Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,153,038 members, 7,818,067 topics. Date: Sunday, 05 May 2024 at 06:47 AM

Jintata's Posts

Nairaland Forum / Jintata's Profile / Jintata's Posts

(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (of 16 pages)

Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 9:35pm On Jun 23, 2023
dfrost:


Might I add Jinata, that with mobile phones, you can even install Kali on them.

Yes, it is certainly possible to install Kali Linux on certain mobile phones. Kali Linux is a popular operating system used for penetration testing and ethical hacking purposes. However, installing Kali Linux on a mobile phone is not a straightforward process and requires technical knowledge and expertise.

To install Kali Linux on a mobile phone, you typically need a compatible device with an unlocked bootloader, root access, and a custom recovery installed. The installation process may involve flashing a custom ROM or using specialized tools designed for this purpose.

It's important to note that installing Kali Linux on a mobile phone may void the warranty and could potentially cause stability or compatibility issues with the device. Additionally, running Kali Linux on a mobile phone may not offer the same functionality and capabilities as running it on a dedicated computer.

If you are interested in using Kali Linux for security testing purposes, it is recommended to use it on a dedicated computer or within a virtual machine environment. This ensures better compatibility, performance, and a more controlled and secure testing environment.

Before attempting to install Kali Linux on a mobile phone or any other device, it is crucial to thoroughly research and understand the process, potential risks, and implications. Additionally, ensure that you comply with all applicable laws and regulations regarding the use of such tools and operating systems.
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 9:29pm On Jun 23, 2023
While I can only remotely understand how or why we landed with Kali in centre space ….

Let’s unpack some things about Kali in relation to cybersecurity and cyber forensics.
Kali Linux plays a significant role in the realm of cybersecurity and cyber forensics. It is a specialized Linux distribution specifically designed for penetration testing, digital forensics, and security auditing. Here's how Kali Linux fits into the learning journey of cybersecurity and cyber forensics:

Penetration Testing: Kali Linux is widely used for penetration testing, which involves assessing the security of computer systems, networks, and applications. It provides a vast array of pre-installed tools and frameworks that facilitate various stages of penetration testing, such as reconnaissance, scanning, exploitation, and post-exploitation.

Learning Kali Linux equips individuals with the necessary skills and tools to identify vulnerabilities and help organizations secure their systems.
Ethical Hacking: Kali Linux is often associated with ethical hacking, which involves legally and ethically identifying vulnerabilities in computer systems and networks. The tools and utilities bundled with Kali Linux enable professionals to simulate real-world attack scenarios and test the security posture of systems. Understanding Kali Linux is essential for aspiring ethical hackers and security professionals to gain practical experience and knowledge in this field.
Digital Forensics: Kali Linux is also used extensively in the field of digital forensics. It provides a range of tools and utilities that aid in the identification, preservation, and analysis of digital evidence. Whether it's examining a compromised system, recovering deleted files, or conducting memory and network forensics, Kali Linux offers a comprehensive toolkit for digital forensic investigations.

Security Research and Development: Kali Linux serves as a platform for security researchers and developers to test, develop, and improve security tools and techniques. It provides an environment where professionals can explore new vulnerabilities, develop exploits, and contribute to the security community.

In the learning journey of cybersecurity and cyber forensics, Kali Linux serves as a practical and hands-on platform. It allows individuals to gain practical experience in various aspects of security testing, vulnerability assessment, ethical hacking, and digital forensics. However, it's important to note that Kali Linux is just one tool in a broader landscape of cybersecurity and cyber forensics. Building a strong foundation in networking, operating systems, programming, cryptography, and other fundamental concepts is equally crucial for a comprehensive understanding of the field.

Ultimately, learning Kali Linux should be accompanied by a broader knowledge base, continuous learning, and adherence to ethical guidelines and legal boundaries in order to make meaningful contributions to the field of cybersecurity and cyber forensics.
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 9:25pm On Jun 23, 2023
Cybersecurity and cyber forensics encompass a wide range of concepts, tools, and practices beyond Kali Linux. While Kali Linux is a popular and powerful tool for specific purposes, it is important to understand the broader landscape of cybersecurity and cyber forensics. Here are some key areas and aspects to consider:

Cybersecurity Fundamentals: Developing a strong foundation in cybersecurity is essential. This includes understanding concepts such as risk management, security policies and procedures, network security, cryptography, secure coding practices, and security frameworks (e.g., NIST Cybersecurity Framework).
Networking and Systems: Understanding how computer networks and systems operate is crucial. Knowledge of TCP/IP protocols, network architecture, firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) is important for securing networks and systems.

