![CYBERWOX](/img/default-banner.jpg)
- 356
- 3 473 160
CYBERWOX
United States
Приєднався 19 лип 2020
Hi, I'm Day. I'm on a mission to decode the fusion between engineering & life.
📧 day@cyberwox.com
All opinions are mine and not those of my employer.
📧 day@cyberwox.com
All opinions are mine and not those of my employer.
Cybersecurity Engineering Careers: Endpoint, SIEM, Threat Intelligence & Automation | Part 2
Cybersecurity Engineering Careers: Endpoint Security, SIEM Engineering, Threat Intelligence & Automation/SOAR Engineering
TIMESTAMPS:
00:00 Intro
00:34 Endpoint Security Engineer
04:30 SIEM Engineer
08:40 Threat Intelligence Engineer
12:07 Security Automation/SOAR Engineer
15:30 Final Thoughts
_____________
🧬 CYBERWOX RESOURCES
🔹Cyberwox Unplugged Newsletter: cyberwox.substack.com/
🔹Cyberwox Cybersecurity Notion Templates for planning your career: daycyberwox.gumroad.com/l/cyberlearningframework
🔹Cyberwox Best Entry-Level Cybersecurity Resume Template: daycyberwox.gumroad.com/l/cybersecurityresume
_____________
💼 CAREER RESOURCES
🔹Learn AWS Threat Detection with my LinkedIn Learning Course: www.linkedin.com/learning/introduction-to-aws-threat-detection/
🔹Get Started with the Google Cybersecurity Certificate: imp.i384100.net/B0Kz3J
🔹Get Started with the Microsoft Cybersecurity Certificate: imp.i384100.net/baPM4v
🔹Get Started with Course Careers [Code DAY50 for $50 off]: account.coursecareers.com/ref/72109/
_____________
⚙️ OTHER RESOURCES
🔹My Content Equipment, Book Recommendations & Desk Setup: www.amazon.com/shop/daycyberwox
_____________
⚡️JOIN CYBERWOX ACADEMY ON DISCORD!
discord.gg/cyberwoxacademy
_____________
📱 LET'S CONNECT
IG: daycyberwox
Twitter: DayCyberwox
Linkedin: www.linkedin.com/in/dayspringjohnson/
Tiktok: www.tiktok.com/@cyberwox
Email: day@cyberwox.com
_____________
#️⃣ Relevant Hashtags
#cybersecurity #cybersecurityengineer #cloudcomputing #cloudsecurity #technology #tech #dallas #texas #cloud
_____________
⚠️DISCLAIMER
This video description has some affiliate links, and I may receive a small commission for purchases made through these links. I appreciate your support!
TIMESTAMPS:
00:00 Intro
00:34 Endpoint Security Engineer
04:30 SIEM Engineer
08:40 Threat Intelligence Engineer
12:07 Security Automation/SOAR Engineer
15:30 Final Thoughts
_____________
🧬 CYBERWOX RESOURCES
🔹Cyberwox Unplugged Newsletter: cyberwox.substack.com/
🔹Cyberwox Cybersecurity Notion Templates for planning your career: daycyberwox.gumroad.com/l/cyberlearningframework
🔹Cyberwox Best Entry-Level Cybersecurity Resume Template: daycyberwox.gumroad.com/l/cybersecurityresume
_____________
💼 CAREER RESOURCES
🔹Learn AWS Threat Detection with my LinkedIn Learning Course: www.linkedin.com/learning/introduction-to-aws-threat-detection/
🔹Get Started with the Google Cybersecurity Certificate: imp.i384100.net/B0Kz3J
🔹Get Started with the Microsoft Cybersecurity Certificate: imp.i384100.net/baPM4v
🔹Get Started with Course Careers [Code DAY50 for $50 off]: account.coursecareers.com/ref/72109/
_____________
⚙️ OTHER RESOURCES
🔹My Content Equipment, Book Recommendations & Desk Setup: www.amazon.com/shop/daycyberwox
_____________
⚡️JOIN CYBERWOX ACADEMY ON DISCORD!
discord.gg/cyberwoxacademy
_____________
📱 LET'S CONNECT
IG: daycyberwox
Twitter: DayCyberwox
Linkedin: www.linkedin.com/in/dayspringjohnson/
Tiktok: www.tiktok.com/@cyberwox
Email: day@cyberwox.com
_____________
#️⃣ Relevant Hashtags
#cybersecurity #cybersecurityengineer #cloudcomputing #cloudsecurity #technology #tech #dallas #texas #cloud
_____________
⚠️DISCLAIMER
This video description has some affiliate links, and I may receive a small commission for purchases made through these links. I appreciate your support!
