- Hacking Applied: Mr. Robot CTF
- A Guide to Linux Privilege Escalation Attacks (Part II)
- A Guide to Linux Privilege Escalation Attacks (Part I)
- Hacking Applied: Getting Root Access with Metasploit
- Introduction to Metasploit
- Hands on Hacking: Initiating a Reverse Shell & Conducting Privilege Escalation with BurpSuite
- Introduction to BurpSuite, Part II
- Introduction to BurpSuite, Part I
- Suricata, Part II: The YAML File
- Python Project: Intelligent Chatbot using the spaCy NLP Library
- Intro to Backups, Part II: Restoring Backups
- Introduction to Suricata
- Linux: How to Configure Static IPs and Transparent Bridges, Block IPs, and Make Startup Programs with rc.local
- Intro to Backups: How to Conduct Encrypted Backups Using Duplicity
- Capturing the Right Packets with tcpdump: Filters
- Capturing a Password with Wireshark & tcpdump: Why Encryption Is Essential
- Python Project: Portfolio w/ SQLAlchemy
- Python Project: Storing Inventory w/ SQLAlchemy
- Python Project: Phrase Hunter Game (Object-Oriented Programming)
- Python Project: Basketball Stats Tool
- Python Project: Numbers Guessing Game
- How To Set Up a Secure & Self-Hosted Cybersecurity Portfolio with WordPress