Adebayo_Abdulmalik_Olanrewaju (@malik_cybersec) 's Twitter Profile
Adebayo_Abdulmalik_Olanrewaju

@malik_cybersec

Cyber_Security_Student ( Aspiring_pentester)||BSc Cybersecurity ⏳|| ISC² CC ⏳|| Junior Cybersecurity Analyst ⏳|| Front_end_Web_Dev

ID: 1704022448880979968

calendar_today19-09-2023 06:43:30

48 Tweet

50 Takipçi

76 Takip Edilen

Adebayo_Abdulmalik_Olanrewaju (@malik_cybersec) 's Twitter Profile Photo

I attended Cyber fair 2.0 last week , hosted by NACSS under the lead of Tory☁️ as the departmental president, it was a great experience meeting with some of my mutual Mr. Henry The Lightsome Delightsome 🤓☁️ and some of the panelists Olúmáyòwá.dev cybernerd🤖 Looking forward to 3.0

I attended Cyber fair 2.0 last week , hosted by <a href="/nacss_uniosun/">NACSS</a> under the lead of <a href="/KoredeSec/">Tory☁️</a>  as the departmental president, it was a great experience meeting with some of my mutual <a href="/adebusola_48872/">Mr. Henry</a> <a href="/Dstixx05/">The Lightsome Delightsome 🤓☁️</a>  and some of the panelists <a href="/akintunero/">Olúmáyòwá.dev</a> <a href="/ce3nerd/">cybernerd🤖</a> 

Looking forward to 3.0
Adebayo_Abdulmalik_Olanrewaju (@malik_cybersec) 's Twitter Profile Photo

"Right time " is a complete waste of time true true, you can't figure everything when you haven't even started because you will always lack something, start roughly you will get it figured out along the line Start roughly start today

Mr Phil Ghana 🇬🇭 (@mrphilghana) 's Twitter Profile Photo

Josh Abdulmalik_cybersecurity Nana Sei Anyemedu Magnet RAM Capture because i see it to be a lightweight imaging tool from Magnet Forensics designed to capture physical RAM on both Windows and Mac. It has a small footprint, minimizing the alteration of the memory being captured.

Mr Phil Ghana 🇬🇭 (@mrphilghana) 's Twitter Profile Photo

Drone forensics turns a drone into evidence. Flight logs, GPS paths, timestamps, controller IDs, and app data can reveal where it flew, when, and who operated it. Even deleted media can leave artifacts behind. A drone isn’t just a camera in the sky. It’s a flying data recorder.

Drone forensics turns a drone into evidence.

Flight logs, GPS paths, timestamps, controller IDs, and app data can reveal where it flew, when, and who operated it. Even deleted media can leave artifacts behind.

A drone isn’t just a camera in the sky. It’s a flying data recorder.
Mr Phil Ghana 🇬🇭 (@mrphilghana) 's Twitter Profile Photo

Today I practiced Email Forensics to trace a message back to its source. By digging into the headers, I extracted the source IP , geolocated it, and verified the SPF/DKIM/DMARC authentication. Verified evidence is the only evidence🕵️‍♂️🛡️ Nana Sei Anyemedu 💚 #CyberSecurity

Today I practiced Email Forensics to trace a message back to its source.

By digging into the headers, I extracted the source IP , geolocated it, and verified the SPF/DKIM/DMARC authentication.

Verified evidence is the only evidence🕵️‍♂️🛡️ <a href="/RedHatPentester/">Nana Sei Anyemedu</a> 💚

#CyberSecurity
The Lightsome Delightsome🤓 (@dstixx05) 's Twitter Profile Photo

Another successful deployment on Elastic Beanstalk. Elastic Beanstalk is an AWS compute service that makes application deployment possible without managing compute instances directly. Under the hood, it’s all CloudFormation.

Another successful deployment on Elastic Beanstalk.

Elastic Beanstalk is an AWS compute service that makes application deployment possible without managing compute instances directly. 

