Drop us a line and you’ll discover one other key differentiator: Our follow through.

9 + 8 =

Contact Info

Insights

Cybercriminals are always looking for ways to get a foothold within Windows systems they've compromised.

In today's livestream (6PM ET), I'm going to be covering unprivileged accounts in @RealTryHackMe's Windows Local Persistence room.

https://t.co/0ARhl8urX2

It's been a minute, so it's time to start doing some more @RealTryHackMe walk throughs! Drop by this Weds 6 PM ET), I'm going to be looking at their new room, Windows Local Persistence. We're covering group membership, privileges, and RID highjacking.

youtube.come/c/cyberinsight

My latest video walks through setting up a free #AWS account (using AWS Free Tier), enabling multi-factor authentication (MFA), and configuring a budget limit and alert threshold to help you keep track of any additional spending.

All in 10 mins!

https://t.co/qmZACONsAw

Title

January 7, 2018

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

View [wp-svg-icons icon=”arrow-right-2″ wrap=”i”]

Insights

Cybercriminals are always looking for ways to get a foothold within Windows systems they've compromised.

In today's livestream (6PM ET), I'm going to be covering unprivileged accounts in @RealTryHackMe's Windows Local Persistence room.

https://t.co/0ARhl8urX2

It's been a minute, so it's time to start doing some more @RealTryHackMe walk throughs! Drop by this Weds 6 PM ET), I'm going to be looking at their new room, Windows Local Persistence. We're covering group membership, privileges, and RID highjacking.

youtube.come/c/cyberinsight

My latest video walks through setting up a free #AWS account (using AWS Free Tier), enabling multi-factor authentication (MFA), and configuring a budget limit and alert threshold to help you keep track of any additional spending.

All in 10 mins!

https://t.co/qmZACONsAw

Cybercriminals are always looking for ways to get a foothold within Windows systems they've compromised.

In today's livestream (6PM ET), I'm going to be covering unprivileged accounts in @RealTryHackMe's Windows Local Persistence room.

https://t.co/0ARhl8urX2

It's been a minute, so it's time to start doing some more @RealTryHackMe walk throughs! Drop by this Weds 6 PM ET), I'm going to be looking at their new room, Windows Local Persistence. We're covering group membership, privileges, and RID highjacking.

youtube.come/c/cyberinsight

My latest video walks through setting up a free #AWS account (using AWS Free Tier), enabling multi-factor authentication (MFA), and configuring a budget limit and alert threshold to help you keep track of any additional spending.

All in 10 mins!

https://t.co/qmZACONsAw

Press Releases

Hack Linux Like A Jedi | TryHackMe Pentest+ Kenobi Lab

Hack Linux Like A Jedi | TryHackMe Pentest+ Kenobi Lab

I'm continuing my studying for the Comptia Pentest+ and wanted to walk through another one of the rooms in the TryHackMe learning path for the Pentest+. In the video below, we reviewed and completed the tasks in the Kenobi room. We looked at ways to exploit a Linux...

read more
How to Use Wireshark | TryHackMe Pentest+ Wireshark Lab

How to Use Wireshark | TryHackMe Pentest+ Wireshark Lab

Continuing down the path studying for the Comptia Pentest+, I wanted to team up again with my friend Kiki (the founder of TechSecChix) and do another interactive walkthrough. In the video below, we reviewed and answered the Wireshark room in TryHackMe. Wireshark is...

read more
How to Configure Linux SSH, SSH Keys, and Lynis

How to Configure Linux SSH, SSH Keys, and Lynis

A few weeks ago I did a CompTIA Linux+ lab livestream where we covered how to configure the most used remote management service for Linux, Secure Shell (SSH). We covered key generation and management, as well as how to use the Lynis audit tool to run a SSH best...

read more
How to Manage and Monitor Linux Services and Processes

How to Manage and Monitor Linux Services and Processes

Today we're doing another CompTIA Linux+ lab walkthrough and are covering some of the basic ways to manage and monitor services and processes. We're going to cover tools such Systemd, SysVInit, running processes in the foreground and background, screen, and running...

read more
How To Hack With Metasploit | TryHackMe Pentest+ Lab

How To Hack With Metasploit | TryHackMe Pentest+ Lab

As I continue practicing for the Comptia Pentest+, I wanted to do something special and for this TryHackMe walkthrough, I'm teaming up with my friend Kiki (the founder of TechSecChix). In the video below, we reviewed and answered the Metasploit room in TryHackMe. In...

read more

Title

January 7, 2018

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

View [wp-svg-icons icon=”arrow-right-2″ wrap=”i”]

Title

January 7, 2018

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

View [wp-svg-icons icon=”arrow-right-2″ wrap=”i”]