Infosec Profile Banner
Infosec Profile
Infosec

@InfosecEdu

Followers
23,798
Following
555
Media
1,567
Statuses
7,246

Putting people at the center of cybersecurity training.

Madison, WI
Joined April 2010
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@InfosecEdu
Infosec
8 years
Writing Burp Extensions (Shodan Scanner)
0
27
40
@InfosecEdu
Infosec
10 years
Cool find: access the Skillset #CISSP practice test engine with thousands questions for free http://t.co/DaHVcgTpgK
3
25
41
@InfosecEdu
Infosec
8 years
Lab: Hacking an Android Device with MSFvenom
0
15
28
@InfosecEdu
Infosec
8 years
Kali Reporting Tools
1
14
24
@InfosecEdu
Infosec
9 years
Race Condition (TOCTOU) Vulnerability Lab
0
14
21
@InfosecEdu
Infosec
8 years
How to Exploit XSS with an Image
0
18
25
@InfosecEdu
Infosec
3 years
It's time to take #ransomware head on. #CISA is here to help fight back. Join Amy Nicewick and David Stern of @CISAInfraSec on 6/24 as they discuss ✔️The state of the ransomware ✔️ Best practices in prevention ✔️ Free tools to help reduce your risk
0
18
24
@InfosecEdu
Infosec
9 years
Tools and Resources to Prepare for a Hacker CTF Competition or Challenge
1
13
23
@InfosecEdu
Infosec
3 years
With the goal of making cybersecurity education more accessible, @InfosecEdu is extremely pleased to announce our new partnership with @coursera 's online learning platform! 🎉🎉 Learn More:
Tweet media one
0
5
21
@InfosecEdu
Infosec
9 years
5 MB harddrive being shipped by IBM - 1956 http://t.co/z7O3pFUpS5
Tweet media one
3
39
22
@InfosecEdu
Infosec
9 years
Attacking WPA2 Enterprise
0
10
20
@InfosecEdu
Infosec
6 years
Top Five Open Source Intelligence (OSINT) Tools:
0
14
20
@InfosecEdu
Infosec
10 years
Null Byte Injection in PHP
1
13
20
@InfosecEdu
Infosec
8 years
Malware Analysis with OllyDbg
0
11
20
@InfosecEdu
Infosec
2 years
▶️ "It's not if you get breached, but when." ▶️ "You just need passion to get hired." ▶️ "Users are the weakest link." Do these sound familiar? @AlyssaM_InfoSec walks through the WORST infosec cliches and finds solutions for industry problems. Tune in 🎧
4
2
19
@InfosecEdu
Infosec
2 years
ICYMI: @AlyssaM_InfoSec , one of our favorite voices in the cybersecurity social community, joined us earlier this summer to talk about finding viable solutions for problems in our industry. Tune in for a return to one of our favorite episodes 🎧
0
4
19
@InfosecEdu
Infosec
9 years
Malware Researcher’s Handbook (Demystifying PE File)
2
39
18
@InfosecEdu
Infosec
8 years
7 Best Computer Forensics Tools
0
15
18
@InfosecEdu
Infosec
10 years
Introduction to Enterprise Security: A Practitioner’s Guide A free e-book from InfoSec Institute http://t.co/LROndXIKKq
0
7
16
@InfosecEdu
Infosec
8 years
Fifteen Must Have Books for Penetration Testing Professionals
0
7
17
@InfosecEdu
Infosec
6 years
Tweet media one
0
7
15
@InfosecEdu
Infosec
8 years
20 Popular Wireless Hacking Tools [updated for 2017]
0
10
15
@InfosecEdu
Infosec
8 years
Penetration Testing Resources: Practicing Skills
0
10
16
@InfosecEdu
Infosec
6 years
Tweet media one
0
8
15
@InfosecEdu
Infosec
9 years
Top 7 Types of Hacking Tutorials on YouTube - InfoSec Resources
0
10
15
@InfosecEdu
Infosec
11 years
Top Links of Tools Compilation for Pentesting, Forensics, Security,... http://t.co/dkMMiQFHiL
0
10
15
@InfosecEdu
Infosec
8 years
Setting Up a VPN-Based Penetration Testing Lab
0
8
15
@InfosecEdu
Infosec
10 years
Ever wanted to do a #DEFCON CTF but found them too hard? Check our n00bs CTF and win up to $1200 in #bitcoin http://t.co/fiYSOVrIel
2
12
15
@InfosecEdu
Infosec
11 years
19 Extensions to Turn Google Chrome into Penetration Testing tool http://t.co/gr4GNCBBpf
0
5
13
@InfosecEdu
Infosec
2 years
We know that finding your place in #cybersecurity comes with a host of challenges. Ning Wang, CEO of @OffSecTraining , joins us to share her tips on finding the right security career path and making the most out of it. Learn more:
0
2
14
@InfosecEdu
Infosec
6 years
Tweet media one
0
3
14
@InfosecEdu
Infosec
6 years
SQLMap Commands that are essential for every pentester -
0
7
10
@InfosecEdu
Infosec
10 years
Android Application hacking with Insecure Bank Part 1 http://t.co/s2A5pEO1MN
0
8
13
@InfosecEdu
Infosec
10 years
Log Analysis for Web Attacks: A Beginner’s Guide
0
6
13
@InfosecEdu
Infosec
9 years
Interesting mobile phishing malware install attempt...
