User
Write something
🔥 Thursday Push — One Day to Make the Week Count
G'day legends! Thursday morning — and this is where it gets real. 🔐 Friday is tomorrow. Whatever you said you'd get done this week, today is your last real shot at it. No pressure — but also, a little pressure. That's the point. 😄 I'll go first: Today I'm finalising the CVE-2026-0498 defender's playbook for the Classroom — covering patch validation steps, privilege audit procedures, and what an IR plan looks like when a CVSS 9.1 hits your ERP environment. Aiming to have it published before end of day. Also reviewing the 2 membership requests that came in overnight — great to see the community growing. Welcome to anyone who just joined! 👋 Your Thursday challenge — answer ONE of these below: 🔥 What's the ONE thing you're committing to getting done today? 📚 What's one concept or tool you've learned this week that actually clicked? 🚨 Got a question you've been putting off asking? Today's the day — drop it below and let's get it answered before the week ends. Thursday is the unsung hero of the week. Most people coast. Don't be most people. Let's finish strong. 💪 — @Aussie Mr Cyber
0
0
⚡ Wednesday Check-In — Halfway There. How's the Week Looking?
G'day legends! Wednesday check-in — we're smack in the middle of the week, and it's the perfect time to take stock. 🔐 Monday set the intention. Now let's see what's actually happened. I'll go first: This week I've been deep in the CVE-2026-0498 SAP S/4HANA response walkthrough — putting together a real defender's playbook for a CVSS 9.1 RCE vulnerability in an enterprise ERP environment. It's the kind of scenario that doesn't get enough airtime in training but shows up constantly in real SOC work. Should be ready to drop in the classroom by end of week. Also been watching the leaderboard closely — shoutout to Jonathan Ingram, Max Allen, and Abdelrahman Hamdy for being active this week. That's the energy. 🙌 Your turn — drop a comment below: ✅ What have you actually done this week so far? 🧱 Where are you stuck or behind? 🎯 What's your ONE focus for tomorrow and Friday? No judgement here — whether you smashed it or the week got away from you, drop in and let's finish strong together. Two days left. Make them count. 💪 — @Aussie Mr Cyber
0
0
🔐 TUESDAY CHECK-IN — Let's Go, Cyber Crew! 🔐
Happy Tuesday, everyone! 💻🔥 We're midway through the week and I want to know — how are you showing up TODAY? Drop your answers below 👇 1️⃣ Where are you in the bootcamp right now? (Module, topic, or concept you're currently tackling) 2️⃣ What's ONE thing you learned this week that surprised you? 3️⃣ What are you stuck on or struggling with? (No shame — we ALL get stuck. That's why we're here!) 4️⃣ What's your goal before Friday? Remember — cybersecurity isn't learned passively. Every lab you run, every concept you break down, every question you ask is leveling you up. 🛡️ The hackers aren't taking days off. Neither are we. 😤💪 Let's check in, support each other, and finish this week STRONG. 🚀
🗓️ Monday Check-In — New Week, New Reps. What Are You Working On?
G'day legends! Happy Monday — the week is wide open and the reps are there for the taking. 💪 Whether you're grinding through cert prep, spinning up a new lab, working through a module, or just trying to carve out 30 minutes of learning today—this is your thread. I'll go first: This week I'm putting together a full walkthrough on responding to CVE-2026-0498 (the SAP S/4HANA RCE vuln we flagged in SOC Ops) — covering patch validation, privilege auditing, and what a defender's incident response playbook should look like for a CVSS 9.1 in an ERP environment. It's the kind of real-world scenario that bridges cert knowledge and actual job skills. Your turn — drop a comment below: 🔧 What's on your bench this week? 📚 Studying for a cert? Which one and where are you up to? 🧪 Got a lab goal or tool you're finally going to tackle? 💬 A question you've been sitting on? Ask it here. Mondays set the tone. Let's make this one count. 🔐 — @Aussie Mr Cyber
🗓️ Sunday Check-In — Last Chance to Win the Weekend!
G'day legends! Sunday's here — and the question is, are you going out with a bang or leaving reps on the table? 💪 Before the week fires back up, it's worth taking five to reflect on what you've learned, what you've built, and what's waiting for you Monday morning. I'll go first: Wrapping up the weekend with a focus on threat actor attribution — specifically mapping TTPs from the SAP RCE CVE we've been dissecting back to known APT behaviours in MITRE ATT&CK. It's one thing to patch a vuln, it's another to understand who might be exploiting it and why. Your turn — drop below: 🏁 What did you actually get done this weekend? 🧠 What's one thing that clicked for you this week? 🔭 What's your focus heading into next week? ⚡ Any wins — big or small — worth shouting out? Sunday reps count double. Finish strong 🔐 — @Aussie Mr Cyber
1-23 of 23
Cybersecurity BootCamp
skool.com/cybersecurity-bootcamp-2235
Aussie cyber pro with hands-on home lab builder sharing SOC ops, pentesting labs, playbooks & cert prep. Level up your blue-team game Down Under!
Leaderboard (30-day)
Powered by