Beta

Explorez tous les épisodes de The Hacker's Cache

Plongez dans la liste complète des épisodes de The Hacker's Cache. Chaque épisode est catalogué accompagné de descriptions détaillées, ce qui facilite la recherche et l'exploration de sujets spécifiques. Suivez tous les épisodes de votre podcast préféré et ne manquez aucun contenu pertinent.

Rows per page:

1–42 of 42

DateTitreDurée
01 Jul 2024#0 Security Is Not Everybody’s Responsibility00:30:23

In this episode, I introduce myself, Kyser Clark, and share my background in cybersecurity. I talk about my experience as a client systems technician in the United States Air Force and my transition into penetration testing. I also discuss my certifications and educational background in cybersecurity. I explain the purpose of this podcast, which is to provide value to the cybersecurity community and learn from industry professionals. I'll outline the upcoming episodes and the topics that will be covered. I conclude with a hot take on the responsibility of end users and the importance of designing secure networks. 

Takeaways:

  • Kyser Clark has a background in cybersecurity and worked as a client systems technician in the United States Air Force before transitioning into penetration testing.
  • He has obtained several certifications in cybersecurity and is currently pursuing a master's degree in cybersecurity management and policy.
  • The purpose of the podcast is to provide value to the cybersecurity community and learn from industry professionals.
  • Upcoming episodes will cover topics such as offensive security, CTF competitions, penetration testing, and the correlation between cybersecurity and everyday life.
  • Kyser believes that security is not everyone's responsibility and that the focus should be on designing secure networks rather than relying on end users to be vigilant.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

02 Jul 2024#1 Do Something Great in the World ft. Joshua Ragland00:36:57

The conversation covers a wide range of topics related to cybersecurity, including the background and career journey of the guest, the importance of offensive security, the cybersecurity skills shortage, strategies for excelling in CTF competitions, and the correlation between cybersecurity and everyday life. The guest also shares insights on preventing burnout and the impact of cybersecurity attacks on society.

Connect with Joshua Ragland on Linkedin: https://www.linkedin.com/in/7h3-gh05t/

Takeaways:

  • The importance of offensive security and the transition from generalist to specialist in cybersecurity careers.
  • The correlation between cybersecurity and everyday life, emphasizing the impact of cybersecurity attacks on society.
  • Strategies for excelling in CTF competitions and the significance of preventing burnout in the cybersecurity field.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

02 Jul 2024#2 Transition From Pentester to Senior Pentester ft. Adolfo (Val) Vask00:37:05

Adolfo (Val) Vask, a seasoned cybersecurity professional, shares insights on his journey from intelligence analysis to penetration testing and red teaming. He discusses certifications, the MetaSploit Pro Specialist, the relevance of education in cybersecurity, and the transition from penetration tester to senior penetration tester. He also provides valuable advice on training, note-taking, and maintaining technical skills as a leader in cybersecurity.

Connect with Val Vask on LinkedIn: https://www.linkedin.com/in/adolfo-vask/

Takeaways

  • Val Vask's transition from intelligence analysis to cybersecurity showcases the diverse paths available in the field.
  • Certifications and the relevance of education in cybersecurity play a significant role in career development.
  • Val Vask emphasizes the importance of maintaining technical skills and continuous learning, even in leadership positions.
  • Training to improve job performance rather than to obtain certifications is a valuable approach in cybersecurity.
  • Effective note-taking and note-taking apps are essential for cybersecurity professionals to document and retain valuable information.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

10 Jul 2024#3 Best Way to Learn Active Directory Hacking Skills ft. Robert O’Connor00:39:17

The conversation between Kyser Clark and Robert O'Connor covers a wide range of topics related to penetration testing, certifications, career progression, and personal experiences in the cybersecurity field. Robert shares insights on his journey from IT intern to senior analyst to penetration tester, discussing certifications, specialization in Active Directory assessments, and the challenges of transitioning into pen testing. The conversation also goes into the nuances of different types of pentesting, the impact of imposter syndrome, and the evolving landscape of pen testing roles in the industry.

Connect with Robert O'Connor on LinkedIn: https://www.linkedin.com/in/robert-o-connor-16634a164/

Takeaways

  • The journey from IT intern to senior analyst to penetration tester highlights the diverse career paths within the cybersecurity field.
  • Specialization in Active Directory and internal network assessments is a key focus for some penetration testers.
  • The challenges of transitioning into pentesting, including imposter syndrome and the need for support and collaboration, are important considerations for individuals entering the field.
  • The evolving landscape of pentesting roles in the industry, focusing on web app and cloud assessments, presents opportunities and challenges for aspiring penetration testers.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

17 Jul 2024#4 A Vulnerability Assessment Isn't a Pentest ft. Kristofer Johnson00:36:26

Kyser Clark and Kristopher Johnson's conversation covers various topics related to offensive security, certifications, career progression, and distinguishing between vulnerability assessments and penetration tests. Kristopher shares his journey into offensive security, his challenges, and the importance of continuous learning and perseverance. The conversation also goes into the significance of different certifications, the value of practical experience, and the need for clear differentiation between vulnerability assessments and penetration tests. Additionally, the discussion highlights the relevance of LinkedIn for career growth and networking within the cybersecurity industry.

Connect with Kristofer Johnson on LinkedIn: https://www.linkedin.com/in/kjohnson422/

Takeaways

  • Continuous learning and perseverance are essential for success in offensive security.
  • Clear differentiation between vulnerability assessments and penetration tests is crucial for accurate testing and reporting.
  • LinkedIn is a powerful platform for career growth and networking within the cybersecurity industry.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

24 Jul 2024#5 Pay It Forward ft. George Raileanu00:39:24

In this conversation, George Raileanu discusses the importance of mentoring, strategies for finding a mentor, and the benefits of building a strong network in cybersecurity. He also shares advice on continuous learning, dealing with imposter syndrome and burnout, and the value of paying it forward in the industry.

Connect with George Raileanu on LinkedIn: https://www.linkedin.com/in/george-raileanu/

Takeaways

  • Mentoring is a crucial aspect of career development in cybersecurity, regardless of experience level.
  • To find a mentor, attend local cybersecurity conferences, join online communities, and reach out to professionals in the field.
  • Building a strong network in cybersecurity involves being genuine, reaching out to like-minded individuals, and asking for advice and guidance.
  • Continuous learning in cybersecurity requires understanding your learning style, considering your flexibility, and identifying your goals.
  • Dealing with imposter syndrome and burnout involves finding hobbies outside of technology, checking in with yourself regularly, and recognizing your progress.
  • Paying it forward by sharing knowledge and experiences with others is essential for personal growth and the advancement of the cybersecurity community.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

31 Jul 2024#6 Is AI Going to Cause Bad Stuff? Of Course, Everything Does ft. Mike Finkel00:31:33

In this conversation, Kyser Clark interviews Mike Finkel, a penetration tester, about his background and experiences in the cybersecurity field. They discuss certifications, the importance of customer service skills in pentesting, and the role of AI in the industry. Mike shares his hot take on AI, expressing his excitement for its potential in pentesting. They also touch on the value of getting out of one's comfort zone and overcoming social anxiety. Overall, the conversation provides insights into pentesting and the skills and knowledge needed to succeed.

Takeaways

  • Certifications such as OSCP, OSWE, and CRTP can be valuable in pentesting, providing a baseline of knowledge and helping with specific areas like web application testing and source code review.
  • Customer service skills are important in pentesting, as effective communication with clients can lead to better relationships and repeat business.
  • Getting out of your comfort zone and overcoming social anxiety can benefit personal and professional growth.
  • AI is a hot topic in the cybersecurity field, with potential applications in pentesting, but it should be used with caution and not relied upon as the sole solution.
  • AI tools like ChatGPT can be helpful in research and information gathering, but their results should be verified and not blindly trusted.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

07 Aug 2024#7 Think Outside the Box to Land First Pentesting Job ft. Ryan Daub00:32:28

In this conversation, Kyser Clark interviews Ryan Daub, an Offensive Security Analyst Associate, about his journey in cybersecurity and his current role as an internal penetration tester for healthcare organizations. They discuss topics such as landing a job in cybersecurity, the role of AI in penetration testing, the differences between internal and consulting pentesting, the importance of collaboration between red and blue teams, and the value of continuous learning in the field. Ryan also shares his advice for aspiring cybersecurity professionals.

Connect with Ryan Daub on LinkedIn: https://www.linkedin.com/in/ryan-daub-b87b9b216/

Takeaways

  • Landing a job in cybersecurity requires dedication, self-awareness, and demonstrating your skills through personal projects and documentation.
  • AI is a useful tool in penetration testing, but it is not yet capable of fully automating the process due to the complexity and constant evolution of technology and environments.
  • The role of an internal penetration tester in healthcare organizations involves conducting compliance testing, red team engagements, and collaborating closely with the blue team.
  • Continuous learning and staying up to date with industry trends and certifications, such as OSCP and CRTO, are essential for career growth in offensive security.
  • Collaboration and knowledge sharing within the cybersecurity community are crucial for personal and professional development.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

14 Aug 2024#8 Cybersecurity Is a Beautiful Field: There's People That Don't Like Me ft. Aaron Tran00:35:14

Kyser Clark interviews Aaron Tran, a military veteran who successfully transitioned into a career in cybersecurity. They discuss Aaron's journey from the military to becoming a penetration tester, the challenges he faced, and the steps he took to bridge the gap between non-cyber and cyber roles. They also touch on the importance of having a plan and utilizing resources like the SkillBridge internship program. Aaron shares his insights on paying ransomware demands, the value of the TCM Practical Career Ready Professional program, and the need for kindness and collaboration in the cybersecurity field.

Connect with Aaron Tran on LinkedIn: https://www.linkedin.com/in/aarontran-anasec/

Takeaways

  • Having a plan is crucial when transitioning from the military to a career in cybersecurity
  • Utilize resources like the SkillBridge internship program to gain real-world experience
  • Paying ransomware demands is not recommended, but there may be situations where it's the only option
  • The TCM Practical Career Ready Professional program can provide valuable training and networking opportunities
  • Soft skills are essential in cybersecurity, as they help with client interactions and job interviews
  • Don't let the noise and conflicting advice in the cybersecurity field discourage you
  • Reach out to fellow veterans for support and camaraderie
  • Kindness and collaboration are important in the cybersecurity field

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

21 Aug 2024#9 Red Teaming & Malware Development ft. Nathan Rice00:35:04

In this conversation, Kyser Clark interviews Nathan Rice, a senior penetration tester, about his background and experience in cybersecurity. They discuss the differences between penetration testing and red team operations, the importance of starting with penetration testing before moving to red teaming, and the challenges and rewards of obtaining certifications. They also touch on the skills required for malware development and the importance of staying up to date with evolving techniques. Nathan shares advice for aspiring red team operators and emphasizes the need to be proactive and not be afraid to ask questions.

