Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,150,999 members, 7,810,780 topics. Date: Saturday, 27 April 2024 at 03:17 PM

CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM - Career (15) - Nairaland

Nairaland Forum / Nairaland / General / Career / CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM (39954 Views)

Virtual Training on CISSP, CISA, CISM, CRISC, CEHv11 / Virtual Training on CISSP, CISA, CISM, CRISC, CCSP, CEH / CISA And CISA Aspirants..come In! (2) (3) (4)

(1) (2) (3) ... (12) (13) (14) (15) (16) (Reply) (Go Down)

Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by dfrost: 5:45pm On Jun 23, 2023
Jintata:


With a mobile phone, you can browse the web, send emails, use social media apps, access productivity tools like document editors and note-taking apps, and even learn programming through dedicated mobile apps. You can also install various other apps that cater to specific needs, such as photo editing, video creation, or language learning.


Might I add Jinata, that with mobile phones, you can even install Kali on them.
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 9:23pm On Jun 23, 2023
dfrost:


Might I add Jinata, that with mobile phones, you can even install Kali on them.

Thanks for pointing that out.

While Kali Linux is a valuable tool (especially in ethical hacking, & penetration testing) it is just one part of a larger landscape of cybersecurity and cyber forensics.
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 9:25pm On Jun 23, 2023
Cybersecurity and cyber forensics encompass a wide range of concepts, tools, and practices beyond Kali Linux. While Kali Linux is a popular and powerful tool for specific purposes, it is important to understand the broader landscape of cybersecurity and cyber forensics. Here are some key areas and aspects to consider:

Cybersecurity Fundamentals: Developing a strong foundation in cybersecurity is essential. This includes understanding concepts such as risk management, security policies and procedures, network security, cryptography, secure coding practices, and security frameworks (e.g., NIST Cybersecurity Framework).
Networking and Systems: Understanding how computer networks and systems operate is crucial. Knowledge of TCP/IP protocols, network architecture, firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) is important for securing networks and systems.

Threat Intelligence: Keeping up-to-date with the latest cyber threats, vulnerabilities, and attack techniques is vital. Cyber threat intelligence involves gathering, analyzing, and applying intelligence about potential threats to anticipate and mitigate cyber risks effectively.

Security Assessment and Testing: Conducting security assessments and testing is a critical aspect of cybersecurity. This includes vulnerability assessments, penetration testing, web application security testing, and security auditing to identify weaknesses and improve the overall security posture.

Incident Response: Being prepared to handle and respond to security incidents is crucial. Understanding incident response methodologies, incident handling, digital evidence collection, and analysis are important skills for cyber forensics and incident response professionals.

Legal and Ethical Considerations: Knowledge of laws, regulations, and ethical guidelines pertaining to cybersecurity and cyber forensics is essential. This includes understanding privacy laws, computer crime laws, chain of custody protocols, and ethical guidelines for handling and analyzing digital evidence.

Industry Standards and Certifications: Familiarizing yourself with industry standards such as ISO 27001, NIST Cybersecurity Framework, and CIS Controls can provide a framework for implementing effective security practices. Additionally, industry-recognized certifications like Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), and Certified Incident Handler (GCIH) can enhance your professional credentials.

Remember, cybersecurity and cyber forensics are constantly evolving fields, driven by new threats, technologies, and regulations. It is crucial to stay updated with the latest trends, attend conferences, participate in training programs, and engage in continuous learning to deepen your knowledge and skills in these areas.

4 Likes

Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 9:29pm On Jun 23, 2023
While I can only remotely understand how or why we landed with Kali in centre space ….

Let’s unpack some things about Kali in relation to cybersecurity and cyber forensics.
Kali Linux plays a significant role in the realm of cybersecurity and cyber forensics. It is a specialized Linux distribution specifically designed for penetration testing, digital forensics, and security auditing. Here's how Kali Linux fits into the learning journey of cybersecurity and cyber forensics:

Penetration Testing: Kali Linux is widely used for penetration testing, which involves assessing the security of computer systems, networks, and applications. It provides a vast array of pre-installed tools and frameworks that facilitate various stages of penetration testing, such as reconnaissance, scanning, exploitation, and post-exploitation.

