Mr. Patrick Essien Profile Banner
Mr. Patrick Essien Profile
Mr. Patrick Essien

@CyberSecFalcon

Followers
10,049
Following
1,267
Media
270
Statuses
4,261

Passionate about protecting individuals and organizations from cyber attacks. Prioritizing detection to prevent SecBreach.

Joined June 2014
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@CyberSecFalcon
Mr. Patrick Essien
1 year
1. Hey there, Aspiring cybersecurity professionals! Today, we're going to talk about the basics of networking. You see, before you can protect a network, you need to understand how it works. So, let's dive into the world of networking! This is a thread, so follow along...
63
208
781
@CyberSecFalcon
Mr. Patrick Essien
1 year
Hey Cyber Newbies, Let's talk about the Journey through the Layers: Defending Cyberspace with the OSI Model. 📖 Once upon a time, in the kingdom of Cyberspace, a group of cybersecurity newbies embarked on an epic adventure to unravel the secrets of the OSI Model.
Tweet media one
28
233
797
@CyberSecFalcon
Mr. Patrick Essien
3 months
Cybersecurity Community this is super useful. Make sure to share so a lot of us can make good use of it. New Free Practice Exams | CEHv12 🛡️. CCSP ☁️. SSCP 🔐 In addition to hundreds of practice exams in the CertPreps library, here are 3 new ones we’ve just released! Full
26
205
568
@CyberSecFalcon
Mr. Patrick Essien
9 months
Go check this out for practice exams. Repost to your network, so others can see it, and don't be selfish with the information .😂
Tweet media one
5
314
508
@CyberSecFalcon
Mr. Patrick Essien
3 months
Cybersecurity Community newbies and especially those who are visual learners. Share with your network and communities alike. 𝗡𝗲𝘁𝘄𝗼𝗿𝗸 𝗕𝗮𝘀𝗶𝗰𝘀 𝘄𝗶𝘁𝗵 𝗣𝗼𝘄𝗲𝗿𝗖𝗲𝗿𝘁 𝗔𝗻𝗶𝗺𝗮𝘁𝗲𝗱 𝗩𝗶𝗱𝗲𝗼𝘀 Here is a list of topics explained thoroughly by the YouTube channel
35
177
491
@CyberSecFalcon
Mr. Patrick Essien
6 months
Happy Birthday to myself, Mr. P! 🎉🎂 As a Taurus and Cybersecurity defender, I'm dedicated to protecting our digital space with tenacity and reliability. Here's to another year of fortifying cyber defenses and embracing the bull's strength! #Taurus #Cybersecurity #PatrickEssien
Tweet media one
140
24
462
@CyberSecFalcon
Mr. Patrick Essien
10 months
Hey guys, Share with your network.👇 ISC² Exam Voucher 2024. CC1M12312024
33
251
445
@CyberSecFalcon
Mr. Patrick Essien
1 year
Hey guys, I see that a lot of people are getting into the cybersecurity industry and are seriously looking at different career paths, learning the basics, getting their hands dirty with hands on experience, joining communities. This is a thread. Kindly follow along.
21
117
431
@CyberSecFalcon
Mr. Patrick Essien
1 year
📢 Transitioning into Cybersecurity? 💻🧵 If you're looking to embark on a rewarding journey in cybersecurity, I've got some motivational and educational insights to share! Let's dive into the CompTIA certification path, a perfect starting point for your cybersecurity career. 🚀
Tweet media one
16
150
376
@CyberSecFalcon
Mr. Patrick Essien
10 months
Hey guys, Planning to become a SOC Analyst this year? Feeling unsure? Here's a guide:👇 Start with Learning IT fundamentals. Proceed to Network Fundamentals. Then Cybersecurity Fundamentals. Move on to research specific SOC Analyst skills/tools (e.g., SIEMs, IDS/IPS).
14
93
345
@CyberSecFalcon
Mr. Patrick Essien
9 months
This is a great resource for the Security+ SYO-701 exam certification. If you are planning on taking the exams, you better jump on this fast. Don't forget to share it with your network as well. Someone might need it. Repost for wider reach.
10
165
322
@CyberSecFalcon
Mr. Patrick Essien
3 months
Your SOC team detected unusual activity. You have 24 hours to identify and neutralize the threat before it compromises sensitive data. Are you ready to accept the challenge? Objective: Solve a series of cybersecurity puzzles to neutralize a simulated threat. Rules: 1.
22
51
324
@CyberSecFalcon
Mr. Patrick Essien
1 year
Hey guys, As a Cybersecurity professional, you have to keep yourself updated with past and recent breaches in the ecosystem, Doing this will help you better prepare yourself and your defenses against any such attack Title: The Equifax Data Breach: What We Can Learn from It🧵
Tweet media one
16
75
311
@CyberSecFalcon
Mr. Patrick Essien
8 months
To whom it may concern. If you're diving into the exciting world of cybersecurity, huh? Buckle up because you're in for a wild and rewarding ride. But before you go hunting for a mentor to guide you through every step, let's talk about something crucial: your pathway. It's
33
84
305
@CyberSecFalcon
Mr. Patrick Essien
1 year
🔒🌐 New to Cybersecurity and unsure where to specialize after mastering the fundamentals? 🤔 Let's peruse the exciting field of #CyberSecurity together! Here are the main fields simplified for you. #CyberTalkWithPatrickEssien #PatrickEssien Check the next 🐦
17
79
300
@CyberSecFalcon
Mr. Patrick Essien
1 year
Hey guys, 🛡 Building a strong cyber defense starts with one word: Networking! 🌐💻 Dive deep into the world of cyber security with these FREE networking training resources: Master Basic Router and Switch Configuration:
5
79
285
@CyberSecFalcon
Mr. Patrick Essien
1 year
Which cybersecurity area do you find most interesting?  a) Threat hunting.   b) Incident response.  c) Network security.  d) Identity and Access Management.
68
39
274
@CyberSecFalcon
Mr. Patrick Essien
6 months
If you have the time as a cybersecurity enthusiast, watch this movie. Firewall, hacking, IP address lookup, proxy, and blockchain technology. Initially looked like a low-budget action wannabe. But, it turned out great so far.👇
Tweet media one
13
54
263
@CyberSecFalcon
Mr. Patrick Essien
1 year
Hey guys, 🚨 The importance of Cybersecurity professionals who speak the language of finance! In today's technological world, organizations face mounting cyber threats. But how can we effectively communicate the significance of cybersecurity to business executives? Check this!
6
70
262
@CyberSecFalcon
Mr. Patrick Essien
1 year
Which device is used to connect multiple network devices together within a local area network (LAN)? a) Switch b) Router c) Modem d) Firewall
205
28
255
@CyberSecFalcon
Mr. Patrick Essien
1 year
Hey guys, Excited to share that I've earned my Cisco CyberOps Associate badge! Huge thanks to @OnijeC for making this journey possible. The course content was incredibly detailed and well-structured.
31
32
247
@CyberSecFalcon
Mr. Patrick Essien
5 months
CISSP Resources 💻
5
97
238
@CyberSecFalcon
Mr. Patrick Essien
1 year
In the world of cybersecurity, it doesn't matter how you acquired your knowledge - all that matters is that you possess it. The path to success is yours to pave, so seize the opportunity and let your expertise shine. Your journey to cybersecurity greatness begins with you.
9
58
236
@CyberSecFalcon
Mr. Patrick Essien
10 months
If you are new to ethical hacking you can check out these resources on the basics. I think the instructor is easy to understand if you don't mind the accent. There are parts 1 and 2. Part 1👇 Part 2👇
5
86
233
@CyberSecFalcon
Mr. Patrick Essien
1 year
🚀 Calling all young professionals seeking to boost their cybersecurity knowledge! Check out these FREE courses. But remember, if you're already studying something, finish that first! 📚 Penetration Testing Course by TCM Security 🔗
5
70
222
@CyberSecFalcon
Mr. Patrick Essien
1 year
Which port number is commonly used for secure web browsing over HTTPS? a) 80 b) 143 c) 443 d) 3389
178
21
217
@CyberSecFalcon
Mr. Patrick Essien
1 year
Hey guys, If you are interested in the Sans Technology Institute Paller Cybersecurity Scholarship for non-US citizens above 18 years. Then check this out 👇
Tweet media one
3
97
218
@CyberSecFalcon
Mr. Patrick Essien
4 months
In cybersecurity or any other field, mastering the right tools and honing your skills with them is crucial. Achieving proficiency in these tools often means you're already 80% of the way to success. The remaining 20% relies on your research abilities, analytical thinking, and
7
42
220
@CyberSecFalcon
Mr. Patrick Essien
1 year
Which protocol is used for sending and receiving email messages over the internet? a) HTTP b) FTP c) SMTP d) DNS
187
22
190
@CyberSecFalcon
Mr. Patrick Essien
1 year
🌱🚀 My Personal Journey When I was a Newbie in Cybersecurity🌟💼 (Thread) This is inspired by messages I have received and, I thought to share this as a motivation to someone out there reading this.
