Keeping Cyber Course Prices Equitable with Kenneth Ellington
Hacker Valley Studio29 Marras 2022

Keeping Cyber Course Prices Equitable with Kenneth Ellington

Kenneth Ellington, the Senior Cybersecurity Consultant at EY and Founder of the Ellington Cyber Academy, achieves his goal of being on the Hacker Valley Studio this week. From working at Publix in college to becoming an online course instructor, Kenneth’s journey into the cyber industry has been heavily influenced by online educators like Chris and Ron. Kenneth covers barriers to entry for cyber, SOAR vs SIM, and how much further we need to go for representation in the industry. Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.

Timecode Guide:

[00:00] Starting a cyber career at the Publix deli counter

[05:16] Fighting through introversion to become an online instructor

[11:02] Setting equitable & understandable prices for cyber courses

[15:54] Looking into the future of SOAR vs SIM to see what’s next

[19:27] Taking the chance on content creation as a new cyber professional

Sponsor Links:

Thank you to our sponsors Axonius and NetSPI for bringing this security podcast to life!

Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone

For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive offensive security solutions. Visit netspi.com/HVM to learn more.

What areas do you feel confident in as a new teacher, and what do you still struggle to get your footing on?

As someone newer to online teaching, having only done it for 2 years, Kenneth is confident in his communication skills, but still struggles with fully grasping new technology. On the bright side, Kenneth believes those technical skills come with time and practice, something he’s 100% willing to do. What helps him stand out as a strong teacher is something harder to learn— communication with others and de-escalating stressful situations for students.

“I worked at Publix for four years in the deli, dealing with customers, and that forced me to develop those soft skills about how to talk to people and how to communicate and how to de-escalate situations. That's how I set myself apart.”

What are some of the things that you're thinking about when it comes to setting the pricing for your course content?

No matter how his prices change or how skilled he becomes, Kenneth still believes in fair and equitable pricing for his course content. Considering his experience and expertise, Kenneth charges at least half of what I vendor might charge for similar content and knowledge. However, Kenneth doesn’t believe in thousands of dollars being spent on his courses, because he wants entry-level students like himself to be able to afford to learn.

“I'm very honest with myself, what my skill level is, and the value I bring towards it. Because I've been doing this for over two years, technically, I've gotten a pretty good gauge as to what people are willing to pay for and the value that I can bring.”

Do you have anything you’re looking to expand into with Ellington Academy?

While SOAR and SIM are Ellington Academy's bread and butter, Kenneth is looking forward to continuing to expand his expertise and scale his content. A future upcoming goal Kenneth has is giving back to the country of Jamaica, where his family is originally from. Through providing courses or recruitment opportunities, he wants to bring cyber skills to everyone.

“From a legacy perspective, I want to leave a positive mark on this world, just to make it better than when I got here. One of my big goals, I don't know if it's gonna happen, but my family is from Jamaica, so I'm hoping I can maybe put ECA there someday.”

What advice would you give to a newbie in cybersecurity looking to start making content?

Kenneth got his start at the Publix deli counter, and he understands that the beginning of someone’s cyber journey can look just like his— inexperienced but hungry for knowledge. For newcomers to the industry, Kenneth wants to reassure you that you’re never too young to teach or too old to learn. Take courses, expand your knowledge, and give back to people with less knowledge than you through accessible learning content of your own.

“Take the opportunity to try to do something new because your knowledge is valuable, no matter how much or how little that you have. Everybody can learn something from everyone. I always try to help out however I can.”

---------------

Links:

Keep up with our guest Kenneth Ellington on LinkedIn

Check out the Ellington Cyber Academy

Learn more about EY on LinkedIn and the EY website

Connect with Ron Eddings on LinkedIn and Twitter

Connect with Chris Cochran on LinkedIn and Twitter

Purchase an HVS t-shirt at our shop

Continue the conversation by joining our Discord

Check out Hacker Valley Media and Hacker Valley Studio

Jaksot(406)

Understanding the Psychology of Cyber Risk with David Shipley

Understanding the Psychology of Cyber Risk with David Shipley

Most people think cybersecurity training is about knowledge, but what if motivation is the real key to success? David Shipley, CEO and Field CISO at Beauceron Security, shares how psychology and neuroscience reshape how we approach security awareness, reducing risks in ways tech alone never could. In this episode, Ron and David examine why people, not technology, are at the core of effective cybersecurity. David teaches us about the SCARF model, warns us about the dangers of overconfidence in training, and explains how gamification can drive meaningful behavior change when it comes to cybersecurity awareness and risk reduction.    Impactful Moments: 00:00 – Introduction 02:00 – David Shipley’s journey from journalist to cybersecurity leader 06:10 – Why motivation outshines knowledge in security training 08:20 – The Dunning-Kruger effect: Overconfidence in cybersecurity 11:17 – How overreliance on tech increases click rates 17:03 – Cybercriminals’ evolving tactics and emotional manipulation 25:00 – Gamification in cybersecurity: Changing security behaviors 30:56 – Using the SCARF model to enhance security culture 39:45 – Emotional intelligence as a defense against AI threats Links: Connect with our guest, David Shipley: https://www.linkedin.com/in/dbshipley/ Learn more about Beauceron Security here: www.beauceronsecurity.com/partner   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

