🌐
Thesecuritynoob
thesecuritynoob.com › cybersecurity › interview-with-heath-adams-the-cyber-mentor-youtuber-ceo-of-tcm-security-and-hacker
Interview with Heath Adams/The Cyber Mentor YouTuber, CEO of TCM Security and Hacker – The Security Noob.
November 30, 2020 - Hello and welcome to another interview, this time I spoke to a guy with possibly one of the coolest names in Information Security Mr Heath Maverick Adams, how cool of a name is that! Unless this is your first day looking at Information Security, Cyber Security, Ethical Hacking etc I expect you already know him, only you probably know him by his other name ‘The Cyber Mentor’.
🌐
Wikitia
wikitia.com › wiki › Heath_Adams
Heath Adams - - Wikitia
August 15, 2023 - Heath Maverick Adams (born June 29, 1989), better known by his online alias The Cyber Mentor, is an American security researcher, businessman, YouTuber, author [2], and cybersecurity instructor.
🌐
LinkedIn
linkedin.com › in › heathadams
Heath Adams - Breach Point | LinkedIn
February 19, 2026 - As the CEO of TCM Security, Heath demonstrates an unparalleled passion for helping businesses navigate the complex landscape of cybersecurity threats. Heath's expertise as a Cyber Mentor and Hacker sets him apart, enabling him to provide invaluable ...
🌐
Twitter
twitter.com › thecybermentor
thecybermentor - Heath Maverick Adams
June 1, 2023 - JavaScript is not available · We’ve detected that JavaScript is disabled in this browser. Please enable JavaScript or switch to a supported browser to continue using twitter.com. You can see a list of supported browsers in our Help Center · Help Center · Terms of Service Privacy Policy ...
🌐
Transistor
simplycyber.transistor.fm › 1
Daily Cyber Threat Brief | 001 Heath Adams 'The Cyber Mentor' Disrupting the Industry with PNPT
October 12, 2021 - Heath Adams, aka the Cyber Mentor is well known for his education contributions to the cybersecurity industry and for his talent as a penetration tester. Now he has launched the TCM Academy which has education courses, and the Practical Network ...
🌐
YouTube
youtube.com › watch
My Journey to Cybersecurity CIA Keynote - Heath Adams (aka The Cyber Mentor) - YouTube
Heath Adams (aka The Cyber Mentor) is the CEO and founder of TCM Security. Outside of TCM Security, he is an online cybersecurity instructor on platforms suc...
Published   December 15, 2020
🌐
BeyondTrust
beyondtrust.com › home › resources › podcast › ep. 55 - uncovering informant lists & crime stopper reports through a city's vulnerabilities // heath adams (the cyber mentor™)
Ep. 55 - Uncovering Informant Lists & Crime Stopper… | BeyondTrust
May 28, 2024 - This week, James hosts the renowned ethical hacker Heath Adams, famously known as The Cyber Mentor™. Heath shares his unconventional journey, beginning as an accountant and transitioning into the world of cybersecurity.
🌐
YouTube
youtube.com › c › thecybermentor
The Cyber Mentor - YouTube
Bridging the cybersecurity education gap since 2018. For our full catalog of the most affordable and practical cybersecurity courses on the market, go to ht...
Find elsewhere
🌐
YouTube
youtube.com › watch
How to Start a Career in Cyber Security with The Cyber Mentor - YouTube
Huge shout out to Heath Adams the Cyber Mentor for being our guest on today's show. To see more about Heath use the links below:Website: https://www.thecybe...
Published   January 29, 2020
🌐
RYSEC
ryseccybersecurity.com › blog › exclusive-interview-with-heath-adams-the-cyber-mentor
Heath Adams of TCM Security on Ethical Hacking, PNPT & Cybersecurity Careers | RySec Interview — RYSEC
June 4, 2025 - The name "The Cyber Mentor" came from that mindset. I started by helping individuals one-on-one, usually through Discord or LinkedIn messages, just answering questions and giving guidance where I could.
🌐
Reddit
reddit.com › r/cybersecurity › tcm leaving tcm?
r/cybersecurity on Reddit: TCM leaving TCM?
December 27, 2025 -

I recently read news of Heath Adams leaving his company to search for “greener” pastures. While I appreciate everything that he’s done for the cybersecurity education, is it just me that thinks that this screams “bait & switch”? I mean, “he” was the brand behind the company and now that he’s leaving, to me, it just looks like any other cybersecurity education provider. I don’t see any difference. Yes, I know that he wasn’t making any content after a certain time but yet. What are the opinions of other folks here?

🌐
TCM Security Academy
academy.tcm-sec.com › home
TCM Security Academy | TCM Security, Inc.
February 1, 2026 - Learn the fundamentals of C# and .NET to enhance your hacking skills. Alex Tushinsky · 4h · Start thinking and working as a Detection Engineer. Anthony Isherwood · 11h · Learn to conduct an external network penetration test from start to finish · Heath Adams ·
🌐
Spotify
open.spotify.com › episode › 3ILG0dj6Cdp3PPDsA0OJAH
001 Heath Adams 'The Cyber Mentor' Disrupting the Industry with PNPT - Simply Cyber | Podcast on Spotify
October 12, 2021 - Heath Adams, aka the Cyber Mentor is well known for his education contributions to the cybersecurity industry and for his talent as a penetration tester. Now he has launched the TCM Academy which has education courses, and the Practical Network ...
🌐
YouTube
youtube.com › @theheathadams
Heath Adams - YouTube
This channel is focused on my daily life as a techie, CEO, Harvard student, car enthusiast, and so much more. If you are looking for cybersecurity content, please check out our educational channel, The Cyber Mentor.