Under the hood, it’s all CloudFormation.
Adebayo_Abdulmalik_Olanrewaju (@malik_cybersec) 's Twitter Profile Photo

Airtel network has been down over an hr MTN wey I switch to I still have to walk to the main road before I can get access to do my test 🤦🏻‍♂️ We are really suffering in this country

Airtel network has been down over an hr 

MTN wey I  switch to I still have to walk to the main road before I can get access to do my test 🤦🏻‍♂️

We are really suffering in this country
Mololuwa | Cybersecurity (The God Complex) (@cyber_rekk) 's Twitter Profile Photo

.exe files cannot run on Linux because they are made for Windows and Linux uses a completely different program format, so the system does not understand how to execute them. If a malicious site downloads a .exe file onto your Linux system, it will usually have no power and will

Mr Phil Ghana 🇬🇭 (@mrphilghana) 's Twitter Profile Photo

Just finished analyzing the Jimmy Wilson case 1️⃣ Used FTK Imager to verify the E01 evidence. 2️⃣ Imported the disk image into Autopsy for a deep dive. 3️⃣ Extracted artifacts and reconstructed the user's activity. Bit-by-bit, the truth comes out🔍🛡️ Another day to tell you

Just finished analyzing the Jimmy Wilson case 

1️⃣ Used FTK Imager to verify the E01 evidence.

2️⃣ Imported the disk image into Autopsy for a deep dive.

3️⃣ Extracted artifacts and reconstructed the user's activity.

Bit-by-bit, the truth comes out🔍🛡️

Another day to tell you
Tory☁️ (@korede_sec) 's Twitter Profile Photo

Just completed Networking Academy CCNA 1-3 and earned a discounted exam voucher! 🚀 Grateful to Olúmáyòwá.dev, TechPeak Lab, & Lancelot eihoda for the opportunity. Invaluable gains in network infra, IP addressing, & security. Next stop: Certification! 💪 #CCNA

Just completed <a href="/CiscoNetAcad/">Networking Academy</a> CCNA 1-3 and earned a discounted exam voucher! 🚀

Grateful to <a href="/akintunero/">Olúmáyòwá.dev</a>, <a href="/TechPeakLab/">TechPeak Lab</a>, &amp; <a href="/lanceeihoda/">Lancelot eihoda</a> for the opportunity. Invaluable gains in network infra, IP addressing, &amp; security.

Next stop: Certification! 💪

#CCNA
Mãsh_Cyb3r (@shittudedeji10) 's Twitter Profile Photo

Grateful to have completed the 3-stage program by Tech Peak Lab! TechPeak Lab As a reward, I received a 58% voucher discount for the CCNA exam 🎉 Thank you for investing in learners and making professional certifications more accessible. On to the next milestone! #CCNA

Grateful to have completed the 3-stage program by Tech Peak Lab! <a href="/TechPeakLab/">TechPeak Lab</a> 
As a reward, I received a 58% voucher discount for the CCNA exam 🎉

Thank you for investing in learners and making professional certifications more accessible. On to the next milestone! 
#CCNA
Adebayo_Abdulmalik_Olanrewaju (@malik_cybersec) 's Twitter Profile Photo

My oga I would love to have a session with you no matter how small the time might be Will be glad my request is granted, thank you ❤️

Adebayo_Abdulmalik_Olanrewaju (@malik_cybersec) 's Twitter Profile Photo

Over the last two weeks I have been learning Java Why Java? I have had it in mind to learn it and I got to know I will be doing Java two weeks to exam . Went to the school library and get myself some books. Stay tuned while I build something after exam Elorm Daniel Dr Iretioluwa Akerele

Over the last two weeks I have been learning Java 

Why Java? I have had it in mind to learn it and I got to know I will be doing Java two weeks to exam . Went to the school library and get  myself some books. Stay tuned while I build something after exam 
<a href="/elormkdaniel/">Elorm Daniel</a> <a href="/ireteeh/">Dr Iretioluwa Akerele</a>
Adebayo_Abdulmalik_Olanrewaju (@malik_cybersec) 's Twitter Profile Photo

Omo no be lie I have exam back to back for the next two weeks Google Cybersecurity scholarship is there time is going API security waiting patiently Portswigger academy Java project is waiting for me too I gat a lot on my neck mehn