Austine

1.4K posts

Austine banner
Austine

Austine

@AustineCyberS

cybersecurity/ Security Engineer/ SOC Analyst

Ogun, Nigeria Katılım Ekim 2022
374 Takip Edilen84 Takipçiler
ZILLION
ZILLION@zillionokoye·
The $3 is still on. If you didn't get it last week comment again for the link. ✅It is instant and Direct to your Bank. Drop your comment now 👍
English
430
9
156
9.8K
Austine retweetledi
Shraddha Bharuka
Shraddha Bharuka@BharukaShraddha·
🚀 ALL FREE CERTIFICATION RESOURCES Level up your skills for FREE 👇 ☁️ AWS drive.google.com/drive/mobile/f… 🔐 CISSP drive.google.com/drive/mobile/f… 🛡️ CISA drive.google.com/drive/mobile/f… 📊 CISM drive.google.com/drive/mobile/f… ⚡ CRISC drive.google.com/drive/mobile/f… 📈 Digital Marketing drive.google.com/drive/mobile/f… 📌 Save this for later 🔁 Retweet to help others 🎯 Follow for more free tech resources 🚀
Shraddha Bharuka tweet media
English
15
377
1.2K
54.2K
Austine retweetledi
Victor Akinode
Victor Akinode@VictorAkinode·
No course will get you a cybersecurity job. Labs will. Here are the 10 you need to practice right now. 1. TryHackMe SOC Level 1 Path: the single best starting point for anyone who wants to work in a SOC. Covers log analysis, SIEM tools, threat detection, and incident response in a fully guided, beginner-friendly format. tryhackme.com/path/outline/s… 2. HackTheBox Starting Point: step-by-step guided machines that take you from zero to your first real exploitation. Once you finish Starting Point, move to the easy machines and build from there. hackthebox.com/starting-point 3. PortSwigger Web Security Academy: the best free resource for learning web application security. Every OWASP Top 10 vulnerability covered with real labs you actually hack, not just read about. Free. portswigger.net/web-security 4. Blue Team Labs Online: defensive security labs focused on forensics, threat hunting, SIEM analysis, and incident response. Built specifically for people who want to work on the blue team side. blueteamlabs.online 5. OWASP WebGoat: a deliberately insecure web application you run locally and attack. One of the best ways to understand how web vulnerabilities actually work from the inside. owasp.org/www-project-we… 6. VulnHub: free downloadable vulnerable virtual machines you spin up in VirtualBox and practice on locally. No internet required, no subscription, just download and hack. vulnhub.com 7. PicoCTF: a free beginner CTF platform built by Carnegie Mellon University. Covers web exploitation, forensics, cryptography, reverse engineering, and binary exploitation through hundreds of challenges. picoctf.org 8. OverTheWire Bandit: a wargame that teaches Linux fundamentals, SSH, file permissions, and basic exploitation through progressive challenges. If your Linux skills are weak, start here before anything else. overthewire.org/wargames/bandit 9. Immersive Labs: used by enterprise security teams globally for hands-on skills development. Has a free tier with labs covering SOC, malware analysis, cloud security, and threat intelligence. immersivelabs.com   10.Cyberdefenders: blue team focused labs built around real-world attack scenarios with PCAP files, malware samples, and memory forensics. The closest thing to working a real incident without being on the clock. cyberdefenders.org The gap between people who get hired and people who keep applying is not certificates. It is lab hours. Put in the reps. Save this and share it with someone trying to break into cybersecurity. Repost for others to see.
Victor Akinode tweet media
English
29
315
1K
100.2K
Austine
Austine@AustineCyberS·
@MrCharlesky I always comment on your posts but never get any response
English
0
0
0
4
Elorm Daniel
Elorm Daniel@elormkdaniel·
VMware or VirtualBox
Elorm Daniel tweet mediaElorm Daniel tweet media
Dansk
186
36
764
69.7K
ZILLION
ZILLION@zillionokoye·
I have a new $3 Daily Update oh!! And this one is instant and Direct to your Bank. People are printing hard there. Are you ready for this one?
English
917
15
293
15.6K
Austine retweetledi
TheCyberChef👨‍🍳| Cybersecurity | Educator🇬🇭🎓
If becoming a SOC Analyst is the goal: Certifications: CompTIA Network+, CCNA, Security+ Skillset: Log analysis, Linux, Windows Tools: Splunk, Wireshark, Microsoft Sentinel In that order. No shortcuts. Anything else is a distraction.
English
7
51
369
9K
Austine retweetledi
iShowCybersecurity
iShowCybersecurity@ishowcybersec·
Beginner-Friendly Platforms to Start Learning Ethical Hacking & Cybersecurity. 1.✅ Hacker101 CTF ctf.hacker101.com 2.✅ TryHackMe tryhackme.com 3.✅ CMD Challenge cmdchallenge.com 4.✅ Hacksplaining hacksplaining.com/exercises 5.✅ Hackaflag Academy academy.hackaflag.com.br 6.✅ OverTheWire overthewire.org 7.✅ PicoCTF picoctf.com 8.✅ Root-Me root-me.org 9.✅ Exploit Education exploit.education 10.✅ PentesterLab pentesterlab.com #CyberSecurity #CTF #EthicalHacking
iShowCybersecurity tweet media
English
7
124
456
15.1K
Austine
Austine@AustineCyberS·
@twitch_nigeria_ Just because it’s Wizkid now, he must help him? I’m not a fan of Wizkid but Wizkid didn’t owe him anything bro, it’s his money and he can do anything with it…all of you should just stfu 🤫
English
1
0
0
327
Twitch Nigeria
Twitch Nigeria@twitch_nigeria_·
FOR THE RECORDS 🚨 ✅️ Wizkid never paid for any of CarterEfe’s studio section ✅️ Wizkid never Co-signed CarterEfe ✅️ Wizkid didn't buy any Streaming equipment for CarterEfe. ✅️ Wizkid has never tweeted anything about CarterEfe before. ✅️ Wizkid never gave CarterEfe money before. ✅️ Wizkid never gave CarterEfe a platform to perform the hit song "Machala" on his stage (DJ Tunez did) The statement "Leave the man that gave u a career" is FALSE, as he never had a direct impact on his journey. Instead, the fans has always talked about how to CANCEL him since he started supporting DAVIDO. NO SHADES, JUST FACTS 😊
Dr Fab@Tufab

