 Hello, hi everyone. I am Sanjay Gupta. I welcome you on Sanjay Gupta Tech School. So I welcome everybody in this new bootcamp and this bootcamp you all know it is based on cyber security. So which is different stream other than Salesforce. It is also related to Salesforce somewhere and I have Sumit with me. So Sumit will be your instructor and he will be delivering all the content with you. So this is day zero where Sumit will be guiding you like what cyber security is and when I announced this bootcamp, so lots of people were having a doubt like what cyber security is. Can you please guide us so that we can decide whether this stream will be beneficial for us or not. So today I have Sumit live with you guys and whatever question you have in your mind you will be able to ask right. So hello and welcome everybody those who just messes in the chat. Okay, so initially like I will be interacting with you for five, six minutes and then I will hand over this stage to Sumit so that he can guide you. Okay, so I'm just sharing my screen and like you all know this is cyber security bootcamp. So I will be your host Sanjay Gupta. I am just running this platform so that I can provide free knowledge to everybody in the whole world, right? So this is the idea behind this YouTube channel. So we are doing everything totally free of cost for the betterment of the community and I have Sumit Jen with me. He will be your trainer speaker for all the sessions related to cyber security, right? And one more information I want to float with you. So this is separate bootcamp other than Salesforce. So from next week you will be having two different sessions at two different time intervals. One is one is related to Salesforce and another one is related to cyber security, right? So don't get confusion. Salesforce is not going anywhere. I will be having all those sessions at regular weeks. We'll be having all the sessions on daily basis, right? So there will be a little bit time change so that I will be updating you, right? So before starting, so I just want to share one information like me and Sumit, we both are from Jaipur, India. And I just want to thank all my viewers and subscribers for following this channel for so long time. And like I'm doing this YouTube thing from past seven years. And I just want to thank everybody. And like what I decided now I am going to connect with a lot more creators and Sumit is first one with whom I am collaborating. So I just guided him to start his own YouTube journey. So he will be sharing information free of cost on his channel for the viewers, right? And he also belongs to Jaipur. So we live in Jaipur, India. And I just want to know like from which location you are. So just, just mention your location in the chat so that we know every, like we know each other from which location you are and you all know like we belongs to Jaipur, India. And you can see this beautiful picture. It is famous in Jaipur and Jaipur is basically known with this picture everywhere. It is Havamel, right? It is located in the center of the city. And like with this picture, whenever you see you can recall Jaipur. And in Jaipur, Salesforce ecosystem is growing fastly and it is having lots of companies here. And other than Salesforce, like I just wanted to have other technologies also. So that's why cyber security is there. So I can see lots of people are from outside India as well. So people are from Canada, USA, people are from India, like different locations. I can see Bangalore, Jharkhand, Nagpur, Andhra Pradesh, Chennai, Vizag. We have people from Jammu Kashmir as well. We have people from Maharashtra. We have people from Uttar Pradesh, Kolkata, Ghaziabad. So that is great to see like people from all over the globe joining this bootcamp. Okay, so now I'm just moving to the next slide. So before like starting this bootcamp, we just want to know the audience like from which background you are, are you a student or fresher or are you a working professional? Like so after sharing your information like from which location you are, now just share whether you are student or fresher. If you are a student or fresher, so from which college or university you are, or if you are any working professional, so in which company you are doing a job so that we know if you if you don't want to disclose your company name, so just say like you are a working professional, so that Sumit will be having an idea like like what kind of audience is there, like we have more student or fresher or we have more professionals or we have a combination of both. Right, so if you are from non-IT background then also you can just mention whatever, whatever Sumit is just watching this chat, so he will get an idea like what kind of viewers or what kind of audience he will be like speaking with. So just mention whether you are IT professional, non-IT professional, student, fresher, career gap, whatever. So we need to know about you so that we can understand how our sessions we need to plan. Okay, so I am just like speaking in front of Mike a little bit closer so that you can hear properly. So yeah, I can see lots of professionals are there, I can see career break folks, I can see freshers as well. Right, so like this bootcamp will give you both the opportunities like after learning different tools or different features of cybersecurity, you can apply for a job or you can become a freelancer as well. Right, but no one can become freelancer in one day, no one can get a job in one day. So what you need to do, you just need to attend the complete bootcamp. Then we can sort of say like you can apply for a job or you can try freelancing and I have already created a telegram group. So you can be part of that telegram group that telegram group link is available in the description of this video. So if you become part of that telegram group, so submit is there and he can guide you throughout the bootcamp, whatever problems or challenges you will be facing. Right, so I can see lots of folks like here we have different background people. So I saw lots of students, lots of non ID folks, lots of freshers, lots of career gap of freshers, lots of working professionals. So yeah, so we have good amount of audience. So now I'm just going to hand over this platform to submit so that he can guide you a little bit about cybersecurity. Right, so I'm just stopping my screen share so that he can start sharing and yeah, so now you can go ahead and let world know about you and about cybersecurity. Best I would like to thank Sanjay sir for this warm welcome. It would be my pleasure to share the knowledge with all the viewers so that they can learn and start their career in cybersecurity. Before we begin, it's important to all of you to know about me, what I do and what's my experience in this domain. So viewers, my name is Sumit Jain. Currently, I am a member of Cinec and Pentabug red team. These companies helps to secure the various type of applications. Apart from this, I'm working as a senior security specialist in Zeto networks, the company located in Jaipur, India. I have 10 year experience in cybersecurity and penetration testing. Previously, I'm a guest lecturer at center detective training school. Right now I'm helping a student, freshers and professionals to ramp their career in cybersecurity domain. If you find this information we have shared as a team, subscribe and follow our YouTube channels where we will creating content related to our stream. I just started a YouTube channel named the cyber security zone where I'm actively posting content related to cybersecurity. You can follow me on the other social media platforms as well. The links are available in the video description. So let's begin with the introduction about the cybersecurity. So what the cybersecurity means is cybersecurity refers to the practice of protecting computer systems network and digital devices from theft, damage or unauthorized access. It involves implementing measures to prevent and mitigate cyber attacks such as hacking, phishing and malware infection, which can compromise the confidentiality, integrity and availability of data. Cyber security includes a wide range of techniques and the technologies including firewalls, encryption, access control, intruder detection and prevention systems, antivirus software and incident response procedures. It also encompasses security policies such as procedures, risk management and employees training and awareness. Cyber security is increasingly important in today's digital era as more and more aspects of our life become relied on the technology and the internet. A successful cyber attack can have serious consequences including financial loss, reputational damage and even physical harm. As such, cyber security is essential for protecting individual and business and governments from cyber threats. So why we need cybersecurity? Tell me in the comments if you know something about the cyber security. Why we need cyber security? We have to know what cyber security is. So why we need cyber security? So in that digital era, we have some major security problems and to protect ourselves, our application, what we develop, what we create, what we use and our server. From these problems, we need an expert who can solve and protect our data. So the sum of major security problems are virus, malware, ransomware, data theft, DOS attack, vulnerability attacks and money fraud. So what is virus? Virus is the type of malicious software or malware that is designed to replicate itself and spread from one computer to another. You can, a malicious attacker can design, design the virus with writing some scripts, using some programs and spread through your email attachments, your checkbooks, your telegram group on your WhatsApp and on your social media platform as well. Computer viruses are often spread through email attachments, infected websites or file sharing networks like some of you download movies and songs from the pirated websites. So virus can harm your computer. It can cause a variety of harmful attacks such as stealing sensitive information, deleting files as well. Next is malware. Malware is a term used to describe any type of malicious software designed to cause harm to computer system network and digital devices. The term malware is a combination of word malicious and software. So anything with a anything software with a malicious activity, it comes with a malware. Malware are in form of very different types like spyware, who can spy your network, your phone, your computer system, your networks as well. Atrozen, which secretly steal your sensitive data, a keylogger, which can record your keystrokes and your messages as well. The next is ransomware. Ransomware is a type of malware that encrypts files or blocks access to a computer system or network until a ransom is paid. So this attack is commonly attacked on hotels, on companies to demand a ransom. Once the ransomware infects a system, it will display a message informing the victim that their files have been encrypted and demanding payment, often in the form of cryptocurrency. And if you are running a company, an organization or a hotel, you will need that data. So you pay ransom to protect your systems. The next is data theft. This is unauthorized