Zero to Hoodie Substack

Get the full archive of everything you need to go from ZERO to HOODIE and land a job in cybersecurity in as little as 90 days.

So far, we’ve helped out students win over $1.6M in total comp. This method works.

What you get with a FREE subscription:

What you get with a PAID subscription:

Both work! I’m happy to serve you however I can!
ROADMAP

- Roadmap - Click Here to Start your Journey

If you’re here for the free cybersecurity content, welcome! I hope you get a lot of insanely valuable information for your everyday life and your business, and even how to start your Cybersecurity Career for FREE.

Roadmap to your first cybersecurity job

If the thought of trying an IT Speedrun makes you uncomfortable, go get a degree from a university and then go get a helpdesk job.

Don’t wait. Do it now.

Roadmap to your first tech sales job

EVERYTHING you need to go from ZERO to a CAREER in TECH SALES as a TOP PERFORMER at your company. Cohort 0 was an ABSOLUTE BANGER and we can’t wait to make it EVEN BETTER for this next cohort.
GAMEPLANS

🚀BowTied Gameplan for CySA+🚀

On November 29th, I got my CompTIA CySA+ certificate. And this is my first ever CompTIA or any other industry cert. In this article, I'm going to tell you all about my experience and what you need to get the certificate...

SPLUNK Core Certified User Study Guide

As my students apply for THOUSANDS of jobs every week, they give me insights on what employers are looking for.

One of those common requests is for SPLUNK!

72 Hour AZ-900 Gameplan

Azure is an amazing platform. Not as much market share as AWS but has less professionals that know how to use it.

This means we have an opportunity. We can get MORE impact by having Azure on our resume for a few reasons...

Splunk Core Gameplan 2.0

We’ve had a few students pass their Splunk Core User cert recently! And they have some resources to share.

This is an extremely simple cert and one that can be done in DAYS, not months.

72H AWS CCP GAMEPLAN

This program is aboslutley incredible with everything you need to CRUSH IT in your new career.

Financing is available for those who qualify. Or pay cash and SAVE 20%!

The BowTied Game Plan for Net+ & Sec+

This guide is not a study guide. It is an organized text of resources and an example study plan you can use to pass your CompTIA Network+ exam. You are taking your first step to becoming a Cyber Chad/Stacy by taking this certification.
LINUX

What the hell do I do with Linux?

So now you need to know how to do stuff in the Linux terminal. The terminal is the command line interface (CLI) for Linux. It’s where you can issue commands directly to the OS and, suprise, it’ll do them.

Basic Linux Commands II (VIM and CHMOD)

As promised, today we’re going to discuss two essential topics - editing files with VIM and changing file permissions with CHMOD.

Linux - the Saga Continues

Do you need to be able to build an NDR to get a job? Fuck no. But hold on… Having this knowledge is impressive and will give you CLOUT, which helps you get interviews, which is how you get a job. Let’s dive in.
PYTHON

Explaining a simple program in Python

I am a firm believer in learning by doing. Let’s examine a script that I wrote in 30 seconds, piece by piece, and hopefully, it’ll make sense at the end...

A deeper dive into Python (making a script)

Today we’re going to make a script in Python. I found a free API that’s easy to work with and I’ll be making this script in real time, troubleshooting, and explaining everything.

Advanced Python Variables Part I (Strings)

Let’s take a deeper dive into the specifics of Python and some of the useful tricks to help you in your cyber journey. First, let’s evaluate the different data types and...

Advanced Python Variables Part II (lists)

Today we’re going to learn about about lists in Python. What is a list? A list is a collection of objects in a particular order. The objects in these lists can be anything: stings, integers, other lists, dictionaries, you name it. Any object can be a list item.

Advanced Python Variables Part III (Dictionaries and Numbers, plus a sentence on Tuples)

Today we’re going to finish up the Python variable types - dictionaries, integers, and floats (and a sentence on tuples). What is a dictionary? It’s a key/value pair type of variable.

Python Foundations IV - Functions, Loops and Conditions

Today we’re going to do or last installment of the foundations of Python by going over functions, loops, and conditions. We already learned all about variables - this is how to put everything together...

Making Daemons with Python

First, what is a Daemon? Is that spelled wrong? Isn’t it demon? It can be pronounced with or without the “a”, but a daemon is simply a program that runs in the background. Congratulations, you now understand daemons.

Tricks of the Trade: Automating Emails with Python Part I

We’ll take some time over the coming weeks digging into automation with Python that both makes for a useful portfolio as well as automating tasks on the job.

Tricks of the Trade: Automating Emails with Python Part II

This process is surprisingly straightforward once you’ve done it once (but what isn’t around here)

First thing you’ll do is create a gmail account.
SURICATA

Introduction to Suricata

Suricata is THE SINGLE GREATEST open source software for cybersecurity and I’ll argue that to the grave. This will be the first of many posts explaining how to use Suricata to make a simple NDR.

