NewStats: 3,263,657 , 8,180,919 topics. Date: Saturday, 07 June 2025 at 06:24 AM u4522

6382y

Soutechremote's Posts h6u4

Soutechremote's Posts

(1) (of 1 pages)

soutechremote(m): 6:49pm On May 18
ive Reconnaissance Using Google Dorks, GHDB, and the Wayback Machine Part 1


https://www.youtube.com/watch?v=Re4ZKKkm8-k&t=29s

Google Dorking & ive Reconnaissance Lab | Ethical Hacking Tutorial (Step-by-Step) 🔍
đź’Ł ive Reconnaissance Using Google Dorks, GHDB, and the Wayback Machine!


Ready to uncover the internet’s hidden secrets? In this hands-on lab, I walk you through Google Advanced Searches, Google Hacking Database (GHDB), and the Wayback Machine to perform ive reconnaissance like a pro ethical hacker. 🕵️‍♂️ Whether you're prepping for your Cisco Ethical Hacker, CompTIA Pentest, CEH or just love cybersecurity, this tutorial is a must-watch!

🎯 What you'll learn:
âś… Google Dorking techniques to find sensitive data
âś… Exploring GHDB for real hacker dorks
âś… Using the Wayback Machine to uncover archived secrets
âś… How hackers gather intel without triggering alarms
âś… Real-world applications for ethical hacking & penetration testing

🧠 Level up your cyber skills with this practical walkthrough and start using Google like a hacker. This is the kind of intel gathering that ethical hackers use to get ahead—and stay legal.

Check complete playlist for the ethical hacker course:

https://www.youtube.com/playlist?list=PLmi6GtTayDkdiQzG7A4CLvSjSZbXFJxeq

Dont forget to subscribe and share to stay updated.
soutechremote(m): 8:15am On Nov 19, 2022
Interested in Data Science- Analytics and Machine Learning


SOUTECH Academy organizes as free remote session for interested prospects.


Date: ( Sat-19th and Sun- 20th Nov 2022)

Venue: Zoom, WhatsApp

*Data Science* (Python, SPSS/Jamovi, Research Methods, BI with Google Data Studio )
Want to become a data analyst? Then the SOUTECH Academy custom made data science course is for you. Starts with a introduction to the python programming language, python libraries eg- numpy, pandas, pandas with some visualization libraries like matplotlib and seaborn. The course progresses with three machine learning algorithm- linear regression, logistics regression and deciscion tree.
Research Methods and Data analysis using SPSS/Jamovi is next with exhaustive hands on for participants.
The course course concludes with case studies for sales, business data intelligence using Google Data Studio.

Duration: 5 weekends + 3 weeks follow up projects


*Get started with the Initial 2 Classes for free*


SOUTECH REMOTE ACADEMY is inviting you to a scheduled Zoom meeting.

Topic: SOUTECH REMOTE ACADEMY's Zoom Meeting
Time: Nov 19, 2022 11:00 AM West Central Africa

Zoom Meeting
https://us05web.zoom.us/j/88677210984?pwd=enBEZXJSVnVicHhLSUFTVXRFWFVGZz09

Meeting ID: 886 7721 0984
code: soutech



Kindly forward to interested persons

Thanks

#teamSOUTECH
www.soutechventures.com/courses
Abuja, Owerri, Remote


If interested send a message to s. link at time

Via WhatsApp u will be added to a mentorship group ASAP.