or illegal transfer of sensitive and confidential information from one organization, system or individual to another. This can include theft of personal information, financial data, intellectual property or trade secrets as well. The next is dose attack. All of you have seen this attack very often, like you see in the news that YouTube is down and some of the companies is not running, the website is not running. So this attack is usually carried out by the flooding the target system with a massive volume of requests, traffic or data packets that overwhelm the system resources and cause it to the crash or become unresponsive. So if a dose attack happened, your application will not be as responsive as much earlier. Next is vulnerability attack. Vulnerability attack is a type of cyber attack that exploits a weakness or security flow in a computer system or network. These vulnerabilities can be present in software, hardware or network configuration and can be exploited by the attackers to gain unauthorized access, steal data or carried out other malicious activities, money fraud. Like if we are using money transaction on the internet very often, we use U-type payments and the other gateways. So using the hacking money fraud will be applicable to you. Password breaking, some of the malicious attacker can break your social media passwords and sell your account details on the dark web. Pornography, net extortion, someone can demand some extortion for your personal information. Fishing by creating some fake pages of a lezimate website and redirect to steal user-press information. Spoofing is something like steal the someone's identity and do the malicious activity on their behalf. Sniffing is something to capture the network packets and then see the confidential information they are sending, they are receiving on the network. Cyber defamination to defame someone on internet and demanding for some money, forms of personal information threatening to threat someone on internet and hardware hacking. The devices you are used for connecting the applications, the running environments. So hardware hacking can be also possible. So to protect these we learn cyber security and there are cyber security, in cyber security there are several domains and areas of focus that deal with different aspects of security. So here are some of the main types of domains in cyber security. There is network security, application security, cloud security, IoT security which is internet of things security, physical security, social engineering and incident response. So we have to discuss about these domains as well. So what is network security? So if you are running an organization, you have a network where multiple systems are connected with each other and you are sharing some data, you are sharing some files, you are sharing the applications you develop. So network security is also important. This domain involves securing computer networks from unauthorized access, intrusion and cyber attacks. Network security includes firewall and intrusion detection systems, virtual private networks and other technologies that prevent malicious activity on the internet. So if you are using a network then we have to protect our network from the malicious attackers, cyber criminals or a skilled person who learns various types of attack. The next is application security. Basically applications have three forms. One is web application, one is mobile application and the other one is software application. So these applications developed using various technologies, various infrastructures, various CMS, various plugins, various languages. So we have to protect these applications from a malicious activity. The activities I explained before. So application security, this domain involves securing software applications, our web applications, our mobile applications, Android applications and iOS applications from cyber security, from cyber threats. Application security involves identifying vulnerabilities in software code and implementing measures to mitigate them. It includes secure coding practices, testing and patching of applications. So if we learn cyber security, we can protect our applications we develop, we can check out what the problem we have. If we don't write a secure code so that a malicious attacker can take advantage to expose some of the things you confidentially store in your databases. The next is cloud security. So right now the cloud is also very important because we are moving into the cloud. So cloud security, this domain involves securing data and applications that are stored in the cloud. Cloud security includes access control, data encryption and monitoring of cloud infrastructure to prevent unauthorized access, data breaches and other cyber attacks. So telling the comments, what type of security you want to read, what type of your, what you experience in these type of security. So next is internet of things security. This domain involves securing the network of physical devices, vehicles and buildings that are embedded with sensors and softwares and that enable them to connect and exchange data. IoT security includes such as data encryption, authentication and access control because the some of the major things like refrigerator, our AC, our TV is also running on internet. So we have to protect these systems as well. That's why we need cyber security and these applications are developed with some kind of program, some kind of coding. So if you don't write a secure code or if you don't test your developed application, it will be vulnerable to attackers to take advantage and to hijack your devices or to steal