Gabbytech || Cyber_Security (@gabriel_coder01) 's Twitter Profile
Gabbytech || Cyber_Security

@gabriel_coder01

Founder X @Gabbytech_Sec || Penetration Tester || Bug bounty hunter 👤 || Offensive Security🏹 || Chelsea FC💙 || Computer Scientist || Ethical Hacker

ID: 1663090211922800642

calendar_today29-05-2023 07:49:50

544 Tweet

175 Followers

73 Following

Gabbytech || Cyber_Security (@gabriel_coder01) 's Twitter Profile Photo

I just completed Enumeration & Brute Force room on TryHackMe. Enumerate and brute force authentication mechanisms. tryhackme.com/room/enumerati… #tryhackme via @realtryhackme

Gabbytech || Cyber_Security (@gabriel_coder01) 's Twitter Profile Photo

I just completed Session Management room on TryHackMe. Learn about session management and the different attacks that can be performed against insecure implementations. tryhackme.com/room/sessionma… #tryhackme via @realtryhackme

Gabbytech || Cyber_Security (@gabriel_coder01) 's Twitter Profile Photo

it was fun I just completed Security Engineer Intro room on TryHackMe. What does a day in the life of a security engineer look like? tryhackme.com/room/securitye… #tryhackme via @realtryhackme

Dr Iretioluwa Akerele (@ireteeh) 's Twitter Profile Photo

This month, we received a total donation of 510, 000 from 5 people. We sent data to 112 people. Thank you to our data vendors 𝐌𝐚𝐧𝐱 𝐂𝐥𝐨𝐭𝐡𝐢𝐧𝐠 | 𝐃𝐚𝐭𝐚𝐂𝐢𝐭𝐲 Mharieam🔮🧚 May God continue to bless our sponsors 🙏🏾 If you will like to donate to our data support next month, please reach out

Gabbytech || Cyber_Security (@gabriel_coder01) 's Twitter Profile Photo

What day are we on the #100dayscybersecurity again...i do it everyday. I just completed Security Principles room on TryHackMe. Learn about the security triad and common security models and principles. tryhackme.com/room/securityp… #tryhackme via @realtryhackme Ṣẹ́gunfúnmi😎 Dr Iretioluwa Akerele

Gabbytech || Cyber_Security (@gabriel_coder01) 's Twitter Profile Photo

#100DaysOfCyberSecurity I just completed Introduction to Cryptography room on TryHackMe. Learn about encryption algorithms such as AES, Diffie-Hellman key exchange, hashing, PKI, and TLS. tryhackme.com/room/cryptogra… #tryhackme via @realtryhackme Ṣẹ́gunfúnmi😎 Dr Iretioluwa Akerele

Gabbytech || Cyber_Security (@gabriel_coder01) 's Twitter Profile Photo

Knowledge checkpoint: What does the IAAA model represent a.) The four pillars of information security. b.) The main principles of information security c.) The information Adaptation, Accumulation and Availability model