𝑆𝑂𝑁 𝑂𝐹 π΄π½π΄πΎπ΄πΌπ‘ŒπΈ (@educated_ogee) 's Twitter Profile
𝑆𝑂𝑁 𝑂𝐹 π΄π½π΄πΎπ΄πΌπ‘ŒπΈ

@educated_ogee

| Microbiologist | JCI | Business Developer | @chelseafcπŸ’™ | Cybersecurity | Certified in Cybersecurity

ID: 1245330555094302720

calendar_today01-04-2020 12:43:24

13,13K Tweet

3,3K Followers

3,3K Following

Mololuwa | Cybersecurity (The God Complex) (@cyber_rekk) 's Twitter Profile Photo

🚨 What Exactly Is Splunk? And Why Does It Matter So Much in Cybersecurity? πŸ”πŸ”₯ Over the next few weeks, I’ll be sharing a lot about Splunk β€” and if you’re in cybersecurity, IT, or even tech in general, you should care about it. Here’s why πŸ‘‡ βΈ» 🧰 What is Splunk, really?

🚨 What Exactly Is Splunk? And Why Does It Matter So Much in Cybersecurity? πŸ”πŸ”₯

Over the next few weeks, I’ll be sharing a lot about Splunk β€” and if you’re in cybersecurity, IT, or even tech in general, you should care about it. Here’s why πŸ‘‡

βΈ»

🧰 What is Splunk, really?
Elorm Daniel (@elormkdaniel) 's Twitter Profile Photo

Dear beginners, here are the top 40 youtube channels to learn Cybersecurity 1. David Bombal 2. Null Byte 3. NetworkChuck 4. CYBER TRUTH 5. HackerSploit 6. CyberSecurty_PK 7. John Hammond 8. Cyber Insecurity 9. The Cyber Mentor 10. LearnCyber Security 11. GeraldAuger 12.

Dr Iretioluwa Akerele (@ireteeh) 's Twitter Profile Photo

Mentee Spotlight La CyberFashionista βœ‚πŸ“ŒπŸ‘©πŸΎβ€πŸ’» ✨ When Tobi joined my mentorship program, she had just lost a spot in a prestigious cybersecurity internship. She felt uncertain about her path, and was seeking clarity. After speaking with one of my former mentees, she decided to take a leap of

Mentee Spotlight  <a href="/Omotafede/">La CyberFashionista βœ‚πŸ“ŒπŸ‘©πŸΎβ€πŸ’»</a> ✨

When Tobi joined my mentorship program, she had just lost a spot in a prestigious cybersecurity internship. She felt uncertain about her path, and was seeking clarity. 

After speaking with one of my former mentees, she decided to take a leap of
Mololuwa | Cybersecurity (The God Complex) (@cyber_rekk) 's Twitter Profile Photo

Vulnerability exposure is when a security weakness becomes known or visible to the public whether by accident or on purpose before it’s fixed. This means anyone, including hackers, can see and possibly exploit it. It’s like leaving your house keys on the sidewalk where anyone can

Mololuwa | Cybersecurity (The God Complex) (@cyber_rekk) 's Twitter Profile Photo

A firewall is a tool that helps protect computers and networks by controlling what kind of internet traffic is allowed to pass through. It watches every connection that tries to enter or leave your system and checks if it follows the security rules set by the network admin. If

Cisco Nerd (@onijec) 's Twitter Profile Photo

At Cisco, we know talent is everywhere, but opportunity isn't always. That's why Project 525 is making CCIE certification more accessible, starting in sub-Saharan Africa. Learn how we're bridging the digital skills gap πŸ‘‰ s.co/61106AgH8e

Dr Iretioluwa Akerele (@ireteeh) 's Twitter Profile Photo

I have posted 15 breaches this month, and here’s a summary πŸ‘‡πŸΎ Cybersecurity professionals will always be in demand, the threats are not slowing down. Humans remain the weakest link in the security chain. Third-party organisations continue to be common entry points for