some sensitive information or to expose the information you store in your cloud or in your servers. So if you read the cyber security domain, we have some emerging fields on for non coders as well. So for non coders, we have network security, penetration testing and cyber crime investigation. You can do these, you can make career in these fields. And if you love coding, if you love to write code, if you want to write secure code, then we have web security, wireless security, virus and malware analysis, mobile application security, cyber forensics. So you can choose what technology you like most and what type of stream you will allow to talk about. So in the cyber security, we have various certifications, various companies provides an exam to showcase your skills. And after that, you will get a certificate. So some of the major certificates are Comptia, Pentas plus certificate, EC council certified ethical hacker certificate, offensive security certified professional GIC penetration tester, Elon security certified professional penetration tester, offensive security, EC council and Elon security have some more certifications related to cyber security like red team operationals, mobile security, IoT security, cloud security, network security. So we can do those exam as well. ISERB certified penetration tester, mile two certified penetration tester. So if you have skills, I suggest you to give those exams and took a certificate. These certificates will help you to get a job, a higher payout in your respective companies. So the job roles we have in the cyber security domain is computer forensic analyst, IT security specialist, security manager, security engineer, security consultant, director of security, security administrator and information security analyst. These are the various positions we have in cyber security and you can apply for these positions if you have knowledge of the domains I mentioned earlier. Apart from this, in the cyber security, we have some freelance opportunities as well. You can start your journey with the bug bounty platforms who will provide some money to test their applications. So I will show you how this works. So we have multiple platforms across the globe. They have multiple applications to test on. So you can start right now with testing their application by reporting some vulnerabilities you will find out. Some of the attacks you will learn in this bootcamp. So see this is a website called hackerven.com. This website have various companies listed in the directory section. And as you can see, there are multiple companies. And you can see what the minimum bounties they offer for a single bug. We have here OKX, Indrive. Many multinational companies are using these bug bounty platforms to secure their applications because in the whole world, some of the hackers using their skills to test the applications. So they hunt on these websites. We have multiple platforms for showcase your skills. As you can see, they're providing higher rewards. And if I show you the activity section, you can see like this internet, internet bug bounty offer a user called far polar some $8,000 for this vulnerability. And the vulnerability is JWT audience claim is not verified. So he reported this vulnerability on that platform and received an $8,000 reward by providing the information. So you can start your career as a freelancer as well by learning the cyber security. These are covered in the web application security and the application security section. So we have multiple websites like hackerven.com and bugcraw.com. They have various partnerships with multiple companies to offer rewards for securing their applications. They repeatedly change the applications and their sub domains for testing. Right now, open AI platform is also listed on bugcraw and it will offer minimum $200 to $6,500 for finding a single bug. Depends on the severity. If you report a critical severity like something like exposing some sensitive or confidential information, you will get a $5,000 reward. So hackers are making money with these bug bounty platforms and you can use the individual platforms as well. Like Facebook is running separately program on their website and it is accessible via Facebook right at. So the link in the link is in your check box so you can see the Facebook is helping. Facebook is asking all of the hackers to test their applications. These are the applications you can test and earn a reward. Google and Twitter and Microsoft and Apple are also running with these programs. So these are called bug bounty programs where anyone can join and anyone can hunt. If you have some skills, if you know what to find, what to look for, what are the vulnerabilities, how to test, how to make a report. So you can report here and if your vulnerability is accepted then you can earn that reward. It will be directly transferred to your bank accounts. So you can make freelancing careers in cybersecurity as well and you can do day job and you can test the applications in the night. So moving on, you can audit the applications as well. You can find various projects on freelancing websites like Upwork, Fever. So we have multiple opportunities for the freelancers as well in the cybersecurity. So if you are not doing freelancing and want a job in the cybersecurity, so the cybersecurity job websites is some of them are hacker one, LinkedIn. You can find the various jobs using LinkedIn and using drug portals. So let me show you how hacker one handle your application as a cybersecurity specialist or in different positions. So here you can see that Lacework company is required a cloud security researcher