Glen D. Singh
Glen D. Singh
  • Home
  • About
    • whoami
    • Interviews
    • Accolades
  • Blog
  • Books
  • Learn
    • Study
    • Courses
    • Articles
    • Talks
  • Contact
  • Disclaimer
  • More
    • Home
    • About
      • whoami
      • Interviews
      • Accolades
    • Blog
    • Books
    • Learn
      • Study
      • Courses
      • Articles
      • Talks
    • Contact
    • Disclaimer
  • Home
  • About
    • whoami
    • Interviews
    • Accolades
  • Blog
  • Books
  • Learn
    • Study
    • Courses
    • Articles
    • Talks
  • Contact
  • Disclaimer

How It All Began

My journey into the dynamic world of IT began in my teenage years, sparked by a deep fascination with computers and the intricate dance of technology. This early curiosity quickly evolved into a focused pursuit after secondary school, where I earned my CompTIA A+ certification. It was during this foundational experience that I first discovered my passion for cybersecurity.


To deepen my understanding of network security, I pursued the CompTIA Network+ certification, setting the stage for my career. My commitment to cybersecurity was further solidified with the CompTIA Security+ certification. Faced with the exciting challenge of specialization, I chose the Certified Ethical Hacker (CEH) certification, a pivotal milestone that ignited my enthusiasm for offensive security tactics. To further enhance my expertise, I earned my first Cisco Certified Network Associate (CCNA) certification in routing and switching, strengthening my foundational networking skills.


As I continued exploring vulnerabilities and emerging hacking techniques, my curiosity expanded into digital forensics. This led me to achieve the Computer Hacking Forensics Investigator (CHFI) certification, providing valuable insights into operating systems, network forensics, and investigative methodologies.


To reinforce my ability to protect organizations and secure networks, I pursued certifications in firewall operations, including CCNA Security, Check Point Certified Security Administrator (CCSA), and Fortinet. These credentials and training marked a significant transition from administrative roles to dedicated security positions, allowing me to tackle evolving cybersecurity challenges while continuously expanding my expertise.


My journey eventually led me to education and training. I began by teaching Cisco certification courses, then expanded into cybersecurity training at various institutions. This shift enabled me to collaborate on secure network strategies, develop comprehensive training programs, and educate professionals across both private and public sectors—including regional ISPs and government agencies—on cybersecurity operations and defensive tactics.

Qualifications

Anglia Ruskin University

  • Master of Science (MSc) Cyber Security


EC-Council

  • Certified Ethical Hacker (CEH)
  • Computer Hacking Forensic Investigator (CHFI)


Cisco

  • Cisco Certified CyberOps Associate
  • Cisco Certified Network Associate (CCNA) Security
  • Cisco Certified Network Associate (CCNA) Routing and Switching


Pentester Academy

  • WiFi Security Professional
  • Web Application Security


Check Point

  • Check Point Certified Security Administrator (CCSA)

Giving Back to the Community

Since 2018, I’ve authored many books with Packt Publishing which focuses on discovering and exploiting security vulnerabilities, cybersecurity operations, implementing network security solutions to prevent cyber-attacks and threats, and enterprise networking solutions. 


The following are a list of my publications:


  1. Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide, 2E
  2. Expert Insight edition: The Ultimate Kali Linux Book, 3E
  3. Reconnaissance For Ethical Hackers
  4. Attack Models and Threat Feeds (exclusive to IU)
  5. CompTIA Network+ N10-008 Certification Guide
  6. The Ultimate Kali Linux Book, 2E
  7. Cisco Certified CyberOps Associate 200-201 Certification Guide
  8. Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide
  9. Learn Kali Linux 2019
  10. Hands-On Penetration Testing with Kali Linux NetHunter
  11. CompTIA Network+ Certification Guide
  12. CCNA Security 210-260 Certification Guide


Additionally, since 2018 I’ve been the Technical Reviewer of the following published books:


  1. Mastering Kali Linux for Advanced Penetration Testing
  2. Cyber Warfare – Truth, Tactics, and Strategies
  3. Penetration Testing with Shellcode


Furthermore, since 2020 I’ve developed many video courses for EC-Council's CodeRed platform:


  1. A Guide to Hands On Network Pentesting
  2. Ensuring Network Security with Zeek 
  3. Site Security with HTTP, TLS, and SSL 
  4. Implementing Secure Network Function Virtualization
  5. Deep Dive into Network Assessments 
  6. Mastering Network Security 
  7. Fundamentals of Networking Concepts, Protocols and Security 
  8. Cisco Certified CyberOps Associate (200-201)
  9. Implementing and Administering Cisco Solutions: CCNA 200-301 
  10. CompTIA Security+ Exam Prep (SY0-501)


In 2023, I've written the official coursebook and developed the examination for the Cyber Threat Intelligence (CTI) module for the Bachelor degree in Cyber Security at the IU International University of Applied Sciences in Germany.


At the beginning of Q2 2023, I launched Cybersecurity with Glen, a global online community which focuses on helping people around the world to develop the technical skills and expertise that are needed for the Cybersecurity and Networking industries.

Realizing the Vision

As a cybersecurity professional in the industry, I wear many hats. I serve as a Cybersecurity Lecturer and an Author, creating content and delivering training in offensive security tactics, cybersecurity operations, blue teaming strategies, network security, and enterprise networking. I also share my expertise through various social media platforms, mentoring those looking to break into the industry, and occasionally delivering speeches on cybersecurity awareness.


Pursuing my dreams has led me to a fulfilling career in cybersecurity, where I help individuals and organizations secure their systems and networks, and protect their loved ones from cyber-attacks and threat actors. I genuinely love what I do; it's not just work, but my passion.

Copyright © 2025 Glen D. Singh - All Rights Reserved.

Security at Heart, Network at Mind.

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

DeclineAccept & Close