Security Trybe Profile picture
A Platform For Cyber Security| Networking | Tech| Education|IG-https://t.co/iWeuXqOxRk
Adesina Ayobami Profile picture nkem okafor Profile picture Sam Powell Profile picture Kolusu_Trinadh Profile picture Syed Ali Profile picture 7 subscribed
Apr 4 10 tweets 4 min read
Top 9 Hacking Gadgets and Their Uses
👇 Image 1. Flipper Zero:

Flipper Zero is a toy-like portable hacking tool. The device is able to read, copy, and emulate RFID and NFC tags, radio remotes, iButton, and digital access keys, along with a GPIO interface.
Mar 20 11 tweets 4 min read
Top 9 Hacking Gadgets and Their Uses
👇 Image 1. Flipper Zero:

Flipper Zero is a toy-like portable hacking tool. The device is able to read, copy, and emulate RFID and NFC tags, radio remotes, iButton, and digital access keys, along with a GPIO interface.
Mar 4 9 tweets 4 min read
Top 9 Hacking Gadgets and Their Uses

1. Flipper Zero:

Flipper Zero is a toy-like portable hacking tool. The device is able to read, copy, and emulate RFID and NFC tags, radio remotes, iButton, and digital access keys, along with a GPIO interface.
Image
2. Raspberry Pi:

This is a low cost credit card sized desktop computer that runs Linux but it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming Image
Feb 28 10 tweets 3 min read
How to Land a GRC Job in 10 Steps 👇

1. Learn the basics of GRC:

You can start by reading books, articles, blogs, and videos on GRC topics, such as governance frameworks, risk management methodologies, compliance standards, and best practices. 2. Get a relevant Degree/Certification:

Having a degree or certification in a related field can boost your credibility and qualifications for a GRC job.

Some of the common degrees that GRC employers look for are:
- Cybersecurity
- Business
- Computer Science
- Legal
- Information Technology

Some of the popular certifications that GRC employers value are:
- CompTIA Security+
- Certified in Risk and Information Systems Control (CRISC)
- Project Management Professional (PMP)
- Certified Information Systems Auditor (CISA)
- Certified Information Systems Security Professional (CISSP)
- Certified Information Privacy Manager (CIPM)
- Certified Ethical Hacker (CEH)

You don't need to have all of these degrees or certifications, but having at least one or two can demonstrate your commitment and expertise in GRC.
Feb 28 5 tweets 2 min read
GOVERNANCE, RISK AND COMPLIANCE (GRC)

What is GRC?

GRC stands for Governance¸ Risk and Compliance, and it refers to an organization’s strategy to structure governance, risk management and regulatory and company compliance.

It Aligns IT goals with business objectives and at the same time manage cyber threats and achieve regulatory compliance.Image GRC Concepts:

Governance:
- Identifying Compliance Requirements
- Strategy Management
- Policy management
- Corporate Management

Risk:
- Mitigation
- Risk Assessment
- Identify security threats and risks
- Authorize Systems

Compliance:
- Implement security measures and protocol
- Monitor Compliance
- Constant Self-Assessment
Feb 25 6 tweets 1 min read
Roadmap To Becoming a SOC Analyst 👇 Image 1. Learn the basics of cybersecurity, such as security concepts, principles, and best practices.

Use online courses, books, blogs, podcasts, and other resources to gain foundational knowledge.

Examples: Google's Cybersecurity Course, Cybrary's Introduction to Cybersecurity….
Feb 23 13 tweets 1 min read
If you often Procrastinate, open this Follow the 2-minute rule: If a task takes less than two minutes, do it immediately to prevent buildup.
Feb 21 6 tweets 2 min read
Don’t use having a Laptop as an Excuse

Learn Cybersecurity with your mobile devices

This is a thread containing resources you can utilize and achieve your goals 👇 YouTube:

Top handles to subscribe to:

-Network Chuck
-David Bombal
-John Hammond
-Professor Messer
-Loi Liang Yang
-Outpost Gray

Top courses to check out:

-Ethical Hacking in 15 Hours- The Cyber Mentor

-Beginner to Advanced Bug Bounty- PHD Security
Feb 20 6 tweets 2 min read
50 Important Abbreviations in CyberSecurity

*CIA - Confidentiality, Integrity, Availability
*IDS - Intrusion Detection System
*IPS - Intrusion Prevention System
*WAF - Web Application Firewall
*PII - Personal Identifiable Information
*DoS - Denial of Service
*DDoS - Distributed Denial of Service
*DNS - Domain Name System
*ZTA - Zero Trust Architecture
*NAT - Network Address Translation
*CTF - Capture the Flag
*ACL - Access Control List
*CDN - Content Delivery Network
*CVE - Common Vulnerabilities and Exposures *RAT - Remote Access Trojan
*APT - Advanced Persistent Threat
*ATP - Advanced Threat Protection
*SSO - Single Sign-on
*URL - Uniform Resource Locator
*TLS - Transport Layer Security
*ARP - Address Resolution Protocol
*RDP - Remote Desktop Protocol
*FTP - File Transfer Protocol
*SFTP - Secure File Transfer Protocol
*HTTP - Hypertext Transfer Protocol
*HTTPS - Hypertext Transfer Protocol Secure
*LDAP - Lightweight Directory Access Protocol
Feb 19 8 tweets 1 min read
ROADMAP FOR CYBERSECURITY/ETHICAL HACKING FOR 2024

A Thread Step 1: Fundamental IT Skills

-Basic Computer Skills
-Basics of Computer Networking
-Computer Hardware Components
-Understand Basics of Popular Suites (Google Suite, iCloud, MS Office)
-Understanding Operating Systems (Linux, MacOS, Windows)
-Connection Types (Wi-Fi, NFC, Bluetooth…)
...
Feb 15 10 tweets 3 min read
Top 10 Cybersecurity Certifications: What You Need To Know 👇

1.Certified Information Systems Security Professional (CISSP):

- Advanced certification demonstrating expertise in designing and managing comprehensive security programs.