and the security engineer, vulnerability researcher. The raw company is required senior product security engineer with mobile application knowledge and web application knowledge. So they have multiple positions for different domains. Like if you have the knowledge of only web applications, you can apply. If you have knowledge about mobile applications, you can also apply. So in the cybersecurity, we have multiple domains. So the companies have multiple positions for showcasing your skills. Like Amazon is also hiring with the security engineer. And if you are searching in the LinkedIn as well, we have various positions available because every company needs a security researcher, a hacker, a web application tester to secure their platform, what they are building or if they are providing some consulting services to their customers. So they need a specialist or multiple specialists. So we have multiple opportunities as well. So companies for jobs, what you are looking, almost every tech company is applicable to hire a cyber security researcher or the person who have knowledge on this field. The security provider companies who provide consultant as a service like to test your applications. You can apply in the government sectors. Government is also approaching ethical hackers to join their team and protecting your servers, their developed application. And you can start your career as a cyber security instructor and mentors. So here is the session tracker. We are delivering in the slide bootcamp. And you can see there are, right now we will be focusing on web application security. Further, we will be moving towards mobile application and cloud security and network security. So this link will be available in your chat. You can go and check out. That's it from my side. I will now request Sanger sir to take from this. And now we are answering your questions. So if you have some questions regarding this bootcamp, drop in the comments. So we will be answered. Okay. Thank you. Thank you so much, Sumit for explaining everything in such a nice way. So I think everybody got a chance to understand what this bootcamp is and what they will be getting from this bootcamp. So now let's jump to the chat window so that we can answer a few questions. Those are being asked. So guys, I hope you understood little bit basics about what cyber security is, what type of job opportunities are there, whether it is related to job or is it related to freelancing, then what all certifications are available there, those you can go through. And I would request if you are searching jobs as a fresher and you are not getting enough opportunities. So I think this is a very nice opportunity for you to attend this bootcamp completely. Because if you attend this bootcamp completely, so Sumit will be guiding you like how you can do freelancing after having a proper knowledge, right? So whatever question is coming in your mind, just throw that question in the comment section or like in the live chat. So Sumit will be answering your questions. So Sumit, I have this question like Priyanka is asking for non IT, which certification is required. So do we have different certifications for IT and non IT folks or like they are same? So if you have the knowledge, once you required and once you completed some courses in the cyber security domain, you can go for some basic level certifications. We have some free certifications for non IT folks where you can watch the videos and after the completing course, you will get a certificate. Okay. Yeah. So I think that we'll be covering throughout the bootcamp. So yes, Priyanka. So there are some free certifications are also available that you can go through. There is one question from Shubham, like cybersecurity and ethical liking, both are different or same. So can you please explain this? Ethical liking is a part of cyber security domain. In cyber security, we have different streams. Ethical liking is completely focused on the attacks. So cyber security, ethical liking is a part of cyber security. No, these are not different, but they're part. Okay. Yeah. So like now you can just go through. So there is one question that I want to take and I want to answer. Meanwhile, you can just go through the questions and if you see any question that is relevant, so you can answer. So I'm taking the question of Anil. Anil is asking cyber security with Salesforce is fruitful. So I would say yes, because Salesforce also offers a job role, which is related to cyber security. Right. So if I show you that job role, so here you can see if you go to this section, learn and click on career paths. So here you will have this option which is related to cyber security. Right. So Salesforce itself is saying like there are lots of job opportunities available as cyber security expert. And if you click on learn more, so here you will see like what all job options available and like what all modules you need to go through. So I'm just trying to open this. Okay. It is opened in another tab. So I'm just going to share that with you. Yeah. So here you can see this tab is showing cyber security career path. So here you can see average base salary. This is US data and 30% job growth by 2031. And these are the job posted in last 12 months. So this is US data, but like in everywhere in the world, like in India, in Europe, in US, so everywhere, like if US is demanding for cyber security experts, so other continents and countries are also having demand. And these are some prerequisite if you want to know little bit basic about cyber security and other streams. So here these are modules which are provided by Salesforce