Xervias (@xerviastv) 's Twitter Profile
Xervias

@xerviastv

I work, eat, gym, watch anime, game and sleep. Usually in that order.

ID: 2254308398

calendar_today20-12-2013 01:42:01

85 Tweet

6 Followers

21 Following

athersleyredsscots (@athersleyredssb) 's Twitter Profile Photo

Lass a know waited 2 hours at drum train station to see the Harry Potter train go past tonight and this happened 🤣🤣.#YaFuckingBastard #HarryPotter

Snowmixy (@snowmixy) 's Twitter Profile Photo

For the people that need to hear it aswell because this sure motivated me; If you start now in 2 weeks you will feel it, in 4 weeks you will see it and in 8 weeks you will hear it. Keep grinding champ you got this! 👑💪

Daniel Kelley (@danielmakelley) 's Twitter Profile Photo

Anyone with an Internet connection can get into cybersecurity with nothing but a laptop: Cybrary is free. Root-Me is free. LetsDefend is free. Hack The Box is free. TryHackMe is free. OverTheWire.org is free. The resources are already out there.

Daniel Kelley (@danielmakelley) 's Twitter Profile Photo

If Twitter is a free University, then YouTube is a free Graduate Program. Here are 6 YouTube channels you can follow to learn about cybersecurity—that are so valuable they should charge $100,000+ for the information & insight they provide:

NCSC UK (@ncsc) 's Twitter Profile Photo

Workshop with world-leading cyber security experts exclusively at #CYBERUK23 in our technical masterclasses! 👇 cyberuk.uk/cyberuk/progra…

Workshop with world-leading cyber security experts exclusively at #CYBERUK23 in our technical masterclasses! 👇

cyberuk.uk/cyberuk/progra…
Daniel Kelley (@danielmakelley) 's Twitter Profile Photo

17 platforms where you can begin cybersecurity: 1. HackXpert - Free labs and training. 2. TryHackMe - Hands-on exercises and labs. 3. CyberSecLabs - High quality training labs. 4. Cybrary - Videos, labs, and practice exams.

Daniel Kelley (@danielmakelley) 's Twitter Profile Photo

30 cybersecurity search engines for researchers: 1. Dehashed—View leaked credentials. 2. SecurityTrails—Extensive DNS data. 3. DorkSearch—Really fast Google dorking. 4. ExploitDB—Archive of various exploits. 5. ZoomEye—Gather information about targets.