Threat Intelligence: Keeping up-to-date with the latest cyber threats, vulnerabilities, and attack techniques is vital. Cyber threat intelligence involves gathering, analyzing, and applying intelligence about potential threats to anticipate and mitigate cyber risks effectively.

Security Assessment and Testing: Conducting security assessments and testing is a critical aspect of cybersecurity. This includes vulnerability assessments, penetration testing, web application security testing, and security auditing to identify weaknesses and improve the overall security posture.

Incident Response: Being prepared to handle and respond to security incidents is crucial. Understanding incident response methodologies, incident handling, digital evidence collection, and analysis are important skills for cyber forensics and incident response professionals.

Legal and Ethical Considerations: Knowledge of laws, regulations, and ethical guidelines pertaining to cybersecurity and cyber forensics is essential. This includes understanding privacy laws, computer crime laws, chain of custody protocols, and ethical guidelines for handling and analyzing digital evidence.

Industry Standards and Certifications: Familiarizing yourself with industry standards such as ISO 27001, NIST Cybersecurity Framework, and CIS Controls can provide a framework for implementing effective security practices. Additionally, industry-recognized certifications like Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), and Certified Incident Handler (GCIH) can enhance your professional credentials.

Remember, cybersecurity and cyber forensics are constantly evolving fields, driven by new threats, technologies, and regulations. It is crucial to stay updated with the latest trends, attend conferences, participate in training programs, and engage in continuous learning to deepen your knowledge and skills in these areas.

4 Likes

Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 9:23pm On Jun 23, 2023
dfrost:


Might I add Jinata, that with mobile phones, you can even install Kali on them.

Thanks for pointing that out.

While Kali Linux is a valuable tool (especially in ethical hacking, & penetration testing) it is just one part of a larger landscape of cybersecurity and cyber forensics.
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 2:43pm On Jun 22, 2023
GNiels:

....
could you please drop your email because in the coming years i might get stuck and would require assistance or would quoting you here suffice i.e in the future
thank you very much
like the sun you have shown me the light

Teamatraining@gmail.com
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 2:39pm On Jun 22, 2023
If you have plans to get a laptop in the future, that's great. A laptop will offer you more flexibility and power for various tasks.

Remember, you can reach out to me here on this platform whenever you have questions or need guidance. I'm here to assist you.
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 2:37pm On Jun 22, 2023
GNiels:
Good day
thanks for all the information
am sorry if am becoming a bother
i just need to know
is it possible to get started with a mobile phone or do i have to get a laptop?
thank you once again

Good day! No bother at all, I'm here to help. You can definitely get started with mobile phone alone. Many tasks that were traditionally done on laptops or desktop computers can now be performed on mobile devices. Smartphones have become increasingly powerful and capable, allowing you to access the internet, communicate, and perform various tasks.

With a mobile phone, you can browse the web, send emails, use social media apps, access productivity tools like document editors and note-taking apps, and even learn programming through dedicated mobile apps. You can also install various other apps that cater to specific needs, such as photo editing, video creation, or language learning.

However, it's important to note that while mobile phones are versatile, they do have limitations compared to laptops or desktop computers. Some tasks may be more convenient or efficient to perform on a larger screen with a physical keyboard and a full-fledged operating system.

1 Like

Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 7:52am On Jun 21, 2023
Ultimately, the choice between a mobile phone and a laptop depends on the specific tasks you intend to perform and your personal preferences. Consider the type of work you'll be doing, your budget, and your comfort level with different devices. You can always start with a mobile phone and assess if you need a laptop later on based on your needs.
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 1:46am On Jun 20, 2023
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 1:39am On Jun 20, 2023
Furthermore, here are some free or low-cost options for learning about cyber security and cyber forensics:

* **SANS Cyber Aces:** This is a free online course that covers the basics of cyber security. It is a great option for beginners who want to learn about the fundamentals of cyber security.