Mololuwa | Cybersecurity (The God Complex) (@cyber_rekk) 's Twitter Profile Photo

The TCP/IP model explains how data moves across the internet in four main steps. The Network Access layer handles how data is sent through cables or Wi-Fi. The Internet layer gives each device an IP address and finds the best route for the data to travel accross networks The

Faiza Chenti Adam | CyberBuddie (@cyberchenti) 's Twitter Profile Photo

FREE SIEM Training Resources and Practical Projects to Level Up Your Cybersecurity Skills If you’ve been thinking about deepening your hands-on experience with various SIEM platforms or working on real projects, now’s the perfect time to get started! If you’re seeking to

FREE SIEM Training Resources and Practical Projects to Level Up Your Cybersecurity Skills

If you’ve been thinking about deepening your hands-on experience with various SIEM platforms or working on real projects, now’s the perfect time to get started!
If you’re seeking to
Dr Iretioluwa Akerele (@ireteeh) 's Twitter Profile Photo

Before I got married, I was so sure I would be a kind and loving spouse. I knew that I would make the home a happy place for us. I also prayed for a kind partner. I have never liked stress or anything that brings unnecessary tension. I love peace, happiness, and enjoyment, and

Mololuwa | Cybersecurity (The God Complex) (@cyber_rekk) 's Twitter Profile Photo

☁️ The 3 Main Types of Cloud Computing Explained (Simply) ☁️ β€œThe Cloud” isn’t one thing it comes in 3 main models every beginner should know πŸ‘‡πŸ§΅ βΈ» 1️⃣ Private Cloud A private cloud is built exclusively for one organization. The infrastructure can be hosted on-site or by a

☁️ The 3 Main Types of Cloud Computing Explained (Simply) ☁️
β€œThe Cloud” isn’t one thing  it comes in 3 main models every beginner should know πŸ‘‡πŸ§΅

βΈ»

1️⃣ Private Cloud
A private cloud is built exclusively for one organization.
The infrastructure can be hosted on-site or by a
πŸ‘‘S.A.L.A.K.OπŸ•Š (@unkleayo) 's Twitter Profile Photo

inDrive Just-Paulo Dear inDrive, If you don't give that man his job back. I'll lead a one week campaign against your brand. It doesn't matter that I'm not in Nigeria. I'll leave work daily & campaign in front of every train station in Paris. Ask around, this is a threat.

CyberNinjaOps (@pinkyqueen001) 's Twitter Profile Photo

Hola bestiesπŸ₯° Dr Iretioluwa Akerele🫑 β€’β€’oxRazβ€’β€’πŸ«‘ Today makes it d 69th day of #100daysofcybersecurity I just completed Summit room on TryHackMe. Can you chase a simulated adversary up the Pyramid of Pain until they finally back down? tryhackme.com/room/summit?ut… #tryhackme via @realtryhackme

πŸ‘‘S.A.L.A.K.OπŸ•Š (@unkleayo) 's Twitter Profile Photo

Every month, I pray this prayer for you. It is about time I said the prayer again, this month. May you never be in a situation where God is your only witness.

Mololuwa | Cybersecurity (The God Complex) (@cyber_rekk) 's Twitter Profile Photo

A runt packet is a network packet that is too small ,less than 64 bytes which means it’s incomplete or damaged. Think of it like sending a message that got cut off halfway. This usually happens because of network problems, like signal collisions or bad cables. Since the packet

𝑆𝑂𝑁 𝑂𝐹 π΄π½π΄πΎπ΄πΌπ‘ŒπΈ (@educated_ogee) 's Twitter Profile Photo

Previously when I started learning Cybersecurity, I somehow missed out on learning how to use Packet Tracers, maybe because I started learning using my phone sha. I revisited last night, and it was fun! πŸ˜‚ At first it was boring, but when I played around it, it was exciting!