Look for any podcast host, guest or anyone
Showing episodes and shows of

CYBERWOX

Shows

Cyber Stories PodcastCyber Stories PodcastCyber Threat Intelligence with Nigel Boston | EP. 26Chatting with Nigel Boston, who is a Senior Cyber Threat Intelligence Professional. Nigel has built and led threat intelligence programs that reduce incident response times, operationalize threat intelligence, and automate workflows to help teams focus on what really matters: staying ahead of the threat curve.In this episode, we discuss how Nigel discovered cyber threat intelligence and carved a path into the field, what core security skills make a difference in Cyber Threat Intelligence, and how threat intelligence intersects with detection engineering, cloud security, and even AI.We also...2025-07-0440 minDetection OpportunitiesDetection OpportunitiesDetection-as-Code & CI/CD in Detection Engineering with Dennis Chow | EP. 9Detection as Code is one of the most important evolutions in modern security detection, and in this video, we break it down.I first encountered this concept as a Cloud Threat Detection Engineer at Datadog. Today, I’m joined by Dennis Chow, a Detection Engineering specialist and author of Automating Security Detection Engineering (which I had the honor of technically reviewing). Together, we explore what Detection as Code really means and walk through two hands-on CI/CD pipeline demos:🔹 Lab 1: Building SIEM detections with synthetic AI testing using...2025-06-0643 minDetection OpportunitiesDetection OpportunitiesApplying AI, LLMs & Prompt Engineering for Threat Detection with Dylan Williams | EP. 8Visit my ⁠sponsor⁠ to view the current average annual salary for a Cybersecurity degree and learn how to get started.I had the pleasure of hosting Dylan Williams and we explored how AI can be applied in cybersecurity, focusing on threat detection. We also examined how his project, D.I.A.N.A., turns threat intelligence reports into actual detections.Connect with DylanDylan's Resource on Applying LLMs & GenAI to CybersecurityDylan's MediumD.I.A.N.A ProjectDI.A.N.A...2025-04-2935 minDetection OpportunitiesDetection OpportunitiesGet-RoleGroup - Detecting Attacker Enumeration in Microsoft 365 Exchange with Purav Desai | EP. 7Visit my sponsor to view the current average annual salary for a Cybersecurity degree and learn how to get started.⁠Purav's LinkedIn⁠⁠Deciphering UALExchange Admin Audit LoggingOffice365 Management Activity APIConnect-IPPSSession_____________TIMESTAMPS:00:00 Intro00:36 Get-RoleGroup Operation01:37 Enumeration is not logged??05:53 SNHU07:22 Using the Security Compliance Center EOPCmdlet08:54 Abusing Purview Compliance & E-Discovery10:21 Useful Log Fields & Key Fields of not...2025-04-2927 minDetection OpportunitiesDetection OpportunitiesAdd-RoleGroupMember - Detecting Persistence in Microsoft 365 Exchange with Purav Desai | EP. 6Learn how to decipher the Microsoft Unified Audit Log (UAL) from a Digital Forensics & Incident Response (DFIR) perspective with Purav Desai, an experienced M365/Azure Incident Responder. In today's episode, we explore the Add-RoleGroupMember operation in Exchange Online.Purav's LinkedInDeciphering UALMicrosoft Application IDsPermission Alert Policy_____________TIMESTAMPS:00:00 Intro00:48 Add-RoleGroupMember Overview03:22 The Result Status04:53 The Application IDs08:59 Key Fields of Note10:39 Fields...2025-04-2925 minDetection OpportunitiesDetection OpportunitiesNew-RoleGroup - Detecting Privilege Escalation in Microsoft 365 with Purav Desai | EP. 5Learn how to decipher the Microsoft Unified Audit Log (UAL) from a Digital Forensics & Incident Response (DFIR) perspective with Purav Desai, an experienced M365/Azure Incident Responder.