Oluwaseyi Profile Banner
Oluwaseyi Profile
Oluwaseyi

@seyi_Anisere

Followers
781
Following
940
Media
63
Statuses
980

Scholar| Book lover| Computer engineering student and a budding Cyber security specialist|CyberGirl 4.0| Interested in finance and money management.

Nigeria.
Joined July 2019
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@seyi_Anisere
Oluwaseyi
4 months
I got my First networking badge🤗
Tweet media one
Tweet media two
38
9
230
@seyi_Anisere
Oluwaseyi
22 days
Basic Networking notes
Tweet media one
Tweet media two
Tweet media three
Tweet media four
27
203
809
@seyi_Anisere
Oluwaseyi
23 days
Fundamental SOC notes for beginners,paired with hands on labs for practical learning
Tweet media one
Tweet media two
Tweet media three
Tweet media four
24
193
740
@seyi_Anisere
Oluwaseyi
19 days
SOC Analyst Roadmap 1. Learn the basics of Cybersecurity, such as security concepts, principles and the best practices ✓ Use online courses, book, blogs, podcasts, and other resources to gain foundational knowledge ✓ Examples: Google's Cybersecurity course, Cisco Cybersecurity
Tweet media one
6
56
251
@seyi_Anisere
Oluwaseyi
17 days
10 Book For Cybersecurity Beginners 1. Cybersecurity for Beginners by Raef Meeuwisse
Tweet media one
6
15
68
@seyi_Anisere
Oluwaseyi
23 days
Tweet media one
Tweet media two
Tweet media three
1
6
39
@seyi_Anisere
Oluwaseyi
25 days
10 websites to learn Linux for free 1. Linux Academy 2. Linux survival 3.Linux command 4. Linux Tutorial 5. Tecmint 6. Linux Hint 7. Linux Handbook 8. It's Foss 9.linuxize 10. nixcraft
Tweet media one
1
9
28
@seyi_Anisere
Oluwaseyi
3 months
Completed my first networking course on Cisco Started learning linux
@Mydeen4u
Myd33n 🤡
3 months
It's the last day of February Comment or quote this post with what you've been able to achieve this month in your Cybersecurity Journey. Me: I collected my in Cybersecurity Certificate Helped in gathering GRC resources for @ireteeh Started Ethical
23
12
105
4
1
25
@seyi_Anisere
Oluwaseyi
26 days
Risk management Which two types of control are effective after a violation of a security policy occurs ( choose two) a corrective b recovery c preventive d deterrent e compensative @_DeejustDee @ireteeh @Queenicea17 @akintunero @Ahmed___khaan @SecurityTrybe @CyberSecFalcon
8
4
22
@seyi_Anisere
Oluwaseyi
2 months
Week 2 of CyberGirls done ✔️ I am gradually adjusting to this rigorous learning and I think it fun. @cybersafehq #proudcybergirl @sisinerdtweets
1
2
17
@seyi_Anisere
Oluwaseyi
21 days
Which layer is responsible for routing messages through an internet work in the TCP/IP model a network access b session c transport d internet
Tweet media one
3
1
14
@seyi_Anisere
Oluwaseyi
20 days
Close your laptop and unwind with these movies 1. Start up A desperate banker, a Haitian American gang Lord and a cuban-American hacker are forced to work together to unwittingly create their version of the American dream
Tweet media one
3
4
12
@seyi_Anisere
Oluwaseyi
18 days
At which layer of the OSI model would a logical address be added during encapsulation a network layer b physical layer c transport layer d data link layer
Tweet media one
7
0
11
@seyi_Anisere
Oluwaseyi
7 months
Yay! I completed my second Cyber security course.
