The PNPT: Pentest Experience Certification

The PNPT: Pentest Experience Certification

The job market in general is tough right now, and cyber security, which is supposed to be a hot field, is flooded with entry-level applicants for what are essentially intermediate-level positions. This may sound a little “doom and gloom,” but if you really want to...
Free Cybersecurity Courses: Where To Begin

Free Cybersecurity Courses: Where To Begin

“How can I learn cyber security for free?” This is a popular question, and honestly, the amount of education that is available for free is immense. The old (or new) adage that “we walk around today with the Library of Alexandria in our pockets” is not that far off...
How Can PCI DSS Compliance Prevent Data Breaches?

How Can PCI DSS Compliance Prevent Data Breaches?

Compliance with cyber security standards sometimes gets a bad rap as a check box that organizations tick off without any real concern for the efficacy of the measures taken to meet those standards. While this can be the case, the requirements of some standards, when...
Password Cracking For Pentesters: A 5-Step Guide

Password Cracking For Pentesters: A 5-Step Guide

One of the first technical needs of a pentester at the outset of an engagement is access, and one of the best ways to gain access is through collecting and cracking password hashes of valid user accounts. The complexity of this process can vary depending on factors...
Professional Pentester Toolbox: TCM Security Picks

Professional Pentester Toolbox: TCM Security Picks

When you’re on a penetration test, the tools you bring with you can make all the difference. Whether you’re attacking a web app, performing reconnaissance on a new target, or even picking a lock during a physical engagement, having the right resources can mean the...