Rafin Rahman Chy

@rafinrahmanchy

Information Security Researcher | Programmer

Chittagong, Bangladesh
Vrijeme pridruživanja: veljača 2015.

Tweetovi

Blokirali ste korisnika/cu @rafinrahmanchy

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rafinrahmanchy

  1. Poništi
  2. 21. sij

    Prerequired Certifications Before Getting Started with Cyber Security *ITF+ *A+ *CCNA/Network+ *MCSA *Linux+ *Server+ *Cloud+ [ n.b. Depends on the IT security domain(s) you wanna work with. ]

    Poništi
  3. 12. sij

    Things You Should Include to Enhance Your Resume for IT Security *Certs *Academic background *Past experience of working *CTF playing experience *Crowdsourced security/bug bounty achievements *Soft skills *Projects you've worked on

    Poništi
  4. 6. sij

    Ways to Learn Ethical Hacking *Certifications (CEH, OSCP, Pentest+) *Online training courses (Udemy, Cybrary) *Books *Forum/Blogs *Video sharing sites (Youtube, Vimeo, Twitch) *Webinars *Mentor

    Poništi
  5. 27. pro 2019.

    Soft Skills Which Every IT Security Professional Should Need *Communication skill *Creativity *Critical thinking *Problem solving *Professionalism *Smart *Quick learner *Honest *Friendly *Motivated

    Poništi
  6. 27. pro 2019.

    🔰Friday Security Tip🔰 Avoid downloading apk file from mirror sites. Often they contains malicious payload which is used to steal user information.

    Poništi
  7. 18. pro 2019.

    Required Skills for Facebook Bug Bounty *Web App Pentesting *Facebook API *graphQL *Burp Suite *Studying PoCs

    Poništi
  8. 17. pro 2019.
    Poništi
  9. 17. pro 2019.
    Poništi
  10. 16. pro 2019.

    Best Books for C|EH v10 Exam Preparation *Certified Ethical Hacker (CEH) Foundation Guide *Certified Ethical Hacker Complete Guide *Certified Ethical Hacker (CEH) V10 Full Exam Preparation

    Poništi
  11. 16. pro 2019.

    How Ethical Hackers Earn from Online? *Remote IT security professional *Freelancing *Selling courses and ebook *Bug bounty hunting *Selling self-made tools (e.g. KNOXSS) *Content creator (e.g. blog, Youtube)

    Poništi
  12. 9. pro 2019.

    Email-Based Cyber Attacks *Email hoax *Email bomb *Malware distribution *Email account hijacking *Email spoofing *Email tracing

    Poništi
  13. 8. pro 2019.

    Where Ethical Hacker/InfoSec Professionals Work? *Government organization *Law-enforcement agency *Intelligence organization *Military *Tech company *Corporate *Bank *Airport *Cybersecurity company *Training institution

    Poništi
  14. 8. pro 2019.
    Poništi
  15. 8. pro 2019.

    Information Gathering Methodologies *Social Engineering *Doxing *OSINT *Advanced Google Search/Google Hacking *DNS Enumeration *Internet Archive *Dumpster Diving

    Poništi
  16. 8. pro 2019.
    Poništi
  17. 3. pro 2019.

    Email Hacking Methods *Phishing *Security Question Bypassing *Brute-force Attack *Sniffing Credentials Using Malware *Compromising SIM Card/Recovery Email Account *SS7 Attack *MiTM Attack

    Poništi
  18. Poništi
  19. 23. stu 2019.
    Poništi
  20. Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·