Skip to main content

Who is OSTEsayed and purpose of This Blog?

 Introduction to Who I Am:

Hello and a warm welcome! My name is Seyyid Taqy Eddine Oudjani. I am Algerian and have dedicated six years to the study of computer science, earning both a bachelor's and master's degree. Additionally, I hold numerous certifications in the fields of cybersecurity and artificial intelligence, with more details on my expertise to be shared in future updates.

In brief, I am deeply passionate about computer science and cybersecurity. I derive great satisfaction from solving complex problems, and I have set some significant goals for myself. The primary objective of this blog is to document my journey from ground zero to wherever life takes me.

My overarching goal is to establish my own enterprise in the cybersecurity domain. To achieve this, my initial steps involve securing an entry-level SOC analyst position and subsequently advancing to meet the requirements of the Blue Team. Following this, I plan to transition to the Red Team, delving into the intricacies of penetration testing.

In upcoming posts and articles, I will meticulously describe each step I have taken or plan to take in order to reach my goals. This journey spans from learning algorithms and coding to the creation of my own DAST tool, exploring various operating systems—transitioning from Windows to the allure of Linux distributions such as Kubunto, Ubuntu, Manjaro, Fedora, and Kali—and shifting from web development to the dynamic field of cybersecurity. I will explore a list of related job opportunities and ultimately decide to embark on the path of a SOC analyst to kickstart my journey.

I look forward to sharing this exciting journey with you. Anyway, let the adventure begin!

Comments

Popular posts from this blog

Cyber Security list of related jobs and my experiences.

  my Cybersecurity Analyst Professional Path :  First of all the realm of cybersecurity is bigger than you ever would imagine, and there is no wrong answers on how to start in this field, it's based on your interest your conditions and your willing to give effort for. and am just sharing my experiences and my choices  Cyber Security related job and posts: Here's a list of cybersecurity-related job roles along with brief descriptions: Penetration Tester (Ethical Hacker): Conducts authorized simulated cyberattacks to identify vulnerabilities in systems, networks, or applications. Advises organizations on security weaknesses and provides recommendations for mitigation. Security Analyst: Monitors security alerts and incidents to identify potential threats and vulnerabilities. Analyzes security data to generate reports and recommends improvements in security protocols. Security Operations Center (SOC) Analyst: Works in a SOC to monitor and respond to security incidents. Analyzes

Computer Science Start Story

Computer Science Love Story This article will delve into the genesis of my passion for computer science and the process I underwent to immerse myself in this captivating and ever-evolving field. Let's embark on this journey: Start of a Journey: Like many children of our generation, my fascination with computer games was inevitable. I was particularly addicted to CS: Global Offensive, an extraordinary game with a community that I loved beyond words. However, as with any addiction, there comes a moment when every kid must wake up to reality and step outside the door (in my case, it was inside a virtual door). After obtaining my baccalaureate, I made a pivotal decision to pursue Computer Science and Mathematics at 8 May 1945 Guelma University. This marked the beginning of a voyage into incredible worlds and fascinating languages. It was during this time that I realized computers have their own language, and we can communicate with them. I found myself conversing with the computer eve