⁠Purav's LinkedIn⁠⁠Deciphering UAL⁠⁠Learn about auditing solutions in Microsoft Purview⁠_____________TIMESTAMPS00:00 Intro00:20 Deciphering New-RoleGroup09:06 Key Fields10:11 Deciphering with Exchange Online PowerShell13:42 Detection Opportunities16:16 SIEM & Attacker Tactics21:43 Outro_____________⚡️⁠⁠JOIN 6,000+ CWX MEMBERS ON DISCO...2025-04-2921 minDetection OpportunitiesDetection OpportunitiesMicrosoft 365 Forensics & Incident Response with Purav Desai | EP. 4Learn how to decipher the Microsoft Unified Audit Log (UAL) from a Digital Forensics & Incident Response (DFIR) perspective with Purav Desai, an experienced M365/Azure Incident Responder.Purav's LinkedInDeciphering UALLearn about auditing solutions in Microsoft Purview_____________TIMESTAMPS00:00 Intro00:49 Microsoft 365 Auditing04:43 The Deciphering UAL Project07:55 Accessing Purview Audit17:41 Outro_____________⚡️⁠JOIN 6,000+ CWX MEMBERS ON DISCORD⁠📰 ⁠SUBSCRIBE TO THE CYBERWOX UNPLUGGED NEWSLETTER⁠🥶 ⁠CYBERWO...2025-04-2918 minDetection OpportunitiesDetection OpportunitiesAttack & Detection of a Cloud Security Breach with 0xd4y | EP. 3This episode covers an attack scenario very similar to the one that led to the breach of US Bank Capital One.  @0xd4y  goes over the attack scenario using CloudGoat by Rhino Security Labs, and I detect his activities using AWS CloudTrail Lake._____________🧬 VIDEO RESOURCES🔹 Segev's YouTube Channel:  @0xd4y  🔹 Segev's walkthrough🔹 Former AWS engineer convicted over hack that cost Capital One $270m🔹 CloudGoat🔹 Instance Metadata🔹 Sneaky Endpoints🔹 AWSealion🔹 GuardDuty Findings🔹 CloudTrail Lake2025-04-2914 minDetection OpportunitiesDetection OpportunitiesThe Anatomy of a Google Cloud (GCP) Cryptomining Attack | EP. 2GCP Service Accounts are interesting cloud identities. Let's review how they contributed to a Cryptocurrency Mining Attack in this Case._____________🧬 EPISODE RESOURCES🔹How A Compromised AWS Lambda Function Led to a Phishing Attack🔹GCP Lateral Movement & PrivEsc🔹GCP Service Accounts🔹 DEFCON 30 Cloud Village - Weather Proofing GCP Defaults🔹GCP IAM basic and predefined roles reference_____________⏰ TIMESTAMPS00:00 How GCP Service Accounts Work02:12 Initial Access - Stolen Service Account Cred...2025-04-2907 minDetection OpportunitiesDetection OpportunitiesHow A Compromised AWS Lambda Function Led to a Phishing Attack | EP. 1In this video, I’ll be going over detection opportunities at various stages of cloud security attacks.Compromised Cloud Compute Credentials: Case Studies From the Wild_____________TIMESTAMPS00:00 Intro00:40 The Attack Case02:12 The Attack Graph02:44 The Attack Flow 03:06 Detection Opportunity 1: Enumeration/Reconnaissance/Discovery - Cloud Infrastructure Discovery05:27 Detection Opportunity 2: Persistence - Create Cloud Account 08:19 Detection Opportunity 3: Impact - Resource Hijacking09:54 Detection Opportunity 4: Defense Evasion - Indicator Removal10:23 Detection Opportunity 5: Credential Ac...2025-04-2912 minCyber Stories PodcastCyber Stories PodcastCommunity College to Microsoft Cybersecurity Internship with Carl David | EP. 25A conversation with Carl David, a rising cybersecurity professional who started as an Incident Response Intern with Microsoft’s world-renowned DART team. Carl, originally from Rwanda, shares how he broke into the field after studying at Collin College, where I also began my journey.He’s now making waves as an Intelligence Analyst Intern at Semperis and will be joining USAA as a Cybersecurity Intern in Summer 2025.We explore Carl's journey of landing his first internship at Microsoft, which subsequently opened doors to two more...2025-04-181h 01Cyber Stories PodcastCyber Stories PodcastGovernance, Risk & Compliance (GRC) Engineering with Ayoub Fandi | EP. 24A conversation with Ayoub Fandi, a Staff Security Assurance Engineer at Gitlab and host of the GRC Engineering Podcast, as we discuss transforming GRC from a cost center into a strategic product through automation and engineering. Ayoub shares his journey from aspiring economist to successful cybersecurity professional. We explore whether GRC is technical