Переглядів: 1 373
Відео
Detecting Privilege Escalation Techniques in Microsoft 365 ~ Detection Opportunities EP 5
Переглядів 712День тому
Learn how to decipher the Microsoft Unified Audit Log (UAL) from a Digital Forensics & Incident Response (DFIR) perspective with Purav Desai, an experienced M365/Azure Incident Responder. Purav's LinkedIn: www.linkedin.com/in/purav-da346393/ Deciphering UAL: github.com/PuravsPoint/DecipheringUAL TIMESTAMPS: 00:00 Intro 00:20 Deciphering New-RoleGroup 09:06 Key Fields 10:11 Deciphering with Exch...
DevSecOps - How To Securely Containerize A Python App With ChainGuard
Переглядів 1,3 тис.14 днів тому
Get started with ChainGuard: go.chainguard.dev/3VKAAJK Try out this DevSecOps project and learn AWS, Infrastructure as Code (CloudFormation), docker, docker scout, docker files, container security, chainguard, bash, and python :) Chainguard Demo Repo: github.com/daycyberwox/chainguard-demo Chainguard Images: images.chainguard.dev/ Docker Setup: medium.com/@nifemi.sofowoke/configuring-a-3-node-d...
Microsoft 365 Forensics & Incident Response w/ Purav Desai ~ Detection Opportunities EP 4
Переглядів 1,5 тис.14 днів тому
Learn how to decipher the Microsoft Unified Audit Log (UAL) from a Digital Forensics & Incident Response (DFIR) perspective with Purav Desai, an experienced M365/Azure Incident Responder. Purav's LinkedIn: www.linkedin.com/in/purav-da346393/ Deciphering UAL: github.com/PuravsPoint/DecipheringUAL Learn about auditing solutions in Microsoft Purview: learn.microsoft.com/en-us/purview/audit-solutio...
Investigating Microsoft Defender Bypass with Splunk - TryHackMe New Hire Old Artifacts
Переглядів 1,8 тис.21 день тому
TryHackMe New Hire Old Artifacts: tryhackme.com/r/room/newhireoldartifacts TIMESTAMPS: 00:00 Intro 01:28 Malicious Password Viewer 05:48 Suspicious Binaries 13:09 Outbound C2 Communication 16:41 Registry Key Manipulation - Defender Bypass 19:04 Killing Processes and Deleting Binaries 24:44 Windows Defender Tampering 29:43 Threat IDs? 35:13 Another Malicious Binary 41:14 DLL Sideloading 43:30 Ou...
From Olympic Athlete To Cloud Engineer w/ @REXTECH9 | CYBER STORIES EP 18
Переглядів 1,1 тис.28 днів тому
Today’s episode is with a friend, Ifeanyi Otuonye, and we discuss everything involving his past life as an Olympic Athlete and the journey to becoming a Cloud Engineer. IFEANYI's STUFF: LinkedIn: www.linkedin.com/in/ifeanyi-otuonye/ Twitter/X: x.com/ifeanyi_otuonye Blog/Medium: medium.com/@ifeanyiro 🧬 CYBERWOX RESOURCES 🔹Cyber Stories Podcast: ua-cam.com/play/PLDqMNdDvMsRkIPsQdNvRnT9wEEyl3hr-A....
I Asked Cybersecurity Managers How To Get Hired
Переглядів 27 тис.Місяць тому
How To Get A Threat Detection or Incident Response Engineer, according to Cybersecurity Managers. TIMESTAMPS 00:00 Intro 00:18 Answer 1 01:22 Answer 2 04:59 Answer 3 07:44 SANS Certification Equivalents 11:34 Answer 4 13:04 Answer 5 15:04 Answer 6 16:00 Scripting 16:10 Answer 7 16:56 Answer 8 18:08 Other Answers 18:26 Final Thoughts 🧬 CYBERWOX RESOURCES 🔹Cyberwox Unplugged Newsletter: cyberwox....