Connect with Nathan Rice: https://www.linkedin.com/in/nathan-rice-b52209123/

Takeaways

  • Penetration testing and red team operations have distinct differences, with red teaming requiring more patience, stealth, and intent to emulate real-world threat adversaries.
  • Starting with penetration testing before transitioning to red team operations is recommended, as the skills learned in penetration testing translate well to red teaming.
  • Obtaining certifications in cybersecurity, such as OSCP and OSEP, can be challenging and may require multiple attempts, but they provide valuable knowledge and recognition in the field.
  • Malware development skills are important for red team operators, as having the ability to create custom tools and bypass EDRs is crucial for success.
  • Aspiring red team operators should not be afraid to ask questions, be proactive, and not get caught up in analysis paralysis. Getting caught is part of the learning process and should be used as an opportunity to improve.
  • Moving with intent and being able to think creatively are essential skills for red team operators, as they need to constantly adapt and find new ways to bypass defenses.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

28 Aug 2024#10 Breaking into Cybersecurity: Tips from a Pro ft. Jake Mayhew00:39:04

In this conversation, Kyser Clark interviews Jake Mayhew, a senior penetration tester, about his background and experiences in cybersecurity. They discuss the importance of internships, the value of creating a home lab, and the benefits of networking at local conferences and meetups. Jake also shares advice for job seekers, including the significance of standing out through proactive actions like writing reports and asking questions. Jake Mayhew and Kyser Clark discuss their favorite hacker movies and shows, as well as their experiences with different hacking certifications. They also explore the challenges of pursuing higher-level certifications and offer advice for those entering the cybersecurity field. The conversation concludes with a discussion on the importance of perseverance and community involvement in the job search process.

Connect with Jake Mayhew: https://www.linkedin.com/in/jake-mayhew-osce-oscp/

Takeaways

  • Internships can be a valuable way to gain experience and get your foot in the door in the cybersecurity field.
  • Creating a home lab and actively using it to learn and practice cybersecurity skills can demonstrate your passion and dedication to potential employers.
  • Attending local conferences and meetups can provide opportunities for networking and building relationships with professionals in the industry.
  • Proactively standing out in the job search process, such as by writing reports or asking questions, can make a candidate more memorable and increase their chances of getting hired.
  • Continuous learning and pursuing certifications can help job seekers demonstrate their commitment to improving their skills and staying up-to-date in the field. 
  • The OSCP certification is highly regarded and a good starting point for those interested in network penetration testing.
  • Higher-level certifications like OSEP, OSWE, and OSED require a deeper understanding of specific topics and may be more challenging.
  • Real-world experience and practical application of skills are crucial for success in advanced certifications.
  • Perseverance is key in the job search process, as rejection is common in the cybersecurity field.
  • Getting involved in the cybersecurity community can provide valuable networking opportunities and support.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

04 Sep 2024#11 Stay Creative Together: Insights from Nouha Ben Brahim00:34:26

Kyser Clark interviews Nouha Ben Brahim, a Python programmer turned bug bounty hunter and founder of No Breach. They discuss Nouha's journey into cybersecurity, the most concerning cyber breach, common web hacking vulnerabilities, becoming a speaker at events, starting a cybersecurity company, and Nouha's podcast, The Hackers Line.

Connect with Nouha Ben Brahim on LinkedIn: https://www.linkedin.com/in/nouha-ben-brahim-4b749b278/

Takeaways

  • Transitioning from programming to bug bounty hunting requires experimentation and learning the basics of hacking.
  • Common web hacking vulnerabilities include GraphQL flaws, authentication issues, and IDOR.
  • To become a speaker at events, choose a topic that tells a compelling story and resonates with the audience.
  • Starting a cybersecurity company requires building trust, providing high-quality solutions, and staying up to date with industry trends.
  • Podcasts are a valuable platform for sharing knowledge and connecting with experts in the cybersecurity field.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

11 Sep 2024#12 Why OSCP Might Not Be Worth It - A Surprising Take by Evan Isaac00:37:52

Kyser Clark and Evan Isaac discuss their experiences and insights in cybersecurity. They cover topics such as certifications, content creation on LinkedIn, web hacking resources, job searching advice, and the importance of offensive and defensive cybersecurity skills.

Connect with Evan Isaac on LinkedIn: https://www.linkedin.com/in/evan-isaac/

Takeaways

  • Certifications like OSCP and eWPTX are valuable in cybersecurity, but other certifications like PMPT and CPTS are gaining recognition.
  • Creating content on LinkedIn and other platforms can help build your personal brand and network in the cybersecurity industry.
  • Web hacking resources like PortSwigger Academy, TryHackMe, and Hack The Box are great for learning and practicing web application security.
  • When searching for a job, networking and building connections are crucial. Contact recruiters and professionals in the field, and consider posting content to showcase your knowledge and skills.
  • Both offensive and defensive skills are essential in cybersecurity. Gaining experience in blue team roles can provide valuable insights for red teaming and penetration testing.
  • Stay consistent, never give up, and continue learning and growing in cybersecurity.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

18 Sep 2024#13 Hacking Time: Real World Skills They Don't Teach You | Trent Darrow00:39:32

Kyser Clark interviews Trent Darrow, a senior penetration tester and cyber protection team crew lead. They discuss Trent's background, certifications, and his role in building a red team. They also touch on ethical dilemmas in the industry, the effectiveness of certifications in preparing for real-world pen testing, and the importance of skills like time management and effective communication. In this conversation, Trent and Kyser discuss time management in cybersecurity exams, the challenges of scanning large networks, the role of a cyber warfare technician, the transition between civilian and military careers, strategies for preparing for the OSCP and OSEP exams, the value of participating in CTFs, and the future of the cybersecurity field.

Connect with Trent Darrow on LinkedIn: https://www.linkedin.com/in/trenton-darrow/

Takeaways:

Trent's background spans help desk, IT specialist roles, network engineering, and cybersecurity contracting, with certifications like OSCP, GCFA, GWAPT, GPEN, and GCPN.

Real-world skills like time management, note-taking, and communication are crucial, differing from those needed for exams or CTFs.

Ethical dilemmas, such as downgrading findings to please clients, can be common in the industry.

Preparing for certifications like OSCP and OSEP requires practice, extensive note-taking, and ensuring tools work properly through a proxy.

AI isn't a threat to cybersecurity jobs, but learning web application security is essential for staying competitive.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

25 Sep 2024#14 Social Engineering Unleashed: DEF CON Insights from Jacob Villarreal00:34:24

Kyser Clark interviews Jacob Villarreal, a penetration tester, about his journey into the cybersecurity field, his experiences at DEFCON, and various topics related to cybersecurity. Jacob shares his background, including his education, certifications, and transition from IT roles to penetration testing. The discussion covers the importance of networking, volunteering at conferences, and key cybersecurity issues such as biometrics, automation, boot camps, and the role of certifications. Jacob also offers insights into social engineering and advice for those interested in pursuing a cybersecurity career. 

Connect with Jacob Villarreal on LinkedIn: https://www.linkedin.com/in/jacob-villarreal-utsa/

Takeaways:

  • Cybersecurity should be a top priority for companies, but financial considerations often take precedence.
  • Networking is crucial in the cybersecurity field and can lead to valuable connections and opportunities.
  • Social engineering is an important skill for red teamers, and building rapport and trust is essential in these engagements. Studying sales techniques can be helpful in this regard.
  • Conferences like DEFCON offer valuable learning and networking opportunities, though the cost should be carefully considered.
  • Engaging in conversations with people in public settings can improve social skills and lead to unexpected connections.
  • Reaching out to professionals in the cybersecurity field through platforms like LinkedIn can provide valuable insights and advice.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

02 Oct 2024#15 From Zero to Hero: How Anyone Can Succeed in Cybersecurity00:34:28

In this solo episode, Kyser Clark discusses the accessibility of cybersecurity careers, emphasizing that anyone can enter the field regardless of their background. He shares his personal journey from blue-collar jobs to becoming a penetration tester, highlighting the importance of certifications and continuous learning. Kyser provides actionable steps for breaking into cybersecurity, including gaining tech experience, obtaining certifications, and effectively marketing oneself. He concludes by encouraging listeners to remain persistent and adaptable in their job search, reminding them that while anyone can enter the field, competition is fierce.

Takeaways

  • Anyone can get into cybersecurity regardless of background.
  • Certifications are often more beneficial than college degrees.
  • Learning from failure is a crucial part of the process.
  • You don't need to be good at math to work in tech.
  • Discipline and hard work are essential for success.
  • Aggressive patience is key in the job search process.
  • Rejections are often due to cultural fit, not skill level.
  • Networking and marketing oneself are vital for job hunting.
  • Internships are a great way to gain experience.
  • Continuous learning is necessary to advance in cybersecurity.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

09 Oct 2024#16 Why Cybersecurity Is Stressful and How to Succeed with Opeyemi Kolawole (Hacking Insights)00:38:56

Kyser Clark interviews Opeyemi Kolawole, a full-time red teamer and cybersecurity professional. They discuss Opeyemi's background in biology and his transition into the cybersecurity field. Opeyemi shares his experience and insights on various certifications, including the Cyberwarfare Lab Certified Red Team Analyst (CPTA) and the importance of staying up to date in the field. They also discuss the benefits of building a personal brand on platforms like LinkedIn and YouTube.

Connect with Opeyemi on LinkedIn: https://www.linkedin.com/in/opeyemi-v-kolawole/

Takeaways

  • Transitioning from a different field into cybersecurity is possible with passion and dedication.
  • Certifications like the Cyberwarfare Lab Certified Red Team Analyst (CPTA) can be valuable for starting a career in red teaming.
  • Staying up to date and continuously learning is crucial in the cybersecurity field.
  • Building a personal brand on platforms like LinkedIn and YouTube can help establish credibility and connect with others in the industry.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

16 Oct 2024#17 Unpacking Bug Bounty Strategies with RootSploit: Zero Days, Recon, and Vulnerabilities00:37:18

Cybersecurity professionals Kyser Clark and Pranit Garud (RootSploit) discuss their experiences in the field. They cover topics such as bug bounty programs, the role of an offensive security engineer, and the differences between consulting and working for a Fortune 500 company. Pranit shares tips for getting started in bug bounty hunting and emphasizes the importance of understanding the business logic of a company. He also highlights the need for a mindset shift when transitioning from consulting to an internal security role.

Connect with Pranit on LinkedIn: https://www.linkedin.com/in/pranit-garud/

Takeaways

  • Bug bounty hunting requires a proactive and research-oriented mindset, as well as a deep understanding of the target company's technologies and business logic.
  • Working as an offensive security engineer in a Fortune 500 company offers the opportunity to see the inner workings of the organization and make a greater impact on security.
  • Transitioning from consulting to an internal security role requires a shift in focus from exploitation to securing and collaborating with developers.
  • Building a close relationship with developers and understanding their challenges can lead to more effective security measures.
  • The pace of work in a Fortune 500 company may be slower due to approval processes and the need for careful consideration of potential impacts.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

23 Oct 2024#18 16 Years in IT, Now a Fortune 100 Pentester: 0xD1CE Shares His Journey00:30:16

Kyser Clark interviews 0xD1CE, a seasoned penetration tester, who shares his extensive journey from IT to cybersecurity. 0xD1CE discusses his various roles, certifications, and the impact of COVID on his career shift. The conversation gets into the differences between consulting and internal roles, the value of certain cybersecurity certifications, and the emerging trends in AI testing. 0xD1CE also provides insights on how to succeed in obtaining the OSEP certification and emphasizes the importance of self-research in career development.

Takeaways:

  • 0xD1CE transitioned from IT to cybersecurity due to a growing interest sparked by his blue team experience.
  • Consulting roles differ significantly from internal testing roles, impacting work pace and responsibilities.
  • AI testing is an emerging field with limited resources available for training.
  • Self-research and initiative are crucial for career growth in cybersecurity.
  • The Network+ certification may be overrated in the context of penetration testing.
  • Hands-on experience and practical knowledge are essential for success in certifications like OSEP.
  • Web application testing is a critical skill for penetration testers, especially in consulting roles.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

30 Oct 2024#19 Beating the Odds in Cybersecurity: What It Really Takes ft. James Scott00:35:39

Kyser Clark interviews James Scott, a cybersecurity professional with a diverse background in the military and digital forensics. They discuss James's journey into penetration testing, the challenges he faced in landing his first role, and the importance of networking and creating personal tools. The conversation also covers the significance of programming skills in cybersecurity, the value of digital forensics knowledge, and the impact of volunteering at conferences. James shares insights on pursuing a PhD in cybersecurity, focusing on weaponizing forensics and compliance training. The episode concludes with advice on persistence and standing out in a competitive field.