and introduce GRC engineering, which uses engineering practices to enhance governance, risk, and compliance. We highlight the shift in GRC professionals' backgrounds and how technical skills improve GRC workflows. We also emphasize the importance of cybersecurity knowledge in GRC roles and what it means to operate...2025-03-201h 04Cyber Stories PodcastCyber Stories PodcastThe Cybersecurity Bootcamp Industry & Level Effect with Anthony Bendas | EP. 23A conversation with Anthony Bendas - Co-Founder at Level Effect, where he designs and delivers cutting-edge cybersecurity training programs, including the Cyber Defense Analyst Program. With over a decade of experience spanning penetration testing, security consulting, and engineering, he has built a reputation for translating complex security concepts into practical, real-world applications.Anthony's LinkedInLevel Effect's LinkedinLevel Effect_____________⚡️JOIN 5,000+ CWX MEMBERS ON DISCORD📰 SUBSCRIBE TO THE CYBERWOX UNPLUGGED NEWSLETTER🥶 WINTER MERCH...2025-02-2647 minCybersecurity UncomplicatedCybersecurity UncomplicatedBecoming a Cybersecurity Engineer in 2025. Cybersecurity Uncomplicated Episode 8The NEW Cybersecurity Podcast, Cybersecurity Uncomplicated with Cyber Queen. Whether you’re starting from scratch, already trying to break in, or feeling overwhelmed by the endless resources and advice out there, this cybersecurity podcast is for you..🔏🚀 In this conversation, cybersecurity expert Day Johnson shares his journey from a young enthusiast to a skilled professional at Amazon. He discusses the evolution of cybersecurity, the importance of continuous learning, and the role of AI in the industry. Day emphasizes the need for personal growth, intentional career moves, and the impact of certifications, particularly the Network Plus, on...2025-01-151h 18Tech Certified PodcastTech Certified PodcastCybersecurity Horror Stories That will Shock You!Episode 23 - Christmas Special! Featuring 9 of our amazing guests:  @DayCyberwox   @UnixGuy   @cyber.queen_   @techtoby_   @caleboni.certified   @NetworkWali  William Wilfred  @CloudCareerMentor   @MrFingerz92  ---------------------------------------------------- Apply to be a guest on Tech Certified Podcast: https://forms.gle/GEfeeuZwbHV2BwnR6 🎙️ Listen to Tech Certified Podcast on: Spotify - https://open.spotify.com/show/66ieOvzETMpYXgX2upcOjm?si=zK9rPcowQ-i1OguKsWQ6KQ Apple Podcasts - https://podcasts.apple.com/gb/podcast/tech-certified-podcast/id1736718308 ---------------------------------------------------- For sponsorship enqiries: Caleboni.certified@gmail.com ---------------------------------------------------- Music used : "Broken Piano " composed and produced by "Vivek Abhishek" Music link : • • [No Copyright Music] SUBSCRIBE us on YOUTUBE: • • [No Copyright Music] D... Follow on Facebook: https://b...2024-12-2330 minCyber Stories PodcastCyber Stories PodcastCyber Threat Intelligence at Microsoft & Building KC7 with Simeon Kakpovi | EP. 22A conversation with Simeon Kakpovi, a Senior Threat Intelligence Analyst at Microsoft & founder of the KC7 foundation. Simeon's LinkedInKC7 LinkedinKC7Cyber_____________⚡️⁠JOIN 4,000+ CWX MEMBERS ON DISCORD⁠📰 ⁠SUBSCRIBE TO THE CYBERWOX UNPLUGGED NEWSLETTER⁠🥶 ⁠WINTER MERCH DROP COMING SOON!⁠_____________🧬 CYBERWOX RESOURCES🔹⁠Cyberwox Cybersecurity Notion Templates for planning your career⁠🔹⁠Cyberwox Best Entry-Level Cybersecurity Resume Template⁠🔹⁠Learn AWS Threat Detection with my LinkedIn Learning Course⁠_____________📱 LET'S CONNECT Email: day@cyberwox.com...2024-11-1149 minTech Certified PodcastTech Certified PodcastHow to Get Into Tech? | Cloud, Cybersecurity, IT support, NetworkingHere's some advice from our Guests on Getting into tech I.e Cloud computing, Cybersecurity, IT Support, Network Engineering Featuring:  @UnixGuy   @DayCyberwox   @techtoby_   @NetworkWali   @stembabe740  @Denzo Linkedin: https://www.linkedin.com/in/caleb-o-967254173/ Instagram: https://instagram.com/caleb_oni.certified?igshid=YmMyMTA2M2Y= HASHTAGS: #cloud #cybersecurity #techjobs ___________________________ TIMESTAMPS: 00:00 Intro 01:26 Unixguy 08:15 Day Cyberwox 15:22 Network Wali 33:56 Tech Toby 43:01 STEM Babe 50:02 Denzo2024-10-1452 minCyber Stories PodcastCyber Stories PodcastAutomating Security Detection Engineering with Dennis Chow | EP. 21A conversation with Dennis Chow, an experienced security engineer and manager who has led global security teams in multiple Fortune 500 industries. Dennis started from an IT and security analyst background, working his way up to engineering, architecture, and consultancy in blue and red team-focused roles. Dennis is also a former AWS professional services consultant who focused on transforming security operations for clients and holds GIAC Security Expert (GSE) #288.Dennis' BlogDennis' GithubDennis' LinkedInAutomating Security Detection Engineering Book_____________PACKT GIVEAWAY2024-09-1654 minCyber Stories PodcastCyber Stories PodcastAsking Cybersecurity Bootcamp Graduates If It Was Worth It | EP. 20Live panel discussion with boot camp graduates, asking them difficult questions about their Cybersecurity boot camp experience. Podcast starts at 01:40.PANELISTS: Joshua Davis Lee Clayton David Elgult Nigel Boston Moja Williams Joshua Mpere Charles Lin2024-09-042h 41Cyber Stories PodcastCyber Stories PodcastFrom US Marine to Cybersecurity Analyst with David Huynh | EP. 19Today’s episode is with a friend and Cyberwox Community Manager, David Hyunh, and we discuss everything involving his evolution and transition from the US Marines to becoming a Cybersecurity Analyst.👉🏽CONNECT WITH DAVID: David's LinkedIn2024-09-0457 minCyber Stories PodcastCyber Stories PodcastFrom Olympic Athlete To Cloud Engineer Ifeanyi Otuonye | EP. 18Today’s episode is with a friend, Ifeanyi Otuonye, and we discuss everything involving his past life as an Olympic Athlete and the journey to becoming a Cloud Engineer.👇🏽IFEANYI's STUFF: LinkedIn Twitter/X Blog/Medium2024-09-041h 01Cyber Stories PodcastCyber Stories PodcastAsking Ex-Helpdesks How To Transition Into Cybersecurity | EP. 17Live panel discussion of previous Helpdesk and IT Support Professionals who now work in Cybersecurity. Episode starts at 2:45.PANELISTS: Reginald (Dion) Wilkerson II David (KnowFatigue) Huynh Jonathan Bailey Courtney Wright Jalin Mayberry2024-09-041h 54Cyber Stories PodcastCyber Stories PodcastModern Detection Engineering with Jimmy Vo | EP. 16Today’s episode is with a mentor & colleague, Jimmy Vo, and we discuss everything career, threat intelligence, detection engineering, cloud security, hiring, Brazilian Jiu Jitsu, and so much more.👇🏽JIMMY's STUFF: LinkedIn Twitter Blog2024-09-0344 minCyber Stories PodcastCyber Stories PodcastMy 3+ Years Cybersecurity & Cloud Security Engineering Journey | EP. 15Stop data brokers from exposing your information. Visit my sponsor, https://aura.com/daycyberwox, to get a 14-day free trial and see if your personal information has been compromised!🎥 EPISODE RESOURCES:——🔹Business email compromise🔹Phising🔹Analyzing exchange artifacts🔹Analyzing suspicious email forwarding rule🔹Analyzing email headers🔹Analyzing malicious hashes🔹Analyzing malicious files2024-09-0337 minCyber Stories PodcastCyber Stories PodcastCashier turned Cybersecurity Content Engineer with Malik Girondin | EP. 14Today's episode features Malik Girondin, a highly energetic cybersecurity content engineer at Security Blue Team, who shares his journey into cybersecurity._____________👨🏽‍🔬MALIK's STUFF YouTube LinkedIn Udemy Course Black Heights Black Girls Hack Financial Starter Kit So Good They Can't Ignore You Digital Minimalism2024-09-0355 minCyber Stories PodcastCyber Stories PodcastGenius Cybersecurity Advice for 40 Minutes | EP. 13The Very Best of Cyber Stories SEASON 1.2024-09-0339 minCyber Stories PodcastCyber Stories PodcastScaling Governance, Risk & Compliance (GRC) with Izzy Vixsama | EP. 12Izzy is a GRC (Governance, Risk & Compliance) professional with over a decade of experience in Cybersecurity. In today's episode, we discuss everything related to this field and address various misconceptions that many people have about GRC. We also delve into Izzy's life as a Digital Nomad and the many lessons she's learned over that journey.