👼🏽| Building My Brand & Sharing the Process W/ Others
❯ C ➟ The Net Ninja
❯ C++ ➟ CodeBeauty
❯ C# ➟ Brackeys
❯ Golang ➟ Tech School
❯ Java ➟ Programming with Mosh
❯ JavaScript ➟ Traversy Media
❯ Kotlin ➟ Coding in Flow
❯ Lua ➟ TheCodingTrain
❯ PHP ➟ Traversy Media
• Python
• Pandas
• Data cleaning
• Visualization (Matplotlib)
• Basic statistics
Start here → you’re already ahead of most beginners.
• Python
• Pandas
• Data cleaning
• Visualization (Matplotlib)
• Basic statistics
Start here → you’re already ahead of most beginners.
Including study guides for CompTIA Security+!
drive.google.com/drive/u/0/fo...
Including study guides for CompTIA Security+!
drive.google.com/drive/u/0/fo...
Enable MFA everywhere → email, VPN, cloud → teach users → enforce policy → log exceptions.
Protects org → proves you think like a pro.
Enable MFA everywhere → email, VPN, cloud → teach users → enforce policy → log exceptions.
Protects org → proves you think like a pro.
• Review unusual file copy from shared drive.
• Cross-check user’s recent HR status.
• Validate USB and cloud sync logs.
Action: escalate HR+Security, apply temporary monitoring.
• Review unusual file copy from shared drive.
• Cross-check user’s recent HR status.
• Validate USB and cloud sync logs.
Action: escalate HR+Security, apply temporary monitoring.
• Check AP load → redistribute clients.
• Validate DHCP scope exhaustion.
• Run interference scan on 2.4/5GHz.
Action: adjust channels, expand IP pool, document root cause.
• Check AP load → redistribute clients.
• Validate DHCP scope exhaustion.
• Run interference scan on 2.4/5GHz.
Action: adjust channels, expand IP pool, document root cause.
• Enable full disk encryption.
• Block unsigned apps via policy.
• Enforce automatic updates.
• Set lock screen to 1 min.
Action: baseline device, apply to all new hires.
• Enable full disk encryption.
• Block unsigned apps via policy.
• Enforce automatic updates.
• Set lock screen to 1 min.
Action: baseline device, apply to all new hires.
Free Splunk Fundamentals 1 & 2 →
Build searches, analyze logs, prep dashboards.
Every SOC uses a SIEM → Splunk dominates.
This skill alone opens $70K-$90K SOC roles.
Free Splunk Fundamentals 1 & 2 →
Build searches, analyze logs, prep dashboards.
Every SOC uses a SIEM → Splunk dominates.
This skill alone opens $70K-$90K SOC roles.
1. HRA – HR Assistant
2. HRE – HR Executive
3. HRG – HR Generalist
4. HRS – HR Specialist
5. HRC – HR Coordinator
6. HRO – HR Officer
7. HRM – HR Manager
8. SHRM – Senior HR Manager
9. HRBP – HR Business Partner
10. HROM – HR Operations Manager
1. HRA – HR Assistant
2. HRE – HR Executive
3. HRG – HR Generalist
4. HRS – HR Specialist
5. HRC – HR Coordinator
6. HRO – HR Officer
7. HRM – HR Manager
8. SHRM – Senior HR Manager
9. HRBP – HR Business Partner
10. HROM – HR Operations Manager
Not your friends. Not your family. Not society.
If you get lazy or lose focus, life will crush you without warning.
So stay hungry. Eliminate distractions. Sharpen your discipline.
Not your friends. Not your family. Not society.
If you get lazy or lose focus, life will crush you without warning.
So stay hungry. Eliminate distractions. Sharpen your discipline.
• Scan network for unknown SaaS logins.
• Identify accounts using personal emails.
• Check data flow & permission level.
Action: migrate to approved tools, enforce SSO.
• Scan network for unknown SaaS logins.
• Identify accounts using personal emails.
• Check data flow & permission level.
Action: migrate to approved tools, enforce SSO.
→ Take a recent technical report and rewrite it in plain business terms.
Why: Senior roles require storytelling, not just accuracy.
→ Take a recent technical report and rewrite it in plain business terms.
Why: Senior roles require storytelling, not just accuracy.
→ Include: mission, 3 priorities, and 5 measurable outcomes.
Why: Simplicity drives execution.
→ Include: mission, 3 priorities, and 5 measurable outcomes.
Why: Simplicity drives execution.
→ Define what kind of IT department or SOC you’d lead someday.
Why: Vision precedes opportunity.
→ Define what kind of IT department or SOC you’d lead someday.
Why: Vision precedes opportunity.
→ Evaluate your growth from Day 1 to now.
→ Write 3 key leadership lessons learned.
Why: Reflection converts experience into wisdom.
→ Evaluate your growth from Day 1 to now.
→ Write 3 key leadership lessons learned.
Why: Reflection converts experience into wisdom.
→ Templates for incident updates, management summaries, and user notices.
Why: Clear communication saves time and reputation.
→ Templates for incident updates, management summaries, and user notices.
Why: Clear communication saves time and reputation.
→ Define process: Request → Approve → Test → Deploy → Review.
Why: Leadership means accountability for impact.
→ Define process: Request → Approve → Test → Deploy → Review.
Why: Leadership means accountability for impact.
→ Write how you’d manage a critical incident: calm, report, resolve, review.
Why: Grace under fire earns trust.
→ Write how you’d manage a critical incident: calm, report, resolve, review.
Why: Grace under fire earns trust.
→ Write 3 labs a beginner could follow to reach where you are.
Why: Mentorship solidifies mastery.
→ Write 3 labs a beginner could follow to reach where you are.
Why: Mentorship solidifies mastery.
→ Write a one-minute update for each “team member role” (Admin, Analyst, GRC).
Why: Coordination is a technical skill.
→ Write a one-minute update for each “team member role” (Admin, Analyst, GRC).
Why: Coordination is a technical skill.
You don’t need to be everyone’s best friend. You don’t need to force anything. But being respectful, approachable, and professional creates a reputation that follows you long after you leave a company.
You don’t need to be everyone’s best friend. You don’t need to force anything. But being respectful, approachable, and professional creates a reputation that follows you long after you leave a company.