Skip to main content
  1. Posts/

My Cybersecurity Journey: A New Beginning

·441 words·3 mins· loading · loading · ·
Cybersecurity Ethical Hacking SIEM Threat Intelligence Cybersecurity Ethical Hacking Threat Intelligence SOC Red Teaming Blue Teaming Digital Forensics
kelvin kiplagat
Author
kelvin kiplagat
Cyber Security Analyst | Threat intelligence analyst | Linux administrator | Information Security | IT Risk & Governance | IT Service management | Incident management

Welcome to My Cybersecurity Blog! πŸš€

Cybersecurity is a fast-paced and ever-evolving field, requiring continuous learning and adaptation. Through this blog, I will share insights, tutorials, and hands-on experiences to help you navigate the world of ethical hacking, digital forensics, and cyber threat intelligence.

What to Expect πŸ›‘οΈ

πŸ”Ή Ethical Hacking & Penetration Testing – Hands-on tutorials, CTF write-ups, and attack simulations.πŸ”Ή Threat Intelligence & SOC Operations – Monitoring, analyzing, and defending against cyber threats.πŸ”Ή Digital Forensics & Incident Response – Investigating attacks and gathering forensic evidence.πŸ”Ή Red vs. Blue Teaming – Offensive and defensive security techniques.

Why This Blog?

βœ… To document my learning journey πŸ“–βœ… To share practical knowledge and security tips πŸ”βœ… To connect with cybersecurity professionals and enthusiasts 🌍

Stay tuned for upcoming posts where I’ll be diving deep into real-world security scenarios, tools, and techniques! πŸ’»πŸ”₯

πŸš€ Welcome to My Cybersecurity Blog!

Hello, world! 🌍 Welcome to my first blog post on my journey through the vast and ever-evolving world of cybersecurity and digital forensics. Whether you’re a beginner exploring security concepts, a seasoned professional, or a fellow hacker seeking knowledge, you’re in the right place.

πŸ”₯ What to Expect From This Blog

I will be diving deep into the real-world challenges, techniques, and strategies that define modern cybersecurity. Some of the key topics I’ll be covering include:

πŸ›‘ Threat Hunting – Identifying cyber threats before they strike.

πŸ’» Security Operations Center (SOC) Insights – Understanding SIEMs, IDS/IPS, and log analysis.

🎯 Red Team vs. Blue Team – Offensive vs. defensive security strategies.

πŸ” Digital Forensics & Incident Response (DFIR) – Uncovering traces left behind by attackers.

🐍 Cyber Threat Intelligence (CTI) – Tracking APT groups and analyzing malware trends.

πŸ΄β€β˜ οΈ Ethical Hacking & Penetration Testing – Exploiting vulnerabilities ethically to strengthen defenses.

πŸ”Ž Why Cybersecurity?

Cybersecurity isn’t just a jobβ€”it’s a mindset. Every day, attackers adapt and evolve, pushing defenders to stay ahead of the curve. My mission is to share knowledge, break down complex concepts, and help others build resilient security strategies.

πŸ“… Upcoming Posts

In the coming weeks, I’ll be writing about:

βœ” How to Set Up a Threat Hunting Lab Using Open-Source Toolsβœ” Mastering SIEM: Analyzing Logs Like a Proβœ” MITRE ATT&CK Framework in Actionβœ” Unmasking Cyber Threats: Real-World Case Studies

πŸš€ Let’s Connect

Cybersecurity is a community-driven field, and I’d love to hear from you! Feel free to reach out, share insights, or suggest topics you’d like me to cover.

πŸ”— Follow my journey:πŸ“Œ Medium: @KelvinKiplagat

Stay secure, stay curious, and let’s build a safer cyber world together! πŸ”πŸ’»

#Cybersecurity #ThreatHunting #SIEM #SOC #EthicalHacking #DFIR #CTI #RedTeam #BlueTeam #MalwareAnalysis #Pentesting #CyberThreats

Related

Threat Hunting with OSINT and Splunk: A Hands-on Guide
·1399 words·7 mins· loading · loading
Cybersecurity Threat Hunting OSINT OSINT Splunk Threat Hunting Cybersecurity SIEM Kali Linux
Learn how to use OSINT tools like Shodan and analyze security logs in Splunk to detect and mitigate cyber threats.
A Practical Guide to Zero Trust Security: Implementing Network Segmentation with pfSense, MFA with Authy, and Continuous Monitoring Using Splunk
·2063 words·10 mins· loading · loading
Cybersecurity Network Security Zero Trust PfSense MFA Authy Splunk Cybersecurity Network Security
Learn how to implement a basic Zero Trust Architecture using pfSense for network segmentation, Authy for MFA, and Splunk for continuous monitoring.
Exploring Vulnerabilities: A Hands-On Assessment with OpenVAS(GVM)
·408 words·2 mins· loading · loading
Case Study Security Vulnerability Management Network Security Penetration Testing Cybersecurity Vulnerability Assessment OpenVAS Kali Linux Network Security Penetration Testing Threat Intelligence
# Exploring Vulnerabilities: A Hands-On Assessment with OpenVAS(GVM) # Introduction