Emmy (@dee_manuel2) 's Twitter Profile
Emmy

@dee_manuel2

Airdrop Hunter|| Physiologist in training|| Dancer and more✨

ID: 1803143502861111296

calendar_today18-06-2024 19:11:42

857 Tweet

23 Followers

182 Following

Hybrid Security Consult (@hsc_consult) 's Twitter Profile Photo

HSC SOC Internship — Starting April 3. Not beginner-friendly. Fully hands-on training for your first SOC role. Threat Hunting • EDR • Cloud Sec • DFIR • SOAR • IR • SOC2 Be socially active. Share your progress. Serious minds only. Apply via the link below

HSC SOC Internship — Starting April 3.

Not beginner-friendly. Fully hands-on training for your first SOC role.

Threat Hunting • EDR • Cloud Sec • DFIR • SOAR • IR • SOC2

Be socially active. Share your progress.

Serious minds only.
Apply via the link below
Digiss LLC (@digissllc) 's Twitter Profile Photo

Applications are officially open for our Q2 and Q3 2026 Internship Cohorts. This is a fast-paced selection process: you have 48 hours to submit your application, or until we reach 1,000 applications (whichever happens first). Eligibility Requirements Applicants must possess at

Applications are officially open for our Q2 and Q3 2026 Internship Cohorts.
This is a fast-paced selection process: you have 48 hours to submit your application, or until we reach 1,000 applications (whichever happens first).

Eligibility Requirements
Applicants must possess at
Elorm Daniel (@elormkdaniel) 's Twitter Profile Photo

Let me show you something more beneficial. ITExperience, in partnership with Grow With Google (Google Career Certificate Scholarship Program), is excited to offer People trhe opportunity to obtain a Google Career Certificate in any of these seven different areas. 1. Google

Emmy (@dee_manuel2) 's Twitter Profile Photo

Cybersecurity Streak | Day 11-12 ✅ Deepened my understanding of cybersecurity, information security categories, first-line defenses, and the core principles (CIA Triad). Also explored the flip side: DAD — Disclosure, Alteration, and Denial

Cybersecurity Streak | Day 11-12 ✅

Deepened my understanding of cybersecurity, information security categories, first-line defenses, and the core principles (CIA Triad). Also explored the flip side: DAD — Disclosure, Alteration, and Denial
Tech Sphere Academy (@techsphereacad) 's Twitter Profile Photo

Welcome to March! Cheers to growth at Tech Sphere as you continue your learning. New to the party, click the link in our bio to apply

Welcome to March! 
Cheers to growth at Tech Sphere as you continue your learning. 

New to the party, click the link in our bio to apply
Emmy (@dee_manuel2) 's Twitter Profile Photo

Cybersecurity Streak | Day 14 ✅ At CAYA-Come As You Are, we discussed Elevating Career Growth with LinkedIn; using the platform to improve, develop, and advance career opportunities Thank you Maryam Shuaibu Aliyu , Okeke Prince and other speakers as well CHOVE Ezechi Jeremiah

Cybersecurity Streak | Day 14 ✅

At <a href="/CayaHQ/">CAYA-Come As You Are</a>, we discussed Elevating Career Growth with LinkedIn; using the platform to improve, develop, and advance career opportunities

Thank you <a href="/Cyberhijabitech/">Maryam Shuaibu Aliyu</a> , <a href="/PorryferaOkeke/">Okeke Prince</a> and other speakers as well

<a href="/chovwenofuru/">CHOVE</a> <a href="/cyberjeremiah/">Ezechi Jeremiah</a>
Emmy (@dee_manuel2) 's Twitter Profile Photo

Excited to be selected for the IBM Cybersecurity Professional Certificate Building depth in 2026 🤲🏾☺️ Big thanks to everyone who shared this opportunity with me. I'm truly grateful 🙏

Excited to be selected for the IBM Cybersecurity Professional Certificate 

Building depth in 2026 🤲🏾☺️
Big thanks to everyone who shared this opportunity with me. I'm truly grateful 🙏
JD (@thewilddreams_) 's Twitter Profile Photo

Day 5 of learning cybersecurity with Tech Sphere Academy On today's class, I learnt some linux command prompts cd mkdir rm cd.. #LearningWithTS #30DaysOfTech

Day 5 of learning cybersecurity with <a href="/TechSphereAcad/">Tech Sphere Academy</a> 
On today's class, I learnt some linux command prompts

cd
mkdir 
rm
cd..
#LearningWithTS #30DaysOfTech
Emmy (@dee_manuel2) 's Twitter Profile Photo

After months of research, sleepless nights, corrections, and intense preparation, I’m excited to share that my project defense is finally Done and Dusted 😌👌 Officially a graduate... I accept Congratulations 🤲🏾

After months of research, sleepless nights, corrections, and intense preparation, I’m excited to share that my project defense is finally Done and Dusted 😌👌
Officially a graduate...

I accept Congratulations 🤲🏾
Ahmedkhan (@ahmed___khaan) 's Twitter Profile Photo

If you rush your foundation in Cybersecurity because you want to look advanced, you will struggle later. But if you take your time to truly understand the basics, your growth will be stronger and more stable.