Tweet media one
Tweet media two
1
0
10
@seyi_Anisere
Oluwaseyi
21 days
At which layer of the OSI model would a logical address be added during encapsulation a network layer b physical layer c transport layer d data link layer
Tweet media one
4
1
10
@seyi_Anisere
Oluwaseyi
1 year
Is supposed to commence in August 2023. Hence I am soliciting for your much needed assistance in making this a reality. VISA fees: #72 ,000 SEVIS fee:$350( #262 ,500) Enrollment deposit:$500(375000) Total= #709 ,500 Please here is my account details Oluwaseyi Anisere 0457373769 GTbank
1
10
9
@seyi_Anisere
Oluwaseyi
4 years
@gabariskufilan Completely agree oo..my friend and her room mate was attacked by robbers and my friends room mate was completely naked when they came...niggas took laptop,phone and money and left without touching them oo..so it not really about what you are wearing
0
0
9
@seyi_Anisere
Oluwaseyi
2 months
Week 4 of CyberGirls done✔️✔️ *I learnt how to configure a stimulated network according to organizational requirements. * I learnt how to analyze malware files that have been extracted from packet captures * I learnt how to evaluate endpoint security. @cybersafehq #proudcybergirl
1
1
9
@seyi_Anisere
Oluwaseyi
1 year
Worth $36,500 for my tuition and fees. However I am faced with the challenge of catering for my VISA fees ( #72 ,000), SEVIS fee($350) and enrollment deposit ($500). I have been informed by the school that I will lose my scholarship if I don't resume for the fall semester which
1
1
7
@seyi_Anisere
Oluwaseyi
20 days
Top Linux networking tools
Tweet media one
0
0
8
@seyi_Anisere
Oluwaseyi
19 days
2. Develop your technical skills in areas such as networking, operating systems, scripting and tools ✓ Use hands on labs, stimulations, and projects to practice and apply your skills ✓Playground: Cyber defenders, Try hack me, Have the box.
1
0
8
@seyi_Anisere
Oluwaseyi
3 months
@omoalhajaabiola I wish it was free After you are selected, you will have to bring two people to enroll and pay for their course before u will be selected for the scholarship So it is not entirely free.
4
0
8
@seyi_Anisere
Oluwaseyi
24 days
What is a disadvantages of deploying a peer to peer network model a lack of centralized administration b high cost c difficulty of set d high degree of complexity @_DeejustDee @CyberPatronMC @Queenicea17 @ireteeh @SecurityTrybe @segun @CyberSecFalcon @TheSecMaster1
1
1
7
@seyi_Anisere
Oluwaseyi
22 days
B. To help organization detect threats before they disrupt business
@allenharper
Dr. Allen Harper
22 days
Sharpen your cyber skills: What is the purpose of a security information and event management (SIEM) system? A. To encrypt data B. To monitor and analyze security events C. To perform penetration testing D. To block unauthorized access events
Tweet media one
191
72
315
0
1
8
@seyi_Anisere
Oluwaseyi
7 months
Yay! I completed my first cyber security course on Cisco.
Tweet media one
1
0
7
@seyi_Anisere
Oluwaseyi
19 days
5. Keep learning and improving your skills and knowledge. ✓ Use online platforms, blogs, podcasts and webinars to stay updated on the largest trends and Technologies in Cybersecurity. ✓ Join community forms and groups to exchange ideas and tips with other SOC analyst.
0
1
6
@seyi_Anisere
Oluwaseyi
2 months
@Queenicea17 I thought of this too...some guys have sent me messages asking me how to start their Cybersecurity career and I think a mentorship program will be of so much help.
2
1
6
@seyi_Anisere
Oluwaseyi
5 months
@Queenicea17 I have started reading mine.