Connect with James Scott on Linkedin: https://www.linkedin.com/in/james011616/

Takeaways

  • Networking is crucial for career growth in cybersecurity.
  • Persistence is key; never give up on your goals.
  • Creating your own tools can set you apart from others.
  • Digital forensics knowledge enhances penetration testing skills.
  • Programming becomes essential as you advance in your career.
  • Volunteering at conferences can lead to valuable connections.
  • Federal resumes require more detail than private sector ones.
  • Stand out from the competition with unique qualifications.
  • Pursuing a PhD can help you contribute to the field significantly.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

06 Nov 2024#20 What it REALLY Takes to Pass OSCP (and What They Don’t Tell You) ft. Trent Miller00:36:40

Kyser Clark interviews Trent Miller, a cybersecurity professional with a diverse background in IT and security roles. They discuss Trent's career journey, the challenges of breaking into cybersecurity, the importance of networking, and insights on certifications like OSCP. Trent shares his experiences with the job market, the reality of skill shortages, and the significance of community engagement through groups like DC608. The conversation emphasizes the need for collaboration and continuous learning in the cybersecurity field.

Connect with Trent Miller on LinkedIn: https://www.linkedin.com/in/azureadtrent/

Takeaways

Networking is crucial for breaking into cybersecurity.
The OSCP certification can boost confidence and job prospects.
Employers often seek unrealistic qualifications, creating a perceived skill shortage.
Hands-on experience and collaboration are key to success in cybersecurity.
The job market can be challenging, but persistence pays off.
Community groups like DC608 provide valuable support and resources.
It's important to balance study and personal life when pursuing certifications.
Anyone can enter the field with dedication and the right mindset.


Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

13 Nov 2024#21 Unpacking AppSec: Lessons and Insights with Jonathon Fuller00:38:48

Kyser Clark interviews Jonathan Fuller, a seasoned cybersecurity professional with a diverse background in various roles, including penetration testing and application security. Jonathan shares his journey from being a NOC engineer to founding Advict Security, emphasizing the importance of delivering comprehensive information to clients during penetration tests. He discusses the balance between his day job and entrepreneurial efforts, the differences between penetration testing and application security, and his contributions to the PNPT course. The conversation concludes with Jonathan offering insights and advice for aspiring cybersecurity professionals and entrepreneurs.

Connect with Jonathon Fuller on LinkedIn: https://www.linkedin.com/in/jonathon-fuller/

  • Penetration testing often leaves out valuable information in reports.
  • Balancing a full-time job with entrepreneurship requires dedication.
  • AppSec offers a more personal relationship with the applications being secured.
  • Automation is key in creating consistent environments for students.
  • Finding a need in the market is crucial for starting a business.
  • Building a home lab can be done affordably with the right equipment.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

20 Nov 2024#22 Q&A: Cybercrime, Certifications, and Sacrifice in Cybersecurity Careers00:39:58

Kyser Clark introduces a new Q&A format where he answers listener questions about cybersecurity, ethical hacking, and career development. He discusses the allure of cyber crime, the importance of networking certifications, and the sacrifices necessary to succeed in the field. Kyser emphasizes that while certifications can enhance career prospects, they are not the only path to success. He encourages listeners to manage their finances wisely and invest in their education to achieve their career goals.

Takeaways

  • Many people turn to cyber crime due to desperation and thrill.
  • The anonymity of the internet contributes to cyber crime.
  • Certifications like Net Plus and CCNA are important for cybersecurity roles.
  • Networking knowledge is essential for securing networks.
  • Sacrifices are necessary to earn certifications and succeed in cybersecurity.
  • Money management plays a crucial role in career advancement.
  • You don't need certifications to work in cybersecurity, but they help.
  • Investing in training is one of the best investments you can make.
  • Hard work and dedication are key to breaking into the field.
  • Finding a balance between work and personal life is important.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

27 Nov 2024#23 SOC Analyst Life: Challenges & Secrets from Trent Williams00:39:24

Kyser Clark and Trent Williams talk about the roles and experiences of a SOC analyst. They discuss the challenges faced in the field, the importance of continuous learning, and the impact of AI on cybersecurity jobs. Trent shares insights from his career journey, the significance of certifications, and the necessity of understanding both offensive and defensive security practices. The conversation also touches on the recent changes in certification names and the relevance of transferable skills in the tech industry. In this conversation, Trent W and Kyser Clark discuss various aspects of cybersecurity, focusing on the importance of continuous learning, the transition between red and blue team roles, and the challenges faced in the field. They emphasize the need for certifications, practical skills, and effective client engagement in a hybrid work environment. The discussion also touches on the complexities of managing multiple clients and the significance of community support in overcoming challenges.

Connect with Trent Williams on Linkedin: https://www.linkedin.com/in/trentonw/

Takeaways:

Continuous Learning: Staying updated and adaptable is essential in cybersecurity due to its ever-evolving nature.

Transferable Skills and Practical Experience: Leveraging prior knowledge and hands-on practice is crucial for transitioning and excelling in the field.

Communication and Networking: Strong communication skills and learning from peers can significantly enhance professional growth.

Cross-Disciplinary Understanding: Gaining knowledge in both offensive and defensive security improves overall effectiveness and perspective.