Learning Kali Linux equips individuals with the necessary skills and tools to identify vulnerabilities and help organizations secure their systems.
Ethical Hacking: Kali Linux is often associated with ethical hacking, which involves legally and ethically identifying vulnerabilities in computer systems and networks. The tools and utilities bundled with Kali Linux enable professionals to simulate real-world attack scenarios and test the security posture of systems. Understanding Kali Linux is essential for aspiring ethical hackers and security professionals to gain practical experience and knowledge in this field.
Digital Forensics: Kali Linux is also used extensively in the field of digital forensics. It provides a range of tools and utilities that aid in the identification, preservation, and analysis of digital evidence. Whether it's examining a compromised system, recovering deleted files, or conducting memory and network forensics, Kali Linux offers a comprehensive toolkit for digital forensic investigations.

Security Research and Development: Kali Linux serves as a platform for security researchers and developers to test, develop, and improve security tools and techniques. It provides an environment where professionals can explore new vulnerabilities, develop exploits, and contribute to the security community.

In the learning journey of cybersecurity and cyber forensics, Kali Linux serves as a practical and hands-on platform. It allows individuals to gain practical experience in various aspects of security testing, vulnerability assessment, ethical hacking, and digital forensics. However, it's important to note that Kali Linux is just one tool in a broader landscape of cybersecurity and cyber forensics. Building a strong foundation in networking, operating systems, programming, cryptography, and other fundamental concepts is equally crucial for a comprehensive understanding of the field.

Ultimately, learning Kali Linux should be accompanied by a broader knowledge base, continuous learning, and adherence to ethical guidelines and legal boundaries in order to make meaningful contributions to the field of cybersecurity and cyber forensics.
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 9:35pm On Jun 23, 2023
dfrost:


Might I add Jinata, that with mobile phones, you can even install Kali on them.

Yes, it is certainly possible to install Kali Linux on certain mobile phones. Kali Linux is a popular operating system used for penetration testing and ethical hacking purposes. However, installing Kali Linux on a mobile phone is not a straightforward process and requires technical knowledge and expertise.

To install Kali Linux on a mobile phone, you typically need a compatible device with an unlocked bootloader, root access, and a custom recovery installed. The installation process may involve flashing a custom ROM or using specialized tools designed for this purpose.

It's important to note that installing Kali Linux on a mobile phone may void the warranty and could potentially cause stability or compatibility issues with the device. Additionally, running Kali Linux on a mobile phone may not offer the same functionality and capabilities as running it on a dedicated computer.

If you are interested in using Kali Linux for security testing purposes, it is recommended to use it on a dedicated computer or within a virtual machine environment. This ensures better compatibility, performance, and a more controlled and secure testing environment.

Before attempting to install Kali Linux on a mobile phone or any other device, it is crucial to thoroughly research and understand the process, potential risks, and implications. Additionally, ensure that you comply with all applicable laws and regulations regarding the use of such tools and operating systems.
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by dfrost: 7:32am On Jun 24, 2023
My pointing out Kali, is to emphasize the powerful angle of today's mobile phones.

Of course, I know it's just part of the picture and not the picture itself.

1 Like

Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by BunbleBee: 9:21am On Jun 24, 2023
This bro is just using ChatGPT to post and respond verbatim. Is it hard to respond normally ? smh

2 Likes

Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by dfrost: 3:51pm On Jun 24, 2023
BunbleBee:
This bro is just using ChatGPT to post and respond verbatim. Is it hard to respond normally ? smh

Drink water and pass. E no hard nah 😝🀣

1 Like

Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by o123456789(m): 1:26pm On Jun 25, 2023
dfrost:


Drink water and pass. E no hard nah 😝🀣
ChatGPT now live on NL, if your comment is against him you go collect, if you support him, you go still collect... You can never satisfy AI, it is very hard for AI to tell you thank you, because AI believe he is the only one that can help you and not the other way round.
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 10:57pm On Jun 27, 2023
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 4:01pm On Jun 29, 2023
Happening now ….. ISC2Nigeria Chapter is inviting you to a scheduled Zoom meeting.

