As I pursue a new career in the field of Cybersecurity, I have just completed a six months training program on the Fundamentals of Cybersecurity at the Ijesha Digital Hub, Iloko-Jesa organized by the Ijesha Global Alliance for Development (IGAD). As part of the requirements of the program, I also got an ISC2 certificate of completion in Certified in Cybersecurity (CC) course.
SAMUEL ABOLARINWA’s Post
More Relevant Posts
-
I have completed my Certified Defensive Security Analyst certification with Cyber Now Labs. This program equipped me with essential skills in security analysis, SOC operations, and incident handling. The hands-on training emphasized practical applications, preparing me to effectively respond to modern cyber threats. Special thanks to Harun Seker, CISSP and Halil BARIS , CSAP and all the other instructors for their knowledge sharing with the Cohort 20.
To view or add a comment, sign in
-
🎉 Excited to share that I have successfully completed the Cyber Threats course offered by the Central Institute of Educational Technology (CIET) under the National Council of Educational Research and Training ( NCERT ) )🛡️ This comprehensive course has equipped me with valuable knowledge and skills to understand and mitigate cyber threats effectively. In an increasingly digital world, staying informed about cybersecurity is crucial, and this certification is a significant step in enhancing my expertise in this field.
To view or add a comment, sign in
-
Leveling up my cybersecurity game! 💪 I've officially completed the Cybersecurity Fundamentals training of the TÜV Rheinland Cybersecurity Training Program, thanks to HIMA Middle East FZE ! This training has equipped me with essential skills to protect against cyber threats. Let's build a safer digital world together. #cybersecurity #certified #skillupgrade #informationsecurity #functionalsafety #certification #safetyfirst
To view or add a comment, sign in
-
✨️ So Exciting to share. I'm thrilled to announce that I have successfully completed a 150-hour intensive Cybersecurity training program from the Information Technology Institute (ITI). This program has provided me with a strong foundation and hands-on experience in several key areas, including: ►Network CCNA: Solid understanding of networking concepts and configurations. ►Cybersecurity Essentials: Gained crucial knowledge in safeguarding systems and data. ►Ethical Hacking: Practiced offensive security techniques to identify and mitigate vulnerabilities. ► Fortigate NSE4 & Palo Alto: Explored advanced firewall configurations and network security strategies. Special thanks to Eng. Ahmed Amir ( من أكتر الناس المحترمة الي هتقابلهم في حياتك ), Eng. Mariam Maher , and Eng.Khaled Taha for their exceptional support and guidance throughout the training. I am excited to apply these skills in real-world challenges and continue growing! #Cybersecurity #Networking #EthicalHacking #PaloAlto #ProfessionalGrowth #HandsOnExperience #ITICertified
To view or add a comment, sign in
-
Excited to share that I've achieved certification for completing the 16-hour Smart Shield: Cybersecurity Workshop (IT Professionals) offered by the Academy of Continuing Education in collaboration with the ITOM Department at the Lebanese American University. This program has enriched my skill set in cybersecurity, providing practical insights crucial for today's digital landscape. Ready to apply this knowledge in safeguarding digital assets!
To view or add a comment, sign in
-
🌟 Thrilled to Announce My Completion of the Security Operation Center (SOC) Essentials Course! 🌟 I’m excited to share that I’ve successfully completed the SOC Essentials training provided by Cyber Academy. This experience deepened my understanding of SOC fundamentals and hands-on capabilities in threat detection, response strategies, and incident management. Throughout the course, I worked on various critical tools and techniques, including: Automating Threat Detection and Response with Wazuh Snort IDS Implementation Integrating Wazuh with Sysmon & Windows Defender for effective malware detection IBM QRadar integration with Sysmon for comprehensive security monitoring Detecting and Analyzing brute force attacks using IBM QRadar Configuring Suricata for Network Security as IDS/IPS and integrating with Wazuh for network monitoring Web Attack Detection and Analysis with DVWA using Wazuh & Suricata, achieving a 95% threat detection accuracy rate Security Configuration Assessment with Wazuh, achieving a 90% compliance rate with industry standards, significantly enhancing organizational security Special thanks to Abdul Wahab and Hamza Ali for their mentorship and invaluable support throughout this journey. Looking forward to leveraging these skills and insights to contribute meaningfully to cybersecurity defense strategies! 🛡️ #CyberSecurity #SOC #SOCtools #ThreatDetection #CyberAcademy #SecurityMonitoring #Grateful #LearningJourney #CyberDefense
To view or add a comment, sign in
-
🌟 Exciting Update! 🌟 I am pleased to share that I recently attended a Cyber Threats Training. 📜🔐 This training provided invaluable insights into the current landscape of cyber threats and equipped me with essential skills to better understand and counter these challenges. 🔍💡 I'm grateful for the opportunity to enhance my knowledge and stay ahead in the ever-evolving field of cybersecurity. 🚀💼 A special thanks to Imam Abdulrahman Bin Faisal University for organizing this insightful session. 🙏👏 #Cybersecurity #Training #ContinuousLearning #ProfessionalDevelopment
To view or add a comment, sign in
-
I am thrilled to share my first achievement in the field of cybersecurity! I recently completed the intensive Cyber Warriors (CTF Training) course 🛡️💻. During this course, I learned a lot of practical skills through (CTF) challenges, which helped me develop my abilities in vulnerability analysis and security implementation.
To view or add a comment, sign in
-
🔐 Just earned my C3SA (Certified Cyber Security Analyst) certification from CyberWarFare Labs ! This comprehensive program encompassed a wide range of essential topics, including: • Web Application Basics & Exploitation • Network Basics & Exploitation • Hosts Basics & Exploitation • Multi-Cloud Basics & Exploitation • Security Operations Center (SOC) A breakthrough moment for me was successfully simulating and countering a cyber attack. The knowledge I’ve gained through this certification will be my armor in the ever-evolving field of cybersecurity.
To view or add a comment, sign in
-
🌟 Excited to Share My Achievement! 🌟 I'm thrilled to announce that I have successfully completed and earned certification in the NPTEL Ethical Hacking course! This program provided me with valuable insights into cybersecurity principles, techniques, and tools for safeguarding digital environments. 📅 Duration Date: July - Oct 2024 💻 Key Learning Highlights: Advanced hacking techniques and ethical practices. Vulnerability assessment and penetration testing. Strengthening security measures to combat cyber threats. This milestone reinforces my commitment to advancing my skills in the ever-evolving field of cybersecurity.
To view or add a comment, sign in
Attended Osun State University
5moGreater heights in Jesus' name