👉🏽CONNECT WITH IZZY: Twitter LinkedIn2024-09-0353 minCyber Stories PodcastCyber Stories PodcastUS Marine Cyber Threat Intelligence to Cybersecurity Creative with Chris Cochran | EP. 11Chris Cochran is Hacker Valley Media's Co-Founder and Chief Creative Officer (@HackerValleyMedia). He is a former cybersecurity leader who now focuses on content creation. With a background in threat intelligence from his time in the US Marine Corps, Chris has spent over a decade building Threat Intelligence Programs for significant organizations like Netflix. Currently, he serves as the Chief Evangelist and Advisory CISO at Huntress, passionately addressing cybersecurity challenges SMBs face. Chris's expertise and practical communication skills make him a valuable asset in Cybersecurity.👇🏽CONNECT WITH CHRIS: Twitter Linkedin Hacker Valley Media The EASY Framew2024-09-0343 minCyber Stories PodcastCyber Stories PodcastDeli Clerk turned Fortune 500 SIEM & SOAR Consultant with Kenneth Ellington | EP. 10Kenneth is a seasoned senior consultant with extensive experience in SIEM and SOAR technologies. He has taught at reputable universities like the University of Houston and has worked as a consultant for Fortune 500 companies, including Publix, DTCC, and EY. Kenneth's expertise has helped his clients achieve significant salary increases within a short span of three months. His proficiency in these technologies, coupled with his teaching and consulting achievements, make him a highly sought-after professional in the cybersecurity field. Learn more about Kenneth's story in this episode of Cyber Stories.👇🏽CONNECT WITH KENNETH: Linkedin Twitter Ellington Cyber Academ...2024-09-0335 minCyber Stories PodcastCyber Stories PodcastFrom CISO to Cloud Security YouTuber with Ashish Rajan | EP. 9This is my conversation with Ashish Rajan, the cloud security podcast host and aficionado. Ashish and I met a couple of years ago during the podcast's early days, and I was privileged to be a guest even before I started working fully immersed in cloud security. In this episode, we discuss the journey & origin story of the cloud security podcast, Ashish's professional background, the magnificent beard (of course!), some insightful and funny podcast moments, food, and a ton of other exciting things!👉🏽SUBSCRIBE to the  @CloudSecurityPodcast !👇🏽Follow Ashish and Cloud Security Podcast: Ashish's Twitter Cloud Security...2024-09-0359 minCyber Stories PodcastCyber Stories PodcastFrom DoD to Red Teamer & Offensive Security Engineer with Travon Duncan | EP. 8Excited to share this conversation with Travon, where we discuss his journey into Cybersecurity from college to the DOD, his transition from defensive security to offensive security, and achieving certifications such as the   @OffSecTraining   OSCP,   @TCMSecurityAcademy   PNPT & the CRTO, all within a relatively short but incredibly focused period. Travon is also big on helping others get into the industry, building Legos, and many other cool things.