Tweet media one
Tweet media two
2
1
6
@seyi_Anisere
Oluwaseyi
17 days
4. Linux Basics for Hackers by Occupy the web
Tweet media one
1
1
6
@seyi_Anisere
Oluwaseyi
3 months
@sisinerdtweets @cybersafehq I am going to be a cyber girl.🤗🤗 I have been selected to join 500+ outstanding fellows across 27 African countries for the CyberGirls fellowship 2024 cohort. Carefully selected from 20,000+ applicants. Thank you Cybersafe foundation #Cybergirls2024
0
1
6
@seyi_Anisere
Oluwaseyi
1 month
Spot your baby girl! Happy International Girls in ICT Day! Thank you @sisinerdtweets for this great opportunity to be a CyberGirl 🤗🤗
@cybersafehq
Cybersafe Foundation
1 month
Happy International Girls in ICT Day! 💙 CyberGirls if you can spot yourself quote this video and say “Am a future cybersecurity leader 💪”
7
19
59
1
0
6
@seyi_Anisere
Oluwaseyi
4 months
@Ifeoma90483092 @osemagnum Oats Omega 3- cod liver oil or Evening primrose oil Zinc Vitamin C (1000mg)
2
1
6
@seyi_Anisere
Oluwaseyi
5 months
Tweet media one
0
0
6
@seyi_Anisere
Oluwaseyi
4 months
A WAF or web application firewall helps protect web applications by filtering and monitoring HTTP traffic between a web application and the internet. It typically protects web application from attacks such as cross- site forgery, cross site scripting(XSS), file inclusion. e.t.c
@wealthyprimate
wealthyprimate
4 months
🧑‍🏫Pop Quiz: What is a WAF, and why do we care?🕵️ #CyberSecurity
5
3
18
1
0
3
@seyi_Anisere
Oluwaseyi
19 days
3. Get certified to validate your skills and knowledge ✓ Use study guides, practice tests, and online courses to prepare for the exams ✓ Certifications to get: CompTIA security+, certified SOC Analyst (CSA), certified cyber defense analyst (CCDA)
1
0
4
@seyi_Anisere
Oluwaseyi
17 days
5. Networking Basics for Hackers by Occupy the web
Tweet media one
0
1
5
@seyi_Anisere
Oluwaseyi
2 months
@akintunero Thank you so much for this course, I really learnt alot.
Tweet media one
0
0
4
@seyi_Anisere
Oluwaseyi
2 months
I got my second networking badge. @cybersafehq #proudcybergirl
Tweet media one
Tweet media two
1
0
4
@seyi_Anisere
Oluwaseyi
8 months
Day 12 A vulnerability is a flaw or weakness in an assets design, implementation or operation and management that could be exploited by a threat. A threat is a potential for a threat agent to exploit a vulnerability. A risk is the potential for loss when the treat happens.
@ireteeh
Dr Iretioluwa Akerele
8 months
Day 12 In simple terms, what’s the difference between Threat, Vulnerability and Risk?
Tweet media one
48
34
122
0
2
4
@seyi_Anisere
Oluwaseyi
2 months
Check this out if you are interested in the ISC Certified in Cybersecurity (cc) Exam
@Lizettle_
Elizabeth Ekedoro
2 months
Interested in Taking the @ISC2 Certified in Cybersecurity (CC) Exam? Read this! The @ISC2 CC is one of the most beginner-friendly Cybersecurity certifications out there. Thanks to the ISC2's 1 Million in Cyber initiative, you can take the certification exam for FREE!
24
88
290
1
0
4
@seyi_Anisere
Oluwaseyi
4 months
@Queenicea17 I like the way it is explanatory and easy to understand. It also starts with the basics concept which is needed for understanding Linux.
