Security Trybe Profile picture
A Platform For Cyber Security| Networking | Tech| Education| IG-https://t.co/iWeuXqP5GS
Adesina Ayobami Profile picture nkem okafor Profile picture Sam Powell Profile picture Kolusu_Trinadh Profile picture Syed Ali Profile picture 14 subscribed
Jul 15 9 tweets 1 min read
Types of Malware 🦠💻

A thread 1. Worms
- The consume bandwidth and overload the web server, they are often hidden within attachments and rely on security failures to replicate and spread itself to other computers
Jul 15 5 tweets 2 min read
Some reasons why your system might be Slowwww👇

A thread Image Image
Jul 14 5 tweets 2 min read
Can I be hacked via Bluetooth?

A thread 👇 Image Image
Jul 14 7 tweets 2 min read
Here are 30 Channels to learn 6 important skills as a Cybersecurity Professional 👇 Image Everything Cybersecurity Image
Jun 16 7 tweets 1 min read
6 Top Tools for Hackers and how the work👇 Image 1. Raspberry Pi:
This is a low cost credit card sized desktop computer that runs Linux but it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming
Jun 4 5 tweets 2 min read
35 Top Cybersecurity Tools👇 Image 35 Top Cybersecurity Tools Cont. Image
Jun 2 7 tweets 1 min read
6 Top Tools for Hackers and how the work👇 Image 1. Raspberry Pi:
This is a low cost credit card sized desktop computer that runs Linux but it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming
May 24 6 tweets 2 min read
🚨 Getting Into Cybersecurity: 5 Skills To Learn

With the ever-evolving landscape of digital threats and vulnerabilities, a career in cybersecurity has become more crucial than ever.

Here are skills you would need to have a sucessful career in Cybersecurity👇 Image 1. Scripting:
Scripting stands as a pivotal skill in the realm of cybersecurity, offering professionals the power to automate tasks and construct custom tools.

Cybersecurity analysts frequently encounter repetitive tasks such as log analysis, incident response, and vulnerability assessments. Scripting proves to be the key to liberating these professionals from the drudgery of manual execution of such tasks.
May 21 4 tweets 2 min read
Cisco Networking Academy (Netacad) is offering this Certifications and Courses (FREE) 👇

1. Introduction to Cybersecurity

netacad.com/courses/cybers…
Image 2. Cybersecurity Essentials

netacad.com/courses/cybers…
Image
May 14 6 tweets 2 min read
CyberSecurity Study Guide👇

1/6
Foundation (Computer Knowledge)

*Basic Computer Skills
*Basics of Computer Networking
*Computer Hardware Components
*Understand Basics of Popular Suites (Google Suite, iCloud, MS Office)
*Linux (Everything)
*Bash (Terminal, Scripting)
*Windows Powershell
*Networking
*Programming Languages (At least 2 of These)
-Python
-C/C++
-JavaScript
-HTML

2/6
May 7 10 tweets 4 min read
Top 9 Hacking Gadgets and Their Uses
👇 Image 1. Flipper Zero:

Flipper Zero is a toy-like portable hacking tool. The device is able to read, copy, and emulate RFID and NFC tags, radio remotes, iButton, and digital access keys, along with a GPIO interface.
May 4 4 tweets 1 min read
Importance of Organizational Data Security

To understand importance of securing an organization, especially in this digital age we must understand the What, the Why and the How.

A Thread What is Data Security?

Data Security is the process of protecting data through out its life cycle from unauthorized access, data manipulation, theft and damage. Data security safeguards digital generated data. The very foundation of data security lies in the security paradigm and framework called the CIA Triad. The CIA triad simply means Confidentiality, Integrity and Availability. This very fundamental pieces are paramount in the protection of Data

Why is Data Security Important?
Data is a very valuable asset to any organization, it is the very life force of how an organization is ran, it encompasses every important detail about an organizational and what the are about. And in a generation where more than 2 Billion data is generated a day, data is a goldmine. Data is secured by an organization when the CIA Triad are strictly adhered to.
Apr 4 10 tweets 4 min read
Top 9 Hacking Gadgets and Their Uses
👇 Image 1. Flipper Zero:

Flipper Zero is a toy-like portable hacking tool. The device is able to read, copy, and emulate RFID and NFC tags, radio remotes, iButton, and digital access keys, along with a GPIO interface.
Mar 20 11 tweets 4 min read
Top 9 Hacking Gadgets and Their Uses
👇 Image 1. Flipper Zero:

Flipper Zero is a toy-like portable hacking tool. The device is able to read, copy, and emulate RFID and NFC tags, radio remotes, iButton, and digital access keys, along with a GPIO interface.
Mar 4 9 tweets 4 min read
Top 9 Hacking Gadgets and Their Uses

1. Flipper Zero:

Flipper Zero is a toy-like portable hacking tool. The device is able to read, copy, and emulate RFID and NFC tags, radio remotes, iButton, and digital access keys, along with a GPIO interface.
Image
2. Raspberry Pi:

This is a low cost credit card sized desktop computer that runs Linux but it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming Image
Feb 28 10 tweets 3 min read
How to Land a GRC Job in 10 Steps 👇

1. Learn the basics of GRC:

You can start by reading books, articles, blogs, and videos on GRC topics, such as governance frameworks, risk management methodologies, compliance standards, and best practices. 2. Get a relevant Degree/Certification:

Having a degree or certification in a related field can boost your credibility and qualifications for a GRC job.

Some of the common degrees that GRC employers look for are:
- Cybersecurity
- Business
- Computer Science
- Legal
- Information Technology

Some of the popular certifications that GRC employers value are:
- CompTIA Security+
- Certified in Risk and Information Systems Control (CRISC)
- Project Management Professional (PMP)
- Certified Information Systems Auditor (CISA)
- Certified Information Systems Security Professional (CISSP)
- Certified Information Privacy Manager (CIPM)
- Certified Ethical Hacker (CEH)

You don't need to have all of these degrees or certifications, but having at least one or two can demonstrate your commitment and expertise in GRC.
Feb 28 5 tweets 2 min read
GOVERNANCE, RISK AND COMPLIANCE (GRC)

What is GRC?

GRC stands for Governance¸ Risk and Compliance, and it refers to an organization’s strategy to structure governance, risk management and regulatory and company compliance.

It Aligns IT goals with business objectives and at the same time manage cyber threats and achieve regulatory compliance.Image GRC Concepts:

Governance:
- Identifying Compliance Requirements
- Strategy Management
- Policy management
- Corporate Management

Risk:
- Mitigation
- Risk Assessment
- Identify security threats and risks
- Authorize Systems

Compliance:
- Implement security measures and protocol
- Monitor Compliance
- Constant Self-Assessment
Feb 25 6 tweets 1 min read
Roadmap To Becoming a SOC Analyst 👇 Image 1. Learn the basics of cybersecurity, such as security concepts, principles, and best practices.

Use online courses, books, blogs, podcasts, and other resources to gain foundational knowledge.

Examples: Google's Cybersecurity Course, Cybrary's Introduction to Cybersecurity….
Feb 23 13 tweets 1 min read
If you often Procrastinate, open this Follow the 2-minute rule: If a task takes less than two minutes, do it immediately to prevent buildup.
Feb 21 6 tweets 2 min read
Don’t use having a Laptop as an Excuse

Learn Cybersecurity with your mobile devices

This is a thread containing resources you can utilize and achieve your goals 👇 YouTube:

Top handles to subscribe to:

-Network Chuck
-David Bombal
-John Hammond
-Professor Messer
-Loi Liang Yang
-Outpost Gray

Top courses to check out:

-Ethical Hacking in 15 Hours- The Cyber Mentor

-Beginner to Advanced Bug Bounty- PHD Security
Feb 20 6 tweets 2 min read
50 Important Abbreviations in CyberSecurity

*CIA - Confidentiality, Integrity, Availability
*IDS - Intrusion Detection System
*IPS - Intrusion Prevention System
*WAF - Web Application Firewall
*PII - Personal Identifiable Information
*DoS - Denial of Service
*DDoS - Distributed Denial of Service
*DNS - Domain Name System
*ZTA - Zero Trust Architecture
*NAT - Network Address Translation
*CTF - Capture the Flag
*ACL - Access Control List
*CDN - Content Delivery Network
*CVE - Common Vulnerabilities and Exposures *RAT - Remote Access Trojan
*APT - Advanced Persistent Threat
*ATP - Advanced Threat Protection
*SSO - Single Sign-on
*URL - Uniform Resource Locator
*TLS - Transport Layer Security
*ARP - Address Resolution Protocol
*RDP - Remote Desktop Protocol
*FTP - File Transfer Protocol
*SFTP - Secure File Transfer Protocol
*HTTP - Hypertext Transfer Protocol
*HTTPS - Hypertext Transfer Protocol Secure
*LDAP - Lightweight Directory Access Protocol