Oluwaseyi🛡️ Profile Banner
Oluwaseyi🛡️ Profile
Oluwaseyi🛡️

@CyberSquisher

1,553
Followers
1,023
Following
130
Media
1,402
Statuses

Cyber security SOC Analyst|Virtual Assistant||Computer engineering student and a budding Cyber security specialists.

Nigeria.
Joined July 2019
Don't wanna be here? Send us removal request.
Pinned Tweet
@CyberSquisher
Oluwaseyi🛡️
8 months
I got my First networking badge🤗
Tweet media one
Tweet media two
41
10
261
@CyberSquisher
Oluwaseyi🛡️
11 days
Fundamental SOC notes for beginners
Tweet media one
Tweet media two
Tweet media three
Tweet media four
12
338
2K
@CyberSquisher
Oluwaseyi🛡️
5 months
Basic Networking notes
Tweet media one
Tweet media two
Tweet media three
Tweet media four
27
198
795
@CyberSquisher
Oluwaseyi🛡️
5 months
Fundamental SOC notes for beginners,paired with hands on labs for practical learning
Tweet media one
Tweet media two
Tweet media three
Tweet media four
25
190
726
@CyberSquisher
Oluwaseyi🛡️
3 months
Fundamental SOC notes for beginners.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
13
118
675
@CyberSquisher
Oluwaseyi🛡️
3 months
SOC Analyst Notes Nmap Notes featuring hands on labs for practical learning
Tweet media one
Tweet media two
Tweet media three
Tweet media four
11
85
562
@CyberSquisher
Oluwaseyi🛡️
3 months
I woke up to an offer letter🤗
Tweet media one
39
14
391
@CyberSquisher
Oluwaseyi🛡️
3 months
Networking Notes for beginners Credit @SecurityTrybe
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
55
296
@CyberSquisher
Oluwaseyi🛡️
5 months
SOC Analyst Roadmap 1. Learn the basics of Cybersecurity, such as security concepts, principles and the best practices ✓ Use online courses, book, blogs, podcasts, and other resources to gain foundational knowledge ✓ Examples: Google's Cybersecurity course, Cisco Cybersecurity
Tweet media one
6
56
250
@CyberSquisher
Oluwaseyi🛡️
5 months
10 Book For Cybersecurity Beginners 1. Cybersecurity for Beginners by Raef Meeuwisse
Tweet media one
6
13
68
@CyberSquisher
Oluwaseyi🛡️
3 months
Day 30 Network Testing Utilities- Troubleshooting Commands A number of software utilities programs are available that can help identify network problems. Most of these utilities are provided by the operating system as CLI commands. Some of the available utilities include:
Tweet media one
5
9
45
@CyberSquisher
Oluwaseyi🛡️
3 months
@itsSierraNicole I just started reading it now..fingers crossed
Tweet media one
3
3
40
@CyberSquisher
Oluwaseyi🛡️
4 months
I will be starting a 30 days challenge for Networking and I will be using this chart. To participate in the challenge you will need to sign up for the Networking Basics course on @CiscoNetAcad and post daily on the topic for the day using the hashtag #30daysofnetworking @ireteeh
Tweet media one
3
10
38
@CyberSquisher
Oluwaseyi🛡️
5 months
Tweet media one
Tweet media two
Tweet media three
1
5
39
@CyberSquisher
Oluwaseyi🛡️
11 days
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
4
38
@CyberSquisher
Oluwaseyi🛡️
9 days
Hello guys⚠️⚠️ I need help. I have been using a borrowed laptop to learn since 2023. Apart from the fact that I do not have access to it all the time and have to stay up at night. I also have to deal with the fact that the battery is bad and I can't use it without electricity.