1
1
4
@seyi_Anisere
Oluwaseyi
1 year
Tweet media one
2
0
4
@seyi_Anisere
Oluwaseyi
26 days
Tips on how to protect your laptop
0
0
4
@seyi_Anisere
Oluwaseyi
17 days
3. Network Security Essentials by William Stallings
Tweet media one
1
0
4
@seyi_Anisere
Oluwaseyi
17 days
2. Social Engineering: The art of human Hacking by Christopher Hadnagy
Tweet media one
1
0
4
@seyi_Anisere
Oluwaseyi
3 years
This is beautiful and well said sir
@AaronAkpuPhilip
𝐷𝑟 𝐴𝑎𝑟𝑜𝑛 𝐴𝑘𝑝𝑢 𝑃ℎ𝑖𝑙𝑖𝑝
3 years
A SHORT LETTER Dear Undergraduate, I know you have been delayed by incessant ASUU strikes. I know you should have graduated by now but you are still stuck. While you feel down, I come with a few words that you can take note of:
26
108
198
1
0
4
@seyi_Anisere
Oluwaseyi
2 months
Data Received with thanks...this will really go a long way... Thank you ma'am 😄😄
@ireteeh
Dr Iretioluwa Akerele
2 months
If you filled the form, check your balance ❤️
26
15
80
0
1
3
@seyi_Anisere
Oluwaseyi
1 month
Please donate and support 👇👇
@sisinerdtweets
Confidence Staveley
2 months
If it was up to you, to help one young woman chase her dreams of a career in #cybersecurity , would you make that happen with your donation? We need your support to turn the potential of 500 young women across Africa into today's cyber talent and tomorrow's cybersecurity leaders.
11
256
420
0
1
4
@seyi_Anisere
Oluwaseyi
19 days
4. Gain experience by working on real world scenarios and challenges. ✓ Use platforms such as SOC prime, Splunk Boss of the SOC or cyber defend to test your skills. ✓ Participate in competition, hackathons, and capture the flag events to showcase your abilities.
1
1
4
@seyi_Anisere
Oluwaseyi
11 days
Which technology is used to secure IOT transactions a DREAD b block chain c T-V pairing d STRIDE
Tweet media one
2
0
4
@seyi_Anisere
Oluwaseyi
5 months
The thing about period pain is no one can feel it and because everyone generally says it painful you might think that yours is the norms. I had similar experience and for some years I endured the pain and tried to live with it until I started having severe symptoms.
@_DeejustDee
DsL_a ʚїɞ ®
5 months
If you feel so much pain on your period, you should really go for a scan, some are underlying issues that you probably think are normal because everyone complains of pain. My pain is different from yours but we all call it pain, if I ever feel excessive pain from period, then
2
5
23
1
0
4
@seyi_Anisere
Oluwaseyi
22 days
Continuous monitoring is more comprehensive and has better results for your security compliance and the overall security of your data compared to periodic monitoring
@allenharper
Dr. Allen Harper
22 days
Cyber moment! If you could only choose one: Continuous monitoring or periodic assessments? Why?
17
2
29
0
1
4
@seyi_Anisere
Oluwaseyi
3 months
Happy International women's day to this amazing women... thank you for all you do in the Cyber space. @ireteeh @sisinerdtweets
Tweet media one
0
0
4
@seyi_Anisere
Oluwaseyi
8 months
@ireteeh As a newbie I am currently learning the basics or cyber security, learning concepts and their meaning and also learning about the various career path in cyber security and what it takes to be in any of these path
0
0
3
@seyi_Anisere
Oluwaseyi
3 months
Happy International women's Day to all the amazing women out there.
@Queenicea17
Cyber Caramel_Choco🍫
3 months
Happy International women's Day to every amazing woman in Cybersecurity doing amazing things & achieving amazing feats💐🥳 You are Seen & loved 🤩 Tag them😎 @sisinerdtweets @ireteeh @_DeejustDee @AbbyJefia @Lizettle_ @_Rega_n @NazaGrace @Gracesharonsol
Tweet media one
14
24
125
0
1
3
@seyi_Anisere
Oluwaseyi
2 months
This is so inspiring
@sisinerdtweets
Confidence Staveley
2 months
"Two years ago, I was a newcomer in this field, aspiring to become a cloud security engineer. Without looking back, I relentlessly pursued my goal. It's remarkable how much can change with time, focus, and effort"- she reflected. You see, @bugsandbags___ used to be a software
Tweet media one
13
18
143
1
0
3
@seyi_Anisere
Oluwaseyi
7 months
🤭🤭
Tweet media one
0
0
3
@seyi_Anisere
Oluwaseyi
2 months
I am just getting started but I am already grateful and I know I won't regret it.
