Forwarded from INSA Cyber Talent Center
๐ข Cyber Security Session Announcement ๐
Today weโll be having our intermediate-level cyber security session, focused on an exciting and practical topic:
๐ฏ Todayโs December 15 Topic: CTF (Capture The Flag)
๐ป Mode: Online @insactc
โฐ Time: 2:30 LT Night
In this session, we will explore CTF challenges with real-world scenarios, covering hands-on problem-solving, practical attack & defense techniques, and how these skills apply in real cyber security environments.
Make sure you join on time and come ready to analyze, think critically, and practice ethical hacking ๐ง ๐ป
See you all in the session. Letโs level up! ๐ Share with ur friends ๐
Today weโll be having our intermediate-level cyber security session, focused on an exciting and practical topic:
๐ฏ Todayโs December 15 Topic: CTF (Capture The Flag)
๐ป Mode: Online @insactc
โฐ Time: 2:30 LT Night
In this session, we will explore CTF challenges with real-world scenarios, covering hands-on problem-solving, practical attack & defense techniques, and how these skills apply in real cyber security environments.
Make sure you join on time and come ready to analyze, think critically, and practice ethical hacking ๐ง ๐ป
See you all in the session. Letโs level up! ๐ Share with ur friends ๐
Forwarded from Yekolo Temari (แจแแ แฐแแช)
#ETB #1.3 billion lost to digital fraud and #cyberattacks has increased by #115%, according to the National Bank of Ethiopia.
https://ethiopianreporter.com/148976/
#cybersecurity #fraud #cyberattack #yekolotemari
https://ethiopianreporter.com/148976/
#cybersecurity #fraud #cyberattack #yekolotemari
๐1
Yekolo Temari (แจแแ แฐแแช)
#ETB #1.3 billion lost to digital fraud and #cyberattacks has increased by #115%, according to the National Bank of Ethiopia. https://ethiopianreporter.com/148976/ #cybersecurity #fraud #cyberattack #yekolotemari
ETB 1.3 billion gone to digital ghostsโฆ hackers must be living their best life! Time for stronger passwords, firewalls, and maybe a virtual guard dog๐๐๐ฏ๐ฏ
๐11๐ฅ2
Forwarded from INSA Cyber Talent Center
๐ข Happening Today! Cybersecurity Interview
Weโre excited to announce that tonight we will be hosting a special interview with a cybersecurity professional experienced in both software development and security.
โฐ Time: 2:00 LT (Tonight)
๐ Venue: @insactc
Donโt miss this opportunity to gain practical insights from someone working in the cybersecurity field.
Weโre excited to announce that tonight we will be hosting a special interview with a cybersecurity professional experienced in both software development and security.
โฐ Time: 2:00 LT (Tonight)
๐ Venue: @insactc
Donโt miss this opportunity to gain practical insights from someone working in the cybersecurity field.
โค1
Forwarded from INSA Cyber Talent Center
แจINSA แณแญแ แญ แณแแแต แแแจแ แจแ
แณแ แฅแ แฅแแต แแฎแแซแ แแแแญ แแแข
แแแแฃ แ แ แญแฅ แแ แตแแแแแแญ แแแฐแแปแฝแ แแแฅแญแฑแ แฅแตแญแฑแแธแ!
INSA Cyber โโTalent Center Weekend Training Program will start soon.
@insactc
แแแแฃ แ แ แญแฅ แแ แตแแแแแแญ แแแฐแแปแฝแ แแแฅแญแฑแ แฅแตแญแฑแแธแ!
INSA Cyber โโTalent Center Weekend Training Program will start soon.
@insactc
๐ฅ9
Digital Ethiopia 2025 has been successfully completed, achieving its intended goals to a remarkable extent. Today officially marks the launch of Digital Ethiopia 2030.
I was honored to attend this landmark national event, graciously hosted by H.E. Prime Minister Abiy Ahmed, alongside senior government leaders and high-level ministers. Being invited to participate in such an important moment for the countryโs future was truly a privilege.
The Digital Ethiopia 2030 strategy places strong emphasis on expanding digital accessibility, creating equal opportunities for all citizens, and strengthening trust between citizens and institutions. These pillars form the core foundation of the strategy.
To achieve these objectives, major efforts will focus on expanding public digital infrastructure and ensuring that digital technologies remain human-centeredโempowering citizens and improving everyday life. This vision aligns closely with the governmentโs broader reform agenda to reduce bureaucracy and translate ambitious national strategies into real, measurable impact.