Tweet media one
6
25
36
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 1 Types of Networks 1. Local Area Network (LAN)- is the most common type. It allows users to connect within a short distance in a common area. once they connect, users have access to the same resources. #30daysofnetworking @ireteeh @akintunero
Tweet media one
1
10
35
@CyberSquisher
Oluwaseyi🛡️
5 months
10 websites to learn Linux for free 1. Linux Academy 2. Linux survival 3.Linux command 4. Linux Tutorial 5. Tecmint 6. Linux Hint 7. Linux Handbook 8. It's Foss 9.linuxize 10. nixcraft
Tweet media one
1
9
29
@CyberSquisher
Oluwaseyi🛡️
3 months
30 🎉🎉days of networking Challenge done✔️✔️ Thank you to everyone that liked, retweeted and commented...I appreciate. Special thanks to @_DeejustDee @ireteeh @akintunero @OnijeC @allenharper @CyberSecFalcon @CyberPatronMC @A_AbdHafeez @lady_sheraz @Queenicea17
Tweet media one
8
4
29
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 20: packet Tracer Activity Identify MAC and IP Address @ireteeh @akintunero @lady_sheraz @SecurityTrybe
Tweet media one
Tweet media two
2
5
27
@CyberSquisher
Oluwaseyi🛡️
7 months
Completed my first networking course on Cisco Started learning linux
@Mydeen4u
Myd33n 🤡
7 months
It's the last day of February Comment or quote this post with what you've been able to achieve this month in your Cybersecurity Journey. Me: I collected my in Cybersecurity Certificate Helped in gathering GRC resources for @ireteeh Started Ethical
23
13
103
4
1
24
@CyberSquisher
Oluwaseyi🛡️
3 months
10 SOC Analyst Course for Beginners and Intermediates 1. 2. 3. 4. 5. 6. 7.
1
11
24
@CyberSquisher
Oluwaseyi🛡️
5 months
Risk management Which two types of control are effective after a violation of a security policy occurs ( choose two) a corrective b recovery c preventive d deterrent e compensative @_DeejustDee @ireteeh @Queenicea17 @akintunero @Ahmed___khaan @SecurityTrybe @CyberSecFalcon
8
4
20
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 3 Bandwidth refers to the maximum amount of data that can be transmitted over a network or communication channel in a given period of time. Bandwidth is typically measured in the number of bits that (theoretically) can be sent across the media in a second.
Tweet media one
2
6
22
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 6 Wireless Network A wireless network refers to a computer network that makes use of radio frequency (RF) connections between nodes in the network.
Tweet media one
1
4
21
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 15 Network segmentation Is an architecture that divides a network into smaller sections or subnets. Each network segment acts as it own network, which provides security teams with increased control over the traffic that flows into their system
Tweet media one
1
5
18
@CyberSquisher
Oluwaseyi🛡️
6 months
Week 2 of CyberGirls done ✔️ I am gradually adjusting to this rigorous learning and I think it fun. @cybersafehq #proudcybergirl @sisinerdtweets
1
2
17
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 4 Client and Servers Clients are computer hosts that have software installed that enable the hosts to request and display the information obtained from the server. An example of client software is a web browser, such as an internet explorer, safari or chrome.
Tweet media one
3
4
13
@CyberSquisher
Oluwaseyi🛡️
3 months
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
3
15
@CyberSquisher
Oluwaseyi🛡️
3 months
Tweet media one
Tweet media two
1
3
13
@CyberSquisher
Oluwaseyi🛡️
5 months
Which layer is responsible for routing messages through an internet work in the TCP/IP model a network access b session c transport d internet
Tweet media one
3
1
15
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 9 Communication Principles 1. Communication protocols- A communication protocol is a system of rules that allows two or more entities of a communication system yo transmit information via any variation of physical quantity.
Tweet media one
1
4
14
@CyberSquisher
Oluwaseyi🛡️
5 months
Close your laptop and unwind with these movies 1. Start up A desperate banker, a Haitian American gang Lord and a cuban-American hacker are forced to work together to unwittingly create their version of the American dream
Tweet media one
3
3
11
@CyberSquisher
Oluwaseyi🛡️
9 days
I have set up a campaign to help raise donations. Help me get my own laptop.
Tweet media one
0
9
13
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 2 Types of personal Data 1. Volunteered Data- is data created and explicitly shared by individuals such as social network profiles. Volunteered data plays a crucial told in Networking, enabling collaboration, innovation and informed decision making.