Suricata Continued - The YAML File

There’s so much power in Suricata due to it’s vast array of features, but enabling and maximizing these depends on the configuration of the software. That’s where the YAML file comes into play.
BURPSUITE

Start of the RED TEAM SERIES - Introduction to BurpSuite Part I

Hey there, Hoodies! In this article, you will get to see the famous and most used web application penetration testing tool BurpSuite in action. You will see from installing the burp suite to using it to find real vulnerabilities on web applications. Let’s dive into it.

Introduction to BurpSuite Part II

Now the Intruder is another wonderful feature of burp. Although it comes with limitations while using the community version.

To use the full power of Intruder you need burp suite Pro. But you can use a burp plugin to fill this need (explained later).

Hands on Hacking - BurpSuite Part I

Hello there Hoodies! In my previous article, I discussed BurpSuite. In this article, you will see a walkthrough of a vulnerable machine from tryhackme by using our previously learned tools.

I will represent this walkthrough in 2 ways.
UBUNTU

How to install ubuntu on a laptop for the first time

Start by obtaining a laptop that you can fuck with. This should be a minimum of 4 cores and 8gb ram. We need more than a chromebook. Old laptops are perfect for this. Buy a used one on craigslist for $200 and get to work. No excuses.
NETWORK+

How to Pass the Network+ Exam in Just 30 Days

As you know from the roadmap, your FIRST step towards a cybersecurity career is passing your Network+ exam. To motivate you to take advantage of your holiday downtime, I recently put out the Network+ Challenge!

Network+ vs CCNA

Network+ or CCNA? What are these two things we’re speaking of? They’re both certifications - proctored tests you can take that, if you pass, certify that you are sufficiently educated on a topic. Employers like them because they tell them what you objectively know.

Here's how to study for Network+ like you mean it

Don’t be the guy who plans his life to death and never executes. Better to be the guy with no plan that picks up a book than a guy with a perfect plan that never starts.
SECURITY+

SECURITY+ 601 V 701 COMPREHENSIVE GUIDE

CompTIA's Security+ certification is a benchmark for cybersecurity knowledge, offering two recent versions: SY0-601 and SY0-701.
Encryption

Encryption

Encryption is the process whereby data is modified so as to render it unrecognizable. The peculiarity of this process is that it’s possible to

File Encryption Guide

The last post was a brief introduction to what encryption is. This post will present the tools at our disposal to actually encrypt files.
ANTI-VIRUS

Which Anti Virus should you choose?

Today we’re going to explore the landscape of Anti Virus software (AV). AV is a program that runs on your device that is supposed to stop malicious files from running.

Cyber's Choice: PC Matic

After VPNs, Anti Virus is the most widely misunderstood cyber product on the market. If you need a straight forward product that JUST WORKS, PC Matic is the product for you.

Cyber's Choice: VirusTotal

VirusTotal is a free online tool used to detect malware in files and URLs. It was first launched by a Spanish company called Hispasec Sistemas in 2004...
Privilege Escalation

Hacking Applied - Privilege Escalation Part I

Privilege Escalation is an essential part of every pentest. Getting a shell and getting root on a box is the difference between getting a date with a banging hottie and taking her home.

Hacking Applied - Privilege Escalation Part II

I hope you’ve spent a good time with the first part of Linux Privilege Escalation. It’s time to learn more, here is the second part of Linux Privilege Escalation. Let’s shine,
TOR

All about TOR (a video explanation)

Today we’re going to discuss TOR and why it is both safe and effective for keeping your identity anonymous. Apologies if the audio quality isn’t great.

Isn't TOR just a VPN? Exploring the differences.

Today’s topic is going to focus on the differences between TOR and VPNs. We touched on this slightly when...
KALI

Installing your first VM (and it's Kali)

If you’re going to be in cyber, you better get comfortable with Kali and all it has to offer. This is a pentesting Linux distribution offered by Offensive Security, and it’s incredible.
RANSOMWARE

Reduce Your Ransomware Risk by 99%

What is ransomware? It’s a malware that encrypts files on your device. Encryption is changing data so it can’t be read unless you undo the changes (decrypt the data) which can only be done with the decryption key.

