Marvel
@TheCyber_Chic
Followers
44
Following
220
Media
15
Statuses
216
learning in public - technology & security ✧
Lagos, Nigeria
Joined March 2022
Then ended the session with asymmetric cryptography (public key): • Public key encrypts, private key decrypts • Enables secure communication without sharing secrets first • Also supports digital signatures for authenticity & non-repudiation. #LearningInPublic #CloudSecurity
0
0
1
I moved into symmetric encryption: • Same key for encrypt & decrypt • Substitution, block and stream ciphers • DES (old), AES (modern standard) • Why key reuse is dangerous Understanding how data is actually protected in transit and storage.
0
0
1
I learned an important principle in cryptography: Security shouldn’t depend on hiding the algorithm. It should depend on protecting the key (Kerckhoffs’s Principle: “the enemy knows the system.”) Also touched on cryptanalysis and steganography.
0
0
1
Day 91–92 of #100DaysOfCyberSecurity
@segoslavia @chuka_unigwe @ireteeh @jay_hunts Just started a new job, so I’m adjusting & merging two study days. Began Module 2: Cryptology Started with cryptography basics (encryption, decryption, plaintext, ciphertext, algorithms, & keys.)
4
0
6
I wrapped up the module with common attack methods: • MitM, DNS poisoning, DoS/DDoS • SQL injection & XSS • Password attacks (brute force, dictionary) • Social engineering like phishing & baiting Security is as much about people as it is about tech. #LearningInPublic
0
0
1
I moved on to malware types: Viruses, worms, trojans, ransomware, spyware, botnets, rootkits, backdoors. Also learned the malware response process: identify → isolate → remove → update protections.
0
0
1
Day 90/100 of #100DaysOfCyberSecurity
@segoslavia @chuka_unigwe @ireteeh @jay_hunts Started Course 5: IT Security Began with the CIA Triad: • Confidentiality • Integrity • Availability Also covered key terms like risk, vulnerability, threat, exploit, and attack.
2
0
2
Today, I focused on reviewing my tasks, organising my week, and setting myself up properly. I’ll resume studying tomorrow with Course 5 of the Google IT Support Professional Certificate. @segoslavia @chuka_unigwe @ireteeh @jay_hunts
#LearningInPublic #100DaysOfCyberSecurity
1
2
7
Mentor Spotlight: Stephanie Titcombe PM @btrust_builders | SSC Cohort 1 Mentor @StephTitcombe trains devs in Bitcoin & Lightning across Africa. Her mentees call her supportive & inspiring, with practical guidance that aligned with their goals. Much Appreciation!
0
7
20
Final state: • Domain-joined client • Working DNS & DHCP • Authenticated users & OUs • Client internet access via the DC This lab taught me an important lesson: most AD issues are network problems in disguise.😩 #LearningInPublic #ActiveDirectory #CloudSecurity
1
0
1
Thank you so much for this thread! 😊 It was a huge help.
🖥️ Step-by-Step Guide to Setting Up Active Directory in VirtualBox Want to set up Active Directory in your cybersecurity lab? This guide walks you through the entire process using VirtualBox, covering everything from installing the required OS to configuring your domain and
1
0
1
This lab broke multiple times before it worked: • Client OS edition couldn’t join a domain • DNS SRV record lookup failures • NIC misalignment in VirtualBox • Password policy blocking authentication Each failure forced me to troubleshoot properly instead of guessing.
0
0
0
I designed the server with two NICs: • Internal NIC: AD, DNS, DHCP (static IP) • External NIC: bridged, used for internet access Clients lived only on the internal network. This made DNS central & exposed how tightly AD relies on correct network alignment.
0
0
0
Lab environment (in VirtualBox): • Windows Server 2019 (Domain Controller) • Windows 11 Pro (Domain client) The server ran AD DS, DNS, DHCP, and RRAS (NAT). The Client was joined to the domain and routed through the DC for internet access.
0
0
0
Day 87-89 of #100DaysOfCybersecurity
@segoslavia @chuka_unigwe @ireteeh @jay_hunts Over the last 3 days, I built a self-directed Active Directory lab using VirtualBox. Goal: Understand how AD & its dependencies (DNS, networking, & routing) actually work in a realistic setup.
4
0
6
Top 100 Global voices in Cybersecurity 💜 Source: Favikon ✨
65
79
384
I treated this consultation as Project 1 for January, focusing on technical documentation, systems thinking, and practical decision-making under constraints. (Full consultation notes documented offline as part of the course exercise.) #CloudSecurity
0
0
0
For this exercise, I designed IT infrastructure improvements for: • An open-source software company • A fast-growing sales company • A budget-constrained non-profit Each scenario required balancing security, scalability, cost, & operations, with clear technical rationale.
0
0
0
Day 86/100 of #100DaysOfCyberSecurity
@segoslavia @chuka_unigwe @ireteeh @jay_hunts I completed Course 4 in the Google IT Support Professional Certificate. This wrapped up with a sys administration consultation exercise, where I applied what I’ve learned to real-world scenarios.
2
0
2
Happy birthday @segoslavia 🎉 Cheers to a new year of growth and wins🥂
Happy birthday, Mr Segun❤️🎉 @segoslavia Thank you for all that you do for us in the Cybersecurity community. Like Dr @ireteeh mentioned last week, your weekly X class has been beneficial to a lot of people . We love you, and we appreciate you. Age gracefully sir🍾🎉
1
0
1