Chove (@chovwenofuru) 's Twitter Profile Photo

Something special is happening this Sunday on CAYA 🎙️ CAYA-Come As You Are. To celebrate International Women’s Day, we’re hosting a conference-level conversation featuring brilliant women across technology, cybersecurity, product, remote work, and digital health. Her Career, Her Voice:

Something special is happening this Sunday on CAYA 🎙️ <a href="/CayaHQ/">CAYA-Come As You Are</a>.

To celebrate International Women’s Day, we’re hosting a conference-level conversation featuring brilliant women across technology, cybersecurity, product, remote work, and digital health.

Her Career, Her Voice:
Emmy (@dee_manuel2) 's Twitter Profile Photo

Cybersecurity Streak | Day 16-19✅ My cybersecurity journey has been incredible; learning fundamentals, risk management, and legal/ethical considerations. A short pause for Project Defense and the unpredictable power supply didn't stop the growth

Cybersecurity Streak | Day 16-19✅

My cybersecurity journey has been incredible; learning fundamentals, risk management, and legal/ethical considerations. A short pause for Project Defense and the unpredictable power supply didn't stop the growth
Emmy (@dee_manuel2) 's Twitter Profile Photo

Cybersecurity Streak | Day 20✅ Via Tech Sphere Academy taught by our tutor Favour Onoko. We covered network types, OSI & TCP/IP models, and encapsulation/decapsulation (wrapping and unwrapping data) Elorm Daniel CHOVE Dr Iretioluwa Akerele Gospel Temitope Sobulo🛡️ Ezechi Jeremiah

Cybersecurity Streak | Day 20✅

Via <a href="/TechSphereAcad/">Tech Sphere Academy</a> taught by our tutor Favour Onoko. 
We covered network types, OSI &amp; TCP/IP models, and encapsulation/decapsulation (wrapping and unwrapping data)

<a href="/elormkdaniel/">Elorm Daniel</a> <a href="/chovwenofuru/">CHOVE</a> <a href="/ireteeh/">Dr Iretioluwa Akerele</a> <a href="/4osp3l/">Gospel</a> <a href="/TemitopeSobulo/">Temitope Sobulo🛡️</a> <a href="/cyberjeremiah/">Ezechi Jeremiah</a>
TheCyberChef👨‍🍳| Cybersecurity | Educator🇬🇭🎓 (@iamthecyberchef) 's Twitter Profile Photo

If the algorithm brings this to you on the TL And you’re starting out as a beginner in cybersecurity Take a minute and read this. I hope it brings you the clarity you’ve been looking for. Most of you beginners in cybersecurity are stuck not because you aren’t smart enough.

Emmy (@dee_manuel2) 's Twitter Profile Photo

Cybersecurity Streak | Day 21✅ Great session with CAYA-Come As You Are today on leadership, emotions, imposter syndrome, to mention but a few... An insightful session indeed Also completed Windows Fundamentals 1–3 on TryHackMe CHOVE Ezechi Jeremiah Tech Sphere Academy Temitope Sobulo🛡️

Cybersecurity Streak | Day 21✅

Great session with <a href="/CayaHQ/">CAYA-Come As You Are</a> today on leadership, emotions, imposter syndrome, to mention but a few... An insightful session indeed 

Also completed Windows Fundamentals 1–3 on <a href="/tryhackme/">TryHackMe</a>

<a href="/chovwenofuru/">CHOVE</a> <a href="/cyberjeremiah/">Ezechi Jeremiah</a> <a href="/TechSphereAcad/">Tech Sphere Academy</a> <a href="/TemitopeSobulo/">Temitope Sobulo🛡️</a>
Emmy (@dee_manuel2) 's Twitter Profile Photo

Cybersecurity Streak | Day 22✅ Learning is getting more interesting. Today’s session covered subnetting, subnetting for security, port numbers, and network threats. It’s getting intense, but I’ll scale through. Ezechi Jeremiah Temitope Sobulo🛡️ CHOVE Dr Iretioluwa Akerele Abdulkadir | Cybersecurity

Cybersecurity Streak | Day 22✅

Learning is getting more interesting. 
Today’s session covered subnetting, subnetting for security, port numbers, and network threats.
It’s getting intense, but I’ll scale through.

<a href="/cyberjeremiah/">Ezechi Jeremiah</a> <a href="/TemitopeSobulo/">Temitope Sobulo🛡️</a> <a href="/chovwenofuru/">CHOVE</a> <a href="/ireteeh/">Dr Iretioluwa Akerele</a> <a href="/cyber_razz/">Abdulkadir | Cybersecurity</a>
CAYA-Come As You Are (@cayahq) 's Twitter Profile Photo

Something big is coming this Sunday on CAYA 🎙️. We’re bringing together top voices for a conference-level conversation on one of the most important topics in tech today: 𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 & 𝗔𝗜: 𝗗𝗲𝗳𝗲𝗻𝘀𝗲, 𝗢𝗳𝗳𝗲𝗻𝘀𝗲 𝗮𝗻𝗱 𝘁𝗵𝗲 𝗙𝘂𝘁𝘂𝗿𝗲 🚀

Something big is coming this Sunday on CAYA 🎙️.

We’re bringing together top voices for a conference-level conversation on one of the most important topics in tech today:

𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 &amp; 𝗔𝗜: 𝗗𝗲𝗳𝗲𝗻𝘀𝗲, 𝗢𝗳𝗳𝗲𝗻𝘀𝗲 𝗮𝗻𝗱 𝘁𝗵𝗲 𝗙𝘂𝘁𝘂𝗿𝗲 🚀