Glen D. Singh
Glen D. Singh
  • Home
  • Bio
  • Blog
  • Books
  • Learn
  • Contact
  • More
    • Home
    • Bio
    • Blog
    • Books
    • Learn
    • Contact
  • Home
  • Bio
  • Blog
  • Books
  • Learn
  • Contact

Helping people break into the cybersecurity industry

Helping people break into the cybersecurity industryHelping people break into the cybersecurity industryHelping people break into the cybersecurity industry

Cybersecurity Author and Lecturer

Grab a Book Now

About

About Me

My name is Glen D. Singh, I'm an information security author and cybersecurity instructor who specializes in cybersecurity operations, offensive security tactics and strategies, and enterprise networking.

My Goals

Create a safer cyber space.

Educate and mentor others on Cybersecurity.

Become a better version of myself than I was yesterday.

Show the world good things can be done in the simplest of ways.


Skills

Cybersecurity

Training & Development

Cybersecurity

Networking

Training & Development

Cybersecurity

Training & Development

Training & Development

Training & Development

Portfolio

The Ultimate Kali Linux Book
CompTIA Network+ N10-008 Certification Guide
Cisco Certified CyberOps Associate 200-201 Certification Guide
Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide
Learn Kali Linux 2019
Hands-On Penetration Testing with Kali NetHunter
CompTIA Network+ Certification Guide
CCNA Security 210-260 Certification Guide

Cyber Talks

Protecting organization data against cyber attacks, threats and data breaches

Discover the need for data protection and how threat actors locate sensitive information about their targets that can lead to compromising a company and stealing data. 

Learn more

Role of Network Security in Today’s World

  

Network security plays a vital role in today’s world. Without it, threat actors such as cyber criminals will gain the advantage over their targets. Organizations are beginning to realize the need to invest in cybersecurity and network security solutions to safeguard themselves. 

Learn more

Cybersecurity and Ethical Hacking webinar

 Cybersecurity and Ethical Hacking webinar which introduces viewers to  the field of cybersecurity, while providing insights on how to break in to the industry. 

Learn more

Write-Ups

Vulnerabilities in Application and Transport layer

Understanding IPv4 Address spaces, Subnetting & VLSM

Understanding IPv4 Address spaces, Subnetting & VLSM

Learn more

Understanding IPv4 Address spaces, Subnetting & VLSM

Understanding IPv4 Address spaces, Subnetting & VLSM

Understanding IPv4 Address spaces, Subnetting & VLSM

Learn more

Network port numbers on an operating system

Understanding IPv4 Address spaces, Subnetting & VLSM

Network port numbers on an operating system

Learn more

Creating your first Linux virtual machine

Understanding IPv4 Address spaces, Subnetting & VLSM

Network port numbers on an operating system

Learn more
CCNA Security

Interviews

Being the Author of the CompTIA Network+ Guide

Experience of writing the Ultimate Kali Linux Book

Experience of writing the Ultimate Kali Linux Book

READ MORE

Experience of writing the Ultimate Kali Linux Book

Experience of writing the Ultimate Kali Linux Book

Experience of writing the Ultimate Kali Linux Book

Read more

Interview with local TV News company

Experience of writing the Ultimate Kali Linux Book

How I became an author and advice for readers learning Tech

Read more

How I became an author and advice for readers learning Tech

Why Kali Linux as an arsenal for cybersecurity professionals

How I became an author and advice for readers learning Tech

Read More

Why Kali Linux as an arsenal for cybersecurity professionals

Why Kali Linux as an arsenal for cybersecurity professionals

Why Kali Linux as an arsenal for cybersecurity professionals

Read More

Interview with local College

Why Kali Linux as an arsenal for cybersecurity professionals

Why Kali Linux as an arsenal for cybersecurity professionals

Read More

Articles

Honeypot using AWS

Threat Actors, Vectors, and Intelligence Sources

Vulnerability Assessment with Nessus

Read More

Vulnerability Assessment with Nessus

Threat Actors, Vectors, and Intelligence Sources

Vulnerability Assessment with Nessus

Read More

Threat Actors, Vectors, and Intelligence Sources

Threat Actors, Vectors, and Intelligence Sources

Threat Actors, Vectors, and Intelligence Sources

Read More

Networking and Our Daily Lives

Threat Actors, Vectors, and Intelligence Sources

Threat Actors, Vectors, and Intelligence Sources

Read More

REVIEWS

Copyright © 2023 Glen D. Singh - All Rights Reserved.

Security at Heart, Network at Mind.

  • Disclaimer

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

DeclineAccept & Close