Progress Isn’t Linear, in Martial Arts or Cybersecurity

musashi

The Myth of Linear Progress

We often imagine progress as, although slow, always moving upward. Reality is less predictable.

  1. Perfection Bias
    We assume improvement should always feel smooth. However, mastery, in both martial arts and cybersecurity, is a jagged path. The dips are where the depth develops.
  2. The Comparison Trap
    We see others’ highlight reels, the black belt breaking boards, or the company posting its “zero vulnerabilities” report, and mistake it for constant progress. Behind every clean result lies a mess of mistakes, patches, and failed tests.
  3. Forgetting That Setbacks Build Strength
    Regression often signals deeper adaptation in progress. In training, it’s when you refine mechanics. In security, it’s when you reinforce foundations.

Why Steps Back Matter

Plateaus and regressions aren’t detours; they’re checkpoints. They test persistence. Anyone can stay motivated when everything goes as planned; resilience forms when it doesn’t.

They reveal gaps in fundamentals. A failed pen test or misconfigured IAM or conditional access policy highlights what needs real attention. They build humility and precision. Overconfidence blinds; setbacks sharpen focus.

On the mats and in the SOC, mastery isn’t about avoiding mistakes, it’s about learning faster from them.

New Deadlift PR: 234kg/515lbs for a Double

162 Hours on Udemy, Building the Foundation for a Career in Pentesting

When I first clicked “Enroll,” I didn’t know it would add up to 162 hours of training.
That’s almost a full month of time — stolen from late nights, weekends, and early mornings before work.

Udemy became my training ground. Not glamorous, not perfect, but consistent.
Over time, those 162 hours weren’t just “video time.” They became hours of repetition, frustration, and slow understanding.

There’s a phase in every learner’s path where you stop studying for a test and start thinking like the work.

That’s what those hours taught me, how to reason through a network like a puzzle, how to see the seams where systems and people meet, how to build patience in a field where curiosity is the only constant.

Looking back, those 162 hours weren’t just prep for certification. They were the price of entry, not into a career, but into a mindset.

Every scan that failed, every lab that wouldn’t load, every problem that took three days instead of three hours, they were all small rehearsals for the real work ahead.

The PenTest+ and the Long Game of Persistence

That was me, after months of studying, rewrites, retakes, and nights when the last thing I wanted to see was another port, protocol, or payload.

I’d already passed the CompTIA trifecta, A+, Network+, Security+, and each one felt like a step forward. But PenTest+ was different. It wasn’t just about memorization. It forced me to think like an adversary, to build a structured approach out of controlled chaos. It was humbling.

There were setbacks. Long hours after long workdays. Missed weekends. That quiet voice that says, maybe this one’s just too much right now.

But that’s where persistence replaces motivation. I tell my students and training partners the same thing I remind myself: motivation gets you started, discipline keeps you moving.

When that “Pass” finally appeared on the screen, it wasn’t triumph, it was relief. And gratitude. Because every failed scan, every misconfigured lab, every late-night tracing network maps, they built the competence that makes the win real.

The truth is, no certification on its own changes who you are. The process does. The grind does. The decision to sit back down after the first, second, or third setback does.

In cybersecurity, as in martial arts, you don’t earn a belt to prove you’re done. You earn it because you’ve decided you’re not done yet.

The Top Nine Ways to Avoid Being Hacked: Essential Tips for Staying Safe Online

Cyber threats are everywhere. Learn nine expert-approved cybersecurity practices, from password hygiene to phishing prevention, that help protect your data, privacy, and peace of mind.

In today’s hyperconnected world, being hacked isn’t just a risk — it’s a near inevitability if you’re not prepared. Whether you’re an individual, a small business owner, or part of a larger organization, protecting your data should be a daily habit, not an afterthought.

Hackers exploit the smallest cracks: weak passwords, outdated software, and misplaced trust. The good news? A few consistent habits can make you a far harder target.

Here are nine proven ways to reduce your risk of being hacked, simple, practical, and backed by modern cybersecurity best practices.

