Blog

Basic PenTesting 1 Walkthrough

We wanted to do a quick write-up on an easy machine to start out. Basic Pentest 1 is a vulnerable machine you can download from Vulnhub. This machine goes...

Read More

SIM Swapping Attacks: How It Works & How to Protect Yourself

We will cover how attackers perform SIM Swapping attacks and steal your phone while you still have it!

Read More

Cyber Security Back to School List

As the new school year approaches, parents need to protect their children from cyber attacks now more than ever! So just like we make supply lists, we should make...

Read More

Grab Great Udemy Courses on Sale! (2021 Edition)

Some of my favorite Udemy Courses are on sale with some new additions for 2021!

Read More

Books to Start Your Penetration Testing Journey (2021 Edition)

When starting your penetration testing career, it can seem like a lot. There are several terms, tools and attacks to learn. It can be overwhelming. In addition, while learning...

Read More

Dealing With Impostor Syndrome

I wanted to share my recent bout with Impostor Syndrome and provide some tips and words of encouragement for those who also struggle with it.

Read More

Prepping and Passing the GPEN Exam

Please Note – I will follow the GIAC policies and not provide specific details about the course or the exam.  This post will be my recommendations based on my...

Read More

Honest Review: The Pentester Blueprint

My honest review of “The Pentester Blueprint” from Phillip Wylie and Kim Crawley

Read More

Why You are Going to Get Hacked!

Most companies don't know they're hacked for 6 ½ months on average. Even longer when it comes to people. Here are 5 great tips to avoid being a victim!

Read More

How to Install Kali Linux 2020.3

In this article, I will go over the quickest way install the new Kali Linux 2020.3 penetration testing virtual machine. I will also cover some of the changes made...

Read More

How to Install VirtualBox on Your Computer

In this article we’re going to cover how to install VirtualBox Virtualization Software on your computer.

Read More

#ShareTheMicInCyber Recap

Last week, you may have noticed a trending hashtag called #ShareTheMicInCyber on social media. This article is my recap of the event and why it was special! #ShareTheMicInCyber #BlackTechTwitter #Cybersecurity...

Read More

Video: How to Ask for Help Online

Did you ever ask for help or advice online and got no response? This video covers the proper way to reach out to Cyber Security professionals for help!

Read More

Vulnerability Assessments vs. Penetration Tests

People in Cyber Security often get confused about the difference between a vulnerability assessment and a penetration test. This article will explain them.

Read More

Secure Alternatives to Using Google

Google has had its share of privacy issues in the past, leaving people to search for an alternative. Here are some options that are more secure than Google!

Read More

Why You Should Back Up Your Data Regularly

March 31st is World Backup day and we want to explain why you should back up your data regularly. Especially now, with everyone working from home!

Read More

Please Support By Buying a Coffee!!!

If you enjoy InfoSec Unplugged & my other content, PLEASE support by buying me a “coffee”!

I will use it to keep creating content, improving and upgrading equipment & share exclusive content to supporters/members of the #pack! My goal is to produce better quality content to help people start or enhance their careers and/or learn about how they can secure them and their loved ones!

I GREATLY APPRECIATE all the help and support!

Thank You!

Buy Me a Coffee