Drop us a line and you’ll discover one other key differentiator: Our follow through.
Insights
Network🛜 and Cloud☁️ Bundle!
Been a minute...but I'm giving away 4 Bundles including 14 Books covering Linux, network automation, @PaloAltoNtwks , @WiresharkNews, @googlecloud and @Azure Networking, and a lot more!
To Win:
🗣️ Comment below saying why you want it
🔁 Repost this…
Check out this video I did a while back where I broke down NIST 800-53 from my perspective and how it is applicable to engineers.
Had the opportunity to go chat with some college/high school students interning at @blu3cloak!
Hey @bdawgjay, notice these cyber knife hands 😂
Title
Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.
Insights
Network🛜 and Cloud☁️ Bundle!
Been a minute...but I'm giving away 4 Bundles including 14 Books covering Linux, network automation, @PaloAltoNtwks , @WiresharkNews, @googlecloud and @Azure Networking, and a lot more!
To Win:
🗣️ Comment below saying why you want it
🔁 Repost this…
Check out this video I did a while back where I broke down NIST 800-53 from my perspective and how it is applicable to engineers.
Had the opportunity to go chat with some college/high school students interning at @blu3cloak!
Hey @bdawgjay, notice these cyber knife hands 😂
Network🛜 and Cloud☁️ Bundle!
Been a minute...but I'm giving away 4 Bundles including 14 Books covering Linux, network automation, @PaloAltoNtwks , @WiresharkNews, @googlecloud and @Azure Networking, and a lot more!
To Win:
🗣️ Comment below saying why you want it
🔁 Repost this…
Check out this video I did a while back where I broke down NIST 800-53 from my perspective and how it is applicable to engineers.
Had the opportunity to go chat with some college/high school students interning at @blu3cloak!
Hey @bdawgjay, notice these cyber knife hands 😂
Press Releases
CISCO 802.1Q KING | Build and Secure Switchport Trunks
Jul 1, 2020
Today’s topic was requested on Twitter, to talk a little bit about how to build Cisco switchport trunks and specifically how to improve their security configurations. We're going to take a look at how to configure them, what are some security best practices, and Layer...
Hack a Bachelor’s Degree In 2 Years | Fast Track IT And Cyber Degrees
Jun 15, 2020
Do you want to know how to hack a four-year degree in two years and save yourself tens of thousands of dollars? This topic excites me because it's something that I try to share with people as much as I can. I'll show you a few specific hacks that you can use to both...
Exorcise Your IPv6 Demons | IPv6 Subnetting, VLSM, CIDR
May 29, 2020
We're going to be talking about something that strikes fear into the heart of both seasoned and new IT folks alike: IPv6. While IPv6 is new to a lot of folks, this blog's purpose is to walk you through step by step some high-level points, and show you how it's really...
This Framework Helps New Engineers Secure IT Environments | NIST 800-53 Breakdown
Apr 21, 2020
This blog introduces a useful framework for new engineers trying to figure out how to securely build out IT environments. For new people, it's kind of hard to have a good idea of what are some best practices from a security perspective. The following is a breakdown of...
Six Must Have Tools For Network Engineers | Visio, Putty, Wireshark, WinSCP, Python, and Notepad++
Apr 1, 2020
This blog introduces six industry-standard tools and applications that will be heavily relied upon on a daily basis by network engineers. These are tools that those who aim to be network engineers should familiarize themselves with....
Learn to Subnet by Visualizing Networks Like Tetris
Mar 17, 2020
One thing I've noticed in the Infosec/Cyber community (and in the IT community as well, if we're being completely honest) is a little bit of fear over truly understanding how to subnet. There are many methods out there and some of them work for some people, but...
Network Knowledge: #30DaysofJuniper Part 1
Feb 27, 2020
Today’s blog post is the first part of our #30DaysofJuniper information sharing campaign. For the past month, we have been posting daily tips on Juniper configurations to help novice and experienced engineers alike. This is our second campaign like this, as we...
Screen Crab: The Favorite Tool of Bothan Spies
Jan 20, 2020
This is our second review article of the Hak5 pentesting tools. After previously covering the Shark Jack, today we will be focusing on the Screen Crab. Hak5 bills the Screen Crab as a "stealthy video man-in-the-middle implant." It sits inline between an end device and...
Network Knowledge: #30DaysofCisco Part 2
Jan 9, 2020
Today's blog post is the second and final part of our #30DaysofCisco information sharing campaign. For a little over the past month, we have been posting daily tips on Cisco configurations to help novice and experienced engineers alike. This campaign was inspired by...
Shark Jack: The Baby Yoda of Network Attack Tools
Dec 31, 2019
This past Black Friday, I went on a bit of a hacking tools shopping spree at Hak5. Today, I'm going to give a brief rundown of their Linux based network attack tool call Shark Jack (and why it's similar to Baby Yoda). Shark Jack is to be used in environments where you...
Title
Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.
Title
Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.