14
43
198
@CyberSecFalcon
Mr. Patrick Essien
1 year
😱💥 Exciting News for IT Enthusiasts! 💥👩‍💻 Create your own Active Directory Monitoring Home Lab. It will help you to monitor Active Directory events and logs on Grafana Dashboard.🏠🔍 #ITSecurity #HomeLab Ready to bolster your IT security skills?
7
41
200
@CyberSecFalcon
Mr. Patrick Essien
11 months
Hey guys, Internship opportunity. Apply if applicable.
Tweet media one
15
103
194
@CyberSecFalcon
Mr. Patrick Essien
3 months
🛡 To all Cybersecurity Newbies and Aspiring SOC Analysts! 🛡 Think you have what it takes to tackle real-world cyber threats? Join this Challenge and put your skills to the test! 🕵️‍♂️ 🔍 How to Join: Repost this tweet with "I am ready to participate! Use the hashtag
52
86
195
@CyberSecFalcon
Mr. Patrick Essien
1 year
Which command is used to test network connectivity between two devices? a) ipconfig b) ping c) traceroute d) netstat
200
23
189
@CyberSecFalcon
Mr. Patrick Essien
10 months
My Cybersecurity Theme for 2024 is GET YOUR HANDS DIRTY WITH HANDS-ON PROJECTS. Volunteer, and collaborate with anyone to get it dirty. Let's be super ready when the opportunity to work shows itself. #PatrickEssien
11
34
185
@CyberSecFalcon
Mr. Patrick Essien
1 year
What is a man-in-the-middle (MITM) attack?  a) An attack that steals sensitive information   b) An attack that prevents users from accessing a system or network   c) An attack that intercepts communications between two parties to eavesdrop on or manipulate the data
112
20
176
@CyberSecFalcon
Mr. Patrick Essien
5 months
Understanding and Configuring Active Directory on Windows Server Active Directory (AD) is a critical service in many enterprise environments, offering centralised management of users, computers, and permissions. Whether you're setting up a new environment or managing an existing
Tweet media one
10
58
180
@CyberSecFalcon
Mr. Patrick Essien
1 year
What are some common cybersecurity threats?  a) Phishing   b) Ransomware   c) DDoS attacks   d) All of the above
92
24
165
@CyberSecFalcon
Mr. Patrick Essien
1 year
What is a firewall?  a) A security tool that blocks unauthorized access to a network or system   b) A type of malware that spreads through email attachments   c) A tool used by threat actors to gain unauthorized access to a network or system   d) Other (please specify)
93
25
151
@CyberSecFalcon
Mr. Patrick Essien
1 year
Which TCP/IP protocol is used for transferring files between clients and servers? a) HTTP b) FTP c) SMTP d) POP3
142
12
147
@CyberSecFalcon
Mr. Patrick Essien
1 year
Hey guys, Another Opportunity for an internship. Cloud Security Enthusiasts should jump on this. Share with your connections. Registration👇
Tweet media one
9
75
156
@CyberSecFalcon
Mr. Patrick Essien
1 year
Hey guys, When I transitioned to Cybersecurity and interned as a red team member. One of the tasks assigned to me was to research and make a slide presentation on Cryptography, and I must say it was not easy because I was still trying to understand the concept. 🧵
Tweet media one
9
26
144
@CyberSecFalcon
Mr. Patrick Essien
1 year
📢📢📢 Attention Attention! 📢📢📢 ROADMAP ROADMAP ROADMAP 🚀 CyberNewbies, listen up! 🚀 🔒 Don't fall into the trap of chasing every shiny new roadmap that promises to launch your cybersecurity career to new heights. 🛣⚠️
6
35
147
@CyberSecFalcon
Mr. Patrick Essien
1 year
Hey guys, 3 months Internship opportunity from Chaitanya Cyber Strix Technologies Ltd. Apply if interested 👇 Share, so others can see the opportunity as well. All the best 👍
6
101
139
@CyberSecFalcon
Mr. Patrick Essien
9 months
1. What is the Mitre Attack Framework? The Mitre Attack Framework is a comprehensive knowledge base that categorizes and describes various techniques used by attackers during cyber attacks. It provides a structured approach to understanding and countering these techniques,
2
38
130
@CyberSecFalcon
Mr. Patrick Essien
1 year
What is the primary function of DNS in a network? a) Transferring files between clients and servers. b) Resolving domain names to IP addresses. c) Securing network communications. d) Managing network traffic.
121
18
122
@CyberSecFalcon
Mr. Patrick Essien
1 year
What are some basic cybersecurity hygiene practices?  a) Keep your software up to date   b) Use strong passwords   c) Avoid public Wi-Fi   d) All of the above
94
19
120
@CyberSecFalcon
Mr. Patrick Essien
1 year
🙌🎉 Thank you to all the amazing participants who joined in today for the networking and cybersecurity MCQ session! 🌟 I hope you had a fantastic time and learned something new along the way. 💡 Your enthusiasm and engagement made this session a success.
11
8
117
@CyberSecFalcon
Mr. Patrick Essien
1 year
Which network device operates at Layer 3 of the OSI model and is used to connect multiple networks together? a) Switch b) Router c) Hub d) Bridge
113
10
110
@CyberSecFalcon
Mr. Patrick Essien
1 year
Which team is responsible for performing penetration tests and social engineering attacks? A) Blue team B) White team C) Purple team D) Red team
89
14
115
@CyberSecFalcon
Mr. Patrick Essien
11 months
Hey guys, In my opinion, to be an effective and efficient Cybersecurity Analyst or Pen tester. You need to invest in the necessary tools. The first for me is an efficient Laptop 😄😄😄 with more than the right specs. "Good things are not cheap and cheap things are not good"
15
23
113
@CyberSecFalcon
Mr. Patrick Essien
10 months
Hey guys, @Sec_fortress your name came to mind first. Check this out.👇
Tweet media one
5
54
112
@CyberSecFalcon
Mr. Patrick Essien
10 months
Hey guys, 🎄 Heading home to cherish moments with loved ones. Wishing my cybersecurity followers and everyone a joyous holiday season! Spend time with those you love, whether family, friends, or neighbors. Stay cyber-safe and physically safe. Merry Christmas! 🌟 #PatrickEssien
Tweet media one
13
2
111
@CyberSecFalcon
Mr. Patrick Essien
7 months
Excited to announce I'll be attending the Africa CyberFest event this May! How about you? Are you planning to join if you get the chance? Let's make this a grand gathering for knowledge, networking, and innovation in cyber tech! Are you committed to attending the Africa
Tweet media one
29
19
107
@CyberSecFalcon
Mr. Patrick Essien
2 years
Hey guys, After 7 unsuccessful attempts, I finally got my Kali Purple up and running! This powerful tool will allow me to protect people and data. But in order to fully utilize its capabilities, I must continue to learn, unlearn, and relearn the latest technology.
Tweet media one
14
9
104
@CyberSecFalcon
Mr. Patrick Essien
11 months
Hey guys, I was reading today and came across something that brought my mind to why we need to specialize in a domain within cybersecurity. It will be a thread and I want you guys to read through it.
12
21
100
@CyberSecFalcon
Mr. Patrick Essien
9 months
THE TIME STARTS NOW. Task: Analyzing APT TTPs Using MITRE ATT&CK Framework Objective: Explore and understand the Tactics, Techniques, and Procedures (TTPs) employed by a major Advanced Persistent Threat (APT) group using the MITRE ATT&CK framework. Assigned APT Group: Choose
4
37
102
@CyberSecFalcon
Mr. Patrick Essien
10 months
Hey guys, I want you to keep this in mind👇 Serious study + hands-on hustle = your key to cybersecurity success! " NO GREE FOR ANYBODY " CyberTalk With Patrick Essien #PatrickEssien
11
18
100
@CyberSecFalcon
Mr. Patrick Essien
10 months
A wise man said👇 " Don't chase certificates, Instead chase knowledge "
8
37
99
@CyberSecFalcon
Mr. Patrick Essien
1 year
Which networking device is used to inspect and filter network traffic based on predefined rules? a) Switch b) Router c) Firewall d) Modem
129
13
93
@CyberSecFalcon
Mr. Patrick Essien
1 year
Which wireless encryption protocol provides the strongest security? a) WEP b) WPA c) WPA2 d) WPA3
72
11
92
@CyberSecFalcon
Mr. Patrick Essien
1 year
Hey guys, Yesterday after talking about the Equifax data breach @habszy and @daviconet22 mentioned STUXNET. So, this is my summary of my research. 🧵 What is Stuxnet? Stuxnet is a notorious computer worm that gained global attention in 2010.
