The Cyber Mentor
Bridging the cybersecurity education gap since 2018. For our full catalog of the most affordable and practical cybersecurity courses on the market, go to https://academy.tcm-sec.com/
Learn more about our hands-on certifications: https://certifications.tcm-sec.com
To sponsor the channel, please visit: https://www.tcm.rocks/Sponsors

How to Chain Vulnerabilities for Impact (PWPE Prep)

Every Cybersecurity Job Explained!

Building a Malicious USB Hacking Device for Only $5

Getting Started with HackTheBox in 2025 | Cheatsheet Inside

How Hackers Establish Persistence

Is this Entry-Level Microsoft Cybersecurity Cert Worth It?!

Meet Bjorn, the Easy to Build Hacking Tool!

How APTs Steal Your Secrets

How to Pass the PNPT: From Zero to Hero!

The Best and The Worst of Cybersecurity Career Advice!

What is the MITRE CVE Program - and Why It Matters So Much

Building an AI Chatbot on a Raspberry Pi

How to Avoid These Cybersecurity Resume Mistakes

Security Operations (SOC) 101 Course - 10+ Hours of Content!

Watch Out for These Common SOC Analysts Mistakes!

The Truth About AI in Cybersecurity

How To Start Hardware Hacking Without Breaking The Bank

How to Get Hired in Cybersecurity in 2025

How to Secure Your WordPress Site in 2025

Must Have Blue Team Tools for SOC Analysts

Defeat the OWASP Top 10 With These 5 Tips!

How to Show Impact With SSRF (in Under 10 Minutes!)

How to Become a Web App Pentester in 2025!

Learn Buffer Overflow Hacking From Zero to Hero!

I Hacked Myself & Analyzed It with Sysmon

The Best FREE Tool to Secure Open Source Software

How to Achieve Your Cybersecurity Goals in 2025

A Hacker's Guide to Cookie Jar Overflow Techniques

3 Powerful WAF Bypass Techniques That Actually Work

What is Broken Access Control? A Quick Guide for Beginners