@Hadejia_snr Profile picture

Mohammed Usman

@Hadejia_snr

Sec. Engineer|Bukite| 19™ May | Simple 🔅ⓢⓤⓝⓝ ⓐⓗ ⓦⓐⓨ | Introvert

Similar User
ARAMI 🇳🇬 photo

@esther_hamzat

OJ photo

@jula_jules

Oluwaseun adebayo photo

@Spe_chy

Mydu Mököpotsa photo

@MaboiketloKhal1

Abubakar A. M (QS) photo

@Khalifa_Emgeear

Senator Omar, FNSBMB. photo

@AbuHaps_

Mubarak Sadisu photo

@i_am_Mubarak

Usman GBS photo

@Baffarh_

SALEEM🦁 👑 photo

@maintainlevel

Hamza Abdullahi photo

@HamzaAb50308898

Fiyinfoluwa🦅💙 photo

@FizBlingz

Lucky Moses Adeokhor photo

@LAdeokhor

°This user photo

@SimplyBright5

Mohammed Usman Reposted

The hbar trading Bot AI (HTAI) is an innovative cryptocurrency developed on the Hedera Hashgraph technology, designed to solve one of the key challenges in the network: the ability to place buy and sell orders at specific prices for all HTS tokens available on Hedera.


Mohammed Usman Reposted

Interested in starting a career in Cybersecurity? Check out the Paller Cybersecurity Scholarship. Share with anyone who may be interested in this opportunity 👇🏾 sans.edu/paller-cyberse…

Tweet Image 1

Mohammed Usman Reposted

How DNS Works


Mohammed Usman Reposted

What is most important when securing devices and infrastructures? 1) Multi-factor Authentication (MFA) 2) User Education 3) Strong Passwords 4) Continuous Monitoring


Mohammed Usman Reposted

THESE ARE THE MEANING OF THE FOLLOWING ABBREVIATIONS. 1.) GOOGLE - Global Organization Of Oriented Group Language Of Earth. 2.) YAHOO - Yet Another Hierarchical Officious Oracle. 3.) WINDOW - Wide Interactive Network Development for Office work Solution. 4.) COMPUTER - Common…


Mohammed Usman Reposted

In 1974, Steve Jobs came to India in search for enlightenment. 7 months later, he returned with a philosophy that would later build Apple into a $1 trillion empire. Here’s the philosophy: 🧵

Tweet Image 1

Mohammed Usman Reposted

This cat has very clear logic. I m shocked


Mohammed Usman Reposted

Giving your partner access to your work laptop is another reason we will continue to be in business when it comes to Cybersecurity.


Mohammed Usman Reposted

Roadmap for a SOC analyst??? PS: Each stage is loaded with many learning plans, and tools to master.

Tweet Image 1

Mohammed Usman Reposted

Ethical Hacking: A hands on Introduction to Breaking In!!📚 Save your copy now!!👇📃 drive.google.com/file/d/1LjbDUt…

Tweet Image 1

Mohammed Usman Reposted

50 Soc Analyst Interview Questions from letsdefend.io letsdefend.io/pdf/popular-so… 12 incredible Soc interview questions by Gerald Auger simplycyber.io/post/12-incred…


Mohammed Usman Reposted

Basic Cryptography Cheat Sheet

Tweet Image 1

Mohammed Usman Reposted

Salami Attack: A Salami Attack is a type of cybercrime often utilized for financial gain, where criminals gradually steal money or resources from financial accounts, one small piece at a time. This form of attack involves multiple minor incursions that, when aggregated, can…

Tweet Image 1

Mohammed Usman Reposted

FREE Google Drive link to learn: -Data Analytics -Business Analysis -Data Visualization -SQL -Big Data -Resume tips -Project Mgt -Product Mgt -Software Eng -UI/UX Design -Interview tips and tricks Check this Google drive link: drive.google.com/drive/u/0/fold… Share this! Someone on…

Tweet Image 1

Mohammed Usman Reposted

For those who want to become Rust experts 📘 A pretty solid book for system programming with Rust covering a variety of use-cases, including cryptography. ⭐️ github.com/francoposa/pro…


Mohammed Usman Reposted

In case you're really passionate to learn about cybersecurity, @_Rega_n is organizing a free boot camp to help total newbies transition into cybersecurity effortlessly. Dm me,if you're interested. Class starts soon!!!!!


Mohammed Usman Reposted

Indian Government introduces a platform for free courses on: - cybersecurity - data analytics - data engineering - full stack web development - corporate communication swayam-plus.swayam2.ac.in/courses


Mohammed Usman Reposted

ChatGPT Prompt Frameworks;

Tweet Image 1

Mohammed Usman Reposted

Skills Required in Different IT Sectors CyberSecurity: *Linux *Networking *Coding *Analytic Mind Software Engineer: *Python *Java *Scala *C++ Web Development: *HTML *CSS *JavaScript *PHP Network Engineer: *Networking *Analytic Mind *Communication *Documentation Game…


Loading...

Something went wrong.


Something went wrong.