free, of course, you can go through and I have also provided these links in the session tracker. So if you go to the session tracker, so here you will find this link available here. So we considered it as a prerequisite. So those who have doubt like whether it is related to Salesforce or not. So yes, it is related. But through cyber security knowledge, you can work with other ecosystems as well. You can work as a freelancer, you can test any web application where you can find some bugs and you can just earn bug bounty rewards. Right. So I hope this answers your question. Okay, so, Sumit, you want to take any question? So without these asking in this bootcamp, you will cover basic to advance. Yes, we know first we will start with the basic networking and then I will teach you how to operate a Linux operating system. Then we will be cover some topics related to cyber security. In this phase one, basically, basically, we created this bootcamp in multiple phases. So in phase one, we only talk about the application security. And if this phase is successful, we are planning to announce the phase two as well. So when we where will be covered, the other technologies as well. Great. So I can see one common question. So this is like cyber security is very big stream. So in which part we will be focusing on this bootcamp, particularly phase one. So we are focusing on web application security in this field. Yeah, so everybody in this phase one, we will be focusing on the web application security. Right. So we have other security like mobile cloud. But in this phase one, we'll be focusing on the web application security. So Janna, will you cover from Express? Can we continue with Windows OS? Yes. Yes, Janna, you can continue with the Windows OS. I will show you, I will teach you how to install a Linux operating system inside your Windows operating system. So you don't have to worry about this. You can learn and earn to the Windows operating system. Okay, so there is one more question like this bootcamp is for cyber security in Salesforce or general Salesforce. So like Aditi, just see this bootcamp in keeping in mind, yeah, like you are learning about Salesforce, sorry, about cybersecurity. And then you need to think like how that cybersecurity knowledge you can embed with Salesforce, right? So first understand it separately and then try to club cybersecurity and Salesforce. So whatever knowledge you will be getting in cybersecurity, you need to apply those in Salesforce ecosystem. So Amar is asking what programming language need for cyber security. So Amar, if you have the knowledge of HTML and JavaScript, these are the basic requirements for the cyber security, but you don't have to worry. I will teach you how to write codes and how to find bugs and how to secure the HTML and JavaScript as well. So I will cover the everything you need for the cyber security for this bootcamp. Right. So like those who are asking about programming language, so no need to worry. Those who are asking like they don't know anything about cybersecurity, no need to worry. So we are starting from the scratch. So myth will be explaining everything in detail from the beginning. And this bootcamp is mainly focusing on web application like security, right? So we'll modify our session tracker a little bit more so that it will give you a focused insight like on which stream this bootcamp is focusing about cybersecurity. And we'll have some like Q&As as well. I get to know a common question. So I will try to like highlight those answers in the session tracker so that if you are like joining this bootcamp, so you will be having all the doubts cleared. So Vinayak is hosting. If you want to practice it, do we need to install any tool in our system? Yes, Vinayak, we need many tools in our system to practice and to test the desired application. So I will tell you how to install these tools. So when we start the bootcamp, you will get to know about these tools. So Subham is asking cybersecurity which domain should we focus on? So I think it is web application security, right? So Subham, there are multiple domains in cybersecurity or multiple domains. So web is all about to focus because everything works on the web and we get a broad area to test on the web. So if you have a web, then you can easily learn about mobile and software applications. So first you should go to the web, then you can cover the mobile and the cloud and the software application as well. Right. So we'll be first covering web application and then basis on your attendance or your response feedback we'll see like in which like phase two we'll be having mobile or cloud or whatever. And Aditi is asking about timing and days of every week. So that I will be updating in this session tracker. So soon you will be having timings and date mentioned here and all the session links I will be providing here. Like day before the session, you will be having the link here. And I think everybody is having this access sheet. The link is available in the description of this video, this live stream. So you can get it from there. And Janae is asking along with Salesforce development, can we continue thoroughly? Yes, you can. But if you're doing jobs, so I think it will be difficult. But if you have willingness to learn new things, so then you can continue and like you can, everything will be recorded. It will be available on the channel, like after the session as well. So anytime if you want to continue, you can and everything will be in sequence. So Srikanth is asking, are you providing PPT which helps to learn things easily? Yes. Yes, Srikanth. I will be providing