26,890 --> 00:00:29,350
‫Gaining access to a remote computer
11
00:00:29,350 --> 00:00:31,530
‫that you're not supposed to have access to
12
00:00:31,530 --> 00:00:33,480
‫is hacking that computer.
13
00:00:33,480 --> 00:00:36,030
‫Reading information that you're not supposed
14
00:00:36,030 --> 00:00:39,363
‫to be able to read, again, is considered hacking.
15
00:00:40,340 --> 00:00:43,610
‫So you can see that there is a large number of ways
16
00:00:43,610 --> 00:00:46,090
‫to hack into a system, and the word hacking
17
00:00:46,090 --> 00:00:48,240
‫can refer to a number of things,
18
00:00:48,240 --> 00:00:50,880
‫but the main concept is the same,
19
00:00:50,880 --> 00:00:53,770
‫gaining access or being able to do things
20
00:00:53,770 --> 00:00:56,400
‫that you're not supposed to be able to do
21
00:00:56,400 --> 00:00:58,570
‫is considered hacking.
22
00:00:58,570 --> 00:01:01,110
‫Now, there are three main types of hackers.
23
00:01:01,110 --> 00:01:02,840
‫We have the black-hat hackers,
24
00:01:02,840 --> 00:01:06,540
‫these are the bad people that hack systems illegally
25
00:01:06,540 --> 00:01:08,190
‫in order to steal money,
26
00:01:08,190 --> 00:01:11,183
‫or to achieve their own illegal goals.
27
00:01:12,050 --> 00:01:15,370
‫The second part of hackers are the white-hat hackers.
28
00:01:15,370 --> 00:01:19,340
‫So this is us, these people use the same techniques
29
00:01:19,340 --> 00:01:21,400
‫used by the black-hat hackers,
30
00:01:21,400 --> 00:01:23,790
‫and they also hack into systems.
31
00:01:23,790 --> 00:01:26,300
‫But they only hack into systems
32
00:01:26,300 --> 00:01:28,630
‫that they have permission to hack
33
00:01:28,630 --> 00:01:31,963
‫in order to test the security of the systems.
34
00:01:32,910 --> 00:01:36,370
‫And finally, we have the gray-hat hackers.
35
00:01:36,370 --> 00:01:38,610
‫These are a mixture of the two,
36
00:01:38,610 --> 00:01:40,480
‫so they'll hack into any system,
37
00:01:40,480 --> 00:01:42,310
‫even if they don't have permission
38
00:01:42,310 --> 00:01:44,890
‫to test the security of the system.
39
00:01:44,890 --> 00:01:48,480
‫But they will never steal money or damage that system,
40
00:01:48,480 --> 00:01:50,480
‫and in most cases, they'll go ahead
41
00:01:50,480 --> 00:01:53,710
‫and tell the administrator of that system.
42
00:01:53,710 --> 00:01:56,100
‫But what they do is still illegal
43
00:01:56,100 --> 00:01:59,170
‫because they test the security of systems
44
00:01:59,170 --> 00:02:02,853
‫that they do not own, or do not have permission to test.
45
00:02:03,840 --> 00:02:07,630
‫Now, one big question that people always ask is why hacking?
46
00:02:07,630 --> 00:02:09,700
‫Why teach or learn hacking?
47
00:02:09,700 --> 00:02:12,110
‫Well, hacking is an existing industry,
48
00:02:12,110 --> 00:02:15,270
‫there are lots of job opportunities for ethical hackers,
49
00:02:15,270 --> 00:02:17,450
‫for people like us, who would go ahead
50
00:02:17,450 --> 00:02:19,420
‫and test the security of systems
51
00:02:19,420 --> 00:02:21,910
‫to make sure that these systems are secure
52
00:02:21,910 --> 00:02:24,980
‫and not vulnerable to black-hat hackers.
53
00:02:24,980 --> 00:02:26,530
‫There is actually a huge demand
54
00:02:26,530 --> 00:02:28,320
‫for ethical hackers these days
55
00:02:28,320 --> 00:02:32,130
‫because of the increased amount of hacking attacks.
56
00:02:32,130 --> 00:02:34,720
‫So we hear on the daily big systems
57
00:02:34,720 --> 00:02:37,230
‫and big companies are getting hacked.
58
00:02:37,230 --> 00:02:39,310
‫Not so long ago, Uber got hacked,
59
00:02:39,310 --> 00:02:44,310
‫and information of more than 56 million users were exposed.
60
00:02:44,410 --> 00:02:47,420
‫So companies like Uber, Facebook, and Google,
61
00:02:47,420 --> 00:02:49,930
‫they hire hackers in order to try
62
00:02:49,930 --> 00:02:51,550
‫and hack into their systems,
63
00:02:51,550 --> 00:02:53,720
‫and tell them where the weaknesses are
64
00:02:53,720 --> 00:02:55,550
‫so that they can fix it.
65
00:02:55,550 --> 00:02:57,640
‫They also have bug bounty programs
66
00:02:57,640 --> 00:03:00,660
‫where they literally ask all the hackers around the world
67
00:03:00,660 --> 00:03:02,960
‫to go ahead and try to hack into their websites
68
00:03:02,960 --> 00:03:05,490
‫and with their web applications, and if they could,
69
00:03:05,490 --> 00:03:08,313
‫they will pay them a bounty for the bugs that they find.
5621
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.