🌐
Goodreads
goodreads.com › author › show › 21799410.Heath_The_Cyber_Mentor_Adams
Heath "The Cyber Mentor" Adams (Foreword of Cybersecurity Career Master Plan)
Heath The Cyber Mentor Adams is the author of Cybersecurity Career Master Plan (4.19 avg rating, 58 ratings, 11 reviews)
Author   Heath "The Cyber Mentor" Adams
🌐
X
x.com › thecybermentor
Heath Maverick Adams (@thecybermentor) / Posts / X
May 8, 2019 - Click to Follow thecybermentor · Heath Maverick Adams · @thecybermentor · Husband | Vet | Founder · @TCMSecurity | YouTuber | Professor | Disrupting the education industry via TCM Academy and #PNPT http://linktr.ee/thecybermentor · tcm-sec.com · Joined May 2019 ·
Top answer
1 of 3
2
Another fine episode in the show's "new format"; kudos to the entire podcast team! Here are a few additional tips for guarding against IoT vulnerabilities:Further to Sara's warning about buying cheap gear, it also matters where you buy it from. It may be tempting to save money on more expensive, higher-quality electronics by purchasing from a third-party vendor like Amazon, or another reseller that the manufacturer designates as an official channel. But this leaves you vulnerable to fraudulent and copycat gear that makes its way through the distribution supply chain. In fact, there was just such https://www.justice.gov/archives/opa/pr/leader-massive-scheme-traffic-fraudulent-and-counterfeit-cisco-networking-equipment involving resale of tens of thousands of bogus Cisco networking devices on Amazon, eBay, and other sites both official and unofficial. Buying your equipment directly from the manufacturer is your safest strategy, even if it costs a bit more.My next suggestion is to isolate all of the IoT gear away from your main computers and wireless devices. In most small office and home (SOHO) scenarios, your router will have a Guest Wi-Fi connection that is (typically) segregated from the primary local network to which your computers and devices are connected. Assigning all of the IoT gear to the Guest network will instantly provide you a considerable degree of privacy and protection -- the toaster might know what your dryer is doing, but not what you're emailing to the attorney.If you have to provide a password to a contractor for, say, connecting a thermostat, be sure to change the Guest network password after they are finished, and then reconnect all of your IoT devices. And, as Sara also recommended, just don't connect anything that's not really necessary. Oh, and if your router is end of life (i.e. more than five years old), or you're connecting everything directly to the equipment from your Internet Service Provider, it's time to https://www.ic3.gov/PSA/2025/PSA250507. Now, for those who were inspired by Heath Adams' tips for getting starting in cybersecurity, you can extend the concept of isolating IoT on your Guest Wi-Fi, and in doing so, learn foundational info about computing environments. Here's how...A key cybersecurity strategy is to use network segmentation to isolate many different types of equipment and users from each other on the overall network. As result, an attacker may be able to compromise one device, but not move laterally to compromise others. As an analogy, think of it like an apartment building in which every unit has its own locks on the door... a thief may break into one unit, but stealing from many is much less likely.This concept of network segregation  is just as applicable in a SOHO situation as at the company office. For example, you could separate the media devices (e.g. TV, streaming box, smart speaker) from the rest of the IoT appliances -- your oven doesn't need to know what program you're currently binging.And you can keep going... it would be wise to isolate any of your employer's work computers that you use at home from the personal computers at home. Or you might want to isolate your personal computers from those of the tenant living in your accessory dwelling unit. And if you want to build a home cyber lab for experimentation, you definitely want that at a healthy distance from the rest of your network gear. Etc.In order to accomplish this, you'll need a router (or similar network device) that allows for creation and configuration of multiple Virtual Local Area Networks, or VLANs. The one I purchased (manufacturer direct) is the https://www.peplink.com/products/soho-routers/b-one/. It has tremendous capability for this exact type of network segmentation and other forms of easy-to-perform configuration / experimentation, all of which enhance security and privacy while helping you learning about network environments. (This is not a paid endorsement, I'm just a very happy customer.)Cheers!
2 of 3
1
I love this Smart_Boat​! Thank you so much for sharing such a comprehensive overview of stellar tips! Some excellent ones in there that I didn't immediately think of!
🌐
LinkedIn
linkedin.com › posts › mikeholcomb_i-am-excited-to-announce-that-heath-adams-activity-7062033553861087232-j5g8
Mike Holcomb on LinkedIn: I am excited to announce that Heath Adams, the Cyber Mentor himself, will… | 31 comments
May 10, 2023 - I am excited to announce that Heath Adams, the Cyber Mentor himself, will be returning to BSides Greenville, this year as our keynote speaker on Oct. 28th… | 31 comments on LinkedIn
🌐
Buzzsprout
theartofsellingonlinecourses.buzzsprout.com › 1698871 › episodes › 18263467-210-how-i-built-an-8-figure-business-heath-adams-interview
210 How I Built an 8-Figure Business (Heath Adams interview) - The Art of Selling Online Courses
November 27, 2025 - Heath Adams, better known as The Cyber Mentor, built an 8-figure training business and sold it. In this episode, he shares how he did it starting from scratch with no sales team, no ad spend, and just pure organic content.We talk about how he ...
🌐
TCM Security Academy
academy.tcm-sec.com › home › practical ethical hacking
Practical Ethical Hacking - The Complete Course
February 2, 2026 - One membership gives you ongoing ... cybersecurity experience. Hi everyone! My name is Heath Adams, but I also go by “The Cyber Mentor” on social media....