- Exam cost: $699
- Average salary: $113,000.Image 2.Certified Information Security Manager (CISM):

- Demonstrates expertise in managing an organization's information security program.

- Exam cost: $575
- Average salary: $118,000. Image
Feb 13 5 tweets 3 min read
Here are 12 Important Source of Cybersecurity Training Resources

( Blogs, Courses , Webinars, Videos, Books…)

A thread 1. Cybrary (Courses)



2. Open Security Training (Courses)



3. MIT Open Courseware (Courses)

cybrary.it/catalog/
opensecuritytraining.info/Training.html
ocw.mit.edu/courses/electr…
Feb 11 9 tweets 1 min read
ROADMAP FOR CYBERSECURITY/ETHICAL HACKING FOR 2024

A Thread Step 1: Fundamental IT Skills

-Basic Computer Skills
-Basics of Computer Networking
-Computer Hardware Components
-Understand Basics of Popular Suites (Google Suite, iCloud, MS Office)
-Understanding Operating Systems (Linux, MacOS, Windows)
-Connection Types (Wi-Fi, NFC, Bluetooth…)
...
Feb 10 4 tweets 1 min read
CAN I BE HACKED VIA BLUETOOTH?

Yes,

Once a Device is ‘Bluebugged’, the Hacker can access the targets device, steal and modify device data, listen to calls, and read messages

A Thread What is a Bluetooth Attack?

This is a form Hacking technique that allows the attacker access to a device with a Bluetooth discoverable connection (when a Bluetooth is left on)

Types of Bluetooth Attacks:

· Bluesnarf Attack
· Man-in-The Middle (MiTM) Attack
· BlueJacking
· BlueSmacking (DoS Attack)
· BluePrinting Attack
· BlueBugging
Feb 4 8 tweets 3 min read
Top 8 Tv Shows for Hackers/Cybersecurity Professionals

1. Mr Robot

Elliot is a brilliant introverted young programmer who works as a cyber-security engineer by day and vigilante hacker by night. Him and his allies try to take down E-Corp Image 2. Silicon Valley

This story follows Richard, a programmer in Silicon Valley trying to build a company Pied Piper. It also tells the story of other programmers and their struggles to make an impact Image
Jan 29 8 tweets 2 min read
CyberSecurity Study Guide

Estimated Duration: 6-8 Months 👇

1/8
What To Learn (Part 1):

The Basics
*CIA Triad
*Cybercrimes & Cyberattacks
*OWASP Framework
*OSINT
*Recon,Scanning & Enumeration
*Exploitation & Attacking Vectors
*Privilege Escalation
*Windows Active Directory
*Exploit Dev & Payloads

Advanced
*Malwares, Rootkits, Reserve Engineering
*Pivoting and Persistence
(Post Exploitation)

2/8
Jan 29 11 tweets 2 min read
10 Top Cybersecurity Certifications: What You Need To Know‼️

1. Certified Information Systems Security Professional (CISSP):

This is an advanced certification certification that demonstrates your expertise in designing and managing comprehensive security programs.

- Exam cost: $699
- Average salary: $113,000. 2. Certified Information Security Manager (CISM):

This certification demonstrates your expertise in managing an organization's information security programs and strategies.

- Exam cost: $575
- Average salary: $118,000.
Jan 8 9 tweets 2 min read
CyberSecurity Study Guide

Estimated Duration: 6-8 Months 👇 What To Learn (Part 1):

The Basics
*CIA Triad
*Cybercrimes & Cyberattacks
*OWASP Framework
*OSINT
*Recon,Scanning & Enumeration
*Exploitation & Attacking Vectors
*Privilege Escalation
*Windows Active Directory
*Exploit Dev & Payloads

Advanced
*Malwares, Rootkits, Reserve Engineering
*Pivoting and Persistence
(Post Exploitation)
Jan 1 10 tweets 1 min read
ROADMAP FOR CYBERSECURITY/ETHICAL HACKING FOR 2024

A Thread Step 1: Fundamental IT Skills

-Basic Computer Skills
-Basics of Computer Networking
-Computer Hardware Components
-Understand Basics of Popular Suites (Google Suite, iCloud, MS Office)
-Understanding Operating Systems (Linux, MacOS, Windows)
-Connection Types (Wi-Fi, NFC, Bluetooth…)
...
Dec 16, 2023 5 tweets 1 min read
25 Top YouTube Channels To Learn Cybersecurity👇 Image 1. Network Chuck- Everything Cybersecurity Related
3. Outpost Gray- Cybersecurity Carer Dev
4. David Bombal- Everything Cybersecurity Related
5. The XSS Rat- Bounty Hunting
6. Cyrill Gossi- Cryptography Videos
7. Cyberspatial- Cybersecurity Education and Training
8. Bugcrowd- Bug Bounty Interviews and Methodology
9. Professor Messer- Guides covering Certifications
10. Black Hat- Cybersecurity Technical Conferences
Dec 15, 2023 7 tweets 1 min read
Roadmap To Becoming An Ethical Hacker (Month 1-8)👇 Image 1. Start from the Basics (Month 1)

> Basic Computer Skills
> Intro to Cybersecurity
> CIA Triads
> CyberAttacks
> Intro to Ethical Hacking
> OWASP Framework
> OSINT