by Josh Daniels | Feb 12, 2025 | Learning, Penetration Testing
What is the purpose of a pentester certification? What should you know? What should you be able to do? If you pass a TCM exam, you can rest assured that you can do what a pentester does – because you did it during the exam. Our associate-level pentest exam, The...
by Alex Tushinsky | Jan 22, 2025 | Learning, Programming
Due to its simplicity and enormous library, Python has long been the go-to language of the hacking community, but learning C# can make you a more versatile and in-demand ethical hacker. I’m not suggesting that you abandon Python in favor of C#, but instead use C# on...
by TCMS Staff | Sep 20, 2024 | Learning
Overview: What is Time Management?Tools for Time ManagementCreating TasksEvaluating TasksPlanning a Sprint (or Week)Tips on Task ExecutionConclusion Overview: What is Time Management? Time management is the process of planning out activities and tasks that you want to...
by TCMS Staff | Sep 11, 2024 | Learning
Imagine that you are visiting a new town for the first time and your cell phone dies before you’re able to pull up directions or order a cab. You would likely wander aimlessly until someone offers you help. Now imagine you are the only person in that town. That...
by Alex Olsen | Aug 30, 2024 | Learning
Overview HackTheBox (HTB) is a well-known and challenging platform for developing and honing cybersecurity skills. Breaking into HackTheBox is a difficult, but overall rewarding challenge. Thankfully, over the years it has become somewhat more accessible. Today, we...
by TCMS Staff | Aug 23, 2024 | Learning
Overview Imposter syndrome can present a major hurdle for all of us in cybersecurity. Even after dedicating countless hours to studying and training, that nagging sense of self-doubt can make us question our skills and abilities. However, it’s important to...