👇🏽CONNECT WITH TRAVON: IG Tiktok Twitter Discord_____________🧬 EPISODE RESOURCES🔹 Interview with TayOnTech🔹My Notion Tutorial for Beginners2024-09-0341 minCyber Stories PodcastCyber Stories PodcastBecoming A Detection Architect at 21 with Charles Quansah | EP. 7This episode is an interview with my best friend and @CyberwoxAcademy co-founder Charles. Charles is one of the brightest and sharpest young people I know, and this conversation has been going on for a long time.We talk about Charles’ journey into Cybersecurity, securing multiple Cybersecurity internships during College, majoring in Computer Science while learning Cybersecurity on his own, Specializing in Azure Security, becoming a Threat Detection Architect, and much more._____________🧬 EPISODE RESOURCES:🔹Blacks in Cybersecurity🔹Microsoft surpasses $20B in security revenue as enterprise customers consolidate news article🔹Azure Detection Lab Blog🔹Azure Detection Lab Playlist🔹Just-in-time Access🔹My Notion Tut2024-09-0251 minCyber Stories PodcastCyber Stories PodcastCybersecurity Engineering & Content Creation with Tayvion Payton | EP. 6This video is an interview with Tayvion Payton (@TayOnTech), an experienced security engineer and content creator whom I admire and look up to. Tay's journey into cybersecurity is very interesting, and he breaks it down in this video.👇🏽CONNECT WITH TAY: LinkedIn Instagram YouTube Twitter TikTok_____________🧬 EPISODE RESOURCES:🔹 Security Blue Team BTL1 Details🔹 Certifications Playlist🔹 My Notion Tutorial for Beginners2024-09-0255 minCyber Stories PodcastCyber Stories PodcastI Interviewed My Boss: Why Did He Hire me? with Zack Allen | EP. 5This episode covers a conversation between my boss and I. We discussed his journey to becoming the Director of Security Detection & Research at Datadog and why he hired me to work on his team.👉🏽CONNECT WITH ZACK on LinkedIn._____________🧬 EPISODE RESOURCES:🔹 RITSEC Website🔹 RITSEC YouTube🔹 Secrets to Thriving as a Remote Cybersecurity Employee🔹 Brainstorming Cybersecurity Project Ideas🔹 Detection Engineering Weekly🔹 Table Stakes for Detection Engineering🔹 Funnel of Fidelity2024-09-0254 minCyber Stories PodcastCyber Stories PodcastHanging Out with a Hacker: How to get into Offensive Cybersecurity with Tadi Kadango | EP. 4This episode covers how to get into Offensive Cybersecurity. It features Tadi, a friend and fellow content creator. We discuss his journey from a beginner to an offensive security engineer.👇🏽CONNECT WITH TADI: Tadi's YouTube Channel Linkedin Newsletter2024-09-0232 minCyber Stories PodcastCyber Stories PodcastThe Path to Cybersecurity Sales Engineering with Ramzi Marjaba | EP. 3In this episode, I interviewed Ramzi Marjaba, an experienced Cybersecurity and networking Sales Engineer. We discussed various topics related to Cybersecurity and Networking Sales Engineering.👇🏽CONNECT WITH RAMZI: LinkedIn YouTube Website Email: ramzi@wethesalesengineers.com2024-09-0243 minCyber Stories PodcastCyber Stories PodcastBecoming a Cybersecurity Incident Response Manger with ‪Henri Davis | EP. 2Henri has been a mentor to me since the start of my cybersecurity career. I am excited to have him on the podcast for the first time to discuss getting into cybersecurity and building a career.👇🏽CONNECT WITH HENRI: YouTube IG X Website Linkedin TikTok Linkedin Course2024-09-021h 32Cyber Stories PodcastCyber Stories PodcastCybersecurity & Web Development with Rebecca Richard | EP. 1Rebecca is one of my favorite content creators. I got to sit down and talk to her about her career in security, her transition into web development, and her answers to a ton of cybersecurity questions.CONNECT WITH REBECCA on YouTube, Personal IG, Business IG, &Website.2024-09-021h 59Tech Certified PodcastTech Certified PodcastUnlocking The Secrets Of Getting into Cybersecurity With ‪@DayCyberwox‬ | A Beginner's GuideOur Guest today is  @DayCyberwox . Day is a Cybersecurity Engineer at Amazon, It's a massive pleasure having day on the Tech Certified Podcast. His journey is incredible and the insights he's shared over the years have been a massive contribution to the Cyber Community. He is a big inspiration to the founding of this channel. We're so excited for you to see this. ___________________________________________ Follow us: www.youtube.com/@caleboni.certified HASHTAGS: #cloud #cybersecurity #aws ___________________________ TIMESTAMPS: 00:00 Intro 04:02 Day's Journey in tech 13:12 Why Cybersecurity? 