Owolewa Azeez (@og_tech1) 's Twitter Profile
Owolewa Azeez

@og_tech1

Cybersecurity & Networking Enthusiast || Aspiring White hat 🎩 || Cybergeneration, Feel free to unfollow me if you’re not interested in what I post 😇🤞.

ID: 1628716273151492097

linkhttps://cybergeneration.podia.com/ calendar_today23-02-2023 11:20:10

2,2K Tweet

236 Followers

626 Following

Mike Miller (@mikemillercyber) 's Twitter Profile Photo

Here are 6 steps every business should to do stay safe from Cyber Attacks. This is what every single Cybersecurity Professional should know: As a Cybersecurity professional, you don't have to re-invent the wheel to keep your organization safe. There are many cybersecurity

Here are 6 steps every business should to do stay safe from Cyber Attacks. This is what every single Cybersecurity Professional should know:

As a Cybersecurity professional, you don't have to re-invent the wheel to keep your organization safe. There are many cybersecurity
Onyekachi (@cyberhacck) 's Twitter Profile Photo

It’s been 6years since I joined this X app, I’ve met the most amazing people who have really helped transform my career and life in general. It’s on this app I saw the advert for the Cybersafe Foundation CyberGirls fellowship and this has transformed my life in no small way.

It’s been 6years since I joined this X app, I’ve met the most amazing people who have really helped transform my career and life in general. 

It’s on this app I saw the advert for the <a href="/cybersafehq/">Cybersafe Foundation</a> CyberGirls fellowship and this has transformed my life in no small way.
Onyekachi (@cyberhacck) 's Twitter Profile Photo

Godddd!!!!!! I am soooooo glad I took a bet on my self. I am so glad I closed my ears to doubt and uncertainty. My life changed tremendously ever since I took this bold step. My earnings quadrupled😭😭 Thank you Jesus!! ❤️

Job Corner (@jobcorner247) 's Twitter Profile Photo

CISCO is offering FREE trainings and certifications for people looking to learn: - Data Analytics, - Data Science, - Cybersecurity, - JavaScript, - Python These are self-paced courses, so you can practice as you learn. Open this THREAD to get started on your learning.

Elorm Daniel (@elormkdaniel) 's Twitter Profile Photo

Nmap is free. Wireshark is free. OpenVAS is free. Kali Linux is free. OSINT Framework is free. Shodan (basic tier) is free. TryHackMe & Hack The Box (basic tiers) are free. You say you want to get into cybersecurity, but the truth is… you already have the tools at your

Elorm Daniel (@elormkdaniel) 's Twitter Profile Photo

IPv4 Address Format An IPv4 address is the unique number given to every device on a network. Example shown: 185. 107. 80. 231 How it works: An IPv4 address has 4 parts, called octets. Each octet = 8 bits (1 byte). Total = 4 × 8 = 32 bits. Two formats: 1. Dotted Decimal

IPv4 Address Format

An IPv4 address is the unique number given to every device on a network.
Example shown: 185. 107. 80. 231

How it works:
An IPv4 address has 4 parts, called octets.

Each octet = 8 bits (1 byte).

Total = 4 × 8 = 32 bits.

Two formats:

1. Dotted Decimal
Pretty Cyber Girl 💻 💀 (@lukaslookalike) 's Twitter Profile Photo

📂 Cybersecurity Stack ┃ ┣ 📂 Foundations ┃ ┣ 📂 Networking (TCP/IP, DNS, HTTP/S) ┃ ┣ 📂 Linux & Windows Internals ┃ ┣ 📂 OSI Model ┃ ┣ 📂 Cryptography Basics ┃ ┗ 📂 Security Principles (CIA Triad) ┃ ┣ 📂 Security Operations (SOC) ┃ ┣ 📂 SIEM (Splunk, ELK) ┃ ┣

Dr Iretioluwa Akerele (@ireteeh) 's Twitter Profile Photo

Congratulations to Ola Arilewola for winning the laptop in April. I’m rooting for your success in the Cybersecurity field, and I hope this laptop becomes a valuable tool in your journey. It’s my wish that it makes your learning experience smoother and opens up more opportunities