Stephen Michael

1.1K posts

Stephen Michael

Stephen Michael

@Stephenswe_

Tech (Data scientist & Engineer) | Software Engineer || Health (Optometrist) || Business and founder @timelessfolioHq

Katılım Mayıs 2022
1.7K Takip Edilen422 Takipçiler
Stephen Michael
Stephen Michael@Stephenswe_·
I’ve officially completed the @AltSchoolAfrica Front-End track. Beyond the code, this was about mastering scalable architecture and user-centric design. I’m ready to bring these skills to a high-growth team in Fintech, HealthTech, or EdTech. #Baraka25 #Frontend #Altschool
Stephen Michael tweet mediaStephen Michael tweet media
English
3
3
16
901
Emmy Jakes
Emmy Jakes@Obiekweemma·
What is a Pivot Table mainly used for? A. Formatting cells B. Sorting data C. Summarizing large data D. Writing formulas
English
54
10
148
10.5K
Steve Kay
Steve Kay@IamSteveKay·
Dear mom, your son is now an Engineer at Amazon🇺🇸🤲🏽 Continue to RIP❤️‍🔥
Steve Kay tweet media
English
606
884
12.9K
286.9K
Stephen Michael retweetledi
Chidanand Tripathi
Chidanand Tripathi@thetripathi58·
STOP USING YOUR MACBOOK LIKE A BASIC LAPTOP. You’re only using 10% of what macOS can really do. Copy these 16 hidden settings to upgrade your daily workflow
English
13
189
1.5K
464.3K
Stephen Michael retweetledi
Shruti Codes
Shruti Codes@Shruti_0810·
Excel + SQL + Power BI = Data Analytics Excel + Financial Modeling = Financial Analysis Excel + Dashboarding = Business Intelligence Excel + A/B Testing + KPI Tracking = Product Analytics Excel + Google Analytics + Reporting = Marketing Analytics Excel + Sales Data + Forecasting = Sales Analysis Excel + HR Metrics + Workforce Planning = HR Analytics Excel + Risk Modeling + Scenario Analysis = Risk Analysis Excel + Investment Analysis + Valuation = Investment Analysis Excel + CRM Data + Performance Tracking = Customer Analytics Excel + Project Tracking + Resource Allocation = Project Management Excel can literally make you rich
English
5
71
360
11.4K
Stephen Michael retweetledi
Nana Phiona
Nana Phiona@NanaPhio·
If you're learning Excel for data analytics, focus on these 5 things: - PivotTables - Power Query - Data cleaning - Advanced formulas - Dashboard building Master these and you'll stand out.
English
18
68
374
8.3K
Stephen Michael retweetledi
Dave
Dave@Oxdave·
Bro to bro Invest in your gadgets - Get a good pc - Get a good phone - Get a good power bank Buy anything that will make you grind comfortable Very very important
English
119
203
2.1K
24.7K
Umar Farouk Farouk
Umar Farouk Farouk@Cyber_GRC·
New phone New laptop New country Same week, cybersecurity na you do this one 😏
English
45
29
712
24.2K
Stephen Michael retweetledi
Dr Iretioluwa Akerele
Dr Iretioluwa Akerele@ireteeh·
If you are currently learning Cybersecurity, remember this: every professional you admire was once a confused beginner who chose not to give up. Stay consistent. Keep showing up. Your breakthrough is on the way ❤️
English
86
214
1K
60K
Frieda Odagboyi
Frieda Odagboyi@friedaDcreator·
I got a MacBook Pro M4, Thank you Cardtonic 💙
Frieda Odagboyi tweet media
English
66
26
1.1K
40.9K
Stephen Michael retweetledi
cybernerd🤖
cybernerd🤖@ce3nerd·
OWASP Top 10 2025 is here and the shift is another level.
cybernerd🤖 tweet media
English
16
101
579
29.5K
Stephen Michael
Stephen Michael@Stephenswe_·
Deep dive into #DataScience fundamentals with @alx_africa Learning how Measures of Spread (Variance, StDev) reveal data consistency, not just the average. Also, mastering spreadsheet power tools: Absolute/Relative Cell References and essential Pivot Tables #datascience
Stephen Michael tweet mediaStephen Michael tweet mediaStephen Michael tweet mediaStephen Michael tweet media
English
0
0
0
48
Stephen Michael retweetledi
Dhanian 🗯️
Dhanian 🗯️@e_opore·