Topic: Growing your cyber security career
Time: Jun 29, 2023 04:00 PM West Central Africa

Join Zoom Meeting
https://us05web.zoom.us/j/81979591209?pwd=c1cvUXpOMU9Jbk5iVnFLcnJZc2FpZz09

Meeting ID: 819 7959 1209
Passcode: GrowSec

1 Like

Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 4:21pm On Jun 29, 2023
Here are some of the reasons why you might want to consider getting a free master's in cybersecurity:

* **Cybersecurity is a growing field.** The demand for cybersecurity professionals is expected to grow significantly in the coming years.

* **A master's degree in cybersecurity can help you advance your career.** A master's degree can give you the skills and knowledge you need to move into more senior-level cybersecurity roles.

* **A free master's degree can save you money.** The cost of a master's degree can be significant, so a free program can be a great way to save money on your education.
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 4:23pm On Jun 29, 2023
Here are some of the free online master's in cybersecurity programs that are available:

* **The Open University** offers a free online course called "Introduction to Cyber Security."

* **University of Maryland** offers a free Cyber Security Specialization course through Coursera.

* **Stanford University** offers a free Cryptography 1 course through Coursera.

* **MIT Opencourseware** offers a free Computer Systems Security course.

1 Like

Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 12:53am On Jul 01, 2023
Hello everyone,
Hope you are doing well.
Silicon Valley chapter is organizing a free CISA exam prep class in July.
Here is the link for registration:
https://us02web.zoom.us/webinar/register/WN_lZIhqhyqT4itzPLnteJExQ#/registration
Registration closes at 11:59pm on July 3, 2023 (US Pacific Time)
Please feel free to share it with your members and your network, so they can benefit from this opportunity.
Here is the LinkedIn post with more details:
https://www.linkedin.com/posts/isacasv_cisa-continuouslearning-itaudit-activity-7079206134900760576-vjbo/
Thanks!
#WeAreOneGlobalISACAFamily

1 Like

Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by hustla(m): 6:32am On Jul 02, 2023
Hi everyone

Please who has links to download official study guides for CCSP and CISSP

Thanks!
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by emoboy4u: 7:21am On Jul 02, 2023
hustla:
Hi everyone

Please who has links to download official study guides for CCSP and CISSP

Thanks!
A simple google search would link you to them
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by mumu9gerian: 11:53pm On Jul 03, 2023
hustla:



Thanks, I'll register as a student member then, seems it's cheaper.

Got vouchers for 3 AWS exams and 50% off for AWS security is currently on but I want 100% off

grin
How you take get am
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by hustla(m): 9:12am On Jul 04, 2023
mumu9gerian:

How you take get am


Na God wink
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by mumu9gerian: 6:30pm On Jul 04, 2023
hustla:



Na God wink
How na?
Baba! Show us the way na
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by hustla(m): 7:06pm On Jul 04, 2023
mumu9gerian:

How na?
Baba! Show us the way na

.
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by mumu9gerian: 12:12pm On Jul 05, 2023
hustla:


Got it from their training day and my company paid AWS Security for me

Think its not on at the moment though

smiley

Btw, who has recently passed the CCSP exam? How was it and where did you get practice questions from?

Currently using learning materials on Oreilly - Certified Cloud Security Professional (CCSP) by Michael J. Shannon and it has been nice so far. Looking to use Gwen Betty's Udemy videos too
Ok
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Alliswell248: 10:09am On Jul 14, 2023
Nice thread and wonderful people

1 Like

Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Digitron: 11:48am On Jul 22, 2023
Please who has past questions for CISM.
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by yuceeh: 6:36pm On Aug 01, 2023
Hi guys.

Please who has CISA video tutorials??
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 7:34am On Aug 02, 2023
Stutern has introduced a free short course designed to equip learners with zero or basic knowledge with fundamental knowledge in either product design or software development. The course is self-paced and flexible, so you can learn at your own pace and on your own time.

At the end of the course, you will complete a final project that allows you to be eligible to join the full course. A certificate of completion is also given to learners that complete their learning.