7 Tammi 202544min

From Landscaping to Cyber Leadership with Cole Lisko

From Landscaping to Cyber Leadership with Cole Lisko

How does a scorching July day in a van with no air conditioning lead to a career at one of the world’s top cybersecurity companies? In this episode, Cole Lisko shares his journey from landscaping to becoming the Cortex Team Manager at Palo Alto Networks.  Joined by his bestie Cole, Ron weaves the conversation through their history of friendship with laughs and lessons learned along the way. Discussing career pivots, unexpected opportunities, and the impact of mentorship, this conversation offers relatable motivation and a candid look at the power of meaningful connections.   Impactful Moments: 00:00 - Introduction 03:00 - Cole’s first exposure to cybersecurity 06:30 - Pivotal moment: a call for mentorship 11:40 - Breaking into cleared work 18:30 - Lessons learned at Booz Allen 22:00 - The art of work-life compartmentalization 27:45 - Leadership insights from landscaping days 32:50 - What’s next for Cole at Palo Alto Networks Links: Connect with our guest, Cole Lisko: https://www.linkedin.com/in/matthewlisko/   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

24 Joulu 202434min

Think Like a Hacker, Solve Like a Leader featuring Ted Harrington

Think Like a Hacker, Solve Like a Leader featuring Ted Harrington

What if the key to innovation is breaking the rules? Ted Harrington, Executive Partner at Independent Security Evaluators and a pioneering ethical hacker, explores the power of commitment, curiosity, creativity, and nonconformity to rethink cybersecurity and life itself. From hacking the first iPhone to disrupting misconceptions about security testing, Ted shows why the hacker mindset matters more now than ever. Join Ron and Ted as they discuss strategies for using the hacker mindset to solve problems, address risks like AI-driven deepfakes, and uncover unconventional opportunities in both business and personal growth.   Impactful Moments: 00:00 - Intro 03:15 - The four traits of a hacker mindset 07:40 - Hacking the first iPhone and Tesla 11:50 - Why penetration testing is misunderstood 16:30 - Risks and realities of AI deepfakes 21:20 - Applying hacker traits to entrepreneurship 28:45 - Ted’s upcoming book: Inner Hacker 33:00 - Why mindset matters most   Links: Connect with our guest, Ted Harrington: https://www.linkedin.com/in/securityted/ Order Ted Harrington’s book “Hackable” here: https://www.amazon.com/Hackable-How-Application-Security-Right-ebook/dp/B08MFTQ7Q4 Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

17 Joulu 202441min

Hacking Trust with AI and Deepfakes featuring Iain Jackson

Hacking Trust with AI and Deepfakes featuring Iain Jackson

What happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic voices and AI in cybersecurity.  Together, Ron and Iain discuss how adversaries are using AI to bypass human intuition. From synthetic voice calls to automating phishing attacks at scale, this episode explores how hackers leverage technology using these tactics and what you can do to stay one step ahead.    Impactful Moments: 00:00 - Introduction 01:56 - Iain shares his journey with AI 03:29 - Demonstrating voice cloning in real-time 06:31 - Risks of automated synthetic voice attacks 09:46 - Impact of AI on social engineering tactics 11:00 - Importance of "vibe checks" in cybersecurity 15:17 - Real-world phishing and HR scam example 20:00 - Uncanny Valley: Defense against AI deception 23:37 - The future of AI in adversary emulation   Links: Connect with our guest, Iain Jackson: https://www.linkedin.com/in/iain-j-98578a238/ Learn more about CovertSwarm here: https://covertswarm.com/   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

12 Joulu 202425min

Championing the Human in Cybersecurity with Julie Haney

Championing the Human in Cybersecurity with Julie Haney

What happens when cybersecurity puts people first? Julie Haney, Human-Centered Cybersecurity Program Lead at NIST, shares how designing security with humans at the center leads to greater adoption, reduced frustration, and stronger protection. In this episode, Julie discusses how to improve user adoption by simplifying complex security processes, why empathy is a game-changer for effective security, and strategies for empowering people to feel confident and secure online. This conversation will inspire you to rethink how we protect people in the digital age and shares a fresh perspective on making cybersecurity work for all. Impactful Moments: 00:00 - Introduction 07:15 - Breaking down barriers in user design 15:40 - Why empathy matters in cybersecurity solutions 21:05 - Challenges in bridging tech and humanity 28:30 - Designing systems with people, not just for them 35:10 - Practical steps to empower users in security 42:45 - Final reflections on human-centered innovation   Links: Connect with our guest, Julie Haney here: https://www.linkedin.com/in/julie-haney-037449119 Check out NIST’s Online Community of Interest here: https://csrc.nist.gov/Projects/human-centered-cybersecurity/hcc-coi Learn more about Human-Centered Cybersecurity on NIST’s website here: https://csrc.nist.gov/projects/human-centered-cybersecurity   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

