SOC Analyst Roadmap
1. Learn the basics of Cybersecurity, such as security concepts, principles and the best practices
✓ Use online courses, book, blogs, podcasts, and other resources to gain foundational knowledge
✓ Examples: Google's Cybersecurity course, Cisco Cybersecurity
10 websites to learn Linux for free
1. Linux Academy
2. Linux survival
3.Linux command
4. Linux Tutorial
5. Tecmint
6. Linux Hint
7. Linux Handbook
8. It's Foss
9.linuxize
10. nixcraft
It's the last day of February
Comment or quote this post with what you've been able to achieve this month in your Cybersecurity Journey.
Me: I collected my in Cybersecurity Certificate
Helped in gathering GRC resources for
@ireteeh
Started Ethical
Close your laptop and unwind with these movies
1. Start up
A desperate banker, a Haitian American gang Lord and a cuban-American hacker are forced to work together to unwittingly create their version of the American dream
At which layer of the OSI model would a logical address be added during encapsulation
a network layer
b physical layer
c transport layer
d data link layer
At which layer of the OSI model would a logical address be added during encapsulation
a network layer
b physical layer
c transport layer
d data link layer
Is supposed to commence in August 2023. Hence I am soliciting for your much needed assistance in making this a reality.
VISA fees:
#72
,000
SEVIS fee:$350(
#262
,500)
Enrollment deposit:$500(375000)
Total=
#709
,500
Please here is my account details
Oluwaseyi Anisere
0457373769
GTbank
@gabariskufilan
Completely agree oo..my friend and her room mate was attacked by robbers and my friends room mate was completely naked when they came...niggas took laptop,phone and money and left without touching them oo..so it not really about what you are wearing
Week 4 of CyberGirls done✔️✔️
*I learnt how to configure a stimulated network according to organizational requirements.
* I learnt how to analyze malware files that have been extracted from packet captures
* I learnt how to evaluate endpoint security.
@cybersafehq
#proudcybergirl
Worth $36,500 for my tuition and fees. However I am faced with the challenge of catering for my VISA fees (
#72
,000), SEVIS fee($350) and enrollment deposit ($500). I have been informed by the school that I will lose my scholarship if I don't resume for the fall semester which
2. Develop your technical skills in areas such as networking, operating systems, scripting and tools
✓ Use hands on labs, stimulations, and projects to practice and apply your skills
✓Playground: Cyber defenders, Try hack me, Have the box.
@omoalhajaabiola
I wish it was free
After you are selected, you will have to bring two people to enroll and pay for their course before u will be selected for the scholarship
So it is not entirely free.
Sharpen your cyber skills:
What is the purpose of a security information and event management (SIEM) system?
A. To encrypt data
B. To monitor and analyze security events
C. To perform penetration testing
D. To block unauthorized access events
5. Keep learning and improving your skills and knowledge.
✓ Use online platforms, blogs, podcasts and webinars to stay updated on the largest trends and Technologies in Cybersecurity.
✓ Join community forms and groups to exchange ideas and tips with other SOC analyst.
@Queenicea17
I thought of this too...some guys have sent me messages asking me how to start their Cybersecurity career and I think a mentorship program will be of so much help.
@sisinerdtweets
@cybersafehq
I am going to be a cyber girl.🤗🤗
I have been selected to join 500+ outstanding fellows across 27 African countries for the CyberGirls fellowship 2024 cohort. Carefully selected from 20,000+ applicants.
Thank you Cybersafe foundation
#Cybergirls2024
A WAF or web application firewall helps protect web applications by filtering and monitoring HTTP traffic between a web application and the internet. It typically protects web application from attacks such as cross- site forgery, cross site scripting(XSS), file inclusion. e.t.c
3. Get certified to validate your skills and knowledge
✓ Use study guides, practice tests, and online courses to prepare for the exams
✓ Certifications to get: CompTIA security+, certified SOC Analyst (CSA), certified cyber defense analyst (CCDA)
Day 12
A vulnerability is a flaw or weakness in an assets design, implementation or operation and management that could be exploited by a threat. A threat is a potential for a threat agent to exploit a vulnerability. A risk is the potential for loss when the treat happens.