Tweet media one
0
43
12
@InfosecEdu
Infosec
9 years
Web Application Penetration Testing Methodology: a free eBook
0
9
13
@InfosecEdu
Infosec
10 years
Cracking a Wi-Fi WPA2 Password, Thanks to Amazon
1
12
13
@InfosecEdu
Infosec
6 years
User Name: admin Password: admin
Tweet media one
0
9
13
@InfosecEdu
Infosec
7 years
Free Lab! Advanced Kernel Exploitation: #infosec #hacking
0
9
13
@InfosecEdu
Infosec
10 years
Session Hijacking Cheat Sheet
0
6
13
@InfosecEdu
Infosec
6 years
This cartoon has been making the rounds recently, and it's all too real for a lot of us!
Tweet media one
0
5
13
@InfosecEdu
Infosec
11 years
Manual Web Application Penetration Testing – Blind SQL Injection with... http://t.co/CTJdNf3xVh
0
5
12
@InfosecEdu
Infosec
12 years
How Nmap Helped Me in Cracking My Neighbor’s Wireless Router Password http://t.co/FPEatwbo
0
5
12
@InfosecEdu
Infosec
7 years
Learning Pentesting with Metasploitable3: Exploiting Elasticsearch
0
7
12
@InfosecEdu
Infosec
7 years
@DillPickleFan @slpng_giants Hi Joe, thank you for bringing this to our attention. We are blocking this url from our buy.
0
0
10
@InfosecEdu
Infosec
3 years
We've got $120,000 in cybersecurity scholarships up for grabs for #veterans , students, #LGBTIQI + and #BIPOC & underrepresented groups looking to build their #cybersecurity skills 💻 Winners receive a lifetime training subscription! Check them out here 👇
Tweet media one
1
8
12
@InfosecEdu
Infosec
9 years
Malware Researcher’s Handbook: Introduction
0
5
12
@InfosecEdu
Infosec
9 years
Antivirus Evasion Tools #infosecedu
2
6
12
@InfosecEdu
Infosec
10 years
Free e-book: Introduction to Enterprise Security: A Practitioner’s Guide http://t.co/agvzUcHB7h
0
8
12
@InfosecEdu
Infosec
8 years
Penetration Testing from Amazon Cloud
0
5
12
@InfosecEdu
Infosec
8 years
Exploiting Format Strings: Getting the Shell
0
7
11
@InfosecEdu
Infosec
6 years
HIRED!
Tweet media one
0
0
10
@InfosecEdu
Infosec
6 years
Who's coding tonight?
Tweet media one
0
2
10
@InfosecEdu
Infosec
8 years
Automating Windows Privilege Escalation
0
14
12
@InfosecEdu
Infosec
10 years
Encrypted Code Reverse Engineering: Bypassing Obfuscation - InfoSec... http://t.co/KaIB8lyNjZ
0
6
12
@InfosecEdu
Infosec
11 years
Top Links of Tools Compilation for Pentesting, Forensics, Security, and Hacking http://t.co/dkMMiQFHiL
0
8
12
@InfosecEdu
Infosec
9 years
Malware Researcher’s Handbook (Demystifying PE File Part 2)
1
30
12
@InfosecEdu
Infosec
10 years
Cryptography Fundamentals - in five parts
0
5
12
@InfosecEdu
Infosec
3 years
Our Infosec team is growing! Here's what you can expect when you join our team: ✅ flexible work schedule ✅ paid volunteer time ✅ parental leave ✅ inclusive culture and diverse teammates Learn more & apply: #hiring #cybersecurity #madison #chi
Tweet media one
0
2
10
@InfosecEdu
Infosec
9 years
Fundamentals of Anti-Forensics. You need to know this if you work in the #DFIR field. http://t.co/LWL4FQWyFL
0
8
11
@InfosecEdu
Infosec
6 years
Nooo!
Tweet media one
0
6
11
@InfosecEdu
Infosec
8 years
10 Most Popular Password Cracking Tools
0
8
10
@InfosecEdu
Infosec
9 years
Our Twitter password is the last 14 digits of π.