* **Digital Forensics Essentials (D|FE):** This is a free online course that covers the basics of digital forensics. It is a great option for beginners who want to learn about the fundamentals of digital forensics.

* **Great Learning Academy:** This online learning platform offers a free course on cyber forensics. The course covers the basics of cyber forensics, including evidence collection, preservation, and analysis.

* **TryHackMe:** This is a gamified learning platform that offers free courses on cyber security. The courses cover a variety of topics, including penetration testing, web application security, and ethical hacking.

* **HackTheBox:** This is another gamified learning platform that offers free courses on cyber security. The courses cover a variety of topics, including network security, reverse engineering, and malware.

These are just a few of the many free or low-cost options available for learning about cyber security and cyber forensics. With a little research, you can find a course that is right for you and your budget.

I hope this helps!
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 1:37am On Jun 20, 2023
GNiels:
Wow thats alot
thank you for the information
can i get all these at udemy or do you have any recommendations where i can learn online
do all these require programming

When it comes to online learning platforms, Udemy is a popular choice that offers a wide range of courses, including those related to web development, Flutter, and cybersecurity. Udemy has courses taught by instructors from around the world, providing flexibility and a variety of options.

In addition to Udemy, here are some other reputable online learning platforms where you can find courses related to web development, Flutter, and cybersecurity:

1 Coursera: Offers courses and specializations from top universities and institutions. You can find courses on web development, Flutter, cybersecurity, and related topics.

2 edX: Provides courses from renowned universities and organizations. Offers a variety of web development, Flutter, and cybersecurity courses, some of which are self-paced.

3 Pluralsight: Focuses on technology-related courses and offers a vast library of courses on web development, Flutter, and cybersecurity, with content suitable for different skill levels.

4 Codecademy: Specializes in coding and programming courses. Offers interactive tutorials and projects for web development and Flutter, allowing you to practice hands-on.

5 LinkedIn Learning: Formerly known as Lynda.com, it offers a vast library of courses on various topics, including web development, Flutter, and cybersecurity. You can access it through a LinkedIn Premium subscription.

These platforms provide a range of courses to suit different skill levels, from beginner to advanced. Be sure to read course reviews, check the syllabus and instructor credentials, and choose courses that align with your specific learning goals and preferences.
Additionally, don't forget to explore free resources such as documentation, tutorials, and open-source projects available online. These can supplement your learning and provide practical experience.

Remember to stay consistent, practice regularly, and engage in hands-on projects to reinforce your skills.

Good luck with your learning journey!
Programming / Re: Where To Learn Cyber Security And Coding by Jintata: 7:09am On Jun 19, 2023
GNiels:
Do i need to learn basic frontend before learning python for cyber security or should i simply start with python
help me please

No, you don't need to learn basic frontend before learning Python for cyber security. Python is a general-purpose programming language that can be used for a variety of tasks, including cyber security. There are many Python libraries and tools that are specifically designed for cyber security tasks, such as malware analysis and reverse engineering.

Frontend development is the process of creating the user interface for a website or application. It involves using HTML, CSS, and JavaScript to create the visual elements of a website or application. While frontend development can be a useful skill for cyber security professionals, it is not essential.

If you are interested in learning Python for cyber security, I recommend starting with the basics of Python. There are many online resources that can help you learn Python, such as tutorials, courses, and books. Once you have a good understanding of the basics of Python, you can start learning about the Python libraries and tools that are specifically designed for cyber security.

Here are some resources that you may find helpful:

* **Python for Beginners:** This tutorial from Real Python is a great introduction to the basics of Python.

* **Python for Cyber Security:** This course from Udemy covers the basics of Python for cyber security, including malware analysis and reverse engineering.

* **The Python Standard Library:** This documentation from the Python Software Foundation provides a comprehensive overview of the Python standard library, which includes many modules that are useful for cyber security tasks.

I hope this helps!
Programming / Re: Where To Learn Cyber Security And Coding by Jintata: 7:06am On Jun 19, 2023
Responding to your questions on another thread that I currently don’t have access to ….