Tweet media one
1
3
13
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 8 Configure a wireless router and client using Cisco Packet Tracer
Tweet media one
1
4
11
@CyberSquisher
Oluwaseyi🛡️
4 months
Happy Birthday mama...Thank you for inspiring me and many other young girls out there...Cheers to many more years filled with Joy and happiness.🥂🥂🍾🎂🎂 @sisinerdtweets @cybersafehq
Tweet media one
1
1
12
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 14 : The IPV4 address structure The IPv4 address is a 32 bit number that uniquely identifies a network interface on a machine. An IPv4 address is typically written in decimal digits, formatted as four 8 bits fields that are separated by periods.
Tweet media one
3
2
11
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 18 Routers as Boundaries Between Network The wireless router acts as a DHCP server for all local hosts attacked to it, either by Ethernet cable or wirelessly. These local hosts are referred to as being located on an internal, or inside network.
Tweet media one
1
2
10
@CyberSquisher
Oluwaseyi🛡️
5 months
At which layer of the OSI model would a logical address be added during encapsulation a network layer b physical layer c transport layer d data link layer
Tweet media one
7
0
11
@CyberSquisher
Oluwaseyi🛡️
3 months
Day 29 Email and Messaging Each mail server receives and stores mail for user who have mail boxes configured on the mail server. Each user with a mailbox must then use an email client to access the mail server and read these messages.
Tweet media one
1
3
10
@CyberSquisher
Oluwaseyi🛡️
5 months
At which layer of the OSI model would a logical address be added during encapsulation a network layer b physical layer c transport layer d data link layer
Tweet media one
4
1
10
@CyberSquisher
Oluwaseyi🛡️
7 days
Day 3: Donations received so far. My account details if you will like to make a transfer 0457373769 Oluwaseyi Anisere Gtbank @ireteeh @akintunero @lady_sheraz @hackSultan @OnijeC @segoslavia @_Rega_n
Tweet media one
Tweet media two
@CyberSquisher
Oluwaseyi🛡️
9 days
Hello guys⚠️⚠️ I need help. I have been using a borrowed laptop to learn since 2023. Apart from the fact that I do not have access to it all the time and have to stay up at night. I also have to deal with the fact that the battery is bad and I can't use it without electricity.
Tweet media one
6
25
36
0
4
10
@CyberSquisher
Oluwaseyi🛡️
11 months
Yay! I completed my second Cyber security course.
Tweet media one
Tweet media two
1
0
10
@CyberSquisher
Oluwaseyi🛡️
1 year
Is supposed to commence in August 2023. Hence I am soliciting for your much needed assistance in making this a reality. VISA fees: #72 ,000 SEVIS fee:$350( #262 ,500) Enrollment deposit:$500(375000) Total= #709 ,500 Please here is my account details Oluwaseyi Anisere 0457373769 GTbank
1
10
8
@CyberSquisher
Oluwaseyi🛡️
3 months
Day 24: Create a PLAN using packet Tracer #30daysofnetworking @ireteeh @akintunero @lady_sheraz
Tweet media one
Tweet media two
1
2
9
@CyberSquisher
Oluwaseyi🛡️
13 days
Happy Birthday Big sis @_DeejustDee ..Thank you for all you do Cheers to many more years
Tweet media one
1
1
9
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 7 Components of a home Network * Routers * Desktop Computers * Gaming Systems * Smart TV systems * Printers * Scanners * Security Cameras * Telephones * Climate control Devices
Tweet media one
2
2
9
@CyberSquisher
Oluwaseyi🛡️
4 years
@gabariskufilan Completely agree oo..my friend and her room mate was attacked by robbers and my friends room mate was completely naked when they came...niggas took laptop,phone and money and left without touching them oo..so it not really about what you are wearing
0
0
9
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 17 IPv4 addresses can be assigned either statically it dynamically. With a static assignment, the network administrator must manually configure the network information for a host: At a minimum, this includes the following IP Address- this identifies the host on the network.
Tweet media one
1
3
9
@CyberSquisher
Oluwaseyi🛡️
3 months
Day 27: Client server relationship and application server The term server refers to a host running a software application that provides information or services to other hosts that are connected to the network, such as a web server.
Tweet media one
1
3
9
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 19 ARP process (MAC and IP) Address Resolution Protocol (ARP) is a protocol or procedure that connects an ever changing internet protocol (IP) address to a fixed physical machine address, also known as a media Access control (MAC) address, in a local area network (LAN).