1
8
11
@InfosecEdu
Infosec
11 years
Python for Web application security professionals http://t.co/e84jzYBOS5
0
0
11
@InfosecEdu
Infosec
7 years
How WannaCry Ransomware Crippled Healthcare: #infosec #cybersecurity #WannaCry
0
4
9
@InfosecEdu
Infosec
10 years
Shellshock [CVE-2014-6271]: Another Attack Vector – Bluffing IPS/IDS Sensors With Python Crafted Pkts http://t.co/oIzTHFmCX7
0
11
11
@InfosecEdu
Infosec
8 years
DNS Analysis and Tools
0
5
10
@InfosecEdu
Infosec
9 years
Reverse Engineering Virtual Machine Protected Binaries
0
3
11
@InfosecEdu
Infosec
9 years
Malware Analysis Basics: Static Analysis
0
6
11
@InfosecEdu
Infosec
11 years
OWASP Top Ten Testing and Tools for 2013 http://t.co/I1WWXUDeco
0
13
11
@InfosecEdu
Infosec
9 years
15 Must Have Books for InfoSec Enthusiasts and IT Security Professionals
0
9
11
@InfosecEdu
Infosec
10 years
Understanding iOS Security: Part 1
1
7
11
@InfosecEdu
Infosec
8 years
Top Ten Hacking Tools of 2017
0
5
11
@InfosecEdu
Infosec
9 years
20 Popular Wireless Hacking Tools [updated for 2016]
0
5
11
@InfosecEdu
Infosec
10 years
Evolution of Banking Malwares, Part 1
0
9
11
@InfosecEdu
Infosec
7 years
Learn how to decode fileless malware in this step-by-step guide: #infosec #malware
Tweet media one
0
8
9
@InfosecEdu
Infosec
10 years
Setting Up a Pentest Lab with pfSense in VirtualBox
0
7
11
@InfosecEdu
Infosec
3 years
When Athens Independent School District in Texas got hit with #ransomware , it was staring at a $50,000 problem. Learn how they solved the problem and recovered their encrypted #data without paying a dime.
Tweet media one
0
2
10
@InfosecEdu
Infosec
11 years
Hacker Proofing Apache & PHP Configuration http://t.co/JmyyCfNxFw
0
9
10
@InfosecEdu
Infosec
10 years
WPScanner: Automated Security Testing Tool for WordPress
0
4
10
@InfosecEdu
Infosec
8 years
13 Popular Wireless Hacking Tools
0
7
9
@InfosecEdu
Infosec
9 years
SQL Injection Analysis
1
3
10
@InfosecEdu
Infosec
5 years
Infosec's Sam Fay and Jerome Goodman making new friends today at the FISSEA conference in Gaithersburg, MD. Thanks to NIST for hosting! #FISSEA2019
Tweet media one
1
1
10
@InfosecEdu
Infosec
8 years
Dumping A Complete Database Using SQL Injection
0
6
10
@InfosecEdu
Infosec
8 years
Practical Thick Client Application Penetration Testing using Damn Vulnerable Thick Client App: An Introduction
0
7
10
@InfosecEdu
Infosec
6 years
FREE LAB: Android Penetration Tools Walkthrough Series: Apktool #infosec #cybersecurity #Android #APK
0
9
9
@InfosecEdu
Infosec
3 years
You've got to check this one out 👀 Watch the recording of our ransomware risk webinar with @CISAgov on demand and we'll send you a copy of the CISA/MS-ISAC Ransomware Guide 👉 @USCERT_gov @cyber
Tweet media one
0
5
10
@InfosecEdu
Infosec
8 years
The Rules of a Public Key Infrastructure
0
4
9
@InfosecEdu
Infosec
3 years
Home, office or screen saver - we've got you covered! Here are 20 free security awareness infographics and posters you can save and share with your team, family and friends this #cybersecurityawarenessmonth 👏 #becybersmart #cyberawarenessmonth #infosec
Tweet media one
0
13
9
@InfosecEdu
Infosec
3 years
We're excited to have @offsectraining CEO @NingWangSB join us for this week's Cyber Work Podcast on her try harder mindset and methodology in order to grow and gain new insights. Listen to the full episode here 🎧 #infosec #offsec #cybersecurity #cyber
0
1
10
@InfosecEdu
Infosec
2 years
Meet Kandice- a 2022 Infosec Accelerate Scholarship Winner. She’s ambitious, undaunted by challenge, and has her sights set on becoming a future executive — possibly even the director of the CISA like her idol, Jen Easterly. 🛡️ Read her story:
Tweet media one
0
2
10
@InfosecEdu
Infosec
12 years
Forensic Artifact: Malware Analysis in Windows 8 http://t.co/p71BQpTo
0
5
10
@InfosecEdu
Infosec
9 years
New way to securely keep your computer from prying eyes. http://t.co/VZgo0iLxAE
Tweet media one
0
12
10
@InfosecEdu
Infosec
9 years
Privilege Escalation without Automated Tools - a free downloadable e-book
0
6
10
@InfosecEdu
Infosec
9 years
Beta Bot Analysis: Part 1 #infosecedu
0
9
10
@InfosecEdu
Infosec
7 years
An Overview of the Public Key Infrastructure Parameters and Standards
0
10
10
@InfosecEdu
Infosec
8 years
Test Lab V8: SSH-Dev and Portal
0
5
8
@InfosecEdu
Infosec
5 years
Infosec Chief Evangelist Lisa Plaggemier and Paul Wilson, Jr., Area Director of the Small Business Development Center at GSU spoke at today's CyberSecure My Business workshop in Atlanta. @StaySafeOnline @ugasbdc_gsu
0
1
6
@InfosecEdu
Infosec
10 years
PowerShell Toolkit: PowerSploit
0
6
10
@InfosecEdu
Infosec
8 years
Social Networking Forensics with Bulk_Extractor
0
8
10