Cybersecurity · Field-Tested · No Marketing

I've Watched This
Industry Lie to You
Long Enough.

I'm Weston Raze. I work in cybersecurity as a practitioner, not a content creator. Everything here is stuff I've tested, run in production, or watched fail in a real environment. If it doesn't hold up, I won't put my name on it.

weston@raze:~$ 
100%
Field-Tested
Every tool, command, and technique shown here has been run in a real environment. Not a lab simulation. Not vendor marketing.
4
Academy Rooms
SIEM, Windows, Linux, Networking
0
Vendor Deals
No sponsors. No affiliate links. No bias.
Real Work
Not Certification Prep
Built for people starting their first IT or security job — not for passing an exam and forgetting everything the next day.
Who Watches
SOC AnalystsIT AdministratorsSecurity EngineersPrivacy ProfessionalsEthical HackersCareer ChangersStudentsBlue TeamersSysadmins SOC AnalystsIT AdministratorsSecurity EngineersPrivacy ProfessionalsEthical HackersCareer ChangersStudentsBlue TeamersSysadmins

The stuff that
actually shows up at work.

Not theoretical. Not "here is what RFC 1234 says." The things that come up in real IT and security jobs, explained by someone who deals with them daily.

🛡️ Detection
SIEM and Alert Triage

Building detection pipelines that catch real threats — not generating noise. Wazuh, Elastic, writing Sigma rules, hunting inside your own data.

🪟 Windows
Windows Internals

Event logs, Active Directory, Group Policy, PowerShell, Scheduled Tasks, Sysmon. How Windows actually works in a corporate domain environment.

🐧 Linux
Linux for the Real World

Ubuntu, RHEL, Rocky, Debian. Permissions, services, networking, log forwarding. Running servers the way they are actually run in production.

🌐 Networking
Network Traffic Analysis

TCP/IP, DNS abuse, TLS, Wireshark, firewall rules. Reading packet captures and identifying indicators that most people scroll past.

🔒 Privacy
Real Privacy vs. Theater

VPNs, DNS-over-HTTPS, browser fingerprinting, data brokers. The gap between what products claim and what they actually do.

⚙️ Operations
Day-to-Day IT Operations

The unsexy stuff that runs every organization — DHCP, DNS, domain management, scripting, backups. What you will actually spend your time on.

If I wouldn't run it
on my own systems,
I won't teach it.

The security content space is full of people who have never actually worked in security. They regurgitate certifications, recommend tools they get paid to promote, and teach techniques that fall apart the moment you try them on real infrastructure.

This is not that.

"Tested this on a home lab" is not the same as tested this in production under real load with real consequences."
On lab vs. field experience
"A detection that fires on everything is worse than no detection. It trains your team to ignore alerts."
On detection quality
"The most dangerous person in a security team is the one who passed the exam but never broke anything."
On hands-on experience

Things I keep seeing
get wrong in real environments.

Not theoretical attack scenarios. Actual patterns that show up in real IT and security work, over and over.

01
Windows

Standard users running as local admin

In smaller companies especially, everyone has local admin on their own machine because "it's easier." Every piece of malware they run now runs with admin rights. This is the single fastest way to go from phishing email to full domain compromise.

02
Detection

No audit policy means no investigation

Default Windows audit settings log almost nothing useful. If something happened two weeks ago and you have no process creation logs, no logon events, no PowerShell logging — you are not doing incident response, you are guessing.

03
Linux

SSH with password auth enabled on public IPs

Expose port 22 to the internet with password authentication enabled and your auth logs will be full of brute force attempts within hours. Key-based auth only, disable passwords, change the default port. Takes ten minutes and eliminates an entire attack surface.

04
Networking

Flat networks with no segmentation

One VLAN for everything — workstations, servers, printers, cameras, IoT devices — all on the same subnet. Once an attacker is on any device, they can reach everything else directly. Segmentation is not optional, it is the difference between a contained incident and a full breach.

05
Privacy

VPNs sold as anonymity tools

A VPN moves trust from your ISP to the VPN provider. That is it. It does not make you anonymous, it does not protect you from malware, and it does not hide you from sites you are logged into. Most VPN marketing is designed to make you feel protected, not to actually protect you.

06
Operations

DNS is always the problem

Can not reach a domain-joined resource? Can not authenticate? Can not join a machine to the domain? Check DNS first, every time. Wrong DNS server, stale DNS cache, missing DNS record — these cause 80% of the "random" connectivity issues in Windows environments.

Stop watching. Start doing.

Four structured rooms covering the tools and systems that actually matter. Built around hands-on labs, real configs, and the kind of knowledge that transfers directly to a job.

SIEM and Detection Windows Internals Linux for Security Networking