This video is in good timing for me. I've been learning a lot lately and getting frustrated with myself when I am having trouble. Blaming myself for not trying hard enough. This is refreshing. Thank you!
I'd like to share two additional tips: • In the case of Python, when a connection/certificate error is caused in code that uses the requests library, normally use the verify=False parameter in functions such as get() and post() fixes. • In the case of Metasploit, because it is written in Ruby, the native SSH client has become obsolete. So it won't actually work.
ua-cam.com/play/PLtsY6_AbwdOR9EhsVR1zSnzXNr1dlnPMK.html - Something like this might be useful. But if you mean exploit development for beginners, that's something we can consider in the future.
Quick question…. Where would you recommend someone with ZERO IT/Cybersecurity experience start? I plan on going through all of your courses so should I start with Linux, Python, PEH, etc.. Any guidance would be greatly appreciated….Thank you!!!
This is exactly what I’ve been looking for. I can’t tell you how many different videos I’ve watched, and none of them broke it down like you have!!!! I can’t wait to get my tattoo and start your courses…..again thank you very much!!!
This video is in good timing for me. I've been learning a lot lately and getting frustrated with myself when I am having trouble. Blaming myself for not trying hard enough.
This is refreshing. Thank you!
I'd like to share two additional tips:
• In the case of Python, when a connection/certificate error is caused in code that uses the requests library, normally use the verify=False parameter in functions such as get() and post() fixes.
• In the case of Metasploit, because it is written in Ruby, the native SSH client has become obsolete. So it won't actually work.
Thanks David!
Best mentor ever ❤❤❤❤❤❤
Thanks for being a member of our community!
Can you please make a tutorial for beginners like everything from scratch
ua-cam.com/play/PLtsY6_AbwdOR9EhsVR1zSnzXNr1dlnPMK.html - Something like this might be useful. But if you mean exploit development for beginners, that's something we can consider in the future.
@@TCMSecurityAcademy Thank you for replying you are the best mentor ever
@@TCMSecurityAcademy can you make video on osi model and ports
We can add it to our backlog.
Quick question…. Where would you recommend someone with ZERO IT/Cybersecurity experience start? I plan on going through all of your courses so should I start with Linux, Python, PEH, etc.. Any guidance would be greatly appreciated….Thank you!!!
Get some ideas here:
tcm-sec.com/so-you-want-to-be-a-hacker-2023-edition/
@@TCMSecurityAcademy Sweet, thank you!!!
This is exactly what I’ve been looking for. I can’t tell you how many different videos I’ve watched, and none of them broke it down like you have!!!! I can’t wait to get my tattoo and start your courses…..again thank you very much!!!
Can you please make a Bettercap tutorial for DNS and ARP spoofing?
Highly demmand!!
1st