  1. Use Strong, Unique Passwords

Weak or reused passwords remain one of the top causes of account compromise.
A strong password should be:

  • At least 12 characters long
  • Include a mix of upper and lowercase letters, numbers, and symbols
  • Avoid personal details like your pet’s name or birthday

Pro Tip: Use a password manager to create and store unique credentials safely — it’s far more secure than your memory (or sticky notes).

2. Enable Multi-Factor Authentication (MFA)

If passwords are your front door, MFA is your deadbolt.
This simple tool requires an additional verification step — like a text message code or an authentication app prompt — before granting access.

Even if a hacker steals your password, MFA can stop them cold.
Enable it everywhere you can: email, banking, social media, and especially your work accounts.

  1. Keep Software and Systems Updated

Cyber attackers love outdated software — it’s like an open window.
Enable automatic updates on your devices, browsers, and security tools to patch vulnerabilities before attackers can exploit them.

Updates aren’t annoyances; they’re armor.

4. Spot and Stop Phishing Scams

Phishing remains the #1 way users get hacked.
Attackers use fake emails or messages that mimic trusted sources to trick you into clicking malicious links or revealing credentials.

Stay sharp:

  • Check sender addresses carefully
  • Hover over links before clicking
  • Be skeptical of urgent or emotional language (“Your account will be suspended!”)
  • When in doubt, contact the organization directly

Education here pays off, once you’ve spotted a good phish, you’ll never unsee the patterns.

  1. Secure Your Home Network
  • Your Wi-Fi router is the gateway to everything on your home network.
  • Change the default password immediately after setup.
  • Use WPA3 encryption (the most secure standard).
  • Disable WPS and consider hiding your SSID.
  • Set up a guest network to isolate visitors and IoT devices.

A few minutes of setup can close the door on thousands of automated attacks.

  1. Use a Virtual Private Network (VPN)

When connecting to public Wi-Fi (airports, cafes, hotels) use a VPN to encrypt your internet traffic. This prevents hackers from intercepting data like login credentials and personal info.

Choose a reputable, paid VPN provider. (Free ones often collect your data instead of protecting it.)

7. Be Mindful of What You Share Online

Every social post is a breadcrumb. Hackers use personal details to guess passwords, craft phishing messages, or reset your accounts.

Limit what you share publicly, especially location check-ins and birthdates.
Remember: oversharing fuels social engineering — the human side of hacking.

  1. Regularly Back Up Your Data

Ransomware doesn’t work if your data is safely backed up.
Use the 3-2-1 rule:

  • 3 total copies of your data
  • 2 different storage types (cloud + external drive)
  • 1 kept offline

Automate backups and test them occasionally — a broken backup is no backup at all.

9. Educate Yourself and Your Circle

Technology changes fast — human habits change slowly. Stay updated on emerging threats, and share what you learn with coworkers, friends, or family.

Security awareness training and cybersecurity newsletters are excellent ongoing resources.

Cybersecurity is everyone’s job. The more we all understand, the safer we all become.

Final Thoughts

Avoiding being hacked isn’t about paranoia — it’s about preparation.
Each of these habits strengthens your security posture one layer at a time.

Think of cybersecurity as compound interest: small daily actions, multiplied over time, create unbreakable resilience.

Stay curious. Stay cautious. Stay secure.

*Updated October 2025: refreshed to reflect updated security practices for the modern threat landscapes.

Hypertrophy Phase for Building Strength in the High Bar Back Squat

Here’s a sample 8-Week Hypertrophy Phase for Building Strength in the High Bar Back Squat.
The high bar back squat is a foundational exercise for developing leg strength, power, and muscle hypertrophy. This 8-week hypertrophy program focuses on squatting twice a week, with an emphasis on high-repetition sets in the 15-20 rep range to stimulate muscle growth. Complementary accessory exercises, proper recovery, and nutrition are also crucial for maximizing gains during this phase.

Program Overview
The 8-week hypertrophy phase is divided into two 4-week blocks. Each block progressively increases the intensity and volume of your workouts to optimize muscle growth and strength. The program includes two squat sessions per week, supplemented with accessory exercises to target supporting muscle groups and ensure balanced development.

