Thesecuritynoob
thesecuritynoob.com › cybersecurity › interview-with-heath-adams-the-cyber-mentor-youtuber-ceo-of-tcm-security-and-hacker
Interview with Heath Adams/The Cyber Mentor YouTuber, CEO of TCM Security and Hacker – The Security Noob.
November 30, 2020 - Hello and welcome to another interview, this time I spoke to a guy with possibly one of the coolest names in Information Security Mr Heath Maverick Adams, how cool of a name is that! Unless this is your first day looking at Information Security, Cyber Security, Ethical Hacking etc I expect you already know him, only you probably know him by his other name ‘The Cyber Mentor’.
Wikitia
wikitia.com › wiki › Heath_Adams
Heath Adams - - Wikitia
August 15, 2023 - Heath Maverick Adams (born June 29, 1989), better known by his online alias The Cyber Mentor, is an American security researcher, businessman, YouTuber, author [2], and cybersecurity instructor.
Videos
Twitter
twitter.com › thecybermentor
thecybermentor - Heath Maverick Adams
June 1, 2023 - JavaScript is not available · We’ve detected that JavaScript is disabled in this browser. Please enable JavaScript or switch to a supported browser to continue using twitter.com. You can see a list of supported browsers in our Help Center · Help Center · Terms of Service Privacy Policy ...
YouTube
youtube.com › watch
My Journey to Cybersecurity CIA Keynote - Heath Adams (aka The Cyber Mentor) - YouTube
Heath Adams (aka The Cyber Mentor) is the CEO and founder of TCM Security. Outside of TCM Security, he is an online cybersecurity instructor on platforms suc...
Published December 15, 2020
YouTube
youtube.com › watch
How to Start a Career in Cyber Security with The Cyber Mentor - YouTube
Huge shout out to Heath Adams the Cyber Mentor for being our guest on today's show. To see more about Heath use the links below:Website: https://www.thecybe...
Published January 29, 2020
Reddit
reddit.com › r/cybersecurity › tcm leaving tcm?
r/cybersecurity on Reddit: TCM leaving TCM?
December 27, 2025 -
I recently read news of Heath Adams leaving his company to search for “greener” pastures. While I appreciate everything that he’s done for the cybersecurity education, is it just me that thinks that this screams “bait & switch”? I mean, “he” was the brand behind the company and now that he’s leaving, to me, it just looks like any other cybersecurity education provider. I don’t see any difference. Yes, I know that he wasn’t making any content after a certain time but yet. What are the opinions of other folks here?
Top answer 1 of 19
118
No opinion, he made his money and then sold it for more money. It’s all a business.
2 of 19
85
He got his lambo and his bag and left. Can't blame the guy for selling, I probably would too - we're all in it for money, one way or another. There's only so much you can care about people refusing and actively hurting themselves by ignoring the basics of IT and trying to jump straight into hacking. If someone offered me 10 mil for my company, I'd probably take it, invest it, and live off dividends and pursue my hobbies and maybe go back to work if I get bored.
TCM Security Academy
academy.tcm-sec.com › home
TCM Security Academy | TCM Security, Inc.