Interested in Taking the
@ISC2
Certified in Cybersecurity (CC) Exam? Read this!
The
@ISC2
CC is one of the most beginner-friendly Cybersecurity certifications out there. Thanks to the ISC2's 1 Million in Cyber initiative, you can take the certification exam for FREE!
A SHORT LETTER
Dear Undergraduate,
I know you have been delayed by incessant ASUU strikes. I know you should have graduated by now but you are still stuck. While you feel down, I come with a few words that you can take note of:
If it was up to you, to help one young woman chase her dreams of a career in
#cybersecurity
, would you make that happen with your donation?
We need your support to turn the potential of 500 young women across Africa into today's cyber talent and tomorrow's cybersecurity leaders.
4. Gain experience by working on real world scenarios and challenges.
✓ Use platforms such as SOC prime, Splunk Boss of the SOC or cyber defend to test your skills.
✓ Participate in competition, hackathons, and capture the flag events to showcase your abilities.
The thing about period pain is no one can feel it and because everyone generally says it painful you might think that yours is the norms. I had similar experience and for some years I endured the pain and tried to live with it until I started having severe symptoms.
If you feel so much pain on your period, you should really go for a scan, some are underlying issues that you probably think are normal because everyone complains of pain.
My pain is different from yours but we all call it pain, if I ever feel excessive pain from period, then
Continuous monitoring is more comprehensive and has better results for your security compliance and the overall security of your data compared to periodic monitoring
@ireteeh
As a newbie I am currently learning the basics or cyber security, learning concepts and their meaning and also learning about the various career path in cyber security and what it takes to be in any of these path
"Two years ago, I was a newcomer in this field, aspiring to become a cloud security engineer. Without looking back, I relentlessly pursued my goal. It's remarkable how much can change with time, focus, and effort"- she reflected.
You see,
@bugsandbags___
used to be a software
@CoLab_kd
I am a computer engineering student who is interested in cloud computing. I have started learning the basics of coding and I intend to learn JavaScript programming language. I visited colab a month ago with a friend and I was really amazed by the conducive learning environment.
Sometime in February, I transitioned into cybersecurity. Currently in a bootcamp and each time an assignment is given, I get mine done at my friend’s place.
This laptop will aid my cybersecurity journey and help me to practice anytime of the day.
Happy birthday Dr. ❤️ You are phenomenal, your achievement knows no bound. You are a woman of purpose & integrity. Thank you for being a trail blazer . You lead , we follow Mama 🎂🎉. Such a humble personality, your character is worthy of emulation. Love U ❤️
@CoLab_kd
I will be delighted to join the present session to increase my practical knowledge on coding and learn about other interesting subjects that will be taught.
Sharpen your cyber skills:
Which of the following is a type of attack that exploits vulnerabilities in software?
A. Phishing
B. Distributed Denial of Service (DDoS)
C. Buffer overflow
D. Brute force attack
Sharpen your Networking skills
Which type of device provides an internet connection through the use of a phone jack
a satellite modem
b Wi-Fi AP
c DSL modem
d cable modem
@CyberPatronMC
@SecurityTrybe
@TheSecMaster1
I am still in my first month of learning. The need to acquire a skill that is relevant to my course of study keeps me motivated daily.
I need a group of people that are currently learning and in their beginner level along with mentorship.
Day 5
@CyberPatronMC
How long have you been in this Cybersecurity journey?
What motivates you to keep going daily?
Are you facing any challenge currently? How can we help?
@xtertainerr
It is because of statements like this
@sisinerdtweets
is empowering women in Cybersecurity.....some years from now this narrative would have changed ✔️
2. Blacklist
After turning himself in, a brilliant fugitive offers to help the FBI bay other baddies but only if rookie profiler Elizabeth keen is his partner.
Salting is a technique used in Cybersecurity to enhance the security of passwords stored in a database. It involves adding a random string of characters to each password before it is hashed and stored.
Salting is used to make brute Force attack difficult.
#cybersecuritytips
CyBlack's Cybersecurity Quiz.
As we begin the weekend, let's have fun with this little exercise.
"If you get an email from an unfamiliar source, mention three things you’d look out for to confirm if it is a phishing attempt or not."
Drop your answers in the comment section.