Python Strings, Variables & Inputs ~ Python for Cybersecurity 1
Переглядів 2,2 тис.Місяць тому
Sharing my understanding of some foundational Python concepts. TIMESTAMPS: 00:00 Intro 01:17 Setup 02:05 Print Function & Commenting 03:08 Numbers & Math 04:40 Boolean Values 06:23 Variables & Strings 10:14 Input Function 18:32 Conclusion 🧬 CYBERWOX RESOURCES 🔹Cyberwox Unplugged Newsletter: cyberwox.substack.com/ 🔹Cyberwox Cybersecurity Notion Templates for planning your career: daycyberwox.gum...
Learn Cybersecurity FASTER in 2024 - Trainings, Certifications & Courses
Переглядів 9 тис.Місяць тому
Learn Cybersecurity FASTER in 2024 - Trainings, Certifications & Courses
Investigating Microsoft Windows Exploitation and Malware Delivery with Splunk
Переглядів 1,2 тис.Місяць тому
Investigating Microsoft Windows Exploitation and Malware Delivery with Splunk
Modern Detection Engineering w/ Jimmy Vo | CYBER STORIES EP 16
Переглядів 1,5 тис.2 місяці тому
Modern Detection Engineering w/ Jimmy Vo | CYBER STORIES EP 16
Cybersecurity Engineering Careers: CorpSec, Threat Detection & Incident Response Engineers | Part 1
Переглядів 4,3 тис.2 місяці тому
Cybersecurity Engineering Careers: CorpSec, Threat Detection & Incident Response Engineers | Part 1
what i wish i knew before becoming a cybersecurity engineer ~ Day's Engineering Dairy EP9
Переглядів 7 тис.2 місяці тому
what i wish i knew before becoming a cybersecurity engineer ~ Day's Engineering Dairy EP9
Analyzing Attacker Recon to Malware Installation with Splunk
Переглядів 1,3 тис.3 місяці тому
Analyzing Attacker Recon to Malware Installation with Splunk
The Cybersecurity Incident Response Life Cycle Explained
Переглядів 1,5 тис.3 місяці тому
The Cybersecurity Incident Response Life Cycle Explained
Investigating a Windows Intrusion Attack with Splunk | TryHackMe Investigating with Splunk
Переглядів 2,6 тис.3 місяці тому
Investigating a Windows Intrusion Attack with Splunk | TryHackMe Investigating with Splunk
2024 Remote Cybersecurity Setup + Flexispot C7 Review
Переглядів 6 тис.3 місяці тому
2024 Remote Cybersecurity Setup Flexispot C7 Review
Splunk Processing Language For Cybersecurity Investigations - TryHackMe Exploring SPL
Переглядів 2,2 тис.3 місяці тому
Splunk Processing Language For Cybersecurity Investigations - TryHackMe Exploring SPL
Redline InfoStealer Malware Analysis with Wireshark & ANY.RUN
Переглядів 3,7 тис.4 місяці тому
Redline InfoStealer Malware Analysis with Wireshark & ANY.RUN
Splunk SIEM Basics for Cybersecurity - TryHackMe Splunk 101
Переглядів 2,7 тис.4 місяці тому
Splunk SIEM Basics for Cybersecurity - TryHackMe Splunk 101
how my cybersecurity career progressed fast ~ Day's Engineering Dairy EP8
Переглядів 3,8 тис.4 місяці тому
how my cybersecurity career progressed fast ~ Day's Engineering Dairy EP8
Malicious Cryptominer: Cybersecurity Investigation - TryHackMe Intro to SIEM
Переглядів 1,3 тис.4 місяці тому
Malicious Cryptominer: Cybersecurity Investigation - TryHackMe Intro to SIEM
The Future Of Online Cybersecurity: Browser Security
Переглядів 2 тис.5 місяців тому
The Future Of Online Cybersecurity: Browser Security
SIEM Capabilities for SOC Analysts, Threat Hunters, Detection Engineers & Incident Responders
Переглядів 2,6 тис.5 місяців тому
SIEM Capabilities for SOC Analysts, Threat Hunters, Detection Engineers & Incident Responders
What is a SIEM? (Security Information & Event Management)
Переглядів 11 тис.5 місяців тому
What is a SIEM? (Security Information & Event Management)
my cybersecurity career focus for 2024 ~ Day's Engineering Diary EP7
Переглядів 2,8 тис.5 місяців тому
my cybersecurity career focus for 2024 ~ Day's Engineering Diary EP7
i quit my cybersecurity engineering role at Datadog ~ Day's Engineering Diary EP6
Переглядів 19 тис.6 місяців тому
i quit my cybersecurity engineering role at Datadog ~ Day's Engineering Diary EP6
Analyzing AWS Cloud Defense Evasion Using GuardDuty
Переглядів 1,3 тис.6 місяців тому
Analyzing AWS Cloud Defense Evasion Using GuardDuty
DevSecOps - Indirect Poisoned Pipeline Execution | TryHackMe AOC Day 21
Переглядів 13 тис.6 місяців тому
DevSecOps - Indirect Poisoned Pipeline Execution | TryHackMe AOC Day 21
