Back

Anonymous

Anonymous 1

Hey I am on Medial • 1y

Since you know basics of CEH and have experience with Kali Linux and Parrot, you might want to explore cybersecurity roles. Many of them focus more on understanding systems and security protocols than pure programming.

Reply

More like this

Recommendations from Medial

Image Description

Sheikh Ayan

Founder of VistaSec:... • 10m

Top Operating Systems for Cybersecurity & Blue Teaming For cybersecurity professionals and blue teams, having the right operating system is crucial for defense, monitoring, and security analysis. Here are the top OS choices: 1️⃣ Kali Linux – Best f

See More
2 Replies
5

Vasvi Seth

Cyber Security Stude... • 1y

🚀 Excited to share about Parrot, an open-source Linux distribution that's a go-to for security professionals! 🌐 🔐 Designed for pentesting, forensics, and development, Parrot offers a robust suite of tools for cybersecurity experts. Its lightweigh

See More
Reply
6

Aniket Gupta

Tech Enthusiast | Bu... • 2m

Hello Guys, I have recently graduated in BSc IT and have done some IT course like CCNA networking, RHCSA Linux and CEH. I'm a fresher and looking for a job or internship in Mumbai, Maharashtra in Cybersecurity, role: VAPT If you guys have any refere

See More
Reply
5
Image Description

Yashab alam

Founder ZehraSec • 8m

As the founder of Zehra Sec, I’m thrilled to share a behind-the-scenes look at the early build of our AI-powered cybersecurity assistant — LEWIS (Linux Environment Working Intelligent System). 🧠⚙️💻 This isn’t just another tool. LEWIS is designed t

See More
2 Replies
2
12
Image Description
Image Description

Sheikh Ayan

Founder of VistaSec:... • 11m

IoT Hacking Hardware Devices – Understanding Security Risks IoT devices are everywhere—from smart homes to industrial automation. But how secure are they? IoT hacking hardware plays a crucial role in security research, penetration testing, and ethic

See More
3 Replies
2

Vasvi Seth

Cyber Security Stude... • 1y

Decoding Network Protocols: Communication, Management, and Security Network protocols are the backbone of our digital world, enabling seamless communication between devices. These protocols can be broadly categorized into three main types: communica

See More
Reply
1
4

Yashab alam

Founder ZehraSec • 7m

🛡️🔥 Introducing: LEWIS 🔥🛡️ Linux Environment Working Intelligence System An advanced AI-powered cybersecurity assistant built for ethical hackers, IT professionals, and security teams. 💻 What makes LEWIS unstoppable? ✅ Real-time threat detectio

See More
Reply
3

Account Deleted

Hey I am on Medial • 11m

Need someone Fir my startup ✅ Expertise in kernel development (Linux, Unix, or custom microkernels) ✅ Advanced knowledge of encryption, access control, and sandboxing ✅ A team of cybersecurity professionals ✅ Compliance with NIST, NSA, and DoD secur

See More
Reply

Sandeep Jangir

Cyber Security Profe... • 5m

🚨 Calling all Cybersecurity Trainers! 🛡️ I’m looking to connect with skilled and passionate Cybersecurity Trainers for an exciting opportunity. If you're experienced in delivering hands-on training in areas like: 🔹 Ethical Hacking 🔹 Network Sec

See More
Reply
6

Download the medial app to read full posts, comements and news.