@Mydeen4u
Myd33n 🤡
2 months
I just know that for the rest of my life I’ll be grateful I chased after this cybersecurity bag
13
26
140
0
0
3
@seyi_Anisere
Oluwaseyi
26 days
@sisinerdtweets Another Inspiring story .... Thank you @sisinerdtweets and @cybersafehq
1
0
3
@seyi_Anisere
Oluwaseyi
2 years
Thanks colab....
@CoLab_kd
CoLab
2 years
@seyi_Anisere @samiira_tou @Creed_Emmanuel7 Congratulations 🎉🎉🎉!!! You have been selected as the winners.💃💃 Kindly send a DM to continue the conversation.
2
0
2
0
0
3
@seyi_Anisere
Oluwaseyi
2 years
@CoLab_kd I am a computer engineering student who is interested in cloud computing. I have started learning the basics of coding and I intend to learn JavaScript programming language. I visited colab a month ago with a friend and I was really amazed by the conducive learning environment.
0
0
2
@seyi_Anisere
Oluwaseyi
2 years
1
0
1
@seyi_Anisere
Oluwaseyi
20 days
Please donate and support
@sandra_sewa
sandraytee
20 days
Sometime in February, I transitioned into cybersecurity. Currently in a bootcamp and each time an assignment is given, I get mine done at my friend’s place. This laptop will aid my cybersecurity journey and help me to practice anytime of the day.
Tweet media one
24
113
295
1
2
3
@seyi_Anisere
Oluwaseyi
3 months
Happy birthday mama @ireteeh Thank you for all you do
@Queenicea17
Cyber Caramel_Choco🍫
3 months
Happy birthday Dr. ❤️ You are phenomenal, your achievement knows no bound. You are a woman of purpose & integrity. Thank you for being a trail blazer . You lead , we follow Mama 🎂🎉. Such a humble personality, your character is worthy of emulation. Love U ❤️
Tweet media one
5
9
86
0
0
3
@seyi_Anisere
Oluwaseyi
11 months
@TheOyinbooke I keep starting and stopping and that because my laptop is bad...been patching with it but it recently became so worse😥😥
0
0
2
@seyi_Anisere
Oluwaseyi
7 months
@ireteeh
Dr Iretioluwa Akerele
7 months
Day 29 Tag the Cybersecurity communities that contributed to your Cybersecurity growth. Tell us how the communities helped you.
Tweet media one
18
27
101
0
1
3
@seyi_Anisere
Oluwaseyi
2 years
@CoLab_kd I will be delighted to join the present session to increase my practical knowledge on coding and learn about other interesting subjects that will be taught.
0
0
2
@seyi_Anisere
Oluwaseyi
2 months
You will see the end of it
@_kheneh
_kheneh
2 months
Networking will not be the end of me😖 #lifeOfACybergirl
5
0
7
1
0
2
@seyi_Anisere
Oluwaseyi
16 days
Which command would a technician use to display network connection on a host computer a ipconfig b nslookup c tracert d netstat
Tweet media one
1
0
2
@seyi_Anisere
Oluwaseyi
8 months
Woah.... @ireteeh just followed me oh...thank you ma🙏🙏
0
1
2
@seyi_Anisere
Oluwaseyi
25 days
Buffer overflow
@allenharper
Dr. Allen Harper
25 days
Sharpen your cyber skills: Which of the following is a type of attack that exploits vulnerabilities in software? A. Phishing B. Distributed Denial of Service (DDoS) C. Buffer overflow D. Brute force attack
Tweet media one
84
54
251
0
0
2
@seyi_Anisere
Oluwaseyi
23 days
Sharpen your Networking skills Which type of device provides an internet connection through the use of a phone jack a satellite modem b Wi-Fi AP c DSL modem d cable modem @CyberPatronMC @SecurityTrybe @TheSecMaster1
0
0
2
@seyi_Anisere
Oluwaseyi
10 days
@Lizettle_ @CCChampionsC4 @ISC2 Congratulations sis...you are really doing well
1
0
2
@seyi_Anisere
Oluwaseyi
3 years
1
0
2
@seyi_Anisere
Oluwaseyi
8 months
I am still in my first month of learning. The need to acquire a skill that is relevant to my course of study keeps me motivated daily. I need a group of people that are currently learning and in their beginner level along with mentorship.
