WHOAMI
This site is my collection of cyber insights, tactics, techniques, and procedures (TTPs) gathered from various trainings and hands-on experiences. It reflects my continuous learning in the field and is a place where I document and refine the strategies that have shaped my expertise. Whether it’s advanced OCO/DCO tactics or cutting-edge techniques, this repository is my way of staying sharp in the ever-evolving cyber landscape.
NOTICE AND CONSENT BANNER
You are accessing a system provided for authorized use only. By using this system (including any device connected to it), you consent to the following conditions:
I reserve the right to monitor, intercept, and record communications for purposes including, but not limited to, security testing, operational efficiency, misuse prevention, and investigative purposes.
At any time, the system may inspect and seize any data stored on it.
Any communication or data transmitted through this system is subject to routine monitoring and may be disclosed as required by authorized policies.
This system incorporates security measures such as authentication and access controls to safeguard the organization's interests—not for personal privacy or benefit.
However, any communication or content that is legally privileged (e.g., related to attorney-client discussions, therapy, or clergy) remains private and protected from unauthorized monitoring or search. See the User Agreement for full details.
This site and its content are strictly for educational purposes. None of the information, including code, techniques, or methodologies, is intended to promote or facilitate illegal activities or violate any laws or regulations. Users are solely responsible for how they choose to apply the knowledge shared here.
Credits for research techniques and methodologies belong to their respective original authors.
MILITARY TRAINING
PME
WLC, 25Q ALC, 25D ALC, 25D SLC, WOCS, 170A WOBC, 170A WOAC
MIL COURSES
Capabilities Development Course (CDC), Mission Commander Course (MCC), Cyber Operations Planners Course (COPC), Cyber Common Technical Core (CCTC), Equal Opportunity Leader's Course, Electronic Key Management System Manager Course, Local COMSEC Management Software Operator Course, Standard Communications Security (COMSEC) Custodian Course, Combatives Master Trainer Course (formerly Combatives Level 3 and Level 4), Advanced Routing, Basic Routing, SIPR and NIPR Access Point Snap Course, Combatives Level 1 and Level 2, Combat Life Saver Course, Unit Armorer Course
COLLEGE
Dakota State University (DSU)
BS Cyber Operations - Engineering & Programming Emphasis (expected graduation - 2026)
DeVry
Associates in Network Systems Administration (2019, GPA: 4.0)
Technical College of the Lowcountry (TCL)
Certificate in Computer Programming (2010, GPA: 3.6)
PROGRAMMING/SCRIPTING LANGUAGES
BASH, C, x86 Assembly, C++, PowerShell, Python
TECHNICAL TRAINING
OCO
CWL CRT-ID, CWL CRTA, Junior Penetration Tester (THM), Offensive Pentesting (THM), Red Teaming (THM), CCTC, Python 101/102 for Hackers (TCM-SEC), PowerShell for Cyber Offense (PluralSight)
DCO
SANS SEC505 and ICS515, DDS-M Master Gunner Course, IKE Basic Analyst Course, IKE Basic Operator Course, IKE Integration & Admin Course, IKE Mission Management Course, Elastic NSM Cyber Operator Course, Security Onion In-Depth
IT/SECURITY (FOUNDATIONAL)
CompTIA Network+ and Security+, Cisco CCENT and CCNA R&S, Certified Ethical Hacker (CEH) Course, Cisco CyberOps Associate
MANAGEMENT (FUTURE)
PMP, CISSP
DEFENSE ACQUISITIONS
RQM 1010 Introduction to the Joint Capabilities Integration & Development System, RQM 2500 Capabilities-Based Assessments
CERTIFICATIONS
CWL CRT-ID, CWL CRTA, LPI Linux Essentials, CompTIA Network+, CompTIA Security+, CCNA Cyber Ops Associate, CCNA Routing & Switching, Cisco CCENT, GIAC GSEC, GCED, GPYC (Expired), GSNA, GCIH, GCIA, CEH (Expired)
Last updated