Rajneesh Gupta (@rajneeshg7) 's Twitter Profile
Rajneesh Gupta

@rajneeshg7

Zero to CyberHero ๐Ÿš€Coach | Mission to help 100k people get to Cybersecurity by 2025 | Follow for Career tips

ID: 755930303336632320

linkhttps://zaap.bio/haxsecurity calendar_today21-07-2016 01:00:03

1,1K Tweet

2,2K Followers

751 Following

Rajneesh Gupta (@rajneeshg7) 's Twitter Profile Photo

๐‚๐ซ๐š๐œ๐ค ๐ฒ๐จ๐ฎ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐ฐ๐ข๐ญ๐ก ๐Œ๐ž] Question: What is IDS and IPS? And how are they different? ๐Ÿ”ดWatch the Full Video lnkd.in/d4UuwcuS ๐Ÿ” Retweet if youโ€™ve found this useful

Rajneesh Gupta (@rajneeshg7) 's Twitter Profile Photo

๐Ÿ”ฅ[๐๐‚๐ˆ ๐ƒ๐’๐’ ๐‚๐จ๐ฆ๐ฉ๐ฅ๐ข๐š๐ง๐œ๐ž- ๐Ÿ๐Ÿ ๐‘๐ž๐ช๐ฎ๐ข๐ซ๐ž๐ฆ๐ž๐ง๐ญ๐ฌ]๐Ÿ”ฅ If you are a GRC analysts or Security analyst or aspirant SOC analyst, knowledge of PCI DSS compliance will help you excel in your career path. #CyberSecurity

Rajneesh Gupta (@rajneeshg7) 's Twitter Profile Photo

๐Ÿ“ ๐Ÿ’ฅ[๐Ÿ๐ŸŽ ๐–๐ข๐ซ๐ž๐ฌ๐ก๐š๐ซ๐ค ๐…๐ข๐ฅ๐ญ๐ž๐ซ๐ฌ ๐Ÿ๐จ๐ซ ๐Œ๐š๐ฅ๐ฐ๐š๐ซ๐ž ๐ƒ๐ž๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง๐ฌ]๐Ÿ’ฅ๐Ÿ“ Display filters in Wireshark allow you to focus on specific types of network traffic. In this list, Iโ€™ll share 10 Most important Wireshark Filters to detect Malicious traffic. If youโ€™re

Rajneesh Gupta (@rajneeshg7) 's Twitter Profile Photo

๐ŸŒŸ๐๐š๐ฌ๐ฌ ๐ฒ๐จ๐ฎ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐„๐ฑ๐š๐ฆ๐ŸŒŸ What type of attack involves an attacker putting a layer of code between an original device driver and the operating system? A.ย ย ย Refactoring B.ย ย ย Trojan horse C.ย ย ย Shimming D.ย ย ย Pass the hash

Rajneesh Gupta (@rajneeshg7) 's Twitter Profile Photo

๐ŸŒŸ๐Ÿ“ ๐๐ก๐š๐ฌ๐ž๐ฌ ๐จ๐Ÿ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ ๐ŸŒŸ โžก๏ธPlanning and Reconnaissance: Understanding the target and its vulnerabilities through information gathering. โญ•Techniques: Open Source Intelligence (OSINT), footprinting, social media analysis. โžก๏ธScanning: Actively

Rajneesh Gupta (@rajneeshg7) 's Twitter Profile Photo

๐Ÿ˜ฑ๐Ÿ’ฅ[๐ˆ๐๐Œ ๐๐‘๐š๐๐š๐ซ ๐’๐ˆ๐„๐Œ - ๐‡๐จ๐ฆ๐ž ๐‹๐š๐›]๐Ÿ’ฅ๐Ÿ‘ฉโ€๐Ÿ’ป This is the powerful home-lab focused on setting up IBM QRadar SIEM and real-world use cases. If youโ€™re interested to become SOC Analyst(Tier 1/2) , this lab will help you with SOC tools, rules, queries, apps and

Rajneesh Gupta (@rajneeshg7) 's Twitter Profile Photo

๐Ÿง‘โ€๐Ÿ’ป๐Ÿ’ฅ[Malware Analysis Home-Lab v1.0]๐Ÿ’ฅ๐Ÿ‘ฉโ€๐Ÿ’ป Malware analysis is the process of dissecting and studying malicious software (malware) to understand how it works, what it does, and how to defend against it. If youโ€™re a SOC Analyst or Aspirant SOC Analyst, this list will help you.

Rajneesh Gupta (@rajneeshg7) 's Twitter Profile Photo

๐‹๐ข๐ง๐ฎ๐ฑ ๐‹๐จ๐  ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ - Home Lab โญ Access the Home-Lab: lnkd.in/d544nu99