@ireteeh
Dr Iretioluwa Akerele
8 months
Day 5 @CyberPatronMC How long have you been in this Cybersecurity journey? What motivates you to keep going daily? Are you facing any challenge currently? How can we help?
128
37
107
0
0
2
@seyi_Anisere
Oluwaseyi
17 days
@CyberRacheal D...The Safety of people is the primary objective
1
0
2
@seyi_Anisere
Oluwaseyi
8 months
Day 7 Relevance and continuous learning.
@ireteeh
Dr Iretioluwa Akerele
8 months
Day 7 Convince a novice to start a career in Cybersecurity.
Tweet media one
72
72
267
0
0
2
@seyi_Anisere
Oluwaseyi
1 year
Yes oh..I claimed this too IJN and I will earn in dollars...
@_fisayo__
Bljkxx.x
1 year
I've told God and myself that this will be the last year I'll be broke and so shall it be!🙂
3
19
86
0
0
2
@seyi_Anisere
Oluwaseyi
3 months
Acne
@osemagnum
Dr. Ose Etiobhio
3 months
As a lady... ONLY one can go forever. Which would that be? Choose wisely - Acne - Heavy periods - Ovulation pain - Premenstrual symptoms
102
12
61
0
0
1
@seyi_Anisere
Oluwaseyi
15 days
@xtertainerr It is because of statements like this @sisinerdtweets is empowering women in Cybersecurity.....some years from now this narrative would have changed ✔️
3
0
2
@seyi_Anisere
Oluwaseyi
20 days
2. Blacklist After turning himself in, a brilliant fugitive offers to help the FBI bay other baddies but only if rookie profiler Elizabeth keen is his partner.
Tweet media one
2
1
1
@seyi_Anisere
Oluwaseyi
23 days
@Queenicea17 Congratulations...do giveaway oh😄
1
0
2
@seyi_Anisere
Oluwaseyi
2 months
Salting is a technique used in Cybersecurity to enhance the security of passwords stored in a database. It involves adding a random string of characters to each password before it is hashed and stored. Salting is used to make brute Force attack difficult. #cybersecuritytips
Tweet media one
0
1
2
@seyi_Anisere
Oluwaseyi
13 days
@sandra_sewa @Queenicea17 @_DeejustDee @akintunero Congratulations dear...I am glad you gotten the much needed assistance you need
1
0
2
@seyi_Anisere
Oluwaseyi
7 months
1. The sender email 2. Grammatical Errors 3. The persuading write up for you to share personal details and information or click an attached link
@Cyblackorg
Cyblack
7 months
CyBlack's Cybersecurity Quiz. As we begin the weekend, let's have fun with this little exercise. "If you get an email from an unfamiliar source, mention three things you’d look out for to confirm if it is a phishing attempt or not." Drop your answers in the comment section.
Tweet media one
33
24
65
0
2
2
@seyi_Anisere
Oluwaseyi
3 years
Got ballons today
Tweet media one
0
0
2
@seyi_Anisere
Oluwaseyi
3 years
@olumuyiwaayo @georgebest247 check out this thread
1
0
2
@seyi_Anisere
Oluwaseyi
2 months
@RudebwoyPey @Queenicea17 Wow..that so expensive
0
0
2
@seyi_Anisere
Oluwaseyi
5 months
@StatistaG1210 @Queenicea17 Yes we can I will really love that
0
0
2