Channel Avatar

The Cyber Mentor @[email protected]

899K subscribers - no pronouns :c

Bridging the cybersecurity education gap since 2018. For ou


The Last We Heard From Andrew! 😱 Pass The PWPE With These Quick Tips! What Horses Can Teach Us About AI Why Stack Overflows Happen Plugging in a Suspicious Mystery USB Threat Hunting in 3 Easy Steps! Impress Interviewers With This IT Weekend Project! What Is ASLR and Why Does It Matter? How Swiss Cheese is Like Cybersecurity How Bad Characters Can Hold Your Exploits Back! Registry Hack: Clean Up Your Windows Search Bar! How to Write Shellcode in 3 Minutes! Easy Weekend Project to Boost Your IT Resume! Meet Bjorn: The Viking Network Raider! Free Cybersecurity & IT Training From TCM Security! Hacking My Dog's Microchip With a Flipper Zero! How I Almost Got Phished From a Text Message! 3 Tech Books You MUST Read Will AI Replace Your Tech Job in 2025? How Hackers Break Into Servers Through IoT Hardware RIP CVE Program?! How the MITRE Funding Crisis Threatens Cybersecurity Hardware Reverse Engineering with a Logic Analyzer How AI Dating Scams Are Getting Dangerously Smart in 2025 Watch Out for this AI Prompt Injection Hack! How I Landed My First Cybersecurity Job Get Faster on the Linux Terminal with zoxide! Detecting NTFS Timestomping 3 Interview Questions You MUST Ask! Notepad Saves Your Notes - Even If You Don't! How to Find Your First Help Desk Role! Hack Smart Devices For Only $2! Get Hired In Cybersecurity Without Previous Experience Why You Should Start Your Career With IT Help Desk How PNPT Accelerated Camp Will Change Your Career Forever! How I Got Malware From Discord! This Simple Race Condition Made Everything FREE Don't Make This Rookie Mistake as a Professional Pentester Inside the Largest DDoS Attack EVER Decoding Shellcode into Assembly Code - Made Easy! Why You MUST Audit Open Source Tools Before Use Can You Hack a Car With a Flipper Zero? Build Your Own Wi-Fi Pen Testing Device: ESP-32 Marauder TCM Security 2024 Black Friday Cyber Monday Sale is Here! How Often Should You Write Code? 3 Must-Have Skills for SOC Analysts Hack a Smart Safe at the DEF CON IoT Village! Master DOM Invader in 60 Seconds How to Upgrade a Shell on Meterpreter