Guides and Toolkits
We’ve compiled some of our favorite guides and resources to help you on your journey.
How to Be an Ethical Hacker in 2025
Interested in a career in ethical hacking or penetration testing? This guide walks you through the essentials you need to learn to break into the field.
How to Be A SOC Analyst
If you want to break into the defensive security field, this guide contains helpful free and paid resources to help build your skills.
2026 Career Guide
Breaking into the cybersecurity industry is not easy. In this guide, we’ve compiled all of our best advice for choosing a path, writing a resume, interviewing, and so much more!
Web Application Penetration Testing Tools
Exploiting web apps requires a different toolkit. Check out our list of essential web app pentesting tools.
Top 5 Active Directory Pentesting Tools
Learning how to exploit Active Directory is essential for network pentesting. Check out this list of our favorite tools.
Our Favorite Penetration Testing Tools
We asked our penetration testing team which tools they like to use during engagements. See what they said!
Must-Have OSINT Resources
Gathering information from publicly available resources can help you access a network or exploit a web app.
Mobile Application Pentesting Tools
Mobile applications are an often overlooked way that people use the internet. Check out this list of our favorite tools for mobile app security testing.
Tools Every SOC Analyst Should Know
Want to work as a SOC analyst? Get familiar with some of the tools you’ll use on the job.
Training Reimbursement Forms
If your organization offers a training budget or will reimburse you for training, consider purchasing one of TCM Security’s certifications or live trainings! We’ve created some templates that you can copy and use to help craft your request. Remember to always follow your organization’s guidelines to increase the chances of your request being approved.
