Investigating an AWS Cloud Exfiltration Attack with Google Sheets & CloudWatch
Переглядів 1,1 тис.6 місяців тому
Investigating an AWS Cloud Exfiltration Attack with Google Sheets & CloudWatch
Real ones makes it to these comments 😂😂
As a threat intelligence engineer you need some form of education. Mostly bachelors. Threat intel can be broken into so many areas but a good experience with SQL, Python, Research(I mean going out there to look for TA and TTP) and SIEM or EDR tools would come a long way. Remember guys you dont need a degree but keep in mind you are going up agains people with masters or bachelors in computer science and months of internships. I can't tell you how to even the playing ground but just keep that in mind
Awesome vid day! I think CCD is really underrated rn and deserves more HR recognition unlike useless certs like CEH lol
No wazuh??
Cisco has a campus near me. I was considering keeping my focus on Splunk and Cisco products. Does this type of work require a lot of programming knowledge? I’m interested in Network Security Engineering
Is it programming?
Agreed
These comments are scaring me lol 😂 I just enrolled into WGU and I am taking Project+ for term 1
just FYI, this video is being used on a channel called "Tool Explainer" that is using it as an informational video to sell the software through Telegram. They have my video as well as i was hit with this software. It really sucked.
Thankfully it’s been taken down🙌🏽
@@DayCyberwox i reported it and was searching for the channel today. just have to keep an eye out for these farkers. It's just amazing to me how these people survive. I do appreciate all of the work you put into your vids and i wouldn't have found them without the scammer but UGH so annoying.
Thank you so much for your videos and insight :)
You are so welcome!
Where do i get other people's projects to learn?
Thank you so much
These are the worst types of YT videos. Nothing about job at all. Just an attention seeking kid flexing and licking his fingers in an absolute cringfest. The fact that people actually set cameras up and take the time to do this stuff is insane.
Lets gooo!
Noice
Great content ❤ Anything is possible
This cert is good for cloud security engineer (cybersecurity) However, I feel like it's not that popular compared to the solution architect no?
I really regret not taking Sophia's Project Management course, which is open book, before I re-enrolled. Had I done my research I would have found out that it was an option, and I would have avoided this mess. This stupid certification exam should not be a requirement for WGU's Software Engineering BS program.
I have to gain experience at a job I don’t qualify for because leaning the material isn’t good enough? 😂
Nice video man 💪
🙌🏽
Hey Day, thank you for posting this content. I know you’re big on AWS, but it’s nice to see you sharing M365 Modern Work/Security information. These skills are in high demand in Dallas-Fort Worth. For example, American Airlines is actively looking for someone knowledgeable in Purview (data labeling). Companies are finally investing in Microsoft E5 licenses, so tools like Endpoint/Intune, Defender, Purview, and Sentinel are seeing massive demand. Given the current low supply of these skills, those who possess them can expect attractive compensation packages. Another opportunity is with TRWD, which is offering $120,000 for someone to manage endpoint/Intune, and no certifications are required for this position.
That’s very insightful!
I guess I am lost Ive trying to get into cybersecurity and just the over all IT world I've been doing IT since 2009 through my prior jobs Ive always been the tech guy for most companies I worked for even though it was not my profession and I have a high motivation and forever a student always wanting to learn and learn and learn some more I'm passionate about it and cybersecurity is amazing field but I can't seem to ever get into the door despite how motivated I am and I am still applying for them as we speak hoping to get at least the door open but no one is giving me the chance to interview. I'm lost and do not know what to do to make it in.