Certifications and Command Line Proficiency: Certifications build credibility, while command-line expertise is vital for daily cybersecurity tasks.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

04 Dec 2024#24 Building a Career Together: Lessons from Clint & Si The Hackers00:39:44

Kyser Clark is joined by Simon and Clint from the YouTube channel 'Clint & Si The Hackers.' They discuss their journey into cybersecurity, the importance of practical experience over formal education, and the benefits of collaboration in building a successful career. The conversation covers various aspects of penetration testing, the challenges faced in their careers, and the significance of certifications and continuous learning in the field.

Watch Clint & Si The Hackers On YouTube: https://www.youtube.com/@_The_hackers

Connect with Clint on Linkedin: https://www.linkedin.com/in/clinton-elves-180ba0148/
Connect with Simon on Linkedin: https://www.linkedin.com/in/simon-exley-355816194/

Takeaways

  • A college degree is not essential for a cybersecurity career.
  • Practical experience is more valuable than theoretical knowledge.
  • Collaboration can significantly enhance career growth.
  • Networking and building relationships are crucial in the industry.
  • Certifications can help in career advancement.
  • Learning from peers can accelerate skill development.
  • The cybersecurity field is diverse with many specializations.
  • Challenges faced in moving countries can lead to personal growth.
  • Engaging with the community through platforms like LinkedIn is beneficial.
  • Continuous learning is key to staying relevant in cybersecurity.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

11 Dec 2024#25 Beyond Compliance: How Hackers Think and What Companies Miss ft. Albert Corzo00:41:12

Kyser Clark engages with cybersecurity expert Albert Corzo, who shares his extensive experience in ethical hacking, bug bounty programs, and the importance of certifications in the field. Albert discusses his past experiences, including hacking the U.S. government, and emphasizes the need for understanding cybercrime and threat actors to better protect organizations. The conversation also covers the differences between compliance and security, the challenges of bug bounty hunting, and the significance of mentorship in cybersecurity careers.

Bug bounty programs can serve as a practical playground for ethical hackers.

Understanding how cybercriminals operate is crucial for effective security measures.

Compliance does not equate to security; companies must prioritize actual data protection.

Phishing remains a significant threat, accounting for 70% of attacks.

Real-world experience is invaluable in cybersecurity, beyond just certifications.

Adversary simulations can help organizations prepare for potential attacks.

Networking and mentorship are key components for success in cybersecurity careers.

Connect with Albert on LinkedIn: https://www.linkedin.com/in/alberto-corzo-gonzalez/

Check out the Coffee&&Pizza Podcast: https://youtu.be/hcLMYEb8yA4?si=UmoHImLAUTNOxce4

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

18 Dec 2024#26 Q&A: The Certification Everyone Asks For (Is It Overrated?)00:27:44

In this Q&A episode, Kyser Clark addresses various questions related to cybersecurity certifications, focusing on the relevance of CISSP in 2025, the comparison between CPTS and OSCP, and the role of OSCP as a gatekeeper certification. He also discusses the value of TCM and INE certifications and provides insights on the time investment required for the eJPT certification. The conversation emphasizes the importance of experience and practical knowledge in the cybersecurity field.

Takeaways

  • CISSP remains the most in-demand certification in cybersecurity.
  • Experience is crucial for obtaining CISSP certification.
  • CISSP covers a broad range of cybersecurity topics.
  • CPTS is considered harder than OSCP but less recognized.
  • OSCP is still the most sought-after certification for pentesters.
  • TCM certifications do not expire, unlike INE certifications.
  • Hands-on experience is vital for success in cybersecurity roles.
  • The time to complete certifications varies based on individual study habits.
  • Employers may not require OSCP for all pentesting positions.
  • Certifications should align with career goals and job requirements.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

25 Dec 2024#27 Red Team Reality: Building the Hacker's Edge ft. Mike Ortiz00:45:31

In this conversation, Mike Ortiz discusses various aspects of cybersecurity, focusing on the importance of curiosity, the dynamics between red and blue teams, and the transition into red teaming. He emphasizes the need for collaboration between teams and the significance of understanding the foundational roles in cybersecurity. Mike also shares his personal journey into the field and offers valuable advice for aspiring cybersecurity professionals.

Takeaways

Privacy is a trade-off for convenience in the digital age.
Curiosity drives persistence in problem-solving for hackers.
Red teaming involves prolonged engagement and understanding of systems.
The relationship between red and blue teams should be collaborative.
Effective communication is crucial in delivering red team findings.
Entry-level cybersecurity roles provide valuable foundational experience.
Understanding the history of cybersecurity helps in grasping its current state.
Hands-on experience is essential for developing cybersecurity skills.
The OSCP certification is a rigorous but rewarding challenge.
Help desk roles are critical for building soft skills and technical knowledge.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

01 Jan 2025#28 Outwork the Competition: Winning the Cybersecurity Career Game00:28:03

In this episode, Kyser Clark discusses the competitive landscape of cybersecurity, emphasizing the importance of culture fit, the reality of job openings, and how to stand out in a crowded field. He highlights the necessity of hard work, continuous learning, and the value of soft skills in securing a position. Additionally, he addresses the misconceptions about the cybersecurity job market and encourages listeners to invest in their careers through training and certifications.

Takeaways

  • Competition is fierce in cybersecurity due to limited job openings.
  • Culture fit is often more important than technical skills in hiring decisions.
  • Many job postings are ghost jobs that companies don't intend to fill.
  • Continuous learning and self-training are essential in cybersecurity.
  • Soft skills can set candidates apart in a technical field.
  • Help desk experience is valuable for breaking into cybersecurity.
  • Investing in certifications can yield high returns in salary.
  • Avoid unnecessary expenses to fund career development.
  • Hard work and dedication are crucial for success in cybersecurity.
  • Recognizing competition can motivate individuals to improve.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

08 Jan 2025#29 InfoSec Pat’s Journey From Network Engineer to Cyber Mentor:00:41:40

Kyser Clark interviews Patrick Gorman, also known as InfoSec Pat, a seasoned cybersecurity professional with over 23 years of experience. They discuss the importance of certifications in the cybersecurity field, the challenges of retaining knowledge, and the journey of creating educational content on YouTube. Pat shares insights on his motivations for teaching and mentoring others, as well as his thoughts on bug bounty programs and the value of collaborative learning.