Tweet media one
10
22
94
@CyberSecFalcon
Mr. Patrick Essien
3 months
As the saying goes. Celebrate your small wins, be it badge's, Completion certificates or professional certifications. But I want you to always remember, passing a certification is just the beginning. What truly matters is your expertise in the domain. Focus on acquiring and
4
25
90
@CyberSecFalcon
Mr. Patrick Essien
1 year
What is the purpose of NAT (Network Address Translation)? a) Encrypting network traffic. b) Transferring files between clients and servers. c) Assigning IP addresses to network devices. d) Allowing multiple devices to share a single public IP address.
87
12
89
@CyberSecFalcon
Mr. Patrick Essien
1 year
What is the difference between a virus and a worm?  a) A virus requires human action to spread, while a worm spreads automatically   b) A virus spreads automatically, while a worm requires human action to spread   c) There is no difference between a virus and a worm   d) Other
79
13
86
@CyberSecFalcon
Mr. Patrick Essien
1 year
What is the purpose of a DHCP server in a network? a) Assigning IP addresses to network devices b) Managing firewall rules c) Routing network traffic d) Encrypting data transmissions
116
9
84
@CyberSecFalcon
Mr. Patrick Essien
1 year
🔥 The results are in, and Saturday takes the crown! 🎉 📅 Join us for an awesome cybersecurity chat this Saturday at 9 PM WAT. Get ready to share your thoughts, learn from others, and engage with the community. It's going to be fun!🚀 Thank you all for voting, See you there!✌🏼
10
13
88
@CyberSecFalcon
Mr. Patrick Essien
5 months
Big thanks to the #AfricaCyberFest team for the invitation to speak, the award, and the amazing interactions! Every conversation was enriching and memorable. Looking forward to collaborations. Cc: @twenty4_io @tobi_mayana #AfricaCyberFest #Cybersecurity #GratitudeMatters
Tweet media one
3
10
91
@CyberSecFalcon
Mr. Patrick Essien
1 year
Which IP address range is reserved for private networks? a) 10.0.0.0 - 10.255.255.255 b) 169.254.0.0 - 169.254.255.255 c) 172.16.0.0 - 172.31.255.255 d) 192.168.0.0 - 192.168.255.255
85
6
85
@CyberSecFalcon
Mr. Patrick Essien
7 months
@cybersecmeg Protection Begins With Detection. In my opinion, it's better to prevent the breach. You might not survive the breach even after detecting it in some cases. It shouldn't even occur.
7
7
86
@CyberSecFalcon
Mr. Patrick Essien
10 months
Hey guys, For the Cyber newbies. Considering 2024 goals? Explore cybersecurity with free courses on platforms like Coursera and SkillsForAll. Focus on gaining knowledge rather than chasing certificates – it's the best way to see if cybersecurity is your calling. #PatrickEssien
2
24
84
@CyberSecFalcon
Mr. Patrick Essien
1 year
Hey guys, Excited to announce that I'll be speaking in a Twitter Space on Nov 3rd at 8 p.m. WAT! 🎙️ Join me for an insightful discussion, especially if you're making the transition into cybersecurity. Let's learn and grow together! #PatrickEssien Link 👉
Tweet media one
4
38
84
@CyberSecFalcon
Mr. Patrick Essien
1 year
The next will be a discussion on a topic, everyone will give their own input, and if you have a contrary view. You give your own thoughts so we can all learn. I want it to be like a fireside chat. What do you guys think?
13
5
78
@CyberSecFalcon
Mr. Patrick Essien
9 months
Cybersecurity Enthusiasts, Ready for a Challenge? We're considering a hands-on task to enhance our cybersecurity research and presentation skills using the MITRE ATT&CK framework. Are you up for it? Vote by liking and retweeting! If we hit 50 likes and shares, we'll kick off
👍 Yes, I'm excited.
