Glen D. Singh
Glen D. Singh
  • Home
  • Bio
  • Blog
  • Books
  • Learn
  • Courses
  • Contact
  • More
    • Home
    • Bio
    • Blog
    • Books
    • Learn
    • Courses
    • Contact
  • Home
  • Bio
  • Blog
  • Books
  • Learn
  • Courses
  • Contact

The Spark of Light

How It All Got Started

 

As a teenager, I was always blown away by computers and how different technologies work together. After finishing my secondary level education, I decided to pursue my first IT certification, which was CompTIA A+. During this certification, I learned about computer security, and I found it more interesting than other topics. Later on, I went for the CompTIA Network+ certification, and that's where network security caught my attention. And then, it was pretty predictable that I'd go for the CompTIA Security+ certification, which made me realize that I was really into IT Security, and that's the path I wanted to take in my career.

After completing my studies in CompTIA Security+, I had to make a big decision in choosing a specialization. It was a tough call, but I decided to enroll for the Certified Ethical Hacker (CEH) certification. That was it for me! My first major security certification, and my love for cybersecurity grew even more as I wanted to specialize in offensive security tactics. Realizing the need to have a solid foundation in networking, I pursued my first Cisco Certified Network Associate (CCNA) certification, which helped reinforce my networking skills as an aspiring cybersecurity professional.


From there on, I continued to fine-tune my skills in discovering vulnerabilities and learning about new hacking techniques. I often wondered to myself at the time - If I can hack, surely there must be methods a digital forensics professional can use to find the malicious user. And that's why I decided to pursue the Computer Hacking Forensics Investigator (CHFI) certification as a natural progression in my journey to understand everything there is about cybersecurity. This has taught me many things about operating systems, network, email forensics, and so on.

Additionally, along the way, I did a couple of firewall certifications and training such as CCNA Security, Check Point Certified Security Administrator (CCSA), and Fortinet as I wanted to learn more about firewall operations and their functionality to protect organizations and improve network security.


During this time, I was working in an administrative position, but my certifications and knowledge allowed me to gain employment within the IT industry as a security professional at various companies. However, growth was a bit challenging in some of my past positions while my pursuit to continuously expand my knowledge was growing.


Eventually, I started lecturing Cisco certification courses and gradually took over cybersecurity certifications and training at various institutions. This opportunity allowed me to grow a lot while working with others, develop secure network designs and strategies, develop training programs, and train people in both private and public sectors ranging from regional ISPs to government agencies in the field of cybersecurity operations and tactics and techniques.

Qualifications

Anglia Ruskin University

  • Master of Science (MSc) Cyber Security


EC-Council

  • Certified Ethical Hacker (CEH)
  • Computer Hacking Forensic Investigator (CHFI)


Cisco

  • Cisco Certified CyberOps Associate
  • Cisco Certified Network Associate (CCNA) Security
  • Cisco Certified Network Associate (CCNA) Routing and Switching


Pentester Academy

  • WiFi Security Professional
  • Web Application Security


Check Point

  • Check Point Certified Security Administrator (CCSA)

Giving Back to the Community

Since 2018, I’ve authored many books with Packt Publishing that focuses on discovering and exploiting security vulnerabilities, cybersecurity operations, implementing network security solutions to prevent cyber-attacks and threats, and enterprise networking solutions. 


The following are a list of my publications:


  • Reconnaissance For Ethical Hackers
  • CompTIA Network+ N10-008 Certification Guide
  • The Ultimate Kali Linux Book
  • Cisco Certified CyberOps Associate 200-201 Certification Guide
  • Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide
  • Kali Linux 2019
  • Hands-On Penetration Testing with Kali Linux NetHunter
  • CompTIA Network+ Certification Guide
  • CCNA Security 210-260 Certification Guide


Additionally, since 2018 I’ve been the Technical Reviewer of the following published books:


  • Mastering Kali Linux for Advanced Penetration Testing
  • Cyber Warfare – Truth, Tactics, and Strategies
  • Penetration Testing with Shellcode


Furthermore, since 2020 I’ve developed many video courses for EC-Council's CodeRed platform:


  • A Guide to Hands On Network Pentesting
  • Ensuring Network Security with Zeek 
  • Site Security with HTTP, TLS, and SSL 
  • Implementing Secure Network Function Virtualization
  • Deep Dive into Network Assessments 
  • Mastering Network Security 
  • Fundamentals of Networking Concepts, Protocols and Security 
  • Cisco Certified CyberOps Associate (200-201)
  • Implementing and Administering Cisco Solutions: CCNA 200-301 
  • CompTIA Security+ Exam Prep (SY0-501)


In 2023, I've written the official coursebook and developed the examination for the Cyber Threat Intelligence (CTI) module for the IU International University of Applied Sciences in Germany.


At the beginning of Q2 2023, I launched Cybersecurity with Glen, a global online community which focuses on helping people around the world to develop the technical skills and expertise that are needed for the Cybersecurity and Networking industries.

Building the Dream

Currently, I wear many hats within the industry, from being a Cybersecurity Lecturer to an Information Security Author creating content and delivering training in offensive security tactics, cybersecurity operations, blue teaming strategies, network security and enterprise networking. Additionally, I share my knowledge and wisdom with others through various social media platforms, providing mentoring for anyone in the community who is seeking knowledge on how to break into the industry and occasionally delivering speeches on cybersecurity awareness. 


Following my dreams is what has led me to my career in cybersecurity, where I can help so many people and organizations in a lot of different ways, to securing their systems and networks, and even safeguarding their loved ones from cyber-attacks and threat actors. I honestly love what I do, so I don’t see it as “work” but as my passion.

Copyright © 2023 Glen D. Singh - All Rights Reserved.

Security at Heart, Network at Mind.

  • Disclaimer

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

DeclineAccept & Close