February 1, 2026 - Learn the fundamentals of C# and .NET to enhance your hacking skills. Alex Tushinsky · 4h · Start thinking and working as a Detection Engineer. Anthony Isherwood · 11h · Learn to conduct an external network penetration test from start to finish · Heath Adams ·
Goodreads
goodreads.com › author › show › 21799410.Heath_The_Cyber_Mentor_Adams
Heath "The Cyber Mentor" Adams (Foreword of Cybersecurity Career Master Plan)
Heath The Cyber Mentor Adams is the author of Cybersecurity Career Master Plan (4.19 avg rating, 58 ratings, 11 reviews)
Author Heath "The Cyber Mentor" Adams
X
x.com › thecybermentor
Heath Maverick Adams (@thecybermentor) / Posts / X
May 8, 2019 - Click to Follow thecybermentor · Heath Maverick Adams · @thecybermentor · Husband | Vet | Founder · @TCMSecurity | YouTuber | Professor | Disrupting the education industry via TCM Academy and #PNPT http://linktr.ee/thecybermentor · tcm-sec.com · Joined May 2019 ·
Top answer 1 of 3
2
Another fine episode in the show's "new format"; kudos to the entire podcast team! Here are a few additional tips for guarding against IoT vulnerabilities:Further to Sara's warning about buying cheap gear, it also matters where you buy it from. It may be tempting to save money on more expensive, higher-quality electronics by purchasing from a third-party vendor like Amazon, or another reseller that the manufacturer designates as an official channel. But this leaves you vulnerable to fraudulent and copycat gear that makes its way through the distribution supply chain. In fact, there was just such https://www.justice.gov/archives/opa/pr/leader-massive-scheme-traffic-fraudulent-and-counterfeit-cisco-networking-equipment involving resale of tens of thousands of bogus Cisco networking devices on Amazon, eBay, and other sites both official and unofficial. Buying your equipment directly from the manufacturer is your safest strategy, even if it costs a bit more.My next suggestion is to isolate all of the IoT gear away from your main computers and wireless devices. In most small office and home (SOHO) scenarios, your router will have a Guest Wi-Fi connection that is (typically) segregated from the primary local network to which your computers and devices are connected. Assigning all of the IoT gear to the Guest network will instantly provide you a considerable degree of privacy and protection -- the toaster might know what your dryer is doing, but not what you're emailing to the attorney.If you have to provide a password to a contractor for, say, connecting a thermostat, be sure to change the Guest network password after they are finished, and then reconnect all of your IoT devices. And, as Sara also recommended, just don't connect anything that's not really necessary. Oh, and if your router is end of life (i.e. more than five years old), or you're connecting everything directly to the equipment from your Internet Service Provider, it's time to https://www.ic3.gov/PSA/2025/PSA250507. Now, for those who were inspired by Heath Adams' tips for getting starting in cybersecurity, you can extend the concept of isolating IoT on your Guest Wi-Fi, and in doing so, learn foundational info about computing environments. Here's how...A key cybersecurity strategy is to use network segmentation to isolate many different types of equipment and users from each other on the overall network. As result, an attacker may be able to compromise one device, but not move laterally to compromise others. As an analogy, think of it like an apartment building in which every unit has its own locks on the door... a thief may break into one unit, but stealing from many is much less likely.This concept of network segregation is just as applicable in a SOHO situation as at the company office. For example, you could separate the media devices (e.g. TV, streaming box, smart speaker) from the rest of the IoT appliances -- your oven doesn't need to know what program you're currently binging.And you can keep going... it would be wise to isolate any of your employer's work computers that you use at home from the personal computers at home. Or you might want to isolate your personal computers from those of the tenant living in your accessory dwelling unit. And if you want to build a home cyber lab for experimentation, you definitely want that at a healthy distance from the rest of your network gear. Etc.In order to accomplish this, you'll need a router (or similar network device) that allows for creation and configuration of multiple Virtual Local Area Networks, or VLANs. The one I purchased (manufacturer direct) is the https://www.peplink.com/products/soho-routers/b-one/. It has tremendous capability for this exact type of network segmentation and other forms of easy-to-perform configuration / experimentation, all of which enhance security and privacy while helping you learning about network environments. (This is not a paid endorsement, I'm just a very happy customer.)Cheers!
2 of 3
1
I love this Smart_Boat! Thank you so much for sharing such a comprehensive overview of stellar tips! Some excellent ones in there that I didn't immediately think of!
TCM Security Academy
academy.tcm-sec.com › home › practical ethical hacking
Practical Ethical Hacking - The Complete Course
February 2, 2026 - One membership gives you ongoing ... cybersecurity experience. Hi everyone! My name is Heath Adams, but I also go by “The Cyber Mentor” on social media....