Week 1-4: Volume Accumulation

Focus: Build a foundation of muscle mass and muscle endurance.

  • Rep Range: 15-20 reps
  • Intensity: 50-60% of 1RM
  • Frequency: Twice per week

Week 5-8: Intensification

Focus: Increase intensity, maintaining high volume, and technical proficiency.

  • Rep Range: 12-15 reps
  • Intensity: 60-70% of 1RM
  • Frequency: Twice per week

Weekly Training Schedule

– Monday: High Bar Back Squat Focus

  • High Bar Back Squat: 4 sets of 15-20 reps
  • Romanian Deadlifts: 3 sets of 15-20 reps
  • Bulgarian Split Squats: 3 sets of 15-20 reps per leg
  • Front Foot Elevates Split Squat (FFESS): 3 sets of 20 reps – 10 per leg
  • Single leg, body weight calf raises: 3 sets of 20-25 reps

– Thursday: High Bar Back Squat Focus

  • High Bar Back Squat: 4 sets of 15-20 reps
  • Walking Lunges: 3 sets of 15-20 reps per leg
  • Front Squats: 3 sets of 10 reps at 40-50%
  • Frog Pumps: 3 sets of 15-20 reps
  • Tib Raises: 3 sets of 30 reps

Week 5-8 Adjustments

As you progress into the second block, increase the intensity by raising the weight and slightly lowering the rep range to 12-15 reps per set while maintaining the same structure and exercise selection.

Monday: High Bar Focus

  • High Bar Back Squat: 4 sets of 12-15 reps
  • Romanian Deadlifts: 3 sets of 12-15 reps
  • FFESS: 3 sets of 12-15 reps per leg
  • Reverse Hyper: 3 sets of 12-15 reps
  • Single leg, body weight calf raises: 3 sets of 15-20 reps

Thursday: High Bar Focus

  • High Bar Back Squat: 4 sets of 12-15 reps
  • Walking Lunges: 3 sets of 12-15 reps per leg
  • Front Squats: 3 sets of 10 reps at 40-50%
  • Frog Pumps: 3 sets of 15-20 reps
  • Tib Raises: 3 sets of 15-20 reps

Recovery and Nutrition: Prioritizing recovery and proper nutrition is crucial for maximizing gains during the hypertrophy phase:

Sleep: The NUMBER 1 thing you can fix to see increases in the gym — adequate rest and recovery! Aim for 7-9 hours of quality sleep each night to support muscle recovery and growth.

Nutrition:

Protein: Consume 1.6-2.2 grams of protein per kg of body weight daily to support muscle repair.

Carbohydrates: Ensure adequate carbohydrate intake to fuel workouts and replenish glycogen stores. Include complex carbs like whole grains, fruits, and vegetables.

Healthy Fats: Incorporate healthy fats from sources like avocados, nuts, seeds, and olive oil to support overall health and hormone production.

Hydration: Stay well-hydrated to maintain performance and facilitate recovery.

Active Recovery: Incorporate intensity work on such as MAP 10 training, walking, kayaking, yoga, or stretching on rest days to promote blood flow and reduce muscle soreness.

Monitoring Your Progress: Tracking your progress is essential for adjusting your program and ensuring continuous improvement:

Training Log: Record your workouts, including weights used, sets, reps, and any relevant notes on how you felt during each session.

Regular Testing: Periodically test your 1RM to gauge strength improvements and adjust training intensities accordingly. I’d suggest testing your 1RM every 3 to 4 months.

Adjustments: Based on your progress and recovery, modify variables such as intensity, volume, and exercise selection to avoid plateaus and continue making gains.

Final Thoughts:

An 8-week hypertrophy phase focused on the high bar back squat can significantly enhance your leg strength and muscle mass. By incorporating a structured training program that emphasizes high-repetition sets, prioritizing recovery and nutrition, and monitoring your progress, you can achieve substantial gains in your squat performance and overall strength. Stay consistent, maintain proper form, and adjust your program as needed to continue progressing towards your strength and hypertrophy goals.

