Olayiwola Stephen (@cyberkariot) 's Twitter Profile
Olayiwola Stephen

@cyberkariot

ID: 1958315770393370624

calendar_today20-08-2025 23:50:49

29 Tweet

5 Followers

7 Following

Olayiwola Stephen (@cyberkariot) 's Twitter Profile Photo

#Day4๐Ÿš€ Consistency is key! Still on networking basics tonight Iโ€™m focusing on how devices actually talk to each other. Every packet tells a story ๐ŸŒ๐Ÿ’ป #CyberJourney #Cybersecurity #Consistency

#Day4๐Ÿš€ Consistency is key! Still on networking basics tonight Iโ€™m focusing on how devices actually talk to each other. Every packet tells a story ๐ŸŒ๐Ÿ’ป #CyberJourney #Cybersecurity #Consistency
Olayiwola Stephen (@cyberkariot) 's Twitter Profile Photo

#Day5 Deep dive into TCP/IP tonight. While the OSI model explains how data should move, TCP/IP shows how it actually happens on the internet . Step by step, the foundation is getting stronger ๐Ÿ”‘๐Ÿ”ฅ #cyberJourney #cybersecurity #consistency

Olayiwola Stephen (@cyberkariot) 's Twitter Profile Photo

#Day6 ๐Ÿ”ฅ Tonightโ€™s focus: IP addressing ๐ŸŒ. Every device online has its own unique identity like a digital home address๐Ÿก๐Ÿ’ป. Understanding IPv4 vs IPv6 is a must for anyone serious about networking and cybersecurity ๐Ÿ”‘ #cyberJourney #consistency #cyberSecurity

Olayiwola Stephen (@cyberkariot) 's Twitter Profile Photo

#Day7 ๐ŸŒ Tonight Iโ€™m exploring Subnetting. Itโ€™s like breaking a big neighborhood of IP addresses into smaller streets and houses ๐Ÿ˜๏ธ making networks easier to manage and secure. Step by step, the basics are getting clearer ๐Ÿ”ฅ #Consistency #Networking #CyberSecurity #EthicalHacking

#Day7 ๐ŸŒ Tonight Iโ€™m exploring Subnetting. Itโ€™s like breaking a big neighborhood of IP addresses into smaller streets and houses ๐Ÿ˜๏ธ making networks easier to manage and secure. Step by step, the basics are getting clearer ๐Ÿ”ฅ
#Consistency #Networking #CyberSecurity #EthicalHacking
Olayiwola Stephen (@cyberkariot) 's Twitter Profile Photo

#Day8๐Ÿ’ป Tonightโ€™s focus: Ports Protocols ๐ŸŒ. Think of ports as doors๐Ÿšช and protocols as the rules that decide what kind of traffic passes through. From HTTP(80) to HTTPS(443), these are the gateways of the internet ๐Ÿ”‘๐Ÿ”ฅNetworking Academy #Networking #CyberSecurity #EthicalHacking

#Day8๐Ÿ’ป Tonightโ€™s focus: Ports Protocols ๐ŸŒ. Think of ports as doors๐Ÿšช and protocols as the rules that decide what kind of traffic passes through. From HTTP(80) to HTTPS(443), these are the gateways of the internet ๐Ÿ”‘๐Ÿ”ฅ<a href="/CiscoNetAcad/">Networking Academy</a> 
 #Networking #CyberSecurity #EthicalHacking
Olayiwola Stephen (@cyberkariot) 's Twitter Profile Photo

#Day9 ๐Ÿš€Tonightโ€™s focus: DNS (Domain Name System)๐ŸŒ. Itโ€™s like the internetโ€™s phonebook turning names we understand (google.com) into IP addresses computers understand. Without DNS, the web wouldnโ€™t feel so seamless๐Ÿ”‘๐Ÿ’ป #Networking #CyberSecurity #EthicalHacking

#Day9 ๐Ÿš€Tonightโ€™s focus: DNS (Domain Name System)๐ŸŒ. Itโ€™s like the internetโ€™s phonebook turning names we understand (google.com) into IP addresses computers understand. Without DNS, the web wouldnโ€™t feel so seamless๐Ÿ”‘๐Ÿ’ป
 #Networking #CyberSecurity #EthicalHacking
Olayiwola Stephen (@cyberkariot) 's Twitter Profile Photo

#Day10 Today i dived into DHCP (Dynamic Host Configuration Protocol)๐Ÿ“ก. Itโ€™s the service that automatically gives devices an IP address when they join a network like handing out name tags at an event. Without it, connecting would be a mess ๐Ÿ’ป๐Ÿ”ฅ #Networking #CyberSecurity

#Day10 Today i dived into DHCP (Dynamic Host Configuration Protocol)๐Ÿ“ก. Itโ€™s the service that automatically gives devices an IP address when they join a network like handing out name tags at an event. Without it, connecting would be a mess ๐Ÿ’ป๐Ÿ”ฅ
 #Networking #CyberSecurity
Olayiwola Stephen (@cyberkariot) 's Twitter Profile Photo

#Day11 ๐Ÿ’ป Tonightโ€™s topic: Firewalls ๐Ÿ”ฅ๐Ÿ›ก๏ธ. They act like security guards for networks deciding what traffic gets in and what stays out ๐Ÿšช. Understanding them is key to protecting systems from unwanted visitors ๐ŸŒ๐Ÿ”‘ #Consistency #Networking #CyberSecurity #EthicalHacking

#Day11 ๐Ÿ’ป Tonightโ€™s topic: Firewalls ๐Ÿ”ฅ๐Ÿ›ก๏ธ. They act like security guards for networks deciding what traffic gets in and what stays out ๐Ÿšช. Understanding them is key to protecting systems from unwanted visitors ๐ŸŒ๐Ÿ”‘

#Consistency #Networking #CyberSecurity  #EthicalHacking
Olayiwola Stephen (@cyberkariot) 's Twitter Profile Photo

#Day12 ๐ŸŒ Tonight Iโ€™m exploring Wireless Networking ๐Ÿ“ก. From Wi-Fi standards (802.11) to encryption methods like WPA2/WPA3๐Ÿ”‘ securing the airwaves is just as important as securing cables. No weak links allowed ๐Ÿ’ป๐Ÿ”ฅ #Networking #CyberSecurity #EthicalHacking

#Day12 ๐ŸŒ Tonight Iโ€™m exploring Wireless Networking ๐Ÿ“ก. From Wi-Fi standards (802.11) to encryption methods like WPA2/WPA3๐Ÿ”‘ securing the airwaves is just as important as securing cables. No weak links allowed ๐Ÿ’ป๐Ÿ”ฅ
 #Networking #CyberSecurity  #EthicalHacking
Olayiwola Stephen (@cyberkariot) 's Twitter Profile Photo

#Day13 Tonight Iโ€™m diving into Routing & Switching basics๐Ÿ”„. Switches connect devices within a network ๐Ÿ–ฅ๏ธโ†”๏ธ, while routers connect different networks together. These two are the backbone of communication ๐Ÿ’ป๐Ÿ”ฅ #Networking #CyberSecurity #EthicalHacking Brentford | Hilda | Koyin

#Day13 Tonight Iโ€™m diving into Routing &amp; Switching basics๐Ÿ”„. Switches connect devices within a network ๐Ÿ–ฅ๏ธโ†”๏ธ, while routers connect different networks together. These two are the backbone of communication ๐Ÿ’ป๐Ÿ”ฅ
#Networking #CyberSecurity #EthicalHacking
Brentford | Hilda | Koyin