Check out InfoSec Pat on YouTube:  https://www.youtube.com/c/InfoSecPat
And Connect with Patrick Gorman on LinkedIn: https://www.linkedin.com/in/infosecpat/

Takeaways

  • Certifications are valuable but do not guarantee knowledge.
  • Creating content can be a way to reinforce one's own learning.
  • Bug bounty programs can be approached collaboratively for better results.
  • Teaching others can be a fulfilling way to give back to the community.
  • Staying updated with technology is essential in the fast-paced field of cybersecurity.
  • Networking with peers can enhance learning experiences.
  • The journey of creating educational content can be challenging yet rewarding.
  • Certifications should align with personal interests and career goals.
  • Mentoring others can help bridge the knowledge gap in the industry. Unique perspectives in teaching can enhance learning.
  • Mentoring should be valued and compensated.
  • Burnout is a real challenge in cybersecurity careers.
  • Engaging instructors can make a significant difference in learning.
  • Networking is crucial for career advancement in cybersecurity.
  • Free help often leads to a lack of appreciation.
  • Taking breaks is essential to avoid burnout.
  • Having a structured schedule can help manage time effectively.
  • Family should always be prioritized over work.
  • Different instructors resonate with different learners.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

15 Jan 2025#30 Uncovering a $200M Fraud Ring with David Taxer00:43:00

David Taxer, a cybersecurity expert with over 12 years of experience, shares the incredible story of uncovering a $200 million fraud ring disguised under a major corporation. Learn how his unique background in SEO and intelligence helped him expose insider threats and fraudulent schemes, as well as the challenges he faced as a whistleblower. This episode dives deep into protecting yourself from identity theft, understanding corporate vulnerabilities, and adopting the hacker mindset to uncover hidden truths.

Connect with David Taxer on LinkedIn: https://www.linkedin.com/in/davidtaxer/
and at Texas Cyber Solutions: https://www.texascybersolutions.com/

Takeaways

  • David Taxer uncovered a $200 million identity theft ring involving a major corporation.
  • Insider threats and social engineering were key elements in executing the fraudulent scheme.
  • His unique transition from SEO to cybersecurity demonstrates how unconventional skills can drive success in offensive security.
  • Weak state regulatory systems often fail to prevent or address large-scale corporate fraud.
  • Staying curious and adopting the hacker mindset is essential for uncovering hidden threats and solving complex problems.

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

22 Jan 2025#31 Q&A: Are Tech Giants Planning to Replace Us with AI?00:31:57

Kyser Clark dives into the growing role of AI in the tech industry and its potential to replace mid-level professionals. Inspired by comments from tech leaders like Mark Zuckerberg, we explore why companies are investing heavily in AI, how it could reshape the middle-class job market, and what it means for cybersecurity professionals. Kyser shares actionable advice on how to future-proof your career, leverage AI as a tool rather than a threat, and develop skills that make you indispensable in a rapidly evolving field. Don’t miss this critical conversation about the intersection of AI and the workforce. 

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

29 Jan 2025#32 From Physical Security to Penetration Testing: Paul Nieto III's Journey00:41:22

Kyser Clark is joined by Paul Nieto, a seasoned penetration tester with over 22 years of experience spanning physical and cybersecurity. Paul shares his journey from physical security to offensive security, detailing how his curiosity and drive for challenges led to a successful career pivot. They discuss the importance of networking, the debate between being a generalist or specialist in cybersecurity, and why accountability and consistency are crucial for success in the field. Paul also offers actionable advice for transitioning into cybersecurity, including tips on certifications, skill-building, and leveraging conferences for career growth. Whether you're an aspiring ethical hacker or a seasoned professional, this episode is packed with valuable insights to elevate your career.

Connect with Paul Nieto III on LinkedIn: https://www.linkedin.com/in/paulnieto111/
Check out Ox3 Security On YouTube: https://www.youtube.com/@0x3_Security

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

05 Feb 2025#33 Are Cybersecurity Bootcamps a Scam? ft. Keith Coleman00:40:04

Are cybersecurity bootcamps worth the hefty price tag, or are they just another overhyped shortcut to nowhere? In this episode of The Hacker’s Cache, I sit down with Keith Coleman, a seasoned cybersecurity professional with experience in pentesting, security engineering, DevSecOps, and more. We break down the true value of bootcamps, why many graduates struggle to land jobs, and what alternative paths provide a better return on investment. Keith shares his journey from IT to cybersecurity, his take on degrees vs. certifications, and why hands-on learning beats expensive bootcamps every time. If you're considering a cybersecurity bootcamp, listen to this first!

Connect with Keith on LinkedIn: https://www.linkedin.com/in/searchkeith/

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

12 Feb 2025#34 Why Top Pentesters Make More Money (Most Ignore This Skill) ft. Spencer Alessi00:43:58

Kyser Clark sits down with senior penetration tester Spencer Alessi to discuss a skill that separates top-tier pentesters from the rest—client communication. While technical prowess is essential, Spencer shares how clear, proactive communication can make or break a pentest engagement, impact client trust, and even determine career growth. They also dive into the common struggle of pentesting ultra-secure environments, how to navigate “quiet” assessments, and why 99% of vulnerabilities don’t actually matter. Whether you’re an aspiring pentester or a seasoned professional, this conversation offers valuable insights into what it really takes to succeed in offensive security. 

