Temitope Sobulo🛡️
@TemitopeSobulo
Followers
4K
Following
34K
Media
615
Statuses
19K
Sr. Application Security Specialist | Mentor for women4cyber | Speaker on Shespeakscyber | Owner of YouTube channel @latcwitht
Earth
Joined May 2011
Day 94 of 100 days of cybersecurity with the Women Techsters Fellowship Today’s session was fully practical! I worked hands-on with Linux commands to manage file permissions. @ireteeh @TemitopeSobulo
#100daysofcybersecurity
1
1
1
On a good Saturday with OWASP ASVS + wine + good music 🎶
0
0
1
23/100 Today I attended a session on Threat Intelligence. @Nanaaisha_1 did justice in explaining information from Virus Total during Malware analysis. CC @cyberjeremiah Published my report https://t.co/EWMCVBd1g7
@ireteeh @OnijeC @segoslavia @TemitopeSobulo @real_nuelOj
Day22/100 #100DaysOfCyberSecurity Today I studied Vulnerability Management. National Vuln Assessment Life Cycle of Software Vuln Vuln Management LifeCycle Vuln System Database (CVE, CVSS, CWE) CVSS metrics @ireteeh @segoslavia @real_nuelOj @h4ruk7 @TemitopeSobulo
2
4
14
While dating, if your partner… Doesn’t enjoy talking to you, run. Is wicked to you or to people around you, run. Shows consistent cruelty or malicious behaviour, run. Cheats on you, run. Is threatened by your success or achievements, run. There is no award for suffering in
24
105
401
A Nigerian Doctor was sentenced to life imprisonment for rape. He was later freed by the appeal court, then fled to the UK. Got to the UK and committed the same crime. He'll be arraigned in court, today. This is the very definition of "a now disgraced country".
400
2K
6K
Na now I understand Wetin politicians eyes dey see😭😭😭 Vote for me (Al-Amir Badmus) ejor: https://t.co/6Cn9uWEPfk
2
6
14
Day49/100: Learnt about Detection,prevention &response techniques. 🚨 IOCs: login anomalies, unusual traffic, resource spikes. 🔒 Segmentation/Access Controls: allow/deny lists 🛡️Mitigation techniques @ireteeh @_Rega_n @TemitopeSobulo @elormkdaniel @CyberRacheal @BowTiedCyber
0
1
5
Today I explored: The three stages of data, Data encryption, Encryption algorithms like AES & RSA, Differences between symmetric vs asymmetric encryption, Data encryption at rest & in transit Wrapped up with a quiz @ireteeh @TemitopeSobulo @cyber_razz @cyberjeremiah @cyber_rekk
0
1
4
Day29/100 #100DaysOfNetworking Today involved me diving deeper into ether channels by focusing on static ether channels and their configurations, layer 3 ether channel routing ,load balancing. @ireteeh @TemitopeSobulo @OnijeC @segoslavia @NetworkQueenX @sisinerdtweets
Day28/100 #100DaysOfNetworking Today was all about dynamic EtherChannel: Distinguished between LACP and PAgP, including their respective mode pairs. @ireteeh @NetworkQueenX @segoslavia @TemitopeSobulo @OnijeC @sisinerdtweets
0
2
10
Day 50 of #100DaysOfCyberSecurity Took on Ethernet switching module but I wasn’t able to finish, I always thought merging basics to cybersecurity as a final year pharmacy student should not be that much of a big deal, now I know better. @TemitopeSobulo @ireteeh @cyberchenti
1
1
5
Day 68 of #100DaysOfCyberSecurity 💜 ✨ My laptop doesn’t just “turn on” — it quietly wakes itself like a house switching on its lights. ✨ Learned how BIOS/UEFI does the morning check-in before Windows show up @ireteeh @TemitopeSobulo @cyberjeremiah @NnajiDaniel_C @cyber_combat
Day 67 of #100DaysOfCyberSecurity 💜 ✨ NTFS boot sector = the gatekeeper that wakes your system up ✨ MFT = the city’s record keeper, tracking every file’s address ✨ ADS = secret rooms where attackers can hide things 👀 @ireteeh @TemitopeSobulo @cyberjeremiah @NnajiDaniel_C
1
4
8
Day22/100 #100DaysOfCyberSecurity Today I studied Vulnerability Management. National Vuln Assessment Life Cycle of Software Vuln Vuln Management LifeCycle Vuln System Database (CVE, CVSS, CWE) CVSS metrics @ireteeh @segoslavia @real_nuelOj @h4ruk7 @TemitopeSobulo
Day 21/100 #100DaysCybersecurityLearning Couldnt study day. Abit under the weather. Did a bit of malware analysis and trying to make sense of some info on VT. Took a quiz set by WiCys as well. @ireteeh @segoslavia @TemitopeSobulo @h4ruk7 @cyberjeremiah @real_nuelOj
0
4
19
Day 29―#100daysofcybersecurity Didn't understand much but learnt how protocols like Syslog, NTP, DNS, HTTP, & Email can be exploited and how technologies like ACLs, NAT, & VPNs protect, but aren't foolproof. Pros & cons of P2P, Tor & Load Balancing risks in networks! 🎯 @ireteeh
0
2
9
ISC2 Finland Chapter is now officially approved as a recognized chapter of ISC2! On the 15th of January 2025, I took a bold step and applied to establish a cybersecurity local chapter under @ISC2. On the 24th of March, the application was accepted . but that was just the
12
12
71