Carter LEAVE wizkid alone. Leave the man that gave u a career alone. Put some respect on his name. Keep his name out of your mouth. Carter Efe. Leave Wizkid alone. This is a warning.

English
199
314
1.7K
102.9K
𝔸b𝕒𝕫𝕫
𝔸b𝕒𝕫𝕫@abazwhyllzz·
We know you posted this because of Wizkid and Carter Efe. Let me ask,what did Wizkid really give or do for him? When he dropped the machala song he did like he didn’t see it. Carter made it without him. Wizkid should give his artist,starboy Terri what he has❤️
DJ TUNEZ@DJ_TUNEZ

English
458
197
1.6K
164K
Austine retweetledi
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntel·
𝗧𝗼𝗽 𝟭𝟬 𝗦𝗢𝗖 𝗔𝗻𝗮𝗹𝘆𝘀𝘁 𝗣𝗿𝗼𝗷𝗲𝗰𝘁𝘀 𝘁𝗵𝗮𝘁 𝗔𝗰𝘁𝘂𝗮𝗹𝗹𝘆 𝗕𝘂𝗶𝗹𝗱 𝗥𝗲𝗮𝗹 𝗦𝗸𝗶𝗹𝗹𝘀 💀🔥 1.🖥️ Build a Home SOC Lab Use VirtualBox, Windows/Linux VMs, Sysmon, and a SIEM like Splunk or Wazuh to simulate a real monitoring environment. ━━━━━━━━━━━━━━━━━━ 2.🎣 Create a Phishing Detection Workflow Analyze phishing emails, inspect headers, extract IOCs, and build alerting or response procedures. ━━━━━━━━━━━━━━━━━━ 3.📜 Analyze Windows Event Logs Investigate failed logins, PowerShell abuse, suspicious processes, and privilege escalation attempts using Event Viewer or Sysmon logs. ━━━━━━━━━━━━━━━━━━ 4.🚨 Simulate & Detect Brute Force Attacks Generate brute force attempts against SSH/RDP in a lab and detect them using SIEM correlation rules. ━━━━━━━━━━━━━━━━━━ 5.📊 Build Splunk Dashboards Create dashboards for failed logins, malware alerts, suspicious IPs, authentication anomalies, and endpoint activity. ━━━━━━━━━━━━━━━━━━ 6.🧠 Write Sigma & YARA Rules Develop detection rules for malware patterns, suspicious scripts, ransomware behavior, or known attacker techniques. ━━━━━━━━━━━━━━━━━━ 7.🌐 Monitor Network Traffic with Wireshark & Zeek Capture packets, analyze protocols, detect anomalies, and identify suspicious network communication. ━━━━━━━━━━━━━━━━━━ 8.🦠 Analyze Malware in a Sandbox Use FLARE-VM, REMnux, or Any.Run-style labs to safely inspect malware behavior, persistence, and network callbacks. ━━━━━━━━━━━━━━━━━━ 9.📑 Build an Incident Response Playbook Create step-by-step response procedures for phishing, ransomware, brute force attacks, or insider threats. ━━━━━━━━━━━━━━━━━━ 10.🎯 Perform Threat Hunting on Public Datasets Use public PCAPs and log datasets to hunt for attacker behavior, lateral movement, persistence, and IOC activity. ━━━━━━━━━━━━━━━━━━ Projects teach faster than passive tutorials. Building, breaking, detecting, and documenting is what develops real SOC skills. #SOCAnalyst #BlueTeam #CyberSecurity #ThreatHunting
English
2
18
115
4.7K
Austine retweetledi
𝐇𝐚𝐦𝐳𝐚 | Network Engineer (Aspiring)
If you're new to Linux and don’t know where to start, this is for you. After my last post, a lot of people asked me the best way to learn Linux. Truth is, there’s no “best” way to learn anything. You learn by using it daily, breaking things, fixing them, and getting comfortable with it over time. I’m also trying to level up my Linux skills, so I’ve decided to use Linux as much as possible moving forward. Here are some free courses I’ll be taking to improve my Linux knowledge 👇🏾 netacad.com/catalogs/learn…
𝐇𝐚𝐦𝐳𝐚 | Network Engineer (Aspiring) tweet media
𝐇𝐚𝐦𝐳𝐚 | Network Engineer (Aspiring)@Hamzaonchain

