10 Smallest Hacker Gadgets And Their Use👇 1. Raspberry Pi:
This is a low cost credit card sized desktop computer that runs Linux but it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming
Aug 21 • 9 tweets • 2 min read
13 CMD (Command Prompt) Commands
Every Hacker/ Programmer Should Know
1. Creat New Folder
/> mkdir [FolderName]
Makes directory and creates a new folder in the working directory
2. Change Directory
/> cd [FolderName]
Let’s you change and access the directory
Aug 17 • 8 tweets • 2 min read
Roadmap To Becoming An Ethical Hacker (Month 1-8)👇 1. Start from the Basics (Month 1)
> Basic Computer Skills
> Intro to Cybersecurity
> CIA Triads
> CyberAttacks
> Intro to Ethical Hacking
> OWASP Framework
> OSINT
…
Jul 24 • 10 tweets • 2 min read
CyberSecurity Study Guide👇
Estimated Duration: 8-12 Months
1/9
Foundation
*Linux (Everything)
*Bash (Terminal, Scripting)
*Windows Powershell
*Networking
*VIM
*Programming Languages (At least 2 of These)
-Python
-C/C++
-JavaScript
-HTML
2/9
Jul 23 • 8 tweets • 1 min read
How to Become an Ethical Hacker in 8 Months
1/71. Start from the Basics (Month 1)
-Basic Computer Skills
-Intro to Cybersecurity
-CIA Triads
-Intro to Ethical Hacking
-PenTesting
-Phases of Ethical Hacking
…
2/7
Jul 3 • 4 tweets • 2 min read
7 FREE Cybersecurity Certifications from Homeland Security & CISA (Cyber & Infrastructure Security Agency of United States) 👇
1. Cyber Essentials
*CIA - Confidentiality, Integrity, Availability
*IDS - Intrusion Detection System
*IPS - Intrusion Prevention System
*WAF - Web Application Firewall
*PII - Personal Identifiable Information
*DoS - Denial of Service
1/9
*DDoS - Distributed Denial of Service
*DNS - Domain Name System
*ZTA - Zero Trust Architecture
*NAT - Network Address Translation
*CTF - Capture the Flag
*ACL - Access Control List
*CDN - Content Delivery Network
*CVE - Common Vulnerabilities and Exposures
2/9
Jun 13 • 4 tweets • 3 min read
If You have an interest in learning Cybersecurity, You should start with this FREE Courses
7 Steps to Take When Pivoting into the Cybersecurity Industry
1. Acquire the fundamental knowledge. This can be achieved via Certifications and Online Courses 2. Improve your Hands-On Skills. Experiment on onsite or offsite environments.
Jun 12 • 5 tweets • 1 min read
16 Search Engines for Cybersecurity Professionals/Researchers:
1. Pulsedive - Search for Threat Intelligence 2. Censys - Assessing attack surface for Internet connected devices. 3. Binary Edge - Scans, acquire and classify public Internet data.
4. Shodan - Search for devices connected to the internet 5. ZoomEye - Cyberspace mapping 6. FullHunt - Search and Discovery attack surface 7. ONYPHE- Collects Cyber threat Intelligence data 8. Dehashed - View leaked Credentials
Jun 7 • 4 tweets • 3 min read
7 FREE Cybersecurity Certifications from Homeland Security & CISA ( Cyber & Infrastructure Security Agency of United States) 👇
1. Cyber Essentials lnkd.in/dCQr2ket
4. Cyber Supply Chain Risk Management for the Public lnkd.in/dxEaQA8w
Jun 5 • 4 tweets • 1 min read
10 Steps to Entry Level Cybersecurity Jobs
1. Acquire relevant Education and Certifications 2. Gain Practical Experience 3. Create a LinkedIN Account 4. Build/Re-invent your profile into a compelling and informative filled one 5. Follow HRs of Tech Companies
Jun 4 • 7 tweets • 2 min read
Governance, Risk and Governance (GRC)? … What You Need to Know
A Thread👇
G R C
Jun 3 • 6 tweets • 2 min read
Can I Be Hacked Via Bluetooth ?
A Thread
What is a Bluetooth Attack?
Jun 3 • 4 tweets • 1 min read
Dark Web (Myth vs Reality)
A thread
Myth
⁃Dark Web is illegal
⁃ The Dark Web is only for Criminals and Techies
⁃ The Dark Webs Main Purpose is for Criminal Activity
⁃You need the Dark web to be Anonymous
⁃The Dark web is enormous
Jun 2 • 7 tweets • 5 min read
20 FREE Cybersecurity Certifications for Cybersecurity Beginners, Professionals and Enthusiasts
1.Introduction to Cybersecurity