Making cybersecurity accessible to everyone. We provide practical training and resources for students, newcomers, and professionals looking to sharpen their skills. Whether you just don't get the chance to do this stuff at work, you don't have time for a homelab, or you're a student looking to bridge the gap between classroom and career, we're here to help you succeed.
Our training is informed by real-world experience, not just theory. Our approach is built on the fundamental principle of defense in depth, layers of defense, because true security comes from multiple protective measures working together.
I'm based in Colorado and have spent nearly two decades working in technology across IT, infrastructure, cybersecurity, and systems engineering. I developed an enjoyment for teaching at Apple, oddly enough, breaking down complex topics for people who just needed it to make sense. That stuck with me. I still enjoy speaking and teaching whenever the opportunity is right.
This site is a place where I share tools, training, and content I wish I'd had earlier in my career. If anything here has been helpful to you, I'd genuinely love to hear about it. And if you've got constructive feedback on how to make it better, I welcome that too. Reach out anytime.
Due to the nature of my work and family privacy, I've chosen to stay unnamed on this site.
CISSP | CCNA | AWS Architect | CCISO Associate | Blue Team | TCM Security | OffSec (in progress)
I spent years championing IT and security for school districts and a boarding school - small teams, tight budgets, and infrastructure that had to just work. I know what it's like to be the only person standing between a school network and the next phishing campaign.
This isn't another Sec+ study guide or death-by-slideshow training. These are hands-on learning tools where the whole point is: here's the thing - now touch it. Interactive, practical, built for people who learn by doing. Designed for K-12 IT staff and classroom educators who need to understand real threats without sitting through another webinar.
No SIEM. No syslog server. No monitoring at all. You're not behind, you're just getting started.
Monitoring is one of my favorite parts of cybersecurity and honestly, one of the most undervalued. You can have policies, frameworks, and compliance checklists all day long. But if you can't see what's happening on your network, none of it means anything. A monitoring stack isn't a nice-to-have. It's the foundation everything else sits on.
No shame. No jargon walls. Just practical steps you can start on a weekend.
Purpose-built tools for security teams that need results without enterprise overhead.
Most vulnerability scanners tell you what's wrong after you've already committed. DangerMap tells you what to pick before you do. Point it at a package manifest and get a version-by-version risk landscape with migration recommendations. Not just a list of CVEs, but an actual upgrade plan with risk estimates for each path. Built for teams that want to make informed dependency choices during sprint planning, not scramble to patch after a scan kicks back findings.
You know what's in your images at build time. But do you know what's actually running in production right now? WatchBx inventories live Docker containers, detects runtime drift from the original image, and cross-references installed packages against vulnerability databases. One command gives you the full picture: what changed since deployment, what's exposed, and what to fix first. Designed for teams that need continuous container visibility for CMMC, FedRAMP, or SOC 2 without paying six figures for an enterprise platform.
Design reviews generate artifacts, findings, action items, and sign-offs across every gate, and most teams track it all in spreadsheets that nobody trusts. GateKeepr manages the full SRR to PDR to CDR to TRR to SAR lifecycle with role-based dashboards, entry/exit criteria tracking, and real-time visibility into program health and slippage. Includes a dedicated security engineering view with NIST 800-171 controls traceability. Built for small-to-mid defense contractors and engineering orgs that need the rigor without the overhead.
These tools are built for real teams solving real problems. If that sounds like yours, let's talk.
Follow along for updates and additional resources: