Obi Nna (@o_rebyc) 's Twitter Profile
Obi Nna

@o_rebyc

Integrity is everything.

ID: 1548470925175058433

calendar_today17-07-2022 00:53:45

481 Tweet

21 Followers

160 Following

Rood J. Murat (@roodmurat) 's Twitter Profile Photo

Some Projects for beginners getting into cybersecurity And Links below for how to do them ๐Ÿ‘‡๐Ÿ‘‡ - Build A KeyLogger - Build An IDS - Build An Antivirus Software - Build A DNS Spoofer A Massive Thread

TheCyberPatronNetwork ยฉ (@thecyberpatron_) 's Twitter Profile Photo

NIST New Password Security Recommendations NIST (National Institute of Standards and Technology) has introduced new recommendations for password security in Special Publication 800-63B Previous Recommendations - Mandatory password complexity (mix of uppercase, lowercase,

TheCyberPatronNetwork ยฉ (@thecyberpatron_) 's Twitter Profile Photo

Certified Ethical Hacker (CEHv12) ๐Ÿ›ก๏ธ: Over 1,000 unique questions structured in 8 practice exams fully simulated and timed to put you under actual exam conditions. - CEHv12 Practice Exam 1: lnkd.in/dVeQUwiw - CEHv12 Practice Exam 2: lnkd.in/d5ShM5AZ - CEHv12

TheCyberPatronNetwork ยฉ (@thecyberpatron_) 's Twitter Profile Photo

Pentest Practical Lab Pentest Labs practicalpentestlabs.com -> Pentestlab pentesterlab.com -> Penetration Testing Practice Labs amanhardikar.com/mindmaps/Practโ€ฆ -> PentestIT LAB lab.pentestit.ru -> PicoCTF picoctf.com -> PWNABLE pwnable.kr/play.php ->

TheCyberPatronNetwork ยฉ (@thecyberpatron_) 's Twitter Profile Photo

Essential SOC Tools Every Cybersecurity Professional Should Know! 1. SIEM (Security Information and Event Management) - Example: Splunk, IBM QRadar, ArcSight - Purpose: Centralized log management and threat detection. 2. IDS/IPS (Intrusion Detection & Prevention Systems)

TheCyberPatronNetwork ยฉ (@thecyberpatron_) 's Twitter Profile Photo

10 AUDIT TOOLS FOR IT AUDITORS ๐Ÿ“Audit Management Software (e.g., TeamMate, AuditBoard, Pentana) These platforms help organize, track, and manage audit workflows, documentation, and findings across different audit projects. ๐Ÿ“Data Analytics Tools (e.g., ACL Analytics,

TheCyberPatronNetwork ยฉ (@thecyberpatron_) 's Twitter Profile Photo

Best Courses For Network Engineer on YouTube: 1. Network Troubleshooting lnkd.in/dkqAVF7U 2. Palo Alto Firewall lnkd.in/dj4NtUMj 3. Cisco SD-WAN lnkd.in/dp6uEDtN 4. Scenario-Based Network Configuration lnkd.in/dA7aTHHA 5. Real-Time Networks

Rood J. Murat (@roodmurat) 's Twitter Profile Photo

If you got no Cybersecurity experience Again check out these 3 free trainings๐Ÿ‘‡๐Ÿ‘‡ And how to add them to your CV Like&Retweet so more people can benefit from this A Thread

TheCyberPatronNetwork ยฉ (@thecyberpatron_) 's Twitter Profile Photo

BEST YOUTUBE RESOURCES FOR NETWORK ENGINEER 15. Voice over IP(VoIP) lnkd.in/dsHv2R6V 16. Important Networking Topics lnkd.in/dTsd-h_k 17. OSPF lnkd.in/dUYZME73 18. CCNA 200-301 lnkd.in/d8WtGDk6 19. VPN lnkd.in/d7shGyZ6 20. STP