3 Joulu 20242min

Do You Deserve To Be Hacked? Featuring Ilan Fehler and Dahvid Schloss

Do You Deserve To Be Hacked? Featuring Ilan Fehler and Dahvid Schloss

Do you deserve to be hacked? With that bold tagline, CovertSwarm is pushing leaders to rethink how they test and defend their systems, and in this episode, they’re sharing firsthand how organizations can prepare for adversaries in the wild. Recorded at Black Hat 2024, Ron is joined by Ilan Fehler, US Sales Lead at CovertSwarm, and Dahvid Schloss, Hive Leader at CovertSwarm to explore the world of adversary emulation. From physical breaches to API exploits, this conversation covers the human, digital, and physical elements of cybersecurity. Impactful Moments: 00:00 - Introduction 01:25 - You Deserve To Be Hacked 03:05 - Emulating criminal behavior: The hive structure 07:55 - Social engineering tactics that really work 20:16 - Physical breaches: Pentesting in action 24:09 - Past the firewall: Second- and third-layer testing 29:14 - Digital exploits and real-world vulnerabilities 35:24 - Why organizations hesitate to invest in red teams 37:33 - Building muscle memory for security   Links: Connect with our guests, Ilan Fehler https://www.linkedin.com/in/fehler/ and Dahvid Schloss https://www.linkedin.com/in/dahvidschloss/ Learn more about CovertSwarm here: https://covertswarm.com/   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

26 Marras 202440min

Transforming SOC Operations with AI featuring Roy Halevi

Transforming SOC Operations with AI featuring Roy Halevi

Cybersecurity is evolving fast, and AI is at the center. Roy Halevi, Co-Founder and CTO of Intezer, explains how AI automates SOC operations, improving speed and accuracy while freeing up teams to focus on critical threats. In this conversation with host Ron Eddings, Roy explains how AI automates critical tasks like alert investigation and response, reducing noise and improving accuracy. Roy shares insights on overcoming challenges in adopting AI, the future of SOC roles, and how organizations can optimize their defenses using AI driven tools.   Impactful Moments 00:00 – Intro and the AI revolution in cybersecurity 01:16 – Meet Roy Halevi, Co-Founder and CTO of Intezer 03:00 – The story behind the name ‘Intezer’ 06:14 – Key challenges facing today’s SOC teams 15:04 – Top use cases for AI in the SOC 21:27 – How Intezer automates alert triage and response 37:32 – Future predictions for SOC and cybersecurity roles 48:23 – Closing thoughts and call to action   Links: Connect with our guest, Roy Halevi: https://www.linkedin.com/in/royhalevi Learn more about Intezer here: https://intezer.com   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

20 Marras 202449min

From Shadow IT to Full Asset Visibility with Wes Wright

From Shadow IT to Full Asset Visibility with Wes Wright

Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take control of their digital assets. In this episode, Ron and Wes discuss the importance of asset visibility in cybersecurity, outlining the potential of CAASM (Cyber Asset and Attack Surface Management) and how it empowers teams to expose hidden vulnerabilities, streamline operations, and stay ahead of security threats, vulnerabilities, and exposures.   Impactful Moments: 00:00 - Introduction 01:35 - Asset visibility and blind spots 03:47 - What keeps CTOs and CISOs up at night 08:45 - Bridging IT and OT: CAASM explained 12:10 - Real-world use cases for CAASM 18:37 - The power of automated asset management 25:00 - Why continuous inventory is a game-changer 35:59 - Wes’s advice for getting started with Ordr Links: Connect with our guest, Wes Wright: https://www.linkedin.com/in/4kidwes/ Learn more about Ordr here: https://ordr.net/   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

12 Marras 202437min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
voi-hyvin-meditaatiot-2
psykopodiaa-podcast
rss-duodecim-lehti
aloita-meditaatio
rss-psykalab
jari-sarasvuo-podcast
rss-niinku-asia-on
rss-narsisti
rss-vapaudu-voimaasi
adhd-podi
kesken
psykologia
rss-koira-haudattuna
rss-anteeks-etukateen
aamukahvilla
ihminen-tavattavissa-tommy-hellsten-instituutti
rss-liian-kuuma-peruna
rss-valo-minussa-2
rss-metropolia-ammattikorkeakoulu