Meet Your Instructor: Abdulrahman Alnaim

October 31, 2019 | Views: 1603

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

    Fun Facts About Abdul!

  • What course do you teach?
    Cybersecurity Kill Chain
  • What is an interesting fact about you?

    I love and enjoy the marine life and stay close to it as much as I can. For that reason, I picked scuba diving to be a hobby in addition to cybersecurity. I hold a PADI Advanced open water Diver license.

  • Your favorite food?

    I always say “I wouldn’t be overweight if I was picky in food” for me all the food that is tasty.

  • Social Media Handles

    Twitter: @Mynerdfriend

 

The Q & A

Tell us about yourself:

“My name is Abdulrahman “Abdul” Alnaim, I hold a bachelor’s degree in Computer Science from the American University, Washington, D.C. My interest in Cybersecurity started early in my life, and that’s what directed my education and career choices later on. I started my professional career in 2011 as a security architect reviewing and designing systems and application security. While doing that, I started doing vulnerability management and finding system security flaws. I moved to work in Security Operations, then Penetration Testing, and Application Security. After that, I worked in Governance Risk and Compliance.

I currently work as a Security Operations Manager in-charge of overseeing security monitoring, digital forensics, and incident response along with other operations such as Vulnerability Management and Penetration Testing. During my tenure, I was heavily involved in Awareness, Behavior Management, and Security Training. Over my experience, I was able to obtain several certifications, including ISC² Certified Information Systems Security Professional, ISACA Certified Information Security Manager, and ISACA certified as well in Risk and Information System Controls, Certified Ethical Hacker, GIAC Certified Incident Manager, and GIAC Web Application Penetration Tester.”

What brought you to teaching on Cybrary:

“Over my tenure in Cybersecurity, I was heavily involved in Awareness, Behavior Management, and Cybersecurity Training. Due to my current responsibility as a Security Operations Center Manager, I’m unable to continue my training responsibilities, which I enjoyed.

Cybrary being one of the best resources I use to learn and remain on top of current technologies in cybersecurity. I think it’s only fair to give back to the Cybrary community by sharing my experience and knowledge for others to gain the required knowledge to excel in cybersecurity. Also, Cybrary has a grand community with over 2.5 million members that are available to all people providing the opportunity to reach out to more people than any other platform. Finally, the helpfulness and experience of the Cybrary team facilitated the production of great courses.”

Tell us about your course:

“Trell™ is a standard that describes the phases and steps of a targeted cybersecurity attack. Cybersecurity professionals highly accept the Lockheed Martin CyberKill Chain™, and many security professionals build their defense mechanism using the Lockheed Martin Cyber Kill Chain™. The course will cover the kill chain steps in a practical way to share with course attendees a full targeted attack starting with reconnaissance covering both active and passive modes. Then moving to weaponization and covering available resources to create a payload and hide it. Once the payload is created, we move on to delivery, using the Social Engineering toolkit.

Once the payload is delivered, the course moves on to exploitation and installation of the payload and gaining command and control of the target and ending with actioning on objectives. After going through the kill chain steps, the course uses the kill chain to define protection on controls to create a defense in depth model across the 7 phases ensuring detection, denying, disrupting, degrading, deceiving, and containing the targeted attack. The course is designed to give a jump start to a career in cybersecurity.”

Education/Experience in Cyber Security:

“I hold a bachelor’s degree in computer science from the American University, Washington, DC with 8 years’ experience in cybersecurity including Cybersecurity architecture, Access Management, Penetration Testing, Vulnerability Management, Security Operations, and Incident Response. I hold several professional certifications, including ISC² Certified Information Systems Security Professional, ISACA Certified Information Security Manager, and ISACA certified in Risk and Information System Controls, Certified Ethical Hacker, GIAC Certified Incident Manager, and GIAC Web Application Penetration Tester.”

Join the team! Contribute on Cybrary >>

Interests in Cyber Security:

“I have been interested in cybersecurity since I was in my teens, trying to learn using the available sources back in the ’90s and early 2000s. Unfortunately, Cybrary was not available back then, making it much difficult to get access to useful resources. My interest in cybersecurity pushed me to pursue a degree in computer science. After completing my studies and obtaining a bachelor’s in computer science, I did not doubt in my heart to join a cybersecurity team, which I did and continue doing. “

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel