Infosec Learning
13.1K subscribers
665 photos
43 videos
61 files
843 links
Building Future Gladiator and Biggest Consultants
Download Telegram
need ur support
๐Ÿ‘2
๐Ÿ”ฅ Cyber Security Talent Wanted! ๐Ÿšจ
SOC L1, L2, L3 Analysts with Strong Splunk Expertise
(Join in 30 Days!)
CyberGate Defense is rapidly expanding its Security Operations Center (SOC) team and is looking for passionate, skilled, and results-driven SOC Analysts across all levels (L1, L2, L3) to join us! If you have a proven track record in threat detection, incident response, and deep expertise with Splunk, we want to hear from you.
Location: Abu Dhabi, UAE
Employment Type: Full-time
We are seeking individuals who can hit the ground running and make an immediate impact. A critical requirement for these roles is the ability to join our team within 30 days of an offer acceptance

To Apply: Please share your profile to Recruiting@cybergate.tech

Please mention the SOC level (L1, L2, or L3) you are applying for in the subject line of your email.
โค2๐Ÿ‘1
โค6๐Ÿ‘1๐Ÿฅฐ1
โค13๐Ÿ‘3๐Ÿ‘1
๐Ÿ”ฅ10๐Ÿ‘6โค1๐Ÿ†1
Risk Appetite: Company says โ€˜spicyโ€™, CISO hears โ€˜mildโ€™, attackers serve โ€˜extra hotโ€™
๐Ÿ˜20
โค8๐Ÿ‘1
Our popular CISSP Practice Session groupโ€”which made a significant impact has been removed after reports from some members. ๐Ÿ™‚

Donโ€™t worry; weโ€™re creating a new group and will continue to provide our services.
๐Ÿ‘67โค26๐Ÿ’”6๐Ÿ‘3๐Ÿ”ฅ2๐Ÿ˜ข2๐Ÿ˜ญ1
โค12๐Ÿ‘2
Network Security Foundation Master Class: learn core networking types, media and devices every blue-team analyst must know. We break down PAN-LAN-WAN, analog vs digital transmission, wired vs wireless links, plus hub-switch-router-firewall roles. Finish with real-world media-selection metrics (bandwidth, latency, jitter) so you can spot risks and harden any network.

WHAT YOUโ€™LL LEARN
Scope-based network types: PAN, LAN, WLAN, CAN, MAN, WAN, GAN and SAN
Analog vs digital transmissionโ€”why noise and modulation matter for security
Wired vs wireless media: coax, twisted pair, fiber, radio, microwave, infrared
Key devices and their weak spots: hub, switch, router, modem, firewall
Performance metrics that expose risk: bandwidth, throughput, latency, jitter, BD
โค4๐Ÿ‘1