Grateful to be part of this historic milestone in Ethiopiaโs digital transformation journey. ๐ช๐น๐
#DigitalEthiopia2030
#DigitalEthiopia
#DigitalTransformation
#NationalVision
#Innovation
#Leadership
#FutureReadyEthiopia
I was honored to attend this landmark national event, graciously hosted by H.E. Prime Minister Abiy Ahmed, alongside senior government leaders and high-level ministers. Being invited to participate in such an important moment for the countryโs future was truly a privilege.
The Digital Ethiopia 2030 strategy places strong emphasis on expanding digital accessibility, creating equal opportunities for all citizens, and strengthening trust between citizens and institutions. These pillars form the core foundation of the strategy.
To achieve these objectives, major efforts will focus on expanding public digital infrastructure and ensuring that digital technologies remain human-centeredโempowering citizens and improving everyday life. This vision aligns closely with the governmentโs broader reform agenda to reduce bureaucracy and translate ambitious national strategies into real, measurable impact.
Grateful to be part of this historic milestone in Ethiopiaโs digital transformation journey. ๐ช๐น๐
#DigitalEthiopia2030
#DigitalEthiopia
#DigitalTransformation
#NationalVision
#Innovation
#Leadership
#FutureReadyEthiopia
๐5๐2โค1
Forwarded from INSA Cyber Talent Center
แจแขแแณ แณแญแ แญ แณแแแต แจแฆแแญแ แฅแ แ
แณแ แฅแ แฅแแต แตแแ แ แแแตแ แต แแแแฃ แ แ
แญแฅ แฅแแแแซแแแข แ แฐแแญ แ แณแญแ แญ แฐแ
แแแต แฅแ แดแจแแแแแต แแแช แฅแ แขแแตแญแแฒแฌแต แจแแแฝแ แซแแแแแฝแ แจแถแตแต แแญ แตแแ แ แตแแ แแแแฃแ แฅแแณแซแแแฃแฝแแข แแแฐแแต แแฐแแปแฝแแ แแจแแแ แ แตแญแทแธแแข แ แตแญแ แแแฎ แฅแ แ แ แแ แต แแแ แจแณแญแ แญ แฐแ
แแแต แฃแแแซ แจแแซแฐแญแแตแ แตแแ แ แ แแป แญแแฐแฑแข
@insactc
@insactc
๐ฅ7
#LINUX
When a process is in a "Zombie" (Z) state in the process table, which of the following statements is true regarding system resources?
When a process is in a "Zombie" (Z) state in the process table, which of the following statements is true regarding system resources?
Anonymous Quiz
30%
A) The process is still consuming CPU cycles but no RAM
18%
B) The process has been moved to swap space awaiting a SIGCONT signal
34%
C) The process consumes no CPU or memory, but retains an entry in the process table
18%
D) The kernel is currently dumping the process core to /var/lib/systemd/coredump
โค1
Forwarded from INSA Cyber Talent Center
This media is not supported in your browser
VIEW IN TELEGRAM
Happening Tonight... ๐ฅ
We will have our Malware Analysis ๐พ Live Session tonight with a SPECIAL GUEST from INSA.
๐ค Host: INSA CYBER TALENT CENTER (@insactc)
๐ Time: 1:50 LT (ToNight)
Share with your friends โก๏ธ
@insactc | @cteinsa
#LiveSession #CyberSecurity #MalwareAnalysis
We will have our Malware Analysis ๐พ Live Session tonight with a SPECIAL GUEST from INSA.
๐ค Host: INSA CYBER TALENT CENTER (@insactc)
๐ Time: 1:50 LT (ToNight)
Share with your friends โก๏ธ
@insactc | @cteinsa
#LiveSession #CyberSecurity #MalwareAnalysis
โค3
Forwarded from INSA Cyber Talent Center
๐ดToday we diving deep into one of the basis of the security world: "Hacking: The Art of Exploitation" (2nd Edition) by Jon Erickson.
๐ฅWeโll be breaking down:
โถ๏ธ The Book Review: Why this classic is still relevant for developers today.
โถ๏ธHollywood vs. Reality: Weโre analyzing famous movie hacking scenes. Are they even possible, or just flashy graphics?
โถ๏ธThe "No Discipline" Myth: Movies often portray hackers as chaotic or undisciplined. Weโll discuss why real-world hacking actually requires extreme patience, logic, and strict discipline.
๐ Event Details
๐ Topic: Book Review & Hacking Ethics.
๐Book: Hacking: The Art of Exploitation
๐Time: Today at 2:00 LT
Whether you are a coder looking to secure your apps or a tech enthusiast curious about the "dark side," you don't want to miss this.
See you in the stream!
@insactc
@cteinsa
#LiveSession #PersonalDevelopment #Midset #Book
๐ฅWeโll be breaking down:
โถ๏ธ The Book Review: Why this classic is still relevant for developers today.
โถ๏ธHollywood vs. Reality: Weโre analyzing famous movie hacking scenes. Are they even possible, or just flashy graphics?
