David Etim

449 posts

David Etim banner
David Etim

David Etim

@DavidEtim2654

Upcoming SOC Analyst | Cybersecurity Fundamentals SIEM • Networking • Incident Detection Building skills daily 🚀

📍 Nigeria 🎓 Cybersecurity / Katılım Mayıs 2024
516 Takip Edilen144 Takipçiler
Sabitlenmiş Tweet
David Etim
David Etim@DavidEtim2654·
Cybersecurity is not easy ooo Make dem no whine you ooo.
English
44
48
309
12.4K
David Etim
David Etim@DavidEtim2654·
Not been posting lately because of my laptop that got crashed But am back and fit.
David Etim tweet media
English
4
0
18
498
David Etim
David Etim@DavidEtim2654·
!!
Maryam Shuaibu Aliyu@Cyberhijabitech

Amina was 16 when she applied for her first scholarship. Brilliant student. Confident speaker. Dreams bigger than her small town. She passed the exams. She impressed during the interview. But later,silence and weeks passed. One evening, her mentor called her aside. “Your application was strong,” he said gently. “But they reviewed your online presence.” Amina frowned. “My what?” Her digital footprint. Years earlier, she had opened social media accounts just for fun, • Posting insults during online arguments. • Sharing unverified rumors. • Commenting harshly under trending posts. • Accepting random challenges without thinking. To her, it was entertainment. To the scholarship board, it was character evidence. The internet never forgets. Every post… Every comment… Every repost… Every like… They form a silent CV about who you are. That day, Amina learned something powerful: Your digital footprint speaks before you enter the room. She didn’t disappear from social media. She transformed it. She started sharing her learning journey. She cleaned old posts. She used her voice to educate, not attack. One year later, she applied again. This time, when they searched her name, they found: Growth Responsibility Purpose And this time… she got the opportunity. Your phone is not just a device. It is your reputation archive. Before posting, ask yourself: Would I say this in a job interview? Would I want a future employer to see this? Does this reflect who I want to become? Because long before success meets you… Your digital footprint arrive first.

QST
0
0
1
20
Maryam Shuaibu Aliyu
Maryam Shuaibu Aliyu@Cyberhijabitech·
Amina was 16 when she applied for her first scholarship. Brilliant student. Confident speaker. Dreams bigger than her small town. She passed the exams. She impressed during the interview. But later,silence and weeks passed. One evening, her mentor called her aside. “Your application was strong,” he said gently. “But they reviewed your online presence.” Amina frowned. “My what?” Her digital footprint. Years earlier, she had opened social media accounts just for fun, • Posting insults during online arguments. • Sharing unverified rumors. • Commenting harshly under trending posts. • Accepting random challenges without thinking. To her, it was entertainment. To the scholarship board, it was character evidence. The internet never forgets. Every post… Every comment… Every repost… Every like… They form a silent CV about who you are. That day, Amina learned something powerful: Your digital footprint speaks before you enter the room. She didn’t disappear from social media. She transformed it. She started sharing her learning journey. She cleaned old posts. She used her voice to educate, not attack. One year later, she applied again. This time, when they searched her name, they found: Growth Responsibility Purpose And this time… she got the opportunity. Your phone is not just a device. It is your reputation archive. Before posting, ask yourself: Would I say this in a job interview? Would I want a future employer to see this? Does this reflect who I want to become? Because long before success meets you… Your digital footprint arrive first.
English
3
4
23
489
Ahmedkhan
Ahmedkhan@Ahmed___khaan·
Cybersecurity is not for the weak ! If you're still consistent till today, comment with you best emoji. Me: 😌🙃
English
9
3
22
537
David Etim
David Etim@DavidEtim2654·
First of all I want to thank @cyberjeremiah for giving me the privilege to be amongst the community and @Cyberhijabitech for introducing me to him,am so grateful Well we just finished awareness of cybersecurity,and it was filled with wisdom. Am so honoured to be among.
David Etim tweet media
English
0
3
9
146
David Etim
David Etim@DavidEtim2654·
Learning cybersecurity increased my trust issues 😂 My phone glitched while using free WiFi yesterday and my brain immediately said: “You’re being hacked.” Omo I disconnected instantly 😭
English
1
0
0
153
David Etim
David Etim@DavidEtim2654·
Been enrolled in the Cisco Networking Academy Cybersecurity Defense Analyst career path. Trying to get serious about becoming a SOC Analyst. Would appreciate if any professional can help in getting to starting this course.@Cyberhijabitech @ireteeh @Ahmed___khaan @cyber_razz
David Etim tweet media
English
7
20
225
9.7K
CRIMSON | CYBERSEC
CRIMSON | CYBERSEC@cremescene_·
Question 2
Subnet 192.168.10.0/24 into 4 equal subnets What are the subnet addresses? 
Step 1: Determine bits to borrow We need 4 subnets 2² = 4 So we borrow 2 bits from the host portion New prefix:
/24 + 2 = /26 
Step 2: Find subnet mask and block size /26 = 255.255.255.192 Block size = 256 - 192 = 64 Block size tells us how much each subnet increases by.
English
2
1
1
44
CRIMSON | CYBERSEC
CRIMSON | CYBERSEC@cremescene_·
In Networking, Subnetting looks confusing… until it suddenly clicks. 
If you’ve ever struggled with it, this thread will make it make sense step by step. @ireteeh @Cyblackorg
English
1
8
15
1.5K
David Etim
David Etim@DavidEtim2654·
Cybersecurity is not easy ooo Make dem no whine you ooo.
English
44
48
309
12.4K
David Etim
David Etim@DavidEtim2654·
DAY 25 of becoming a soc anslyst Module 16:APPLICATION LAYER SERVICE. This module is clearly understand how network protocols enable communication and how humans interact with the internet through the Application Layer. #SOCAnalyst #BlueTeam #CyberDefense
David Etim tweet media
David Etim@DavidEtim2654

DAY 22-24 of becoming a soc anslyst Module 15:tcp and udp Learnt about Tcp and udp Port numbers Types of Port ans their uses #SOCAnalyst #BlueTeam #CyberDefense #SIEM #SecurityOperations #ThreatDetection #CyberSecurity #EntryLevelSOC

English
1
0
2
176
David Etim
David Etim@DavidEtim2654·
DAY38-42 of becoming a soc analyst Investigation with splunk Learnt about the 5 questions to ask yourself while carrying out an investigation. Siem as a best friend as a soc analyst How siem works Soar as a best friend too and how they work #BlueTeam #SOCAnalyst #CyberDefense
David Etim tweet media
David Etim@DavidEtim2654

DAY 37-38 of becoming a soc anslyst Cybersecurity landscape. This is teaching about,how to: Understand the cost and impact of security events. Identify some historic high profile security events. Security concepts about surrounding information assurance. #BlueTeam #SOCAnalyst

English
1
0
2
111