You can certainly find many of the resources you need to learn cyber forensics online. Udemy is a great option, and there are also many other platforms that offer courses and tutorials on the subject. Here are a few suggestions:

* **Udemy:** Udemy is a popular online learning platform that offers a wide range of courses on cyber forensics, including beginner, intermediate, and advanced topics.

* **Coursera:** Coursera is another popular online learning platform that offers courses from top universities and institutions around the world. There are several courses on cyber forensics available on Coursera, including a specialization in Digital Forensics and Incident Response.

* **edX:** edX is a non-profit online learning platform that offers courses from leading universities and institutions around the world. There are several courses on cyber forensics available on edX, including a specialization in Cyber Security and Digital Forensics.

* **Infosec Institute:** Infosec Institute is a leading online training provider that offers courses on a variety of cybersecurity topics, including cyber forensics.

* **Cybercrime Forensics:** Cybercrime Forensics is an online training provider that offers courses on cyber forensics and incident response.


As for your question about programming, not all of the topics you need to learn for cyber forensics require programming. However, some of the more advanced topics, such as malware analysis and reverse engineering, do require some programming knowledge. If you're not familiar with programming, I recommend taking some introductory courses before you start learning about cyber forensics.

Here are a few programming languages that are commonly used in cyber forensics:

* **Python:** Python is a general-purpose programming language that is easy to learn and use. It is often used for scripting and automation tasks in cyber forensics.
[Image of Python logo]
* **C/C++:** C and C++ are powerful programming languages that are often used for low-level tasks in cyber forensics, such as malware analysis and reverse engineering.
[Image of C/C++ logo]
* **Java:** Java is a general-purpose programming language that is used for a variety of tasks in cyber forensics, including writing forensic tools and analyzing log files.
[Image of Java logo]

I hope this helps!
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 7:33pm On Jun 18, 2023
GNiels:
Wow thats alot
thank you for the information
can i get all these at udemy or do you have any recommendations where i can learn online
do all these require programming

Which of the training are u interested in. Follow the link above for the Microsoft option
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 4:53pm On Jun 14, 2023
Microsoft 365 Virtual Training Day:
Fundamentals

Microsoft 365 Virtual Training Day: Fundamentals


Reimagine the way you work at Microsoft 365 Virtual Training Day: Fundamentals. Join us at this free event from Microsoft Learn to see how to work smarter and faster with Microsoft 365 while maintaining built-in security and compliance. You’ll also explore licensing, service, and support options for your organization.

You will have the opportunity to: 

Enable security, compliance, and privacy features within Microsoft 365.
Identify the right Microsoft 365 pricing and support for your organization.
Jumpstart your preparation for the Microsoft 365 Fundamentals certification exam.
Join us at an upcoming two-part event:
Monday, July 17, 2023 | 2:00 PM - 4:15 PM | (GMT-05:00) Eastern Time (US & Canada)
Tuesday, July 18, 2023 | 2:00 PM - 4:00 PM | (GMT-05:00) Eastern Time (US & Canada)

Delivery Language: English
Closed Captioning Language(s): English


https://emails.microsoft.com/dc/6MOqlD_5FVsn_DtXWPLRrVY67KDv7BQVhDfDoW5Y1xq9hEIBK1-ld3HG5A7wmRF8FwgCqRGO9TaTzVoAX_KXLiVIy55tIy_cKg_51viFpuQVCTn8-9UMMtxnbPMmortDRDYPsKAjdCvQ5ie_6R3yVIMnSQcYDU73V46zsUvx6OQ=/MTU3LUdRRS0zODIAAAGMWW-5zWQH39gysXweREp0Oz50fCYX5dbmZq9iDrAO8KVxQhaJHy1bUttEmjYYHfkP-wj0Kl4=
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 2:18am On Jun 14, 2023
Good day!

Alternatively....

I'm glad to hear about your interest in cyber security and cyber forensics. It's an exciting and rapidly evolving field with a lot of opportunities.

To specialize in cyber forensics, it's essential to have a solid foundation in general cyber security concepts and practices. Here's a pathway that can help you get started and progress in your learning journey:

1 Obtain a solid understanding of computer systems and networks:
• Familiarize yourself with computer hardware, operating systems, and networking concepts.
• Learn about protocols, IP addressing, and network security principles.