Writing a Ransomware Server

Today we’re going to talk about writing a ransomware server. Not only is this EXTREMELY dangerous but it’s also INCREDIBLY ILLEGAL on machines and data that are not yours. But I’m not your dad so that’s the only warning you’ll get.
TCP Stream Aggregator

Building a TCP Stream Aggregator

I’m so incredibly excited to bring you this stack. This was a concept that I developed years ago and I’ve been using it ever since. It’s not an exaggeration when I say it will save you 1000 hours in your career with this one simple program.
TCPDUMP

All About Tcpdump

Last time, we discussed capturing packets with tcpdump, and as promised, we have a dedicated stack for it because the documentation for it is kinda shit.
HTML

HTML: All About Forms

Today we have a special article written by my good friend Lark. This is the next and final post in his All About HTML series and the content is fantastic.
MACHINE LEARNING

Introduction to Machine Learning

Machine learning, in very simple terms, is actually nothing but devising functions that take input and give us the desired output. How do we find these functions? That’s what “learning” in machine learning is about.
MITRE ATT&CK

MITRE ATT&CK Framework

One of my absolute most favorite tools understand this is the MITRE ATT&CK Framework (pronounced “Might-er Attack”), which is this monster right here...
METASPLOIT

Introduction to Metasploit Part I

But learning metasploit is a lot like learning Python. There’s SO MUCH to learn that it doesn’t happen overnight. But we’re here to guide you through it. This is the first of many substacks on metasploit...

Hacking Applied - Metasploit

In the previous article, we learned about Metasploit and how to use it. And we performed all the demos with a windows machine. So, it’s time to play with a vulnerable machine(Linux).
MALWARE

Is this MALWARE???

The best definition of malware is malicious software. Software being a program that can be read and executed by a computer.

Top 5 Online Platforms To Identify Malware and Emerging Threats

Due to rapid digital advancement and the Internet-connected world, Malware has become a significant threat to organizations worldwide.

Cyber's Choice - Free Malwarebytes

Malware attacks are on the rise, and they are not going to end anytime soon. In 2021, the number of malware attacks worldwide reached 5.4 billion.
CTF

Hacking Applied: Mr Robot CTF

For this CTF demonstration, we are going to use a vulnerable machine from tryhackme. You can get this here.

Hacking Applied: Another CTF

In this article, we are going to look at a vulnerable machine from tryhackme. We will break into the machine by...
SHODAN

Cyber's Choice: Shodan

Shodan is basically a search engine, but it doesn’t work like Google or any other search engine. It is mostly used by cybersecurity professionals, researchers, and law...
BACKUPS

Introduction to Backups Part I

Too many freaking companies don’t have proper backups set up for their organizations. They’re at risk of spending thousands (or millions!) on recovery because they didn’t implement a good backup scheme.

Backups Part II - Restoring Backups

In this article we are going to create a second backup script. We want this one to send backups offsite. We’ll then learn about a restore command example that retrieves...
PASSWORD

Hacker 101 - Capturing a Password

Today is when the real fun on cybersecurity blue team work begins. Today, we’re taking a break from Python, but not for long. Next week, I’ll show you how to make one of the most useful tools...

Cyber's Choice: LastPass

For the next 4 weeks, I’ll post 2 articles per week outlining products that I use and personally recommend for everyday folks to up your security game. To kick off the series, we’re talking password managers.

Cyber's Choice - 1Password

We recently completed out Cyber’s Choice series - 8 products and services I recommend for everyday people. At the time, I had suggested LastPass for ease of use, name in the industry, and a decent track record.

Cyber's Choice: Authy

Authy is one of the few apps that enable you to add multi-factor authentication to your accounts to protect them from cybercriminals. It has the best security features and support than other apps.

Hacking Applied: Hashcracking

What is a hash? It’s a string that’s the result of a hashing function.What’s a hashing function? A 1 to 1 function where every unique input (is supposed to) produce a unique output of fixed length.
RESUME

How to Make a Killer Cyber Resume

We’ll go over what I actually know and how that translated to my resume. I’ve also been given many compliments on my resume from hiring mangers over the years, so I’m confident recommending this style to you.

Killer Cyber Resume Part II

Before, I gave you a screenshot to my resume and said “make it look like this”. I’ve included a link to my preferred cyber job hunting resume. This is the resume I recommend you use to get your first job (tailed to your knowledge, skills, certs, etc)...

!!!UPDATED!!! >>>Resume Template<<<

Just wanted to let you know that I’ve updated the recommended resume template! Just make a copy from my google drive to yours and then edit to your hearts content. Here’s a look a the new template...
PORTFOLIO

How to Make a Killer Cyber Portfolio

For a year, I’ve told you to make a portfolio. But I’ve never made a substack post on it, so here we are now. If all you want is an example, you can see my redacted portfolio at the link below and move on with your day:

How to Make Your Own SELF HOSTED WordPress Cybersecurity Portfolio

This is your COMPLETE step-by-step guide to making your VERY OWN, SELF HOSTED, CYBERSECURITY PORTFOLIO WITH WORDPRESS!

Portfolio Projects Part I

You’ve heard me say on MANY occasions that an ePortfolio is essential to landing your first job. That it’s how you “get experience” when you have none. However, the most common question I get on it is...