Thank.
soutechremote(m): 8:30pm On Nov 08, 2022
Digital Forensics and Cyber Security Free Guide


https://www.youtube.com/watch?v=jH2hrbm_HgE&list=PLmi6GtTayDkcqc21yiwejvT-r8pQh5R7B

Learning objectives
--------------

-Goals of computer forensics
-Pursuing a career in computer forensics
-Using open source and digital forensic tools
-File system fundamentals
-Acquiring data, preserving and presenting evidence data
-Ensuring data integrity
-Generating a digital forensic report


Modules

1. Introduction and Understanding Computer Forensics:
- Goals, History, Types of Investigation, Tools, Legal Implication, Current and Future Trends, Challenges, Anti-forensic Techniques, Compliance and Forensics, Cyber security and Forensics


https://www.youtube.com/watch?v=jH2hrbm_HgE&list=PLmi6GtTayDkcqc21yiwejvT-r8pQh5R7B&index=1

2. Careers and Aspects of Digital Forensics:
- Network, Operating System, Web Application, Cloud, Malware, Mobile and Email Forensics, Digital Forensic Certifications

3. Preparing for an Investigation:
- Tools and Knowledge Requirements, Hardware, Software, Understanding Hex Numbers, Forensic OS Distributions

4. File System Fundamentals:
- Boot sequence, Disk Drives, Master Boot Record(MBR),Partitions

5. Cryptography, Cracking And Steganography
- Cryptography Concepts and Types, Cracking methodologies, Hiding Files and revealing hidden files during forensic investigations

6. Acquiring Data and Preserving Data
- Data Aquizition approaches, static acquisition with open-source tools, dcfldd software, commercial tools for acquiring data, memory dump analysis with volatility.
- Evidence Preservation approaches, Role of Write blockers, Software and Hardware Write blockers, Hashing and File Integrity and Algorithms, FTK Imager, Understanding Disk Mounting.


https://www.youtube.com/watch?v=JRJITjuWc-k&list=PLmi6GtTayDkcqc21yiwejvT-r8pQh5R7B&index=8

7. Analyzing Data and Presentation Of Digital Evidence
- Forensic Data Analysis, Staganography, Generating Reports,


Tools for the course
---------------------
-Windows and Linux Operating System
-Autopsy
-VMware
-Hex Workshop
-dcfldd
-Volatility Foundation
-FTK Imager
-Openstego
-Wireshark
-VirusTotal
-Sucuri
-Bulk Extractor
-DD Linux Utility
-SysInternal
-GParted
-BinaryHexConverter.com


Inbox if you need further guide and mentorship.
thanks
soutechremote(m): 12:20am On Nov 04, 2022
You can learn these programs

1. Cisco Cybersecurity Essentials

https://www.youtube.com/watch?v=dBvA-3hJV0c&list=PLmi6GtTayDkeMVTTktKD56AUoGovV5ubG

Has about 20+ Hands on Labs and remote digital exam and digital badge

2. Cisco Information Technology Essentials

https://www.youtube.com/watch?v=5jWTDrmthJ4&list=PLmi6GtTayDkfJZkLoSKIJWRW1bNMSyqJG

This has about 30+ Hands on Labs and remote digital exam and digital badge


3. Cisco Cybersecurity Operations Associate

https://www.youtube.com/watch?v=dBvA-3hJV0c&list=PLmi6GtTayDkeMVTTktKD56AUoGovV5ubG

This has about 40+Hands on Labs and remote digital exam and digital badge


As an accredited CISCO Academy you can get training, certification and digital badges and transcript for your learnings like

https://credly.com//victor-chidi-okpuruka

Start learning by watching the comprehensive videos on the channel and comment or check signature if you need assistance

All the best in your tech career!

soutechremote(m): 12:06am On Nov 04, 2022
Hello
You can always watch the complete video of the training on youtube
CyberOps is 28 Modules on NetAcad

As an accredited CISCO Academy you can get training, certification and digital badges and transcript for your learnings like

https://credly.com//victor-chidi-okpuruka

Use my s in signature

Connect on youtube or for any assistance you need.
soutechremote(m): 3:47pm On Oct 26, 2022
Thanks for your response.
You can reach me via my bio
check out this video to see awesome entry level jobs you can get started with. - see you at the top- mentorship available


https://www.youtube.com/watch?v=-KbHLLdWkqE
soutechremote(m): 7:10am On Oct 16, 2022
Complete Training Modules for CISCO CyberOps Associate


https://www.youtube.com/watch?v=dBvA-3hJV0c&list=PLmi6GtTayDkeMVTTktKD56AUoGovV5ubG


CyberOps Associate v1.0 covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC).