2 Study the basics of cybersecurity:
• Gain knowledge of common threats, vulnerabilities, and attack vectors.
• Understand different types of malware and their behaviors.
• Explore concepts of cryptography and encryption.

3 Learn about digital forensics:
• Understand the basics of forensic investigation, evidence collection, and preservation.
• Study file systems and data storage technologies.
• Familiarize yourself with digital forensic tools and techniques.

4 Gain practical experience:
• Set up a lab environment to practice your skills.
• Work on real-world scenarios and case studies.
• Participate in capture-the-flag (CTF) competitions and challenges.

5 Pursue relevant certifications:
• Certifications can enhance your knowledge and demonstrate your expertise.
• Consider certifications such as Certified Cyber Forensics Professional (CCFP), Certified Computer Examiner (CCE), or GIAC Certified Forensic Examiner (GCFE).

6 Stay updated with the latest trends and technologies:
• Cybersecurity is a dynamic field, so it's crucial to stay current with emerging threats, tools, and techniques.
• Follow industry blogs, attend conferences, and join professional organizations to connect with experts and stay informed.

7 Gain practical experience in the field:
• Look for internships, apprenticeships, or entry-level positions in cyber forensics or incident response teams.
• Collaborate with professionals in the field to gain hands-on experience.

Remember, learning in cyber security is a continuous process due to the ever-changing nature of the field. Keep practicing, stay curious, and always seek opportunities to expand your knowledge.

Best of luck on your journey to specializing in cyber forensics!
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 2:16am On Jun 14, 2023
Sure, I'd be happy to help you with your cyber forensics career path. Here are some steps you can take to get started:

1. **Get a degree in computer forensics or a related field.** This will give you the foundation in computer science and forensic techniques that you need to start your career.
2. **Get certified.** There are a number of certifications available for digital forensic analysts, such as the Certified Forensics Analyst (CFA) certification from the International Association of Forensic Computer Examiners (IAFCE) and the Certified Computer Examiner (CCE) certification from the International Information System Security Certification Consortium (ISC)².
3. **Gain experience.** The best way to gain experience in digital forensics is to get an internship or entry-level job in the field. You can also gain experience by participating in capture the flag (CTF) competitions or by volunteering your time to a non-profit organization that specializes in digital forensics.
4. **Stay up-to-date on the latest trends.** The field of digital forensics is constantly evolving, so it's important to stay up-to-date on the latest trends and technologies. You can do this by reading industry publications, attending conferences, and taking continuing education courses.

With hard work and dedication, you can build a successful career in cyber forensics. Here are some of the job titles you can pursue with a career in cyber forensics:

* Digital Forensics Analyst
* Incident Response Analyst
* Security Analyst
* Security Engineer
* Threat Intelligence Analyst

The median annual salary for a digital forensics analyst in the United States is $98,360, according to the Bureau of Labor Statistics. The job outlook for digital forensics analysts is also positive, with employment projected to grow 16 percent from 2020 to 2030, faster than the average for all occupations.

I hope this helps!
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 5:31pm On Jun 12, 2023
https://education.oracle.com/oracle-oci-certification

Free OCI Training and Certfifcation
Politics / Re: Buhari Deserves Commendation For Diversifying From Oil – Femi Adesina by Jintata: 5:34pm On Apr 11, 2023
Oil has historically been a major contributor to Nigeria's GDP. In 2019, oil accounted for 9% of Nigeria's GDP. However, the contribution of oil to GDP has been declining in recent years, due to a number of factors, including the global decline in oil prices and the rise of other sectors of the Nigerian economy, such as agriculture and manufacturing.

Yes, oil was once over 90% of exports. In 2005, oil accounted for 92% of Nigeria's exports. However, the contribution of oil to exports has also been declining in recent years, due to the factors mentioned above. In 2019, oil accounted for 65% of Nigeria's exports.

The decline in the contribution of oil to GDP and exports is a cause for concern for the Nigerian economy. Oil is a major source of government revenue and foreign exchange earnings. The decline in oil revenue has led to a decline in government spending, which has had a negative impact on economic growth. The decline in oil exports has also led to a decline in the value of the Nigerian naira, which has made it more expensive for Nigerians to import goods and services.