321
👎 Not this time.
8
4
43
79
@CyberSecFalcon
Mr. Patrick Essien
1 year
Story... Story... The Art of Vulnerability Management in Cybersecurity 🛡️ Hey guys, Let's talk about vulnerability management in #cybersecurity and how it's like tending to a garden 🌱 in a real-life scenario. 🏡🔒 🧵 Thread 👇
7
23
80
@CyberSecFalcon
Mr. Patrick Essien
1 year
What is the primary purpose of shoulder surfing in the context of computer security? A) To physically steal devices B) To install malware for the victim C) To obtain confidential information by observing the victim's actions D) To impersonate the victim in online transactions
87
13
77
@CyberSecFalcon
Mr. Patrick Essien
9 months
Do you want to optimize your LinkedIn profile to aid your personal branding in other to increase your chances of getting hired? Check this video out and come back to say thank you. Cc: @paddyjobsman
3
21
79
@CyberSecFalcon
Mr. Patrick Essien
8 months
Cybergirls all over my TL. My advice is for you guys to make the best of the opportunity. Learn, collaborate, and most of all make the best connections with your colleagues. All the best @sisinerdtweets Thank you for creating the platform for ladies grow and fly. Cyberboys nko?
12
6
76
@CyberSecFalcon
Mr. Patrick Essien
1 year
Hey guys, Do you listen to podcasts? My favorite is @DarknetDiaries by @JackRhysider . Best of them all in my opinion. Share yours if you do.
12
5
74
@CyberSecFalcon
Mr. Patrick Essien
3 months
Are you a beginner or an aspiring Pentester? Professionally using HacktheBox is the way to go. I came across this mentoring program that just started and I think it will be beneficial to many in the community. Go check it out and if it's worth it, come back and share your
3
17
75
@CyberSecFalcon
Mr. Patrick Essien
1 year
If you're interested in learning more about cybersecurity, feel free to follow me and let's chat! CyberTalk with Patrick Essien @CyberSecFalcon
10
6
71
@CyberSecFalcon
Mr. Patrick Essien
1 year
What is the purpose of ARP (Address Resolution Protocol)? a) Resolving domain names to IP addresses. b) Assigning IP addresses to network devices. c) Mapping IP addresses to MAC addresses. d) Routing network traffic.
72
5
68
@CyberSecFalcon
Mr. Patrick Essien
1 year
25 YEARS OF LOVE. Today marks a quarter-century of sharing life's journey with the one who holds my heart. From the first day to this moment, my love for you grows stronger with each sunrise. In this life and the next, I choose you. Happy anniversary, my love! ❤️ #PatrickEssien
Tweet media one
13
2
72
@CyberSecFalcon
Mr. Patrick Essien
1 year
📢 Calling all young professionals! 🌟 Join us for a fun and educational journey into the world of networking and cybersecurity. 🌐 Networking forms the bedrock of cybersecurity through a series of engaging multiple-choice questions.
11
5
70
@CyberSecFalcon
Mr. Patrick Essien
1 year
🔐 Access Control Concepts in Cybersecurity For Easy Understanding 🔐🔐 Understand physical access controls. *Physical security controls (e.g., badge systems, gate entry). *Monitoring (e.g., guards, CCTV, alarm systems, logs). *Authorized & unauthorized personnel.
Tweet media one
5
15
67
@CyberSecFalcon
Mr. Patrick Essien
3 months
As you build your portfolio, intentionally build your brand along with it. The world is moving towards you, your skills before your qualifications.
8
15
70
@CyberSecFalcon
Mr. Patrick Essien
1 year
What is the purpose of a VLAN (Virtual Local Area Network)? a) Extending the range of a wireless network. b) Segmenting a physical network into multiple logical networks. c) Blocking unauthorized access to a network. d) Load balancing network traffic.
90
5
65
@CyberSecFalcon
Mr. Patrick Essien
1 year
Hey guys, A fun way to learn Cryptography. Check it out and send a thank you if you find it useful.✌🏼
3
18
65
@CyberSecFalcon
Mr. Patrick Essien
10 months
Hey guys, Remember this, the journey into cybersecurity should not be rushed. So take your time.✌🏼 #PatrickEssien #CyberSecurity
4
11
67