Tweet media one
2
1
9
@CyberSquisher
Oluwaseyi🛡️
6 months
Week 4 of CyberGirls done✔️✔️ *I learnt how to configure a stimulated network according to organizational requirements. * I learnt how to analyze malware files that have been extracted from packet captures * I learnt how to evaluate endpoint security. @cybersafehq #proudcybergirl
1
1
9
@CyberSquisher
Oluwaseyi🛡️
5 months
2. Develop your technical skills in areas such as networking, operating systems, scripting and tools ✓ Use hands on labs, stimulations, and projects to practice and apply your skills ✓Playground: Cyber defenders, Try hack me, Have the box.
1
0
8
@CyberSquisher
Oluwaseyi🛡️
3 months
Day 22 Routing is the process of identifying the best path to a destination .It is the process of selecting and defining paths for IP packet traffic within or between networks as well as the process of managing network traffic overall.
Tweet media one
1
1
8
@CyberSquisher
Oluwaseyi🛡️
1 year
Worth $36,500 for my tuition and fees. However I am faced with the challenge of catering for my VISA fees ( #72 ,000), SEVIS fee($350) and enrollment deposit ($500). I have been informed by the school that I will lose my scholarship if I don't resume for the fall semester which
1
1
8
@CyberSquisher
Oluwaseyi🛡️
5 months
B. To help organization detect threats before they disrupt business
@allenharper
Dr. Allen Harper
5 months
Sharpen your cyber skills: What is the purpose of a security information and event management (SIEM) system? A. To encrypt data B. To monitor and analyze security events C. To perform penetration testing D. To block unauthorized access events
Tweet media one
190
41
269
0
1
8
@CyberSquisher
Oluwaseyi🛡️
3 months
Tweet media one
1
1
8
@CyberSquisher
Oluwaseyi🛡️
5 months
What is a disadvantages of deploying a peer to peer network model a lack of centralized administration b high cost c difficulty of set d high degree of complexity @_DeejustDee @CyberPatronMC @Queenicea17 @ireteeh @SecurityTrybe @segun @CyberSecFalcon @TheSecMaster1
1
1
7
@CyberSquisher
Oluwaseyi🛡️
5 months
Top Linux networking tools
Tweet media one
0
0
8
@CyberSquisher
Oluwaseyi🛡️
7 months
@omoalhajaabiola I wish it was free After you are selected, you will have to bring two people to enroll and pay for their course before u will be selected for the scholarship So it is not entirely free.
4
0
8
@CyberSquisher
Oluwaseyi🛡️
2 months
Internship alert! …
Tweet media one
0
1
7
@CyberSquisher
Oluwaseyi🛡️
5 months
5. Keep learning and improving your skills and knowledge. ✓ Use online platforms, blogs, podcasts and webinars to stay updated on the largest trends and Technologies in Cybersecurity. ✓ Join community forms and groups to exchange ideas and tips with other SOC analyst.
0
1
6
@CyberSquisher
Oluwaseyi🛡️
3 months
Day 28 FTP Clients and servers FTP provides an easy method to transfer files from one computer to another. A host running FTP clients software can access an FTP server to perform various file management functions including file uploads and downloads.
Tweet media one
1
1
6
@CyberSquisher
Oluwaseyi🛡️
11 months
Yay! I completed my first cyber security course on Cisco.
Tweet media one
1
0
6
@CyberSquisher
Oluwaseyi🛡️
3 months
Day 25 TCP, UDP and Port Numbers UDP is a best effort delivery system that does not require acknowledgement of receipt. UDP is preferable with application s such as streaming audio and Volp. Acknowledgments would slow down delivery and retransmission are undesirable.
Tweet media one
1
3
7
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 10 Network Media Types Network media refers to the various means of communication and the transmission of information over computer networks. The media provides the channel over which the message travels from source to destination.