The Nigerian government is taking steps to diversify the economy and reduce its reliance on oil. However, it will take time for these efforts to bear fruit. In the meantime, the Nigerian economy is likely to continue to be vulnerable to fluctuations in the global oil market.

1 Like

Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 5:11pm On Mar 27, 2023
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 12:21am On Mar 19, 2023
Remote Internship – Risk Analysis

International Computing Centre (UNICC)
Remote Work

General SupportManagement and Strategy

Closing soon: 28 Mar 2023

https://www.unicc.org/working-with-icc/internship-risk-analysis-2/

https://www.unjobnet.org/jobs/detail/55163130

Internship – Risk Analysis
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 4:16pm On Feb 14, 2023
Free and Low Cost Online Cybersecurity Learning Content. Collected by NIST

https://www.nist.gov/itl/applied-cybersecurity/nice/resources/online-learning-content
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 5:47pm On Nov 20, 2022
https://www.mckinsey.com/forward/regions/africa


Forward is a free, six-month online learning program offered by McKinsey to equip young talent with must-have practical skills to succeed in the future of work.

WHAT YOU CAN EXPECT
Forward is a three-level learning journey where you can develop new ways of thinking, boost your confidence, and learn to lead with purpose. At the end of the program, receive a McKinsey Forward digital badge and join an exclusive global network of young, life-long learners.

Interactive learning journey
Learn through a variety of formats, including digital courses, discussion boards, virtual workshops with McKinsey experts, and a group assignment with real-time peer feedback.
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 4:09pm On Nov 15, 2022
Certified in Cybersecurity Practice Quiz.

Are you ready for exam day? Test your knowledge with this short 10-item quiz and get recommendations on next steps toward the Certified in Cybersecurity (CC) entry-level certification.


https://cloud.connect.isc2.org/cc-quiz?utm_source=isc2list&utm_medium=email&utm_campaign=GBL-CCquiz&utm_term=november15&utm_content=quiz

1 Like

Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 5:10pm On Nov 14, 2022
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 1:18pm On Nov 09, 2022
How to get a Microsoft Certification for Free as a Student.

https://techcommunity.microsoft.com/t5/educator-developer-blog/how-to-get-a-microsoft-certification-for-free-as-a-student/ba-p/3584897

Which certifications can you do for free?
There are 8 certifications you can do for free as a student. The certifications help you build up and sharpen your skills on various technologies such as Cloud, Artificial Intelligence, Power Platform and Microsoft 365. Additionally, you get to build up on technical depth in different industry roles such as security. Below are some of the popular certifications you can take:
AZ-900: Microsoft Azure Fundamentals
DP-900: Microsoft Azure Data Fundamentals
AI-900: Microsoft Azure AI Fundamentals
SC-900: Microsoft Security, Compliance, and Identity Fundamentals
PL-900: Microsoft Power Platform Fundamentals
MS-900: Microsoft 365 Fundamentals

1 Like

Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 6:11pm On Oct 28, 2022
https://www.wicys.org/events/wicys-2023/2023scholarships/



As part of our mission to close the cybersecurity workforce gap and to diversify the profession, (ISC)² is proud to partner with Women in Cybersecurity (WiCyS). WiCyS is a global community of women, allies and advocates dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity.

Scholarships

Scholarship applications are being accepted for individuals interested in attending the 2023 WiCyS Conference in Denver, Colorado. Scholarships are not limited only to full-time students. You – or a colleague, mentee, etc. – may qualify to apply for the equity and advancement, faculty or Veteran scholarship to support your conference attendance.
Apply for a Scholarship


Call for Participation
If you’re interested in speaking at next year’s conference, you have until October 31 to submit your proposal. Submissions are being accepted for Workshops, Presentations, Birds of a Feather, Lightning Talk, Panels and Student Research Posters.
Submit Your Proposal
We hope you will take advantage of this opportunity. Please feel free to share with your network. Questions? Reach out to program@wicys.org
Career / Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 9:22pm On Oct 07, 2022
Below is an alphabetical listing of Berkeley and UC systemwide IT policies.

https://security.berkeley.edu/policy/policy-catalog

(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (of 16 pages)

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 103
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.