โถ๏ธThe "No Discipline" Myth: Movies often portray hackers as chaotic or undisciplined. Weโll discuss why real-world hacking actually requires extreme patience, logic, and strict discipline.
๐ Event Details
๐ Topic: Book Review & Hacking Ethics.
๐Book: Hacking: The Art of Exploitation
๐Time: Today at 2:00 LT
Whether you are a coder looking to secure your apps or a tech enthusiast curious about the "dark side," you don't want to miss this.
See you in the stream!
@insactc
@cteinsa
#LiveSession #PersonalDevelopment #Midset #Book
๐2
Forwarded from ThreatX Security (Dawit Peter)
ThreatX Security Internship 2026 is OPEN!
We are a Top 120 AI Startup in Ethiopia building real cybersecurity & AI systems and weโre looking for talent.
Open roles:
โข Software Developers
โข Cybersecurity
โข AI Specialists
โข Graphic Designers
โข Video Editors
- Work on real products
- Get international exposure
- Grow into global opportunities
๐ฉ Apply now:
Send your CV or portfolio to threatxs@gmail.com
Comment โInternโ to get started.
#ThreatX #Cybersecurity #AI #Internship2026
We are a Top 120 AI Startup in Ethiopia building real cybersecurity & AI systems and weโre looking for talent.
Open roles:
โข Software Developers
โข Cybersecurity
โข AI Specialists
โข Graphic Designers
โข Video Editors
- Work on real products
- Get international exposure
- Grow into global opportunities
๐ฉ Apply now:
Send your CV or portfolio to threatxs@gmail.com
Comment โInternโ to get started.
#ThreatX #Cybersecurity #AI #Internship2026
๐ฅ3โค1
Forwarded from INSA Cyber Talent Center
๐ด LIVE SESSION TONIGHT ๐ด
Topic: Introduction to Cryptography & Secure Communication
โฐ Today | 2:00 LT (Night)
๐ On INSA Cyber Talent Center Channel @insactc
Join us for a hands-on live session where we break down the fundamentals of cryptography, explore how secure systems work, and understand the core mechanisms behind modern cybersecurity.
โก๏ธ Session highlights:
* Introduction to Cryptography: why it matters in cybersecurity
* Symmetric vs. Asymmetric Encryption: concepts & real-world use cases
* Key Exchange Protocols: understanding Diffie-Hellman
* Hash Functions: integrity, authentication, and applications
* Public Key Infrastructure (PKI): certificates and trust models
* Interactive Q&A on encryption, keys, and secure communication
@insactc
@cteinsa
#INSA #LiveSession #Cryptography #CyberSecurity #Encryption #PKI #InfoSec
Topic: Introduction to Cryptography & Secure Communication
โฐ Today | 2:00 LT (Night)
๐ On INSA Cyber Talent Center Channel @insactc
Join us for a hands-on live session where we break down the fundamentals of cryptography, explore how secure systems work, and understand the core mechanisms behind modern cybersecurity.
โก๏ธ Session highlights:
* Introduction to Cryptography: why it matters in cybersecurity
* Symmetric vs. Asymmetric Encryption: concepts & real-world use cases
* Key Exchange Protocols: understanding Diffie-Hellman
* Hash Functions: integrity, authentication, and applications
* Public Key Infrastructure (PKI): certificates and trust models
* Interactive Q&A on encryption, keys, and secure communication
๐ข Happening today at 2:00 LT night. Donโt miss it!
@insactc
@cteinsa
#INSA #LiveSession #Cryptography #CyberSecurity #Encryption #PKI #InfoSec
โค1๐ฅ1
Forwarded from ADWA CTF
๐Useful Resources For Cryptography
The Science of Codes: An Intro to Cryptography
https://www.youtube.com/watch?v=-yFZGF8FHSg
Cryptography: Crash Course Computer Science
https://www.youtube.com/watch?v=jhXCTbFnK8o
Advanced:
Cryptography for Beginners - Full Python Course (SHA-256, AES, RSA, Passwords)
https://www.youtube.com/watch?v=kb_scuDUHls
Website:
cryptohack.org
@insactc @cteinsa
#CyberSecurity #Cryptography
The Science of Codes: An Intro to Cryptography
https://www.youtube.com/watch?v=-yFZGF8FHSg
Cryptography: Crash Course Computer Science
https://www.youtube.com/watch?v=jhXCTbFnK8o
Advanced:
Cryptography for Beginners - Full Python Course (SHA-256, AES, RSA, Passwords)
https://www.youtube.com/watch?v=kb_scuDUHls
Website:
cryptohack.org
@insactc @cteinsa
#CyberSecurity #Cryptography
๐ฅ6โค1