Welcome to infosecaddicts.

Untitled design (7)

What is Infosecaddicts about?

About Us

You’ll often hear people saying things like “I can’t stand death by PowerPoint”, and “I need more hands-on”, or “I want to go on a real pentest and see what it’s like”.

I’ve been teaching IT Security since 2005 and it finally hit me. While I was helping by offering hands-on labs, and no death by PowerPoint in my classes,. I now realize that in order for me to be a better teacher I need to offer a more complete training program. One that can accomplish the following goals:

– True Measurable technical proficiency
o Taking a student from little to no experience to a real technical expert
o Providing both the student and potential employers with a method of measuring technical proficiency

– Community
o Creating a community of like-minded individuals all focused on “the journey and the process” not the goal (e.g. certification, and degrees)
o Creating a community of individuals that share their knowledge freely, advance the state of the art, and improve the state of IT Security around the world.

With this in mind, I’ve decided to completely revamp Everything I do as a trainer.

Here are the changes that I’m making:
– Creating lab-based classes that cover the fundamentals that a lot of InfoSec students lack
– Creating lab-based classes that fill gaps a lot of InfoSec professionals have
– Transition to completely hands-on skill validation based training.

Member’s Only Blog

Security Onion Advanced Configuration

The architecture of security onion is designed to be deployed in different ways, its components master server, forward nodes and storage nodes, can be deployed in a distributed manner or in standalone mode. for this course, we will use the standalone mode that combines all the components in a box. Advanced configuration Process: Once the […]

Burp Suite

Welcome to the introductory tutorial to Burp Suite. It gives details about the installation and usage of Burp Suite, which is an essential tool for bug hunters and web application pentesters. Installing JAVA In Ubuntu open the terminal then run: sudo add-apt-repository ppa:webupd8team/java sudo apt-get update sudo apt-get install oracle-java8-installer Install Foxyproxy Foxyproxy for Firefox Download links are: https://addons.mozilla.org/en-GB/firefox/addon/foxyproxy-standard/ (Firefox) […]

Installing Splunk on the Ubuntu VM

If you are from people who like the issues related to ethical hacking, then Splunk tines that are part of your list of tools. why in this blog we will tell you how you can install them. Installing Splunk on the Ubuntu VM you can go to the following link and download and create your […]

Hands-on Attacking & Defending Cloud (AWS)

Hands-on Attacking & Defending Cloud (AWS)   Amazon Web Services (AWS) runs the most popular and used cloud infrastructure and suite of services. IT Security professionals, DevOps, DevSecOps, Cloud/IT admins will all benefit from learning how to test their cloud infrastructure.   This workshop is a hands-on training with guided walkthroughs, and scenario based attacks […]

Frequently Asked Questions

Learn how to navigate through the website here.

Learn How to find your courses

Learn about Koins

Learn about our subscription program

Learn about Courses.

Find solutions to your questions