Kyrian (@kyrian_m) 's Twitter Profile
Kyrian

@kyrian_m

ID: 1106979320810127362

calendar_today16-03-2019 18:03:31

3,3K Tweet

9,9K Followers

9,9K Following

TMK | The Money King (@tmkshawdy) 's Twitter Profile Photo

TryHackMe at $14/month is worth it. Complete SOC Level 1, then Level 2, then Jr Penetration Tester paths. LetsDefend at $29/month is another option. Pick one platform and finish their entire learning path. These teach practical skills employers actually want to see.

Abraham Okah(info hub) (@abrahamokah2) 's Twitter Profile Photo

CISCO is offering FREE courses for people looking to learn Data Science, Cybersecurity, Computer Networking, JavaScript, and more. Open this thread to access those courses, 🧵

Vincent Yiu (@vysecurity) 's Twitter Profile Photo

Add a colon to your password, ":", because all the stealer logs have colons, so it'll end up splitting your password incorrectly.

Matt Zorich (@reprise_99) 's Twitter Profile Photo

If you are building SIEM & SOC functionality from scratch and assuming you have all the required logs - what are the first 5 detection rules you create?

Kyrian (@kyrian_m) 's Twitter Profile Photo

That’s why you’re broke, your prosperity is not in your job. Your job is what you’re paid to do, your gift is what you’re born to do.

Daniel Kelley (@danielmakelley) 's Twitter Profile Photo

Cybersecurity is the only field where “nothing happened” is the success metric. If you do your job perfectly, the reward is silence and a budget cut next quarter.

Kyrian (@kyrian_m) 's Twitter Profile Photo

I just finished a comprehensive forensic report on three different scenarios, I knew nothing about this 3 months ago.

Cyber_Racheal (@cyberracheal) 's Twitter Profile Photo

Suricata – IDS/IPS.   Deploy inline with pfSense to detect/block threats.   docs.suricata.io Wazuh – SIEM/XDR.   Collect & analyze logs from lab machines.   wazuh.com/install OpenSearch – Search/visualization stack.   Integrate with Wazuh for event dashboards.

Mololuwa | Cybersecurity (The God Complex) (@cyber_rekk) 's Twitter Profile Photo

A demilitarized zone (DMZ) in networking is a special area of a network that sits between the public internet and the private internal network. It is used to hold systems that need to be accessed by the public, like websites, email servers, or DNS servers, without giving

DsL_a ʚїɞ ® (@_deejustdee) 's Twitter Profile Photo

Free GRC courses : 1. Agentic AI Series 2. ISO 42001 Course 3. ISO 42001 Framework Deep Dive 4. ISO 27001 5. ISO 27001 Framework Deep Dive 6. CMMC Overview 7. SOC 2 8. PCI DSS 9. AI Security Principles 10. HITRUST 11. Privacy 12. Offensive Security Grab