Ready to Start Your Career?

Get to Know Your Instructor: Abdulrahman Alnaim

SLWelty 's profile image

By: SLWelty

July 2, 2019


Fun Facts About Abdulrahman!

  • What course do you teach?Cybersecurity Kill Chain™
  • What is an interesting fact about you?I love and enjoy the marine life and stay close to it as much as I can. For that reason I picked scubadiving to be a hobby in addition to cyber security. I hold a PADI Advanced open water Diver license.
  • Your favorite food?I always say “I wouldn’t be overweight if I was picky in food” for me all food that is tasty.
  • Can we connect with you on social?Twitter:@Mynerdfriend

The Q & A

Tell us about yourself:

"My name is Abdulrahman “Abdul” Alnaim, I hold a bachelor’s degree in Computer Science from the American University, Washington, D.C. My interest in Cyber Security started out early in my life and that’s what direct my education and career choices later on. I started my professional career in 2011 as a security architect reviewing and designing systems and application security. While doing that I started doing vulnerability management and finding system security flaws. I moved to work in Security Operations then penetration testing and applications security. After that I worked in Governance Risk and Compliance. I currently work as Security Operations Manager in-charge of overseeing security monitoring, digital forensics and incident response along with other operations such as vulnerability management and penetration testing. During my tenure, I was heavily involved in Awareness, behavior management and Security Training."

What brought you to teaching on Cybrary:

"Over my tenure in Cybersecurity, I was heavily involved in Awareness, Behavior Management, and Cybersecurity Training. Due to my current responsibility as Security Operations Center Manager, I’m unable to continue my training responsibilities which I really enjoyed. Cybrary being one of the best resources I use to learn and remain on-top of current technologies in Cybersecurity. I think it's only fair to give back to Cybrary community by sharing my experience and knowledge for others to gain the required knowledge to excel in Cybersecurity. In addition, Cybrary has a grand community with over 2.5 million members that is available to all people providing the opportunity to reach out to more people than any other platform. Finally, the helpfulness and experience of Cybrary team facilitated the production of great courses."

Learn how you can contribute on Cybrary >>

Tell us a little bit about your course:

"Cybersecurity Kill Chain™ is a standard that describes the phases and steps of a targeted cyber security attack. Cybersecurity Kill Chain™ is highly accepted by Cyber security professional and a great deal of security professionals build their defense mechanism using the Cybersecurity Kill Chain™. The course will cover the kill chain steps in a practical way to share with course attendees a full targeted attack starting with reconnaissance covering both active and passive modes, then moving to weaponization and covering available resources to create a payload and hide it. Once the payload is created we move on to delivery, using the Social Engineering toolkit. Once the payload is delivered the course moves on to exploitation and installation of the payload and gaining command and control of the target and ending with actioning on objectives. After going through the kill chain steps, the course uses the kill chain to define protection on controls to create a defense in depth model across the 7 phases ensuring detection, denying, disrupting, degrading, deceiving and containing the targeted attack. The course is designed to give a jump start to a career in cyber security."

Your Experience in Cyber Security:

"I hold a bachelor’s degree in computer science from the American University, Washington, DC with 8 years’ experience in cyber security including Cyber security architecture, Access Management, Penetration Testing, Vulnerability Management, Security Operations and Incident Response. I hold a number of professional certifications including ISC² Certified Information Systems Security Professional, ISACA Certified Information Security Manager and ISACA Certified in Risk and Information System Controls, Certified Ethical Hacker, GIAC Certified Incident Manager and GIAC Web Application Penetration tester."

Interests in Cyber Security:

"I have been interested in cyber security since I was in my teens, trying to learn using the available sources back in the 90’s and early 2000’s. unfortunately, Cybrary was not available back then making it much difficult to get access to good resources. My interest in Cybersecurity pushed me to peruse a degree in computer science. After completing my studies and obtaining a bachelors in computer science, I had no doubt in my heart to join a cybersecurity team which I did and continue doing."
Schedule Demo