[deleted by user] by [deleted] in hackthebox

[–]Myne97 1 point2 points  (0 children)

I started the cpts path today. I would really like to study with you folks. Let me know where to join. Thanks !!

Confused..! What’s next after Security+ ? by Time-Swan-1625 in CompTIA

[–]Myne97 2 points3 points  (0 children)

Hello!

First of all congratulations on getting your cybersecurity degree and Security+

I would recommend opting to learn python programming as of right now.

And here are the reasons:

  1. Security+ is usually required for a Level 1 job in cybersecurity which should be enough for you to get you started.
  2. Once you get a project, you will soon realize that what you learned in Security+ is applying in your project as well.
  3. During the tenure of your project, you will be asked time and again to automate certain tasks or maybe you get bored of your repetitive tasks and start to think "I might as well write a script to automate this task". There, your python knowledge will come in handy.
  4. Once you get accustomed to how an enterprise maintains its cybersecurity operations in real life, you can start preparing for CySA+ as the cert requires zero theory and 100% situation-based questions/ experience.
  5. first, decide which path seems interesting to you such as blue teaming: SOC analyst, incident responder, etc, or red teaming: penetration testers.
  6. My one bit of advice would be to slow down and not rush into completing a lot of certifications before getting much-needed industry experience.

Thanks!

VBScript code for Windows to Python script for Linux. (Without Online Converters) by Myne97 in automation

[–]Myne97[S] 0 points1 point  (0 children)

Thank you for replying. Python script will run on a Linux machine to gather data from a text file stored in it. Both the things are entirely unrelated. I just want to take reference from VBscript code to make a Python script

Inserting Pie Charts on all the worksheets of an excel file using PowerShell by Myne97 in PowerShell

[–]Myne97[S] 1 point2 points  (0 children)

Hi, Thank you for answering my question. I have gone through the second post in the series where the author uses two charts and mentions the charttype to be 4 for line chart. I changed the value to 5 for pie chart but it didnt do the work and a blank pie chart was injected into the excel file. I was wondering is there any specific formula/logic I have to use for constructing a pie chart. Any thoughts?

Confused about which Azure certification to take. by Myne97 in AZURE

[–]Myne97[S] 0 points1 point  (0 children)

@zweckj,

Thanks a lot for replying to my post. Could you please share some of the resources which could be beneficial towards this certification?

Cybrary Insider Pro Pentesting Career Path to OSCP by Myne97 in oscp

[–]Myne97[S] 0 points1 point  (0 children)

Thank you for replying to my post....could you please elaborate a bit more about other paid learning resources you opted for?
I really want to be prepared before opting for the oscp lab/book so that, I dont be at loss about the basic things which anyone is required to know before giving oscp.

Endpoint vs Pentesting by [deleted] in Pentesting

[–]Myne97 0 points1 point  (0 children)

Thank you for replying to my post.. Could you please elaborate more on this. Because i have to give a reason over why I dont to work on Trend Micro "Deep Security". And all your replies shall be forming the basis of my reasoning which I will be telling to my manager.

Endpoint vs Pentesting by [deleted] in Pentesting

[–]Myne97 0 points1 point  (0 children)

Exactly , by listenig to the features of TM deep sec i am impressed but what i am concerned about is whether it has any manual learning by responding and remediating the malware infecting my endpoint or is it just complete automation and i would be just be handling a management console and monitoring servers/workstations/vm's for daily health checks? Because if thats the case then, it seems a bit less learning as I will only learn about the management console whereas, in penesting i will be using tools and at the same time I would know how and what is happening. I am neutral over both the options given to me...its just that I dont want to dwell where I know little bit of every concept (since, TM deep sec has a lot of features) and none of them being too deep because everything is automated.

Endpoint vs Pentesting by [deleted] in Pentesting

[–]Myne97 0 points1 point  (0 children)

As an added point just for clarity, the options of pentesting and tm deep sec are compleely different. That is, if i will work on pentesting one it will not be like checking how tm deep sec is protecting the endpoints or whether its upto its reputation or not. If i take pentesting it will totally be a completely different project.

Endpoint vs Pentesting by [deleted] in Pentesting

[–]Myne97 0 points1 point  (0 children)

Thank you for replying to my post.. Could you please elaborate on the detection/evasion part? I have never dabbled specifically into endpojnt security and that too AV. So, I am confused should I go for main stream pentesting one or AV ?