Felicia Moses

Felicia Moses The Cybersecurity & AI Girl | SOC Analyst | Speaker: Cyber, AI Risk & Leadership | Alumna, International Model United Nations

13/10/2025

FAVOUR TRAVELS FASTER THAN FUNDING.
GOD IS WAITING FOR YOUR BOLDNESS, NOT YOUR BANK ACCOUNT.

M.O.V.E!!!

THIS IS THE END OF PRIVACY, YOU ARE EXPOSED! What if I told you that your personal data is already being used across the...
07/10/2025

THIS IS THE END OF PRIVACY, YOU ARE EXPOSED!

What if I told you that your personal data is already being used across the internet without your permission?

7 days ago, Anthropic (makers of Claude AI) announced that it would start repurposing user conversations as training data for its large language models. Yes, you can opt out, but how many people know this?

Here’s the shocker, Anthropic isn’t alone.
ChatGPT, Gemini, MidJourney, PrimEyes, Higgsfield, and many other platforms do this quietly by default. Most users don’t even realize their conversations, images, and uploads are being harvested.

ChatGPT saves your chats by default.
Gemini, MidJourney, and other AI tools quietly keep your prompts and uploads.
Social media tracks every click, like, and DM.
Your phone apps collect location, microphone, and contact data even when you’re not looking.

Opt-Out of AI Training
1. ChatGPT: Go to Settings > Data Controls > Turn off Chat History & Training.
2. Claude: Settings > Privacy > Opt-out of data use.
3. Gemini, MidJourney & others: Check account privacy settings (usually hidden deep).
4. Limit What You Share: Avoid putting highly personal details into AI chats (health records, IDs, financials).
5. Review app permissions: Turn off location, mic, camera unless necessary.

At the end, control remains key when using AI.

P.S. I created this image using MidJourney and Canva. The prompt I used is in the comment.


IF I HAD TO START MY SECURITY OPERATIONS JOURNEY AGAIN (5 MONTH ROADMAP)When I first set out to become a SOC Analyst, I ...
05/10/2025

IF I HAD TO START MY SECURITY OPERATIONS JOURNEY AGAIN (5 MONTH ROADMAP)

When I first set out to become a SOC Analyst, I wasted time chasing too many things. If I could restart, I’d structure my journey differently.

Here’s exactly how I’d do it in 5 months

First Month
Google Cyber Security Cert: https://lnkd.in/dKTXFNG8

Second Month
HackTheBox CDSA: https://lnkd.in/dYmViwvj

Third Month
LetsDefend SOC Analyst Path: https://lnkd.in/dZe4emAP

Fourth Month
CyberDefenders CCD: https://lnkd.in/dxi8jz8V

Fifth Month
TryHackMe SOC1: https://lnkd.in/dyjQvasC

Get hands-on and build visible proof of your skills.

I am rooting for you!

04/10/2025

Have you seen Wan 2.2 Animate by Alibaba Company?

The line between digital human creators is about to blur like never before.

What do you think?


My First 90 Days as a Cybersecurity Analyst. Things I wish I knew, Real struggles beginners face, Mistakes I made._Every...
03/10/2025

My First 90 Days as a Cybersecurity Analyst. Things I wish I knew, Real struggles beginners face, Mistakes I made.

_
Everyone tells you cybersecurity is hot and in demand. What they don’t tell you is how overwhelming it can get when you’re just starting. My first 90 days were overwhelming, I felt lost, doubted myself, and sometimes wondered if I had picked the right career.

_
Mistakes I made, and most beginners make too
1. Information overload
I was learning everything, instead of streamlining my focus. Knowing your niche is very important. You’ll drown if you don’t filter. Pick one path and go deep first. You can always expand later.

_
2. Ignoring soft skills & documentation
I underrated skills like report writing, communication, branding, and more. Worst, I never documented my journey, not on a personal blog or my socials. Arrrggg!!!
Visibility creates opportunities. Share your journey online.

_
3. Rejections were discouraging, and I almost gave up
The struggle to land that first internship is real, and most entry-level roles want 2–3 years of experience.
Advice: Stop pouring your energy into job applications, build scalable projects, and solve problems. Focus on being invaluable, and soon you'd be sought after.

_
4. Imposter syndrome
Seeing others post their achievements made me feel like I was left behind.
Be patient with yourself, but stay consistent in learning. Learn from others, however, take it easy on yourself.

_
5. Network smartly
Join cybersecurity communities, attend local meetups. Referrals and visibility matter more than cold applications.

