
acks
@Acksec02
Followers
34
Following
462
Media
13
Statuses
96
Today, I continued to the dashboard and reports room where I learnt how to create dashboards for visualization and scheduling reports. To avoid slowing down search heads or delaying results, avoid βall timeβ searches, use specific time frames instead. @ireteeh .@thecyber_sharon
Finishing this room took a while, moved beyond the basics of splunk, proceeded to learn how to install it on Windows & Linux. I observed how splunk can index logs from OS, web apps, IDS, OSquery and how to configure forwarder to collect and send logs. @ireteeh.@thecyber_sharon.
0
1
1
Finishing this room took a while, moved beyond the basics of splunk, proceeded to learn how to install it on Windows & Linux. I observed how splunk can index logs from OS, web apps, IDS, OSquery and how to configure forwarder to collect and send logs. @ireteeh.@thecyber_sharon.
I continued with Splunk. This room focused on building effective search queries and making better use of the Search Processing Language. I went through SPL syntax and how it processes search commands, .@ireteeh.@thecyber_sharon .
0
1
5
I'll recreate one day too π«‘πͺ.
Finally met my mentor. Thank you for that you do for all young cybersecurity prospects @ireteeh #Cyblack2026
0
0
0
RT @h4ck3r__g1rl: Day 31 of #100DaysOfCyberSecurity . I looked into the first type of Malware, Computer virus. It is malicious code that atβ¦.
0
6
0
I continued with Splunk. This room focused on building effective search queries and making better use of the Search Processing Language. I went through SPL syntax and how it processes search commands, .@ireteeh.@thecyber_sharon .
I just finished the SIEM module on THM, felt tough at first but watched YT videos to understand it better. I went through:. β Intro to SIEM.β Investigating with ELK.β ItsYBitsy & Benign challenges.β Splunk basics and how to use it during incidents. @ireteeh.@thecyber_sharon
2
2
8
Congratulations to the shortlisted candidatesππͺ.
Hello everyone, after a rigorous selection process, our team has been able to shortlist some candidates for the CyBlack "pre-entry" SOC application slots we promised. Below are the handles of the selected candidates for assessment and interview. Send a DM to @dami_kanye !.
0
0
0
Thank you @Cyblackorg for the opportunity to pitch, I was the last to pitch π. Save the best for the last hehe π.
0
0
1
The log analysis room covered the basic methodology behind adopting an effective log analysis strategy. I also explored importance of log data collection, common attack patterns and identifying useful tools for the investigation and response process. @ireteeh.@thecyber_sharon
Logs are a record of events within a system which answer critical questions about an event. In this room, I learnt about the types of log, the standards and format. Checked out the process, techniques & tools used to interpret and get info from log data.@ireteeh.@thecyber_sharon
0
1
3
Logs are a record of events within a system which answer critical questions about an event. In this room, I learnt about the types of log, the standards and format. Checked out the process, techniques & tools used to interpret and get info from log data.@ireteeh.@thecyber_sharon
0
1
2
RT @thecyber_sharon: Hey Cyber Family!. This would happen on Saturday. π« Free Registration: Whatsapp: +353 89 221β¦.
0
3
0
RT @TemitopeSobulo: New video is up ππππβ€οΈ. This is the last video in the OWASP Top 10 and guess what is up next?π₯°π₯°π₯°. Link to video: https:β¦.
0
9
0