The truth is Linux isn't hard you just don't use it enough.

English
3
24
212
8.2K
Gabriel Odusanya • WoTxOSec
In a collision domain, what device creates multiple collision domains? A. Hub B. Switch C. Repeater D. Bridge (legacy)
English
2
1
6
458
Gabriel Odusanya • WoTxOSec
Which cable type is used for connecting a switch to another switch (straight-through or crossover)? A. Straight-through B. Crossover C. Rollover D. Fiber only
English
9
1
17
1.1K
Austine retweetledi
AI_Explorer
AI_Explorer@ai_explorer25·
4. 10 Completely FREE Cybersecurity Courses for 2026 Nmap and Wireshark for Ethical Hacking youtube.com/playlist?list=… Ethical Hacking & Penetration Testing youtube.com/playlist?list=… How to Hack Metasploitable 2 with Kali Linux youtube.com/playlist?list=… Metasploit Hacking Tutorials for Beginners youtube.com/playlist?list=… OWASP Top 10 Basics youtube.com/playlist?list=… OWASP Top 10 Playlist youtube.com/playlist?list=… Ethical Hacking Playlist youtube.com/playlist?list=… OWASP Top 10 youtube.com/playlist?list=… OWASP Top Ten Cyber Security Training youtube.com/playlist?list=… Nmap for Ethical Hacking youtube.com/playlist?list=… #free #courses #playlist
AI_Explorer tweet mediaAI_Explorer tweet mediaAI_Explorer tweet mediaAI_Explorer tweet media
English
18
123
421
10.8K
Austine retweetledi
Networking Academy
Networking Academy@CiscoNetAcad·
SOC Analyst is one of the most in-demand cybersecurity jobs right now. Now NetAcad learners have a free, structured path to get there. We just released 8 free @Splunk courses that will take you from cybersecurity fundamentals to real SOC Analyst skills. cs.co/6010BBwh2q
Networking Academy tweet media
English
5
164
734
58.5K
Austine retweetledi
iShowCybersecurity
iShowCybersecurity@ishowcybersec·
Platforms to learn cybersecurity for FREE: 1. Cybrary Training cybrary.it 2. AttackIQ MITRE ATT&CK lnkd.in/dcfmSPEJ 3. Splunk Courses lnkd.in/d_dZNdu 4. CSILinux Forensics Training lnkd.in/dhjwx_5h 5. Fortinet Courses lnkd.in/dmmkZ-tH 6. OSINT Courses lnkd.in/dTCaCf-u 7. TryHackMe tryhackme.com 8. Bugcrowd University lnkd.in/djaaDNSa Start with fundamentals. Practice consistently. Build real skills. #Cybersecurity #Infosec #Learning
iShowCybersecurity tweet media
English
3
87
345
7.8K
Austine
Austine@AustineCyberS·
@gabbytech01 But you no reply to my message almost 3month now
English
1
0
1
44
Gabriel Odusanya • WoTxOSec
Dear CyberSecurity community, My job is to give out as much resources as I can to help you start out in your journey, let me know where I can come in.
English
9
6
95
2.7K
