Glen D. Singh
Glen D. Singh
  • Home
  • About
    • whoami
    • Interviews
    • Accolades
  • Blog
  • Books
  • Learn
    • Study
    • Courses
    • Articles
    • Talks
  • Contact
  • Disclaimer
  • More
    • Home
    • About
      • whoami
      • Interviews
      • Accolades
    • Blog
    • Books
    • Learn
      • Study
      • Courses
      • Articles
      • Talks
    • Contact
    • Disclaimer
  • Home
  • About
    • whoami
    • Interviews
    • Accolades
  • Blog
  • Books
  • Learn
    • Study
    • Courses
    • Articles
    • Talks
  • Contact
  • Disclaimer

How It All Began

 

My fascination with computers began in my teenage years, drawn to the intricate dance of technology. After secondary school, I launched my IT journey with a CompTIA A+ certification, where I first discovered my passion for cybersecurity. This interest led me to pursue the CompTIA Network+ certification, deepening my understanding of network security and setting the stage for my career in IT security.


Determined to build a strong foundation, I obtained the CompTIA Security+ certification, which solidified my commitment to cybersecurity. Faced with the decision of specialization, I chose the Certified Ethical Hacker (CEH) certification, a pivotal milestone that fueled my enthusiasm for offensive security tactics. To further enhance my expertise, I earned my first Cisco Certified Network Associate (CCNA) certification in routing and switching, strengthening my networking skills.


As I continued exploring vulnerabilities and emerging hacking techniques, my curiosity expanded into digital forensics. This led me to achieve the Computer Hacking Forensics Investigator (CHFI) certification, which provided valuable insights into operating systems, network forensics, and investigative methodologies.


To reinforce my ability to protect organizations and secure networks, I pursued certifications in firewall operations, including CCNA Security, Check Point Certified Security Administrator (CCSA), and Fortinet. These credentials marked my transition from administrative roles to dedicated security positions, allowing me to tackle evolving cybersecurity challenges while continuously expanding my expertise.


My journey eventually led me to education and training, where I began teaching Cisco certification courses before expanding into cybersecurity training at various institutions. This shift enabled me to collaborate on secure network strategies, develop training programs, and educate professionals across private and public sectors—including regional ISPs and government agencies—on cybersecurity operations and defensive tactics.

Qualifications

Anglia Ruskin University

  • Master of Science (MSc) Cyber Security


EC-Council

  • Certified Ethical Hacker (CEH)
  • Computer Hacking Forensic Investigator (CHFI)


Cisco

  • Cisco Certified CyberOps Associate
  • Cisco Certified Network Associate (CCNA) Security
  • Cisco Certified Network Associate (CCNA) Routing and Switching


Pentester Academy

  • WiFi Security Professional
  • Web Application Security


Check Point

  • Check Point Certified Security Administrator (CCSA)

Giving Back to the Community

Since 2018, I’ve authored many books with Packt Publishing which focuses on discovering and exploiting security vulnerabilities, cybersecurity operations, implementing network security solutions to prevent cyber-attacks and threats, and enterprise networking solutions. 


The following are a list of my publications:


  1. Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide, 2E
  2. Expert Insight edition: The Ultimate Kali Linux Book, 3E
  3. Reconnaissance For Ethical Hackers
  4. Attack Models and Threat Feeds (exclusive to IU)
  5. CompTIA Network+ N10-008 Certification Guide
  6. The Ultimate Kali Linux Book, 2E
  7. Cisco Certified CyberOps Associate 200-201 Certification Guide
  8. Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide
  9. Learn Kali Linux 2019
  10. Hands-On Penetration Testing with Kali Linux NetHunter
  11. CompTIA Network+ Certification Guide
  12. CCNA Security 210-260 Certification Guide


Additionally, since 2018 I’ve been the Technical Reviewer of the following published books:


  1. Mastering Kali Linux for Advanced Penetration Testing
  2. Cyber Warfare – Truth, Tactics, and Strategies
  3. Penetration Testing with Shellcode


Furthermore, since 2020 I’ve developed many video courses for EC-Council's CodeRed platform:


  1. A Guide to Hands On Network Pentesting
  2. Ensuring Network Security with Zeek 
  3. Site Security with HTTP, TLS, and SSL 
  4. Implementing Secure Network Function Virtualization
  5. Deep Dive into Network Assessments 
  6. Mastering Network Security 
  7. Fundamentals of Networking Concepts, Protocols and Security 
  8. Cisco Certified CyberOps Associate (200-201)
  9. Implementing and Administering Cisco Solutions: CCNA 200-301 
  10. CompTIA Security+ Exam Prep (SY0-501)


In 2023, I've written the official coursebook and developed the examination for the Cyber Threat Intelligence (CTI) module for the Bachelor degree in Cyber Security at the IU International University of Applied Sciences in Germany.


At the beginning of Q2 2023, I launched Cybersecurity with Glen, a global online community which focuses on helping people around the world to develop the technical skills and expertise that are needed for the Cybersecurity and Networking industries.

Realizing the Vision

As a cybersecurity professional in the industry, I wear many hats. I serve as a Cybersecurity Lecturer and an Author, creating content and delivering training in offensive security tactics, cybersecurity operations, blue teaming strategies, network security, and enterprise networking. I also share my expertise through various social media platforms, mentoring those looking to break into the industry, and occasionally delivering speeches on cybersecurity awareness.


Pursuing my dreams has led me to a fulfilling career in cybersecurity, where I help individuals and organizations secure their systems and networks, and protect their loved ones from cyber-attacks and threat actors. I genuinely love what I do; it's not just work, but my passion.

Copyright © 2025 Glen D. Singh - All Rights Reserved.

Security at Heart, Network at Mind.

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

DeclineAccept & Close