Become A Cyber Security Engineer

Earn a bachelor’s degree in information security ,cybersecurity or related field.

High GPA and a strong internship can add practical , Real-World value to this Degree.

Gain a entry level job in an area related to security engineering , such as RISK MANAGEMENT or PROGRAM TESTING

Spend about 4 years gaining professional experience in the field

After 4 years security professionals can qualify for the CISSP credentials through the international information security certification consortium.

Earn a mater in degree in cybersecurity or information security with a focus in security engineering.

GitHub is a web-based interface that uses Git, the open source version control software that lets multiple people make separate changes to web pages at the same time. As Carpenter notes, because it allows for real-time collaboration, GitHub encourages teams to work together to build and edit their site content.

Bluetooth hacking is a technique used to get information from another Bluetooth enabled device without any permissions from the host. This event takes place due to security flaws in Bluetooth technology. Bluetooth hacking is not limited to cell phones, but is also used to hack PDAs, Laptops and desktop computers.

The most common types of Bluetooth attacks

  • BlueSmacking. BlueSmacking is a way to execute a Denial of Service attack against a Bluetooth-enabled device.
  • BlueJacking. BlueJacking sounds like Bluetooth plus hijacking for a reason.
  • BlueSnarfing.
  • BlueBugging.

Tools

  • Super Bluetooth Hack 1.08. This software is used for controlling and reading information from a remote phone via Bluetooth or infrared. …
  • Blue Scanner. …
  • Blue Sniff. …
  • BlueBugger. …
  • BTBrowser. …
  • BTCrawler. …
  • BlueSnarfing.

Global mobile use has been on a major upswing for quite some time. From toddlers who learn to operate a mobile phone before they can even speak to professionals whose phones contain sensitive information. Mobile devices are now like opinions: everyone has at least one they hold very dear.

As…

Social Engineering is an act of stealing
information from humans. As it does not have
any interaction with target system or network,
it is considered as a non-technical attack, Social
Engineering is considered as the art of
convincing the target to reveal information. It
may be physically one-to-one interaction with
the target or convincing the target on…

Sketch2Code is a web based solution that uses machine learning to transform your handwritten notes from an image to a working HTML markup code. And it’s open source!

Just draw your design and convert it to HTML code !!

https://sketch2code.azurewebsites.net/

FIGlet is a simple command-line utility for creating ASCII text banners or large letters out of ordinary text, whereas TOIlet (a sub-command under figlet) is a command-line utility for creating colorful large characters from ordinary text.

Install Figlet in kali linux (2021)

apt-get install figlet

sudo apt-get install figlet

nano .zshrc

(In nano )________________________________________

figlet “ Name You Need”

ctrl+s

Enter

ctrl+x

________________________________________

For more fonts visit :

https://github.com/xero/figlet-fonts

The shell

Shell allows you by use of commands to interact with your computer hence retrieve or store data, process information and various other simple or even extremely complex tasks.

The Variables

Variables are the essence of programming. Variables allow a programmer to store data, alter and reuse them throughout the script.

Conditionals Statements

Conditionals allow…

  • Steganography is a technique of hiding a secret message within an ordinary message and extracting it at the destination.
  • Utilizing a graphic image as a cover is the most popular method to conceal the data in files.
  • Attackers can use steganography to hide message such as list of compromised servers…

BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 2741 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs.

Vishnu prasad

Cyber Security Researcher | CEH

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store