some resources, my own notes and the virtual labs to practice what you learn throughout this bootcamp. Yes, he's asking, what is the system requirement? So yes, if you have a Windows operating system on any hardware, I think this is enough for a start this bootcamp. And after that, you can upgrade your systems according to our requirement. Okay, so Srivalli, I hear your question and you're asking, I am a fresher, we don't know anything. So that you can leave on us. This is our responsibility. And so how to choose with job role related to with security that yeah, so this everything, Sumit will be explaining in the throughout the session. So just understand the things first, and then we'll have one session where we'll guide you about these job role certifications again. Right. So first understand what cyber security is, then I think you will automatically get answer to these questions. Will be all in English or or in different language? Yeah, so we'll be doing it in English only because I can see lots of folks are from other countries as well. So Vladimir, everything will be in English. Narayan is asking without certification, we can become a cyber security expert. Just now and you can become a cyber security expert, because this will present your skills certification is a plus to get some jobs or in our respective or MNCs. And it will boost your skills as well. So for getting the certificate, you have to pass some exam. So it will encourage you to learn some something new or to practice some systems as well. So I just updated the sheet as well. So like next week, you can see in the sheet. So I just mentioned a date and time. So these sessions will be at 9 p.m. IST, right? And next week, we'll be having three sessions. So let me just show you so that you don't miss. So next week, Monday, Tuesday, Wednesday, we'll be having three sessions. And timing will be 9 p.m. IST. So nine to 10 p.m. one hour, we have decided. And those who are attending Salesforce admin and development bootcamp. So I just want to update you as well. So for you, timing will be 730 p.m. IST. So it will be one hour earlier because we need to manage both. Right. So that's why there will be little time change. And I think you can manage because we are doing it for you. So we just need to manage the time. Right. And yeah, so this is updated here. I am just I will be updating the sheet. So just share updating it live because everybody know like there is a little bit time change. Yeah, so just jumping to the chat again. So submit any other relevant question that you can pick up. Because asking, I want to learn from the beginning when you will teach me. So Monica, you will attend this bootcamp and you will learn. I will show you. Yeah. So you can go to go through my YouTube channel and you will find some resources and the previous and how to install some security tools. So it will be helpful for you when we start this bootcamp. You will get to know you get to know about how these tools works or how the how to how you how will you use these tools. So the link is in the session tracker so you can check out. So guys, I think we answered all the questions and yes, classes are starting immediately from the next week. And like classes will be totally focusing on the knowledge sharing no other bullshit, right? So we'll be sharing pure knowledge. We won't be talking like nonsense things like you can find lots of channels where they're like talking much and sharing knowledge less. So the way I run the sessions in the similar way, so it will be running the session, right? So he will be starting with the topic and will be explaining throughout and he will be answering all your questions live, right? So the way I run the session, similar way, he will be running the session. So please support him and show trust, right? And I'm sure after two months, you will be having enough knowledge about cybersecurity and like you can just try your hands for freelancing opportunities if you're not getting job as a fresher, right? So, Sumit, do you see any other question which is relevant? Yes, she's asking, can we add cybersecurity skills and its module tower CV without certification to get turbulent to get job? Yes, yes, you can mention the cybersecurity skills in your CV and you will get a job. But if you have certifications, if you have some certifications, it will help you to boost your career and your salary hike. Companies are judging you on the basis of the what certification do you have? So certification is almost plus. Yeah, so without certification also you can do freelancing. I can see Isha is asking for freshers, jobs are available or not? So jobs are available and freelancing opportunities are also available. So Sumit himself is doing job as well as freelancing, right? So he will share his experiences throughout the sessions. So he is doing these things from last 10 years, right? So have faith on him and he will guide you everything. And Sumit is asking, can we relate cybersecurity to Salesforce? Yes, that I already explained. And let me take few more questions. So when I this bootcamp is related to web application security, right? Yes, really. So first 730 pm IST I will be having the session and next 9pm IST there will be cybersecurity session. So initially I will be also part of those sessions because I also going to learn these things because cybersecurity is important to learn no matter you will be working in that domain or not. But if you are going to work, so then it is 100% must for you. Yes, I will be focused on the practical part because cybersecurity is not something you will learn with that theory. So I will