16:58 Passed the Comptia A+ 18:02 How did Cyberwox happen? 21:08 How has Content Creation helped you? 25:18 Biggest le...2024-08-2159 minThe TechTual TalkThe TechTual TalkGetting into Cybersecurity with Day CyberWoxSend us a Text Message.In this live  episode of The TechTual Talk Henri talks to guest co-host Dayspring ( https://msha.ke/daycyberwox/) about getting his start in CyberSecurity. getting CyberSecurity Certifications, starting his YouTube channel, and much more! Support the Show.If you enjoyed the show don't forget to leave us a 5 star review, to help with the algorithm :) Email: henridavis@thetechtualtalk.com➡️ Need coaching help then go here (ask about our financing)⬇️https://techualconsulting.com/offerings➡️ Want to land your first IT Job? Then check out the...2022-06-141h 11The TechTual TalkThe TechTual TalkWhat's it really like working in CyberSecurity with Day CyberwoxSend us a Text Message.Check out this LIVE episode of The TechTual Talk with the young superstar Dayspring Johnson aka Day Cyberwox!! He gives us his honest opinion on what it's really like working in cybersecurity.Join the patreon: https://patreon.com/techtualchatterCheck out the youtube channel: https://youtube.com/techtualchatterGrab my ebook: https://techtualconsulting.com/digitalproductsCheck out my resume services: https://techualconsulting.com/offeringsFollow me on the rest of my socials: https://techtualconsulting.start.page/Support the Show.If you...2022-06-101h 23The CybrClub PodcastThe CybrClub PodcastReal Talk Ep 3: Charles Quansah | Internships, Cybersecurity vs Computer Degree, and Building Your Resume.In this episode we speak with Cyberwox Academy’s co-founder Charles Quansah. Charles is a senior at University of Maryland Baltimore County pursuing a Computer Science degree. During his college career, he has held multiple cybersecurity internships in security operations and engineering. He has also earned Comptia’s Cysa+ and Security+ along with Microsoft’s Azure fundamentals certification.Learn more about the Cyberwox Academy at www.cyberwoxacademy.com/Follow Charles on Instagram at @_charlesq_Follow him on LinkedIn https://www.linkedin.com/in/charles-q-b788681b5/If you would like to listen previo...2021-10-2728 minCloud Security PodcastCloud Security PodcastCloud Security Careers: Threat Analyst SkillsIn this episode of the Virtual Coffee with Ashish edition, we spoke with Abisola Dayspring Johnson aka Day (@CyberwoxAcademy) is a Threat Analyst at Optiv (@Optiv) and the Founder of Cyberwox Academy helping aspiring CyberSecurity students to get into CyberSecurity. Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv Host Twitter: Ashish Rajan (@hashishrajan) Guest Twitter:  Abisola Dayspring Johnson aka Day (@CyberwoxAcademy) Podcast Twitter - Cloud Security Podcast (@CloudSecPod) If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out o...2021-09-2441 minWritten by AshWritten by AshCyberWox’s Cyber Sec Homelab On Virtual BoxArticle: https://mrashleyball.com/cyberwox-cybersec-homelab-virtual-box/2021-08-2808 minKeepItTechie PodcastKeepItTechie PodcastE26: Tech Talk w/ Day Cyberwox - Cyber SOC AnalystWeekly Live Stream!  Day Cyberwox https://www.youtube.com/c/DayCyberwox  Please enjoy the video and if you have any questions, leave a comment down below. My goal is to expand the Linux community.  Remember to Like, Share, and Subscribe if you enjoyed the video!  Also if you want to support the channel you can send donations to my CashApp: https://cash.app/$KeepItTechie  ✔️SOCIAL NETWORKS ------------------------------- KeepItTechie: https://keepittechie.com/ Facebook:  https://www.facebook.com/KeepItTechie Twitter: https://twitter.com/keepittechie Instagram: https://www.instagram.com/keepittechie/ Discord: https://discord.gg/RjZWuyd CashApp: https://cash.app/$KeepItTechie Patreon: https://ww...2021-06-0553 min