Upon completion of the CyberOps Associate v1.0 course, students will be able to perform the following tasks:


-Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events.
-Explain the role of the Cybersecurity Operations Analyst in the enterprise.
-Explain the Windows Operating System features and characteristics needed to cybersecurity analyses.
-Explain the features and characteristics of the Linux Operating System.
-Analyze the operation of network protocols and services.
-Explain the operation of the network infrastructure.
-Classify the various types of network attacks.
-Use network monitoring tools to identify attacks against network protocols and services.
-Explain how to prevent malicious access to computer networks, hosts, and data.
-Explain the impacts of cryptography on network security monitoring.
-Explain how to investigate endpoint vulnerabilities and attacks.
-Evaluate network security alerts.
-Analyze network intrusion data to identify compromised hosts and vulnerabilities.
-Apply incident response models to manage network security incidents.


Tools


There are a number of tools and resources that are available to you that will help you in your journey as you develop your CyberOps skills and prepare for job opportunities.


Lab Environment


In this course, two virtual machines (VM) are used: CyberOps Workstation and Security Onion. These VMs provide all of the applications and latest security monitoring and network intrusion analysis capabilities needed for the course.


The minimum RAM memory requirement to run CyberOps Workstation virtual machines is 1 GB. However, for the Security Onion virtual machine, 4 GB RAM is recommended. The RAM memory recommendation on Security Onion VM allows the services, such as network security monitoring (NSM), to function properly.


Installation labs are available in the course and provide detailed steps to properly set up your VMs and the lab environment.


About Security Onion

Security Onion is developed by Security Onion Solutions. Security Onion is made available under GPL license. This course uses provides basic training in the use of Security Onion to validate the objectives of this course. For further training needs, visit the Security Onion Solutions developer site.


https://www.youtube.com/watch?v=dBvA-3hJV0c&list=PLmi6GtTayDkeMVTTktKD56AUoGovV5ubG

Let me know if you need any cyber security skill up questions and

Thanks

soutechremote(m): 8:53pm On Oct 14, 2022
Free Complete Project Management Training Guide- All Knowledge Areas Covered


https://www.youtube.com/watch?v=q3OA3AsWeYI&list=PLmi6GtTayDkfJbzTgOoYgttQHTOJlXTo0


During this training, you will learn that being a project management consultant is an exciting place to be. You will also understand how project managers help shape the success of organizations, implement new technology, change the business landscape, and have influence over all areas of a business. Project managers also earn a nice income and often move up the organizational chain into full-time management positions.

In this course, we will examine the absolute basics of project management. Everyone has to start somewhere, right? In this fundamental course, we will explore the big picture of project management and the project management life cycle. You’ll finish this course with a great grasp of what project management is, what your roles and responsibilities as a project manager will be, and how to move forward in your career as a project manager.

Just as this course is designed for people that are new to project management. It is also structured to give you a solid foundation of project management and to help you speak the project management language. Don’t worry this course is easy to follow, has a logical approach, and has a fun, can-do attitude in its delivery.

Project managers use processes to move things forward. These processes are universal to all projects regardless of the industry you may work in. These processes are grouped into logical chunks and that’s our primary focus of the course. You’ll also learn the major components of the project management lifecycle:

-Initiating the project
-Planning the project
-Executing the project
-Monitoring and controlling the project
-Closing the project

soutechremote(m): 7:30pm On Oct 13, 2022
I explained a wide range of career options and roles then looked at 5 certifications you can get to get you an entry level role within 30 days even if you have zero experience...


https://www.youtube.com/watch?v=XCFoqRK72yM


Let me know your thoughts and

Willing to offer assistance to anyone interested in starting a career in cybersecurity ...

soutechremote(m): 4:03pm On May 19, 2020
nice one
Awesome

(1) (of 1 pages)

(Go Up)

Sections: How To . 33
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or s on Nairaland.