Connect with Spencer on LinkedIn: https://www.linkedin.com/in/spenceralessi/

and everywhere else @techspence

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

19 Feb 2025#35 Q&A: The Harsh Truth: You NEED to Code for Cybersecurity Mastery00:36:04

If you want to be an expert in cybersecurity, coding isn’t optional—it’s essential. In this Q&A episode of The Hacker’s Cache, I break down why learning to code separates the entry-level professionals from the true experts and how AI is shifting the skills needed in offensive security. I also dive into the different career paths available after landing your first pentesting job—whether it’s climbing to a senior role, transitioning to red teaming, going freelance, or specializing in niche areas like IoT and hardware hacking. Plus, I answer listener questions about cybersecurity certifications, the safest jobs against AI, and how to balance learning Python with hands-on hacking experience. If you're serious about growing in cybersecurity, this episode is for you. 

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

26 Feb 2025#36 The OSCP Won’t Save You ft. Tyler Ramsbey00:44:55

Many aspiring penetration testers believe that earning the OSCP is the ultimate proof of their skills—but what happens when they step into a real-world engagement? In this episode of The Hacker’s Cache, Tyler Ramsbey joins me to break down the hard truth about OSCP, the gaps it leaves in real-world pentesting, and why experience always outweighs certifications. We discuss rookie mistakes, the reality of internal assessments, and why leadership and communication skills are just as critical as technical expertise. Whether you're chasing the OSCP or already have it, this episode will challenge what you think you know about offensive security.

Connect with Tyler Rambey on LinkedIn: https://www.linkedin.com/in/tyler-ramsbey-86221643/

Subscribe to Tyler Ramsbey on YouTube: https://www.youtube.com/@TylerRamsbey


Check out the Hack Smarter Community: https://hacksmarter.org/

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

05 Mar 2025#37 He Hacked for 1000 Days Straight: Here’s How It Landed Him a Cybersecurity Job ft. Constantinos Kaplanis00:24:59

In this episode of The Hacker’s Cache, I sit down with Constantinos Kaplanis, a senior penetration tester who took an unconventional path into cybersecurity. With no prior IT experience, he grinded his way into the field—applying to 500 jobs, enduring countless rejections, and proving his skills through sheer persistence. One of his biggest accomplishments? A 1,000-day hacking streak on TryHackMe, a testament to his dedication. We break down his journey, the job-hunting struggles, and the underrated attack vectors he’s exploited in real-world pentests. If you’re trying to break into cybersecurity, this is an episode you won’t want to miss!

Connect with Constantinos Kaplanis on LinkedIn: https://www.linkedin.com/in/ckaplanis/

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

12 Mar 2025#38 Fired or Freed? Turning a Cybersecurity Layoff into Your Next Big Break w Justin Mahon00:39:17

Getting laid off can feel like the end of the road, but what if it’s actually the beginning of something bigger? In this episode of The Hacker’s Cache, Justin Mahon shares his journey from military IT to offensive security, including how he bounced back after a cybersecurity layoff and landed in a better position than before. We break down the reality of tech layoffs, why they happen, and how to turn them into opportunities for career growth. Whether you're navigating a layoff, preparing for the worst, or just looking to future-proof your cybersecurity career, this episode is packed with insights you won’t want to miss! 

Connect with Justin Mahon on LinkedIn:

https://www.linkedin.com/in/justin-mahon22/

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

19 Mar 2025#39 Q&A: Struggling with Burnout? Here’s Why It Might Be a Good Thing00:39:15

Burnout sucks, but what if it's actually a sign of growth? In this episode of The Hacker’s Cache, I break down why burnout isn’t always the enemy and how pushing yourself to the limit can actually make you better. Just like lifting weights to failure builds muscle, hitting burnout and recovering makes you mentally stronger. I’ll share my own experiences with burnout, why I see it as part of the process, and how to come back even better. Plus, I answer your cybersecurity career questions, covering internships, certifications, dealing with difficult clients in pentesting, and more. If you're feeling stuck or overwhelmed, this episode is for you! 

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

26 Mar 2025#40 Proof You Don’t Need a Degree to Succeed in Cybersecurity ft. Zach Winchester00:39:37

In this episode of The Hacker’s Cache, Kyser Clark and Zach Winchester talk about breaking into cybersecurity without a college degree and why it’s not the dealbreaker people think it is. You’ll hear a real-world story of going from firewall configs to full-time pentesting with just an OSCP and hands-on experience. We also get into hardware hacking, social engineering discomfort, AI/LLM security loopholes, and why the offensive security space is far from being automated. If you’re wondering whether a degree is essential to succeed in this field, this episode is your answer. 

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

02 Apr 2025#41 How to Actually Become a Great Pentester00:38:25

What separates a good pentester from a great one? It’s not just about popping shells or passing certs. In this solo episode, I break down the real-world skills that actually matter. Technical, non-technical, and everything in between. I share hard lessons from the field, my thoughts on being well-rounded vs. specialized, and why communication, client trust, and soft skills are just as crucial as finding vulnerabilities. Whether you're early in your career or already in the trenches, this episode is about pushing past the surface and leveling up where it really counts. 

Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY


Music by Karl Casey @ White Bat Audio

Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

Opinions are my own and may not represent the positions of my employer.

Améliorez votre compréhension de The Hacker's Cache avec My Podcast Data

Chez My Podcast Data, nous nous efforçons de fournir des analyses approfondies et basées sur des données tangibles. Que vous soyez auditeur passionné, créateur de podcast ou un annonceur, les statistiques et analyses détaillées que nous proposons peuvent vous aider à mieux comprendre les performances et les tendances de The Hacker's Cache. De la fréquence des épisodes aux liens partagés en passant par la santé des flux RSS, notre objectif est de vous fournir les connaissances dont vous avez besoin pour vous tenir à jour. Explorez plus d'émissions et découvrez les données qui font avancer l'industrie du podcast.
© My Podcast Data