Thank you to both of you. Great video. Well explained, izzy. I dont know, but i do like you.
you literally speak at 2x speed 😫 so hard to hear you 😔
Thank you for this vide5. Which one is better after passing sec+, SOC analyst course or cysa+ course? Thank you.
Then what do i do? Ive seen so many videos that support them and then others like this. Where do i even start?
Are you actually talking that fast or did u speed it up?
dude, thanks for taking the time to make these!
Really they don't help you get your jobs yet companies require that you have these certifications in order to get it jobs, I'm confused if you don't really need them then how do you get these cybersecurity jobs without them
thanks for your insights on Docker Scout and Chainguard, I’ll be using them.
That’s exciting👌🏽
AI IS TAKING OVER NO NEED FOR A HUMAN TO MANUALLY CHECK FOR ALERTS IF I CAN PROGRAM THE COMPUTER TO DO SO ND NOT PAY...BETA CREATE A BISS BUY CRYP WHILE U CAN...
🔥
Cdsa is better than both
You need experience for entry level? Then don't write entry level.
When I finish configuring the Network adapters and run the pfsense CE in vmware, it asks me to purchase a license. Is that the only way to setup network?
Great video. Just to be clear. E-7 is not guaranteed. It’s the possibility of a rank up to E-7. At the very least, it’s just a great marketing strategy to fill critical operational needs. I highly doubt the Marine Corps will be handing out E-7 like candy, especially to random young civilians. Peace
by the way, you are amazing. thank you so much, this is literally what I am passionate about. I slowly found that out through dedication and trust in my beliefs. Thank you for making it easier for me to figure this out and giving me an eye-opener. I appreciate it!
This is awesome and practical. Thanks Day!
You’re welcome!
Gotta do this ourselves when we get a chance exactly what we needed 🙏🏿
Wow… I’m up at 2:00AM seeing this video and I’m not feeling sleepy. Getting my Solutions Architecture Exam this week and this motivated me and gave me useful insights…God bless you guys
Thank you very much
in security onion, when I type sudo so-allow. it says Please use the Configuration section in SOC to allow hosts
apparently security onion 2.4 does not run on centos 7. Also the so-allow command is deprecated and all of the firewall settings is done via the online interface. Unfortunately, firefox times out everytime i try to access the web interface on the ubuntu VM. If anyone else is trying to get this done in 2024, let me know. thanks
@@christ5687 I have similar issue. During install, it shows a loop stating that the sobridge port 13 has entered blocking state and disabled state. If you find a fix, please help
@@christ5687 thanks for the info. I will try to install it on a RHEL9 box...hopefully it works
My dream fr
Hey there, Day! Can you share thoughts about Certified CyberDefender (CCD)?
It's all here: ua-cam.com/play/PLDqMNdDvMsRmPoJhzyB6pSfUTWrPRUvtZ.html&si=7-85HpurI4-BZVvU
@@DayCyberwox Thanks a lot!
is it possible that the search at 8:00 didn't work because you didn't put two \\ after Appdata?
Great catch. Very possible
VMWare does not allow you to select a guest OS anymore, it automatically detects it and its not CentOS7. The security onion installation also does not have alot of the same steps anymore. It doesnt ask for home networks or Bond NICs. I hope it still is set up fine, I followed as closely as possible. Thanks for the tutorial
I will keep watching...❤ Please don't stop thank you for all you do.
Exactly
Great video, I did this challenge recently. Great to see your steps.
Intresting!
Im going to Sans for my Bachelor's. I transfer next year. I'm so excited 🎉🎉❤
All the best!
Nice Video bro. I currently work in GRC and want to transition to Blue Team. Now I am preparing for BTL1. Would you recommend to do PJPT before doing CCD or go straight to CCD after BTL1 ?
Whichever order works as long as you’re learning.
@@DayCyberwox I am not sure if BTL1 is enough to do CCD or if PJPT is basically useless in my case
As a guy working in blue team, I'd reccomend Security+, BTL 1 THM SOC Lvl 1, and CySA+, then something like PJPT
@@ArthurRamirezJ you would not recommend CCD?