acks
@Acksec02
Success is atmosphere dependent | Cybersecurity | Gal2:20¶🏠
KAPE and Volatility tools helped me understand what goes on during an investigation. KAPE helps collect and process data fast volatility takes a memory image & allows digging into things like running processes, open connections, & suspicious activity. @ireteeh @thecyber_sharon
I just completed Redline room, this one humbled me ahh , I learnt patience, how to read between the lines and paying attention to details over again omo.. My key takeaways: Redline is a tool for investigating suspicious or compromised Windows systems. @ireteeh @thecyber_sharon 🧵
I always thought I was a good researcher until I started cybersecurity. Investing heavily in soft skills and building relationships 💪💪
Hello Cyber Friends, today, I feel moved to share a few things that have set me up for success in this field 👇🏾 Invest in building your skills and deepening your knowledge. Stay curious. Always be hungry for knowledge. Your soft skills are as important as your technical…
Just completed the DFIR and Windows Forensics room on THM. I learned how to investigate incidents by tracing system activity through events logs, user folders, and other hidden artifacts. I practiced what I learnt by completing the hands-on challenges @ireteeh @thecyber_sharon

I just finished the SIEM module on THM, felt tough at first but watched YT videos to understand it better. I went through: – Intro to SIEM – Investigating with ELK – ItsYBitsy & Benign challenges – Splunk basics and how to use it during incidents. @ireteeh @thecyber_sharon

Hey Cyber Family! Happy weekend 🥰 What do you understand SQLi to be? #CyberSecurityTip #CyberSecurityFlashCard
Just rounded the last room on ESM module on THM. Wazuh covered threat detection using logs. I also analyzed a ransomware case study in retracted room which I enjoyed so much because it gave a glimpse of what a day as a security analyst looks like. @ireteeh @thecyber_sharon

Hey Cyber Family 🥰🥰🥰 How can we protect against Network attacks? Let's discuss in the comment section ⏬ #CyberSecurityFlashCard #CyberSecurityTip
Hello cyber fam, Commenced ESM module, I learned how to spot suspicious activity through Windows core processes, Event Logs, SysInternals tools, Sysmon, & Osquery. These are important in detecting early signs of malicious activity and best reaction. @ireteeh @thecyber_sharon

I am making a big move in my career, starting tomorrow. It’s a significant shift from what I have done over the years. If you come across this post, please wish me luck. Tomorrow is Day One❤️
Hello Cyber Friends, here is your cyber tip of the week 👇🏾 Think before you click. Avoid suspicious links and attachments. Be mindful of what you share. Don’t overshare personal information online. Download wisely. Only use trusted and verified sources. Protect your…
I'm beginning to appreciate traffic analysis much more, just finished the Wireshark room where I analyzed PCAP files, learnt how to spot scans from tools like Nmap, and detecting attacks like ARP poisoning and MITM. Network security done ESM up next ✅ @ireteeh @thecyber_sharon.
Still in the Network security monitoring room, used Zeek to inspect a PCAP, identified alerts, and analyzed incidents like suspicious DNS and phishing attempts. Also picked up the two core Zeek operations, its primary layers, and few command lines. @ireteeh @thecyber_sharon
She started from CybariK GRC Academy. Now, she is a Senior Compliance Specialist in UK. Her growth is so good to see. Interested in the next cohort? Here is the link to register 👇🏾 cybarik.com/training/gover…
Still in the Network security monitoring room, used Zeek to inspect a PCAP, identified alerts, and analyzed incidents like suspicious DNS and phishing attempts. Also picked up the two core Zeek operations, its primary layers, and few command lines. @ireteeh @thecyber_sharon
Just completed the Snort room on THM. I learnt basic cmd & got to explore snort modes including sniffer, packet logger & IDS mode, used snort to investigate PCAPs. Lastly, worked around rule structure, alerts, and saw how it fits into network defense. @ireteeh @thecyber_sharon
Just completed the Snort room on THM. I learnt basic cmd & got to explore snort modes including sniffer, packet logger & IDS mode, used snort to investigate PCAPs. Lastly, worked around rule structure, alerts, and saw how it fits into network defense. @ireteeh @thecyber_sharon