TheCyberPatronNetwork ยฉ (@thecyberpatron_) 's Twitter Profile Photo

๐Ÿ“ข ๐”๐ฌ๐ž๐ซ-๐…๐ซ๐ข๐ž๐ง๐๐ฅ๐ฒ ๐†๐‘๐‚ ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐๐ž๐ ๐ข๐ง๐ง๐ž๐ซ๐ฌ Starting a career in Governance, Risk, and Compliance (GRC) is both rewarding and impactful. To help you get started, here are some beginner-friendly GRC tools that can enhance your learning and practical

Rood J. Murat (@roodmurat) 's Twitter Profile Photo

If you don't have a PC yet, don't let this stop you! - Professor Messer series on Youtube is amazing - TryHackMe has mobile-friendly rooms like the Pre-Security Path - Coursera has an app , look for the google cybersec I mean, grab a pen and paper, take notes.... DO

TheCyberPatronNetwork ยฉ (@thecyberpatron_) 's Twitter Profile Photo

Network Traffic Analysis for Beginners Take the Wireshark University course: lnkd.in/dy2YAyNw Follow the Wireshark Tutorial on guru99: lnkd.in/d8ENd4GG Read through the TCPdump Tutorial on DanielMiessler: lnkd.in/dEcycFqq Read through the Suricata on

TheCyberPatronNetwork ยฉ (@thecyberpatron_) 's Twitter Profile Photo

AI COURSES FOR BEGINNERS ๐—š๐—ฒ๐—ป ๐—”๐—œ ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† - ๐—–๐—ผ๐˜‚๐—ฟ๐˜€๐—ฒ๐—ฟ๐—ฎ lnkd.in/dfZrQzNh A foundational course on how Generative AI is shaping modern cybersecurity practices. ๐Ÿ“Œ ๐—œ๐—ป๐˜๐—ฟ๐—ผ๐—ฑ๐˜‚๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐˜๐—ผ ๐—”๐—œ ๐—ฎ๐—ป๐—ฑ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† -

Mololuwa | Cybersecurity (The God Complex) (@cyber_rekk) 's Twitter Profile Photo

๐Ÿ”Step-by-Step Guide to Setting Up Splunk Enterprise for Log Monitoring (SIEM TUTORIAL)๐Ÿ–ฅ๏ธ A Thread (๐Ÿงต) Want to monitor system logs like a pro? Splunk Enterprise is a powerful SIEM tool for log collection, analysis, and threat detection. This guide walks you through the

๐Ÿ”Step-by-Step Guide to Setting Up Splunk Enterprise for Log Monitoring
(SIEM TUTORIAL)๐Ÿ–ฅ๏ธ

A Thread (๐Ÿงต)

Want to monitor system logs like a pro? Splunk Enterprise is a powerful SIEM tool for log collection, analysis, and threat detection. This guide walks you through the
Marc Menninger (@marcmenninger) 's Twitter Profile Photo

๐Ÿ” How to Investigate a Phishing Email Like a Pro You just got a sketchy email. It looks urgent, maybe even legit. One wrong click could mean stolen credentials, malware, or a full-blown security breach. Before you panic (or click anything), hereโ€™s how to break down a phishing

TheCyberPatronNetwork ยฉ (@thecyberpatron_) 's Twitter Profile Photo

Network Engineer Popular Courses on YouTube: 1. Basic Networking Protocols Configurations lnkd.in/d7FNBSJe 2. Packet Flow lnkd.in/dXRZHkuC 3. EIGRP Full Course lnkd.in/dy383Cfb 4. VPN Full Course lnkd.in/dGGZRHgk 5. Subnetting QnA Course

Dennoh (@cfc_dennoh) 's Twitter Profile Photo

Estรชvรฃo Willian can Dribble, assist, score, create chances, Score freekicks and penalties. He can do ANYTHING!!!!

Elorm Daniel (@elormkdaniel) 's Twitter Profile Photo

Dear beginners, here are the top 40 youtube channels to learn Cybersecurity 1. David Bombal 2. Null Byte 3. NetworkChuck 4. CYBER TRUTH 5. HackerSploit 6. CyberSecurty_PK 7. John Hammond 8. Cyber Insecurity 9. The Cyber Mentor 10. LearnCyber Security 11. GeraldAuger 12.