Cybersecurity Developer Learning Roadmap |-- Foundations of Cybersecurity | |-- Understanding Cyber Threats & Attack Vectors | |-- Principles of Confidentiality, Integrity & Availability (CIA Triad) | |-- Types of Cyber Attacks: Malware, Phishing, DDoS, MITM | |-- Security Policies, Standards & Best Practices | |-- Basics of Networking, Firewalls & VPNs |-- Networking & System Security | |-- TCP/IP, DNS, HTTP/HTTPS & OSI Model | |-- Network Scanning & Packet Analysis (Wireshark, Nmap) | |-- Intrusion Detection & Prevention Systems (IDS/IPS) | |-- Secure Network Design & Segmentation | |-- Managing Firewalls, Proxies & Access Controls |-- Operating System & Application Security | |-- Windows, Linux & macOS Security Fundamentals | |-- File System Permissions & Process Management | |-- Patch Management & System Hardening | |-- Secure Software Development Lifecycle (SSDLC) | |-- Application Sandboxing & Virtualization |-- Cryptography & Data Protection | |-- Symmetric & Asymmetric Encryption | |-- Hashing & Digital Signatures | |-- Public Key Infrastructure (PKI) & SSL/TLS | |-- Secure Key Management Practices | |-- Data Encryption at Rest & in Transit |-- Web & API Security | |-- OWASP Top 10 Vulnerabilities | |-- Cross-Site Scripting (XSS), CSRF, SQL Injection | |-- API Authentication & Authorization (OAuth2, JWT) | |-- HTTPS & Secure Headers Configuration | |-- Input Validation & Data Sanitization |-- Ethical Hacking & Penetration Testing | |-- Footprinting & Reconnaissance Techniques | |-- Vulnerability Assessment Tools (Nessus, OpenVAS) | |-- Exploitation Frameworks (Metasploit, Burp Suite) | |-- Social Engineering & Phishing Simulations | |-- Reporting & Mitigation Strategies |-- Endpoint & Cloud Security | |-- Endpoint Detection & Response (EDR) Solutions | |-- Anti-Malware & Threat Containment Techniques | |-- Securing Cloud Services (AWS, Azure, GCP) | |-- Cloud Access Security Brokers (CASB) | |-- Identity & Access Management (IAM) in Cloud |-- Security Operations & Incident Response | |-- Security Information & Event Management (SIEM) | |-- Log Analysis & Threat Detection | |-- Incident Response Lifecycle | |-- Digital Forensics & Evidence Preservation | |-- Threat Hunting & Malware Analysis |-- Risk Management & Compliance | |-- Risk Assessment Frameworks (NIST, ISO 27001) | |-- Governance, Risk & Compliance (GRC) Concepts | |-- Data Privacy Regulations (GDPR, HIPAA, PCI DSS) | |-- Business Continuity & Disaster Recovery Plans | |-- Audit & Security Posture Management |-- Advanced Topics in Cyber Defense | |-- Zero Trust Security Architecture | |-- Threat Intelligence & Automation | |-- Security Orchestration (SOAR) | |-- AI & Machine Learning in Threat Detection | |-- Cybersecurity for IoT & Industrial Systems |-- Real-World Projects & Practice | |-- Setting Up a Home Lab for Ethical Hacking | |-- Penetration Testing Simulations | |-- Web Application Vulnerability Testing | |-- Cloud Security Assessment Projects | |-- Developing Secure Applications End-to-End |-- Continuous Learning & Certifications | |-- CompTIA Security+, CEH, CISSP, OSCP | |-- Cybersecurity Blogs, Podcasts & Forums | |-- Open Source Security Tools Contribution | |-- Capture the Flag (CTF) Challenges | |-- Staying Updated with Emerging Threats Get the Cybersecurity Developer Projects Ebook here: codewithdhanian.gumroad.com/l/tocvib This ebook provides hands-on cybersecurity projects, ethical hacking labs, and defensive strategies to help you master real-world security practices from beginner to expert level.
Dhanian 🗯️ tweet mediaDhanian 🗯️ tweet media
English
15
114
641
37.9K
AilaunchX
AilaunchX@Ai_Tech_tool·
𝗣𝗮𝗶𝗱 𝗖𝗼𝘂𝗿𝘀𝗲 𝗙𝗥𝗘𝗘 (PART - 1) 1. Artificial Intelligence + Data Analyst 2. Machine Learning + Data Science 3. Cloud Computing + Web Development 4. Ethical Hacking + Hacking 5. Data Analytics + DSA 6. AWS Certified + IBM COURSE 7. Data Science + Deep Learning 8. BIG DATA + SQL COMPLETE COURSE 9. Python + OTHERS 10 MBA + HANDWRITTEN NOTES (72 Hours only ) Cost About - $500 To get FREE: - 1. Follow (So I can DM you) 2. Like & retweet 3. Reply " Send "
AilaunchX tweet media
English
246
223
619
75K