Here are the details of the free short course:

* Course name: Stutern Beginner Short Course
* Course content: The course covers the fundamentals of product design or software development, depending on the track you choose. For product design, you will learn about user research, ideation, and prototyping. For software development, you will learn about HTML, CSS, and JavaScript.
* Course duration: The course is designed to be completed in one month.
* Course cost: The course is free.
* Eligibility: To be eligible for the course, you must have a basic understanding of computers and the internet. You must also be able to speak and understand English.
* How to enroll: To enroll in the course, you must create a Stutern account and apply for the course. You can find the application form on the Stutern website.
Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 7:36am On Aug 02, 2023
yuceeh:
Hi guys.

Please who has CISA video tutorials??

Below integrated approach will help cisa candidates:

Step wise planning:

Step 1: Within next 15 days, please complete 30 day strategy from following link:

http://cisaexamstudy.com/30-day-strategy-for-cisa-success/

This will not take half an hour per day.

Step 2: Simultaneously see below mentioned video tutorials and attempt corresponding mock test. Atleast daily one video and one mock test.

http://cisaexamstudy.com/cisa-domain-1-testing-concepts/

http://cisaexamstudy.com/cisa-domain-2-testing-concepts/


http://cisaexamstudy.com/cisa-domain-3-testing-concepts/

http://cisaexamstudy.com/cisa-domain-4-testing-concepts/


http://cisaexamstudy.com/cisa-domain-5-testing-concepts/

Both the above steps should not take more than 2 months.

Once you complete both the steps you will have sufficient confidence to fight your battle against isaca.

However, step 3 is essential to sharpen your axes.

Step 3: Complete full database atleast 2 times.

Step 4: Read important topics from CRM (CISA review manual).

1 Like

Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 7:41am On Aug 02, 2023

1 Like

Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by yuceeh: 1:50am On Aug 03, 2023
Thank you sir, i so much appreciate!!!


Jintata:


Below integrated approach will help cisa candidates:

Step wise planning:

Step 1: Within next 15 days, please complete 30 day strategy from following link:

http://cisaexamstudy.com/30-day-strategy-for-cisa-success/

This will not take half an hour per day.

Step 2: Simultaneously see below mentioned video tutorials and attempt corresponding mock test. Atleast daily one video and one mock test.

http://cisaexamstudy.com/cisa-domain-1-testing-concepts/

http://cisaexamstudy.com/cisa-domain-2-testing-concepts/


http://cisaexamstudy.com/cisa-domain-3-testing-concepts/

http://cisaexamstudy.com/cisa-domain-4-testing-concepts/


http://cisaexamstudy.com/cisa-domain-5-testing-concepts/

Both the above steps should not take more than 2 months.

Once you complete both the steps you will have sufficient confidence to fight your battle against isaca.

However, step 3 is essential to sharpen your axes.

Step 3: Complete full database atleast 2 times.

Step 4: Read important topics from CRM (CISA review manual).

1 Like

Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by Jintata: 4:53pm On Aug 07, 2023
Just a courtesy FYI that ISC2 is offering free training & a free voucher for ISC2 Certified in Cybersecurity certificate.
You can learn more about this at www. isc2.org/1mcc

2 Likes

Re: CyberSecurity: GRC, CYSA+, AWS, CCSK, CCSP, CISSP, CISA, CRISC, CISM by dfrost: 9:03am On Aug 08, 2023
Jintata:
Just a courtesy FYI that ISC2 if offering free training & a free voucher for ISC2 Certified in Cybersecurity certificate.
You can learn more about this at www. isc2.org/1mcc

Well done Jinata πŸ‘ βœ”πŸ‘πŸ‘Œ. In addition to your courtesy, I'll add another one for beginners to. Cisco's Network Academy is also offering training on Junior Cybersecurity Analyst. Good for knowledge too.

And only 120 hours to finish!

https://skillsforall.com/career-path/cybersecurity?userLang=en-US&courseLang=en-US

1 Like

(1) (2) (3) ... (12) (13) (14) (15) (16) (Reply)

8 Things Successful People Do NOT Do Every Day / My Madam Sacked Me Because I Killed A Snake In Her Compound / Why Ekiti Police Sacked Pregnant Policewoman

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 50
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.