Tweet media one
1
3
6
@CyberSquisher
Oluwaseyi🛡️
9 months
Tweet media one
0
0
6
@CyberSquisher
Oluwaseyi🛡️
7 months
@sisinerdtweets @cybersafehq I am going to be a cyber girl.🤗🤗 I have been selected to join 500+ outstanding fellows across 27 African countries for the CyberGirls fellowship 2024 cohort. Carefully selected from 20,000+ applicants. Thank you Cybersafe foundation #Cybergirls2024
0
1
6
@CyberSquisher
Oluwaseyi🛡️
5 months
Spot your baby girl! Happy International Girls in ICT Day! Thank you @sisinerdtweets for this great opportunity to be a CyberGirl 🤗🤗
@cybersafehq
Cybersafe Foundation
5 months
Happy International Girls in ICT Day! 💙 CyberGirls if you can spot yourself quote this video and say “Am a future cybersecurity leader 💪”
8
19
60
1
0
6
@CyberSquisher
Oluwaseyi🛡️
5 months
4. Linux Basics for Hackers by Occupy the web
Tweet media one
1
1
5
@CyberSquisher
Oluwaseyi🛡️
8 months
@Ifeoma90483092 @osemagnum Oats Omega 3- cod liver oil or Evening primrose oil Zinc Vitamin C (1000mg)
2
1
6
@CyberSquisher
Oluwaseyi🛡️
9 months
@Queenicea17 I have started reading mine.
Tweet media one
Tweet media two
2
1
6
@CyberSquisher
Oluwaseyi🛡️
6 months
@Queenicea17 I thought of this too...some guys have sent me messages asking me how to start their Cybersecurity career and I think a mentorship program will be of so much help.
2
1
6
@CyberSquisher
Oluwaseyi🛡️
8 days
Day 2: please support and donate
Tweet media one
@CyberSquisher
Oluwaseyi🛡️
9 days
Hello guys⚠️⚠️ I need help. I have been using a borrowed laptop to learn since 2023. Apart from the fact that I do not have access to it all the time and have to stay up at night. I also have to deal with the fact that the battery is bad and I can't use it without electricity.
Tweet media one
6
25
36
1
6
6
@CyberSquisher
Oluwaseyi🛡️
3 months
Day 26 Domain Name: system web clients and server The DNS provides a way for hosts to request the IP address of a specific server. DNS names are registered and organized on the internet within specific high level groups, or domains. #30daysofnetworking @ireteeh @akintunero
Tweet media one
1
1
6
@CyberSquisher
Oluwaseyi🛡️
8 months
A WAF or web application firewall helps protect web applications by filtering and monitoring HTTP traffic between a web application and the internet. It typically protects web application from attacks such as cross- site forgery, cross site scripting(XSS), file inclusion. e.t.c
@wealthyprimate
wealthyprimate
8 months
🧑‍🏫Pop Quiz: What is a WAF, and why do we care?🕵️ #CyberSecurity
5
3
18
1
0
3
@CyberSquisher
Oluwaseyi🛡️
1 month
We all know learning cyber security is a bit expensive. That why I have turned to a Cyber virtual Assistant 😎😎.. y'all please send me virtual Assistant gigs so I can get data money🤲
Tweet media one
2
0
5
@CyberSquisher
Oluwaseyi🛡️
9 days
It has also recently development a software problem and is refusing to turn on @ireteeh @akintunero @hackSultan @lady_sheraz @Queenicea17 @OnijeC
1
1
5
@CyberSquisher
Oluwaseyi🛡️
4 months
Day 5 Network Components Network Infrastructure- network infrastructure refers to the hardware and software that enables network connectivity and communication between users, devices,apps ,the internet and more. The network infrastructure is the platform that supports the network
Tweet media one
1
0
5
@CyberSquisher
Oluwaseyi🛡️
4 months
2. Optical signal- Transmission is achieved by converting the electrical signals into light pulses. 3. Wireless signals- Transmission is achieved by using infrared, microwave, or radio waves through the air. @ireteeh @akintunero
1
3
5
@CyberSquisher
Oluwaseyi🛡️
6 months
@akintunero Thank you so much for this course, I really learnt alot.