focus or to deliver the sessions with as much as practical I will show you. So what we'll do like the same way I created a session tracker. So in the similar way, we'll try to create a, sorry, not session tracker, exercise sheet. So whatever demonstration we'll be doing, so we'll keep a track of that in a Google Doc so that day wise you will know like what Sumit explained to you theoretically and what he covered practically so that day by day, if you miss any session so that you can also cope up, right? So Nitesh, you will be using Kali Linux distribution distro to have this mobile camp. So someone is asking about the telegram link. So I'm just sharing that link in the chat. So it is available in the chat. You can just go and join this and whatever question you will be having from Sumit. So you can ask in that telegram group as well. And I will be like in this telegram group, I think session tracker is already pinned. So you can just access it from there and exercise sheet will be preparing soon and will be sharing with you. So I think Sumit answered all the questions and I know there will be lots of questions in your mind. So just focus and believe in Sumit's knowledge and attend all the sessions from Monday onwards. And initially we'll be keeping three sessions per week because it is new technology for everybody who are starting from the beginning. So we will be having three sessions so that in remaining two, three days of the week you can just do a lot more practice. So be consistent. Sumit will be consistent like me. He will be delivering knowledge every week, but you need to attend and practice. So anything else Sumit you want to add? Otherwise, we can just end the session. I shared my YouTube channel in the comments. So go and subscribe this one also. Yeah. And I don't see any more questions. Yep. So Sumit's YouTube channel link I will be updating in the description of this video, this live stream. And you already know the name. So let me just show you that again. So you can simply search on YouTube. So this is the name of his YouTube channel, the Cyber Security Zone. So you can follow. He is creating content in small, small video form. And if you follow, so you will have enough knowledge. And please share reviews and feedback about this initiative in the comment section on LinkedIn. So wherever you want, you can share the review so that we can feel some motivation like we are doing, whatever we are doing, it is, is it good for a community and for you? So what are your takes on this? So if you want to share some feedback right away, so you can just post that in the comment section. So Sumit is also watching all the chat messages. So just share all your true feedback about this initiative. And like so that Sumit can also feel motivated. So just share your thoughts and your positive words. So Nitish, right now this bootcamp will happen on my channel. And later on when Sumit will be having lots of audience, so he will be doing on his channel as well. So what I decided I took an initiative. So I'm meeting with creators and instructors, those who are not on online platform, but they are doing good offline. So I am just promoting them on my channel so that they can have audience, they can share their knowledge free of cost, and they can establish their own online medium so that they can continue knowledge sharing free of cost for the society. Right. So this is the initiative and like I just need some of the feedback if you can share. Okay. So I don't see any response. So am I audible? Like I need some reviews from your side, feedbacks if you can share. So that would be good. Okay. Yeah. Thank you, Ketan for sharing feedback. So feedbacks are always appreciated. It boosts, it like always boosts our energy. Thank you, Revati. Thank you, Nitish. Thank you, Swarna. Thank you, Rituja. Thank you, Sikander. Thank you, Omka. Yeah, Omka education is very important. And like this cyber security, like I hope today lots of folks got something new, new knowledge about cyber security. And if you attend two months bootcamp, so you will be having enough knowledge. So please share this recording, this today's recording, please share with everybody, no matter whether they are students, fresh air professionals, if they have little bit enthusiasm related to cyber security, so it will gonna help them. So we are doing our bit. So we need your support, share the channel link, both the channel links everywhere, so that people get to know about this stream as well, other than other hot technologies. So this is also hot technology, but there are less instruct instructors, they are sharing their knowledge free of cost. So I'm fortunate enough, like I have Sumit with me, and you are also fortunate enough now, like he will be sharing his knowledge free of cost for you. So spread the word and let people learn about cyber security. Okay, so we have few more feedback. So Sumit, I hope you are reading these and you can feel motivated. So now people have lots of trust on you. So I hope you will be sharing all the knowledge with them and they will be able to get the job or some freelancing opportunities. So thank you, everybody. Thank you, Sonu, Yash, Amrapali, Gaikwad, Rama, Rituraj, Manan, Amar, Bindu, Vladimiro, Saroj, Kishore, thank you everybody. Thank you everyone for joining this initiative. And I will try my best to take you in the journey. You will experience throughout this bootcamp. So thank you guys for listening me. It will be pleasure to deliver some knowledge with you. Okay guys, so this is it for today. See you on Monday with two separate bootcamps. Happy weekend. Thank you. Bye everyone.