Tech Enthusiast Profile picture
Follow the @TheCyberJob_Hub | @SecBlueTeam | @hackthebox_eu | Aspiring Cybersecurity Analyst | Researcher | A Reader Who Write | @realtryhackme | Pacifist
Nov 8 12 tweets 5 min read
CYBERSECURITY SOC ANALYST - HANDS-ON TRAINING SITES

Over the weeks, I have been submerged in questions from my cyber friends asking for clarity on the best SOC Analysts' hands-on training sites hence I assembled these pieces for you.

A breakdown of everything below: Image 1. @CyberDefenders - This platform offers one of the best varieties of SOC lab work where you will get to practice a real-world scenario hands-on practice as related to SOC Analysts.

You get to know:

- Network forensics
- Endpoint
- Malware
- Reverse Engineering, etc Image
Image
Nov 4 5 tweets 5 min read
My next - STUDY PLAN:

1. Hunting Phishing Sites In The Festive Season With Maltego

Link: maltego.com/blog/hunting-p…

2. Phishing Attacks & Domains

Link: maltego.com/blog/phishing-…

3. Essential Playbooks For Your Soc

Link: maltego.com/blog/essential… Image
Image
Image
Image
4. Everything To Know About Ransomware

Link: maltego.com/blog/everythin…
Nov 4 17 tweets 3 min read
HOW TO FIND A PERSON’S SOCIAL MEDIA ACCOUNT TO INVESTIGATE USING MALTEGO

So, yesterday, I took a significant amount of time to expand my investigation skills using Maltego.

Below is a breakdown of my study: The first thing to do when investigating someone on social media is to find the account that belongs to that person.

This can be done in several different ways, but below is a six pivot points that will help you find social media accounts belonging to an individual:
Nov 2 11 tweets 2 min read
Everything About – Social Media Intelligence ( SOCMINT ) and Investigations

This is one of the most transformative courses I have studied. Earlier today, driven by curiosity, I set out and delved into SOCMINT.

Below is a breakdown of everything I learned: Image Social media intelligence (SOCMINT) is considered a subdiscipline of open-source intelligence (OSINT).

SOCMINT can be defined as the techniques, technologies, and tools that allow for the collection and analysis of information from social media platforms.
Nov 1 7 tweets 2 min read
Knowing Google Dorking techniques can take your OSINT information gathering to a new level.

Unlike the normal Google search query, Google Dorking is built on commands called “operators” that allow the user to modify their search in many ways. Image How Can You Use Google Dorking In Your Investigation?

Let's look at a couple of unique examples that might be useful in your next investigation:

- Finding Email Addresses Related To A Username

The question is, “How can you do this”? But yeah! There is a simple trick.
Oct 30 10 tweets 4 min read
How To Investigate Fake Social Media Profiles/Usernames

Investigating fake social media accounts can be frustrating at times, especially those without any avenue through which valuable information can be extracted, analyzed, and used. Image However, no matter how hard it is, we can still have a way through which we can penetrate. Firstly, we can achieve our end goal through an embellished “Social Engineering” Attack. Meaning, you can act as a clown, play along the line with your hook, and extract your information.
Aug 31 32 tweets 8 min read
Hi friends, I'm fully back!

Beginner Cyber Security Project you NEED to get HIRED

I will take you down an aisle that revolves around a Beginner Cyber project to work on to enhance your skills, experience, and the possibility of getting hired. Walk down with me friend. Image Moving forward, the first Project to work on is the – IBM Microsoft Windows Defender and Firewall for Beginners

In this project course, you will build key skills to recognize common security threats and risks and learn how to set up cybersecurity defenses and updates. Image
Aug 24 16 tweets 4 min read
Honestly speaking, applying for entry-level cybersecurity jobs is the easiest yet daunting when one fails to understand how to navigate through its complexity. Image As a newbie aspiring to succeed in the respective IT domain, below are give challenges you need to overcome to break the jinx: Image
Aug 23 8 tweets 6 min read
Good news Guys!

Today, I discovered a highly useful platform called "Resumegenius" during my extensive online research. This tool can proficiently create personalized resumes and cover letters.

It was an amazing discovery that truly piqued my interest!

Image
Image
Image
At this stage, you can create the perfect cover letter in a professional, modern, creative, or simple format. The cover letter generator can also help by providing guidance on navigating your creation as seen under the 'Genius Cover Letter Generator'. Image