Tweet media one
0
0
4
@CyberSquisher
Oluwaseyi🛡️
5 months
3. Get certified to validate your skills and knowledge ✓ Use study guides, practice tests, and online courses to prepare for the exams ✓ Certifications to get: CompTIA security+, certified SOC Analyst (CSA), certified cyber defense analyst (CCDA)
1
0
4
@CyberSquisher
Oluwaseyi🛡️
5 months
5. Networking Basics for Hackers by Occupy the web
Tweet media one
0
1
4
@CyberSquisher
Oluwaseyi🛡️
3 months
A challenge for GRC guys!
@CyberPatronMC
CyberPatron ©
3 months
The 30 days GRC challenge starts today, an opportunity for all GRC enthusiasts to research and study more on GRC. We hope you find this as a learning opportunity for you as you delve into the Governance, Risk and Compliance world.
Tweet media one
15
63
207
0
1
5
@CyberSquisher
Oluwaseyi🛡️
9 months
The thing about period pain is no one can feel it and because everyone generally says it painful you might think that yours is the norms. I had similar experience and for some years I endured the pain and tried to live with it until I started having severe symptoms.
@_DeejustDee
DsL_a ʚїɞ ®
9 months
If you feel so much pain on your period, you should really go for a scan, some are underlying issues that you probably think are normal because everyone complains of pain. My pain is different from yours but we all call it pain, if I ever feel excessive pain from period, then
2
5
22
1
0
4
@CyberSquisher
Oluwaseyi🛡️
4 years
This is beautiful and well said sir
@AaronAkpuPhilip
𝐷𝑟 𝐴𝑎𝑟𝑜𝑛 𝐴𝑘𝑝𝑢 𝑃ℎ𝑖𝑙𝑖𝑝
4 years
A SHORT LETTER Dear Undergraduate, I know you have been delayed by incessant ASUU strikes. I know you should have graduated by now but you are still stuck. While you feel down, I come with a few words that you can take note of:
26
107
198
1
0
4
@CyberSquisher
Oluwaseyi🛡️
3 months
I think many people have been misinformed about this conditions 1. Many women in our mothers generation suffered from this same condition too just that it wasn't diagnosed 2. There is no known cause of it meaning it isn't any body fault that they have PCOS
@pee_rsp
.pee🤎
3 months
PCOS ladies they said they won’t marry us ooo so we don’t get to transfer “it” to “their” kids 😩 Lmao 🤣 my own anger is the olodo that made that list of ailment.
241
1K
5K
0
0
4
@CyberSquisher
Oluwaseyi🛡️
5 months
4. Gain experience by working on real world scenarios and challenges. ✓ Use platforms such as SOC prime, Splunk Boss of the SOC or cyber defend to test your skills. ✓ Participate in competition, hackathons, and capture the flag events to showcase your abilities.
1
1
3
@CyberSquisher
Oluwaseyi🛡️
25 days
@Cyblackorg @Cyblackorg here is my pitch for the SOC internship.
Tweet media one
0
0
4
@CyberSquisher
Oluwaseyi🛡️
1 month
Thank you @alx_africa I am a virtual Assistant
Tweet media one
0
0
4
@CyberSquisher
Oluwaseyi🛡️
6 months
I got my second networking badge. @cybersafehq #proudcybergirl
Tweet media one
Tweet media two
1
0
3
@CyberSquisher
Oluwaseyi🛡️
4 months
4. Wide Area Network (WAN)- A Wide Area Network is an extensive network that is not confined to geographical space. Corporations and international companies may use WANs to provide a common Network with far reaching connectivity.
1
3
4
@CyberSquisher
Oluwaseyi🛡️
6 months
Data Received with thanks...this will really go a long way... Thank you ma'am 😄😄
@ireteeh
Dr Iretioluwa Akerele
6 months
If you filled the form, check your balance ❤️
26
15
79
0
1
3
@CyberSquisher
Oluwaseyi🛡️
4 months
3. Wireless Local Area Network (WLAN)- A WLAN operates similarly to a LAN because it transmits data within a small area. While typically less secure and slightly weaker than other networks, a WLAN provides users with flexibility to use their devices in various locations
1
3
4
@CyberSquisher
Oluwaseyi🛡️
5 months
2. Social Engineering: The art of human Hacking by Christopher Hadnagy
Tweet media one
1
0
3
@CyberSquisher
Oluwaseyi🛡️
1 year
Tweet media one
2
0
4