In this article I’m going to review the study method I used to prepare for, and pass, the CompTIA PenTest+ foundational penetration testing and ethical hacking certification in March 2021. I will start by giving some background to the PenTest+ course content, the preparation I did before beginning study, the materials used and finally I’ll go through the day of the exam itself. I will mainly focus on my exam study style, which can be easily transferred to almost any other tech certification or exam process.

Photo by cottonbro from Pexels

Saying that, as with any CompTIA exam I’ve sat, this is closed book exam…


Open Source Intelligence, or OSINT for short, is a wide ranging skillset which leverages multiple disciplines, methods and sources for collecting and analysing data accessible via publically available sources. Its leveraged by the intelligence communities, military, corporate and financial researchers, and average every day people. Simply googling my LinkedIn profile to discover if I’m competent enough to discuss the matter would be an example of OSINT.

Photo by Andrea Piacquadio from Pexels

My goal with this article is to curate a list of the best freely accessible tools, training & educational resources, and demos to empower all those learning, honing and continuously developing their OSINT skillsets…


Ethical hacking (also known as pen-testing or penetration testing) is a term that covers the intruding practices aiming to discover any threats and significant cybersecurity vulnerabilities that can be found and exploited by an malicious attacker.

Image courtesy of pexels.com

Generally ethical hacking is broken into two seperate but complimentary skillsets: web application penetration testing and network penetration testing. One focuses attacking a targets computer networks via known exploitable weaknesses, the other focuses in discovering and exploiting sofware code vulnerabilities. Either way, the end goal is to discover and leverage vulnerabilities, via exploits to establish a foothold in your target environment, doucmenting

My goal…


So this article started off today as an individual student reaching out to me via LinkedIn asking for some advice. Soon to be graduating, they wanted to know if I had any tips for someone looking to enter any kind of IT role. Their primary interests are in Project Management, Cybersecurity and Networks engineering, and thought I might have some connections they could pursue or advice I could dispense. After putting out a few pointers, I realised that it would be a lot more helpful if I committed these thoughts to something less ephemeral than a LinkedIn chat log. …


Breaking Into infosec: Attitudes and Mindset. text over background of woman using a laptop

One of the main things that people look for when interviewing for junior/starter career InfoSec jobs is passion. . . the willingness to stay-up all night learning the “new thing”, to keep up to date with shifting trends and maybe even be ahead of the curve.

Today though, I want to discuss something I believe is even more important, and a fundamental aspect that’s required for you to succeed in Information Security. That is, your attitude and mindset towards Information Security, where it fits in your organisation, your industry, your community and the wider world.

What do I mean when…


logo of TikTok social media platform

During lockdown, like many, I’d struggled with motivation. Motivation to be productive, work out, to make something of my time. Motivation to work on that summer beach body, to write that one groundbreaking novel or screenplay, to learn to paint or knit or play a guitar. The only things that seemed to be increasing was my waist size, total house watched on Netflix, and my PS4 achievements list. Sure I had some study and certification goals that I was kind of achieving, and I’d started dabbling on offering career advice for folks in IT and Cybersecurity, but nothing consistent.

So…


Foreground text says Breaking Into Infosec A beginners guide to all things “cyber”. Background of young woman using a laptop
Foreground text says Breaking Into Infosec A beginners guide to all things “cyber”. Background of young woman using a laptop

“So you wanna be an “Infosec Rockstar”? And live large. Find zero days, have fast cars? Charge large?”

Sorry, but thats not going to happen here. In fact, it’s probably never going to happen full-stop, and thats a good thing. Information Security isn’t an incredibly glamours life, nor is it one for someone who thinks they can play the lone hero or heroine. However, with consideration and determination, study and hard work, it can be an exceptionally rewarding career path, both intellectually and financially.

But seriously, most people are here as they want to, as the title suggests, “break” into…


The Brief: A UK training company, ISCI, have made an introductory training course, the Certified Network Security Specialist, free for the month of May. This course would be good for a junior cyber security engineer, a networking engineer, or SOC Analyst. It would be useful for those preparing for intermediate CompTIA certifications, such as the Security+ or CySA+ certifications, or as a vendor agnostic addition to your studies for the Cisco CyberOps certification.

  • Please note this article was originally published on Peerlyst in May 2020
Image shows front panel of a networking device
Image shows front panel of a networking device
Photo by Paul Pasiecznyfrom FreeImages

As of May 1st, the International Cybersecurity Institute or ISCI, a UK based training organisation…


  • This article was originally posted in Peerlyst in May 2020

Do you need to provide basic cybersecurity education to your end-users?

Do you want to brush up on your networking and network security skills?

Do you want to add to your cybersecurity toolkit, or move from networking into network security?

Maybe you just want to brush up on firewalls for an upcoming exam?

Well, if you can say yes to any of those things, you’re in luck! So sit back, grab and beverage and let’s get going!

Image shows a keyboard wrapped in metal chains
Image shows a keyboard wrapped in metal chains
Photo by Armin Hanisch from FreeImages

First, because I like providing background to things, let’s talk about Next Generation…


  • Note: This article was originally published in Peerylst in April 2020 and received about 3.5k views before Peerlyst announced they were shutting down*

In this article I’m going to review the study method I used to prepare for, and pass, the CompTIA “CyberSecurity Analyst” aka “CySA+” certification in April 2020. I will start by giving some background to the CySA+ course content, the preparation I did before beginning study, the materials used and finally I’ll go through the day of the exam itself. I will mainly focus on my exam study style, which can be easily transferred to almost any…

Jack Baylor

I’m passionate about cybersecurity, cloud technology and houseplants | Twitter @2wiredSecurity | Awesome August: https://bit.ly/33hVzJ7

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store