TCMSecurity Profile Banner
TCM Security Profile
TCM Security

@TCMSecurity

Followers
207K
Following
27K
Media
2K
Statuses
6K

Come learn to hack at TCM Security Academy! Veteran owned. Quality results.

United States
Joined February 2019
Don't wanna be here? Send us removal request.
@TCMSecurity
TCM Security
7 hours
Itโ€™s here! ๐Ÿฅณ. ๐€๐ˆ 100: ๐…๐ฎ๐ง๐๐š๐ฆ๐ž๐ง๐ญ๐š๐ฅ๐ฌ has officially joined the TCM Security Free Tier! Get the building blocks you need to understand the world of neural networks and #LLMs. After taking this free beginner-friendly course, youโ€™ll have the right foundation to
Tweet media one
3
17
87
@TCMSecurity
TCM Security
11 hours
FREE Course Release! LIVE | AI Fundamentals | Q&A
0
6
36
@TCMSecurity
TCM Security
1 day
Will AI ever replace your tech job? ๐Ÿ˜ฑ๐Ÿค–. According to Andrew Bellini (@d1gitalandrew) Thatโ€™s unlikely. But the future belongs to those who can play well with artificial intelligence, and he breaks it down in this short. Want to go deeper and learn not just how to use AI, but
1
1
15
@AccuAir
AccuAir Suspension
5 days
AccuAir's Jeep lift kits deliver uncompromising off-road capability and comfortable handling, providing the perfect balance of adventure and refinement.
0
0
3
@TCMSecurity
TCM Security
1 day
RT @EzenwokePrince: Cybersecurity can drain you mentally. But when you lean on the right community, you gain clarity. And clarity is what tโ€ฆ.
0
3
0
@TCMSecurity
TCM Security
2 days
The need for SOC analysts is expected to grow by 33% over the next decade. If you are looking for a rewarding and sustainable long-term career in cybersecurity, security operations may be the niche for you. Here are some other quick facts about the outlook for SOC analyst jobs:
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
14
81
@TCMSecurity
TCM Security
4 days
An overwhelming number of cybersecurity professionals suffer from #burnout (you yourself might be included.) How do you take steps to combat it? Here are some tips on how you can lessen the impact of burnout, which can cost you your well-being and livelihood. And remember, if it
Tweet media one
3
10
84
@TCMSecurity
TCM Security
5 days
Looking for an ethical hacking roadmap? We've compiled a resource for you based off Heath Adams' blog post & video on how you can get started with #pentesting! Let's get started on how you build a foundation for ethical hacking success โฌ‡๏ธ. ๐—•๐˜‚๐—ถ๐—น๐—ฑ ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—œ๐—ง
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
3
31
@DB_Squadra
DRAGON BALL GEKISHIN SQUADRA
27 days
BIG NEWS, Dragon Ball Fans!.Pre-register now and join Goku on day one!.Get exclusive launch rewards and rare items.Will you be the first to experience it?.
1
11
111
@TCMSecurity
TCM Security
5 days
Want to become a #SOC Analyst? The PSAA (Practical Security Analyst Associate) is waiting to help you launch your career. Get the info you need to succeed and crush SOC Tier 1 - 2 roles with the upcoming SOC Level 1 Live: Any SOC analyst who wants to be
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
8
61
@TCMSecurity
TCM Security
5 days
What if we told you that just a single HTML tag could quietly reroute a userโ€™s CSS, JavaScript, images, and even their form submissions to a server that we control, but without any #XSS?. Enter Base Tag Injection. Watch this video by Alex (@appSecExp) to see exactly how it works.
Tweet media one
0
4
13
@TCMSecurity
TCM Security
6 days
Have you used the #BurpSuite tool Dom Invader yet? Alex (@appSecExp) walks you through how to effectively use it to find vulnerabilities like prototype pollution and cross-site scripting (XSS) in 60 seconds. Let us know if you try it for yourself!. Want to go further? Practical
0
2
14
@TCMSecurity
TCM Security
7 days
A penetration testing report is the key deliverable from an ethical hacker or penetration tester. But did you know these reports can vary greatly in format and detail?. Some firms may provide just raw scan results, while others offer comprehensive reports that can exceed 100
Tweet media one
0
3
25
@TCMSecurity
TCM Security
7 days
It's been a minute since we plugged our completely #free tier. Now up to five courses, the TCM Security Academy free tier includes 25+ hours of content like: . ๐—ฃ๐—ฟ๐—ผ๐—ด๐—ฟ๐—ฎ๐—บ๐—บ๐—ถ๐—ป๐—ด ๐Ÿญ๐Ÿฌ๐Ÿฌ, an intro to Python that walks you through the core essentials of programming you need to
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
17
88
@TCMSecurity
TCM Security
7 days
LIVE: Web Hacking | Pentesting | AppSec | Cybersecurity | AMA
1
7
31
@TCMSecurity
TCM Security
8 days
How do you stay safe in a world where social engineering attacks are on the rise? Alex has some tips in today's reel! He suggests safeguarding your personal information, trusting your instincts, and slowing down as panicking can make you much more vulnerable. What would you
1
1
15
@TCMSecurity
TCM Security
9 days
Looking for some Red Team projects to color your resume? We've got a few ideas for you! We'd love to hear any ideas from the community as well, so leave your thoughts in the comments and let's learn from each other. Remember, we have several courses and certification exams
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
5
54
@TCMSecurity
TCM Security
10 days
Active Directory is packed with powerful features, but some features like the LLMNR protocol can be a prime target for attackers. LLMNR is often exploited or โ€œpoisonedโ€ by attackers to gain access to sensitive systems. Understanding this and knowing how to mitigate against it is
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
23
152
@TCMSecurity
TCM Security
10 days
Watch the #PowerShell course here:
@gossy_84
Adam Goss
11 days
Stop ignoring PowerShell. ๐Ÿ›‘. This crash course from @TCMSecurity shows you how to master the command line for security:. โœ… Learn the core commandlets. โœ… Understand PowerShell objects. โœ… Chain commands with the pipeline. โœ… Filter output to find what you need.
Tweet media one
0
29
126
@TCMSecurity
TCM Security
10 days
The grind is tough, but you are, too.
Tweet media one
2
0
56
@TCMSecurity
TCM Security
11 days
Should you consider becoming a professional hacker? Alex takes a pragmatic look at this career in this video, where he weighs both the pros and cons of this role that can be exciting and fun, but also demanding. What do you think? Tell us where you stand!
Tweet media one
1
3
24
@TCMSecurity
TCM Security
11 days
Want to level up your skills, or just figure out where to start? The TCM Security Academy has something for every stage of your #cybersecurity journey, including foundational courses. And yep, some are even free. ๐ŸŽ‰ Grab your All-Access Membership here:
Tweet media one
Tweet media two
Tweet media three
Tweet media four
5
21
120