_
Don't waste 3 months consuming endless content. Create. Practice. Share

I am rooting for you.

Applications are open for the 2026 Paller Cybersecurity scholarship at SANS Technology Institute. The scholarship is for...
02/10/2025

Applications are open for the 2026 Paller Cybersecurity scholarship at SANS Technology Institute. The scholarship is for people in both technical roles and those new to cybersecurity.

If you applied before and didn't make it, this is your sign to apply again.

Check your eligibility and apply here: https://www.sans.edu/paller-cybersecurity-scholarship/?utm_source=LinkedIn&utm_medium=Social&utm_campaign=EDU_Awareness&utm_content=october2

Applications are still open for the Cybersecurity Master program till November 1

Apply here: https://www.sans.edu/cyber-security-programs/masters-degree/?utm_source=LinkedIn&utm_medium=Social&utm_campaign=EDU_Masters&utm_content=october1

As a Paller Cybersecurity Scholar, you have the option of completing any of these programs fully online while working full-time.


27/09/2025

A key to Growth is showing that you are coachable.

For me, this is always personal. The Women Techsters Fellowship was a springboard for my own career in tech and leadersh...
19/09/2025

For me, this is always personal. The Women Techsters Fellowship was a springboard for my own career in tech and leadership. Giving back to this community is more than just teaching, it’s honoring the journey and paying it forward.

Just wrapped up an incredible session with the brilliant on Personality Insights for Career Growth

It was such a joy to share practical insights on self-assessment, understanding personality strengths, and turning even our flaws into pathways for growth. I’m confident the ladies walked away with fresh clarity they can apply in their career journeys and tech projects.

A huge thank you to the entire Women Techsters Fellowship team at Tech4Dev

I’m excited for what these women across Africa will go on to build, and grateful for every chance to contribute to their growth.

Thank you to all the Fellows for such positive and heartwarming feedback.

I love the community at Tech4Dev.


Join us at Sh'Emerge tribe as we learn and upgrade together. Remember to join the community, there's so much growth happ...
18/09/2025

Join us at Sh'Emerge tribe as we learn and upgrade together. Remember to join the community, there's so much growth happening.



16/09/2025

If you can think it
IT IS POSSIBLE!
If it crossed your mind
IT IS POSSIBLE!

If you’re serious about being an Ethical Hacker, save this roadmap. It’s the fastest, most practical way forward.Tip: Le...
11/09/2025

If you’re serious about being an Ethical Hacker, save this roadmap. It’s the fastest, most practical way forward.

Tip: Learn enough defense to understand how attackers are caught. It will make you a smarter hacker. You can jump straight into hacking, but I always recommend that you understand how defenders think.

If you're a complete beginner,
1. Begin with networking + Linux basics
2. Spend more time in hands-on labs than on theory.
3. Join cybersecurity communities, and you’ll grow faster. Don’t learn in isolation

Step 1: Core Foundations
Networking (TCP/IP, routing, firewalls)
Operating Systems: Linux (Kali, Ubuntu), Windows Server basics.
Basic scripting: Python & Bash

Step 2: Cybersecurity Fundamentals
Learn blue team basics (logs, SIEM, IDS/IPS).
Understand the CIA triad & threat models
Security+ or equivalent free resources for structured knowledge.

Step 3: Offensive Security Basics
Learn how attackers think: OWASP Top 10, common exploits.
Tools: Nmap, Wireshark, Burp Suite, Metasploit.
Practice scanning & enumeration on test environments like Tryhackme, Hack The Box, CYBER RANGES, and PortSwigger

Step 4: Web & Network Pentesting
Web application testing (SQLi, XSS, CSRF, file upload bypass).
Network pentesting: privilege escalation, password attacks.
Active Directory basics (most corporate environments use this).

Step 5: Advanced Skills & Certs
Learn exploitation frameworks and custom scripting.
OSCP (Offensive Security Certified Professional) industry gold standard.
Bug bounty ( HackerOne and Bugcrowd) for real-world practice.

This roadmap avoids time wasting and helps you build a strong foundation.

***I am rooting for you!

Someone is counting on you to show up fully today. We underestimate how deeply our daily presence affects others. Someti...
10/09/2025

Someone is counting on you to show up fully today. We underestimate how deeply our daily presence affects others. Sometimes, impact is simply showing up with the right energy.

A word of encouragement, your story, a reminder, a nudge... These can change lives.
..I am rooting for you!

Address

Remote
Abuja

Website

Alerts

Be the first to know and let us send you an email when Felicia Moses posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Share