Austine retweetledi
Mohammed AlSubayt
Mohammed AlSubayt@AlsubaytM·
دورات تدريبية مجانية في أنظمة الـ SIEM لعام 2026 لأن مجال أنظمة إدارة معلومات وأحداث الأمن (SIEM) أصبح من أهم مجالات الأمن السيبراني جمعت لكم أفضل المصادر التدريبية المجانية لتطوير مهاراتكم في أشهر الأنظمة: هذي المصادر كنز حقيقي لأي شخص مهتم أو متخصص في مجال SOC 🔻 مصادر عامة: أساسيات تسجيل أحداث Windows lnkd.in/grKYFQzJ شرح مبسط للـ SIEM من Jose Bravo (5 فيديوهات) lnkd.in/gc2UDpeD تحليل سجلات Sysmon باستخدام PowerShell lnkd.in/g_8Eq8vm 🔻 نظام QRadar: شرح متكامل لـ QRadar من Jose Bravo (38 فيديو) lnkd.in/gd7V_4pe أساسيات QRadar lnkd.in/esbz2RjK التأسيس في QRadar SIEM lnkd.in/es8NAdAw دليل Ariel Query Language lnkd.in/eAMKy25q 🔻 نظام Splunk: كتالوج الدورات من Splunk lnkd.in/ekm6RekE أساسيات البحث في Splunk lnkd.in/gygnTMfD من الصفر إلى الاحتراف في Splunk lnkd.in/ePF_3PWj أشهر حالات استخدام Splunk lnkd.in/eJ4CTNV2 استكشاف Splunk بشكل عملي lnkd.in/e8gVvMuu 🔻 نظام Microsoft Sentinel: مقدمة حول Microsoft Sentinel lnkd.in/gdB7dAdU تدريب Microsoft Sentinel مستوى متقدم (400) lnkd.in/ezDkpWmx أساسيات مركز العمليات الأمنية (SOC 101) lnkd.in/evnF6kNm 🔻 نظام FortiSIEM: دورة مجانية حول FortiSIEM lnkd.in/e5TvYZYt 🔻 نظام AlienVault OSSIM: دورة مجانية من Cybrary lnkd.in/gRZAansT 🔻 نظام Elastic SIEM: الأساسيات lnkd.in/gYNYs9vS الدليل العملي lnkd.in/dTVwgSbH 🔻 نظام ArcSight: شرح مبسط من Paul Brettle (سلسلة فيديوهات) lnkd.in/gh5ruPZt أساسيات ArcSight ESM 101 lnkd.in/gS33AJdk تدريب ArcSight عملي lnkd.in/guEydy_U 🔻 نظام SureLogSIEM: التدريب باللغة الإنجليزية lnkd.in/eAnAYDWJ 🔻 نظام LogSign: 📎تدريب مجاني lnkd.in/eXnjymv6 🔻 نظام Wazuh: الأساسيات: ▪️ دورة مكثفة مجانية lnkd.in/dQgmwpfR ▪️ نظرة عامة وهيكلية Wazuh lnkd.in/dpG6iYuQ 🔻 إعداد بيئة التدريب: ▪️ تثبيت بيئة Wazuh All-in-One Lab lnkd.in/d4TbFJau ▪️ تثبيت Wazuh على VirtualBox lnkd.in/ddD65zu3 ▪️ تثبيت Wazuh باستخدام Docker lnkd.in/ddD65zu3 ▪️ إنشاء Dashboards مخصصة lnkd.in/dZ-2CxhT 🔻 تحليل السجلات: ▪️ استقبال وتحليل السجلات في Wazuh lnkd.in/dym9fFxq ▪️ تحليل سجلات Windows Sysmon lnkd.in/djvb9sZP ▪️ التكامل مع Graylog lnkd.in/d2BxixuY 🔻 اكتشاف التهديدات: ▪️ قواعد الترابط في Wazuh lnkd.in/dHtXuXB5 ▪️ التكامل مع VirusTotal lnkd.in/dT6YnfpE ▪️ التكامل مع نظام كشف التسلل Suricata lnkd.in/dH4R4J-s ▪️ قواعد Wazuh متقدمة lnkd.in/dYFGbrZB 🔻 الاستجابة للحوادث: ▪️ حظر محاولات اختراق SSH بالقوة الغاشمة lnkd.in/d9eWmQUb ▪️ تعطيل حسابات المستخدم في لينكس lnkd.in/dAsW4jjt 🔻 اصطياد التهديدات: ▪️ الصيد باستخدام بيانات Inventory lnkd.in/dB97vg-f ▪️ مراقبة التغيرات باستخدام FIM وYara على لينكس lnkd.in/dAwEkarW
Mohammed AlSubayt tweet media
العربية
3
109
661
30.9K