Rajneesh Gupta Profile
Rajneesh Gupta

@rajneeshg7

Followers
2K
Following
349
Media
534
Statuses
2K

Zero to CyberHero ๐Ÿš€Coach | Mission to help 100k people get to Cybersecurity by 2025 | Follow for Career tips

๐ŸŒŽ
Joined July 2016
Don't wanna be here? Send us removal request.
@rajneeshg7
Rajneesh Gupta
2 years
๐ŸŒŸ๐Ÿ๐ŸŽ ๐’๐ญ๐ž๐ฉ๐ฌ ๐ญ๐จ ๐๐ซ๐ž๐š๐ค ๐ข๐ง๐ญ๐จ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒย ๐ŸŒŸ Many of you asked me about the practical and effective approach to getting into a Cybersecurity career. So, here it is. I've finally made it public. This is the framework I've been using to help hundreds
2
1
13
@rajneeshg7
Rajneesh Gupta
1 year
๐‹๐ข๐ง๐ฎ๐ฑ ๐‹๐จ๐  ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ - Home Lab โญ Access the Home-Lab: https://t.co/BGCUqacjy0
1
0
5
@rajneeshg7
Rajneesh Gupta
2 years
Reality of working in Cyber Security | Pros and Cons
0
0
1
@rajneeshg7
Rajneesh Gupta
2 years
Top 20 Interview Questions on Information Security
0
0
2
@rajneeshg7
Rajneesh Gupta
2 years
Mock Interview - What is your experience with Incident Response? #CyberSecurity
0
0
2
@rajneeshg7
Rajneesh Gupta
2 years
๐Ÿง‘โ€๐Ÿ’ป๐Ÿ’ฅ[Malware Analysis Home-Lab v1.0]๐Ÿ’ฅ๐Ÿ‘ฉโ€๐Ÿ’ป Malware analysis is the process of dissecting and studying malicious software (malware) to understand how it works, what it does, and how to defend against it. If youโ€™re a SOC Analyst or Aspirant SOC Analyst, this list will help you.
0
0
2
@rajneeshg7
Rajneesh Gupta
2 years
๐Ÿ˜ฑ๐Ÿ’ฅ[๐ˆ๐๐Œ ๐๐‘๐š๐๐š๐ซ ๐’๐ˆ๐„๐Œ - ๐‡๐จ๐ฆ๐ž ๐‹๐š๐›]๐Ÿ’ฅ๐Ÿ‘ฉโ€๐Ÿ’ป This is the powerful home-lab focused on setting up IBM QRadar SIEM and real-world use cases. If youโ€™re interested to become SOC Analyst(Tier 1/2) , this lab will help you with SOC tools, rules, queries, apps and
0
1
1
@rajneeshg7
Rajneesh Gupta
2 years
๐ŸŒŸ๐Ÿ“ ๐๐ก๐š๐ฌ๐ž๐ฌ ๐จ๐Ÿ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ ๐ŸŒŸ โžก๏ธPlanning and Reconnaissance: Understanding the target and its vulnerabilities through information gathering. โญ•Techniques: Open Source Intelligence (OSINT), footprinting, social media analysis. โžก๏ธScanning: Actively
0
0
1
@rajneeshg7
Rajneesh Gupta
2 years
๐ŸŒŸ๐๐š๐ฌ๐ฌ ๐ฒ๐จ๐ฎ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐„๐ฑ๐š๐ฆ๐ŸŒŸ What type of attack involves an attacker putting a layer of code between an original device driver and the operating system? A.ย ย ย Refactoring B.ย ย ย Trojan horse C.ย ย ย Shimming D.ย ย ย Pass the hash
1
0
0
@rajneeshg7
Rajneesh Gupta
2 years
๐Ÿ“ ๐Ÿ’ฅ[๐Ÿ๐ŸŽ ๐–๐ข๐ซ๐ž๐ฌ๐ก๐š๐ซ๐ค ๐…๐ข๐ฅ๐ญ๐ž๐ซ๐ฌ ๐Ÿ๐จ๐ซ ๐Œ๐š๐ฅ๐ฐ๐š๐ซ๐ž ๐ƒ๐ž๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง๐ฌ]๐Ÿ’ฅ๐Ÿ“ Display filters in Wireshark allow you to focus on specific types of network traffic. In this list, Iโ€™ll share 10 Most important Wireshark Filters to detect Malicious traffic. If youโ€™re
0
0
1
@rajneeshg7
Rajneesh Gupta
2 years
๐Ÿ”ฅ[๐๐‚๐ˆ ๐ƒ๐’๐’ ๐‚๐จ๐ฆ๐ฉ๐ฅ๐ข๐š๐ง๐œ๐ž- ๐Ÿ๐Ÿ ๐‘๐ž๐ช๐ฎ๐ข๐ซ๐ž๐ฆ๐ž๐ง๐ญ๐ฌ]๐Ÿ”ฅ If you are a GRC analysts or Security analyst or aspirant SOC analyst, knowledge of PCI DSS compliance will help you excel in your career path. #CyberSecurity
0
0
3
@rajneeshg7
Rajneesh Gupta
2 years
โญ๏ธ Sandbox โ€ข Any Run https://t.co/WtR9vR0rYI โ€ข Palo Alto Wildfire https://t.co/bLNp7RhoMe โญ๏ธ Discover other infected endpoints โ€ข Osquery https://t.co/Sq6v6EKeFc โ€ข Windows Defender for endpoint
0
0
2
@rajneeshg7
Rajneesh Gupta
2 years
โญ๏ธCheck for the known adversaries โ€ข MITRE ATT&CK Groups https://t.co/43Rc9vNxve โญ๏ธTraffic Analysis โ€ข Wireshark https://t.co/c7NQmDb0QQ โ€ข tshark
wireshark.org
Wireshark: The world's most popular network protocol analyzer
1
0
1
@rajneeshg7
Rajneesh Gupta
2 years
โญ๏ธUpload hash to Virustotal Virustotal
1
0
0
@rajneeshg7
Rajneesh Gupta
2 years
๐Ÿ”ฅMalware/Ransomware Incident Response
1
0
0
@rajneeshg7
Rajneesh Gupta
2 years
0
0
1
@rajneeshg7
Rajneesh Gupta
2 years
๐‚๐ซ๐š๐œ๐ค ๐ฒ๐จ๐ฎ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐ฐ๐ข๐ญ๐ก ๐Œ๐ž] Question: What is IDS and IPS? And how are they different? ๐Ÿ”ดWatch the Full Video https://t.co/UPP0DIyXkM ๐Ÿ” Retweet if youโ€™ve found this useful
0
0
1
@rajneeshg7
Rajneesh Gupta
2 years
Quick test๐Ÿ‘‡ Which tool can be used to detect SQL Injections from Server logs? #CyberSecurity
1
0
0
@rajneeshg7
Rajneesh Gupta
2 years
You will rarely find this interview question but itโ€™s worth knowing it..
0
0
0
@rajneeshg7
Rajneesh Gupta
2 years
Learned Hacking - but failed to get cybersecurity job then do this๐Ÿ‘‡
0
0
1