PinnedParker DaudtReviewing the Practical Network Penetration Tester (PNPT) Course Pt. 1It’s been a little over two years since I obtained my last certification, the eWPTX from eLearnSecurity. My primary career focus has been…Sep 20, 2021Sep 20, 2021
Parker DaudtHow to Make Money Selling InfoSec BootcampsThe Thrill of the Cyber ChaseAug 6, 2023Aug 6, 2023
Parker DaudtHow to Hack Your Girlfriend’s Facebook/Instagram Account (2023 Updated)A step by step guide on how to hack your (ex)girlfriend Meta accounts in 2023 May 9, 2023May 9, 2023
Parker DaudtNavigating the Latest Trends in Cyber Security HiringIn today’s rapidly changing digital landscape, cyber security has become a top priority for organizations across the globe. As a result…Mar 21, 2023Mar 21, 2023
Parker DaudtReviewing the Practical Network Penetration Tester (PNPT) Courses Pt. 6Covering the Attacking Active Directory: Initial Attack Vectors and Post-Compromise Attacks modules for the TCM Security PEH CourseNov 2, 2021Nov 2, 2021
Parker DaudtReviewing the Practical Network Penetration Tester (PNPT) Course Pt. 5In Part 4 I covered Practical Ethical Hacking — The Complete Course: Scanning and Enumeration and Exploitation Basics sections. In that…Oct 25, 2021Oct 25, 2021
Parker DaudtReviewing the Practical Network Penetration Tester (PNPT) Course Pt. 4Covering the Scanning & Enumeration and Exploitation Basics modules for the TCM Security Practical Ethical Hacker CourseOct 15, 2021Oct 15, 2021
Parker DaudtReviewing the Practical Network Penetration Tester (PNPT) Course Pt. 3Covering the Ethical Hacking Methodology and Information Gathering Modules for the Practical Ethical Hacker course from TCM SecurityOct 8, 2021Oct 8, 2021
Parker DaudtReviewing the Practical Network Penetration Tester (PNPT) Course Pt. 2Last week I covered the initial sections of the Practical Ethical Hacking — The Complete Course: Before We Begin, and Introduction…Sep 27, 2021Sep 27, 2021