Always remember, quality of reps over quantity of reps!

How To Program MAP 10 Aerobic Workouts

What are Map 10 Aerobic Workouts?

Map 10, which stands for Maximal Aerobic Power, simply means that work at this pace is very easy. As you move from MAP 10 to MAP 1, the pace increases as and the time of each interval drops in length.

Why do we love MAP 10 specifically?

It’s great for recovery!

The Story of OPEX Fitness and James FitzGerald | OPEX Fitness

MAP 10 Can Help You Recover from Soreness

A time tested and proven method that’s especially relevant to functional fitness athletes is mixing intense training with slow recovery sessions throughout the week. This style of training is often referred to as “High Low Method.”

OPEX Fitness calls the slow recovery style of aerobic work “MAP 10”. This is taught in the OPEX Coaching Certificate Program (CCP) because coaches must be able to prescribe a wide variety of training paces, dependent on their client’s needs. When programming different paces, coaches are also tapping into different energy systems. There are three main energy systems refer that we refer to as OPEX Gain, Pain, and Sustain:

(Coach’s Resource: Learn more about how to train specific energy systems in this free guide.)

  • Gain – this is scientifically referred to as the Anaerobic Alactic System. This system refers to very short, 1-20 seconds, bursts of energy at very high power, or “turnover.” Gain refers to you not being able to sustain your power output past that length of time because your muscles cannot continue to turn over fast enough
  • Pain – this is scientifically referred to as the Anaerobic Lactic System. This system refers to a longer interval time, 20 to 720 seconds, at higher power, or turnover. While the range is much longer, you’ll notice the word “Anaerobic” still remains in the name. That means that it isn’t aerobic which means that it isn’t sustainable. If you hold that higher power for those time periods, you will now “feel the burn” and you will recognize that you cannot hold that pace forever
  • Sustain – this is scientifically referred to as the aerobic system. This system refers to efforts that are sustainable. As you move from MAP 1 to MAP 10, your time frame gets even longer, and your power output goes down even more.

MAP 10 pace is on the far end requiring the most amount of time at the slowest pace with the least amount of power, therefore, falling under the Sustain “curve.” Whereas Gain begins with slow and low volume efforts in the beginning followed by a progression of faster, more voluminous efforts later. MAP 10 efforts should begin with longer efforts at a slower pace in the beginning (for most people). The reason MAP 10 needs to start with such long efforts is that you need to keep the pace easy. Very easy effort mixed with smaller amounts of eccentric muscle contractions is often interpreted as recovery by your body.

James FitzGerald vs. Carl Hardwick ...

How to Program MAP 10 Aerobic Workouts

When programming MAP 10 you often want to begin with more aerobic – long easier efforts – work before you implement Gain work into your client/athlete’s fitness program because it builds your ability to do more work – volume – in your training.

To benefit greatly from MAP 10 – and easy aerobic work – make sure you minimize the eccentric load on your client. In the video, you will notice that Solange is doing carries (overhead, suitcase, etc…), Flywheel biking, versa climbing, Front Leaning Rest – FLR (plank) on the rings – etc…The lack of eccentric work allows her body to get better recovery than she would if she was pounding her body day in and day out in her “aerobic” work.

To pick great MAP 10 workouts, you want to pick easy, non-eccentric work and “go easy.” You don’t need to overthink this. You just need to move blood, find relaxation and rhythm, and be consistent in “going long.” People get scared of doing a 60-minute workout because they are going long and hard. MAP 10 is long and easy! To progress in this, you will add volume, but you would still get the pace nice and easy.

Programming MAP 10 Aerobic Workouts For Athletes

High-level athletes may have five morning sessions of 60-90 minutes of MAP 10 work + two “off” days of three sessions/day of 60-90 min of easy aerobic pieces. It will be all different styles of movement but do the math of that volume. They may have 8-12 hours of easy aerobic work each week on top of 3-4 hours per week of intense work.

When you are doing your easy aerobic work, don’t be afraid to go at conversational pace or listen to a podcast or read a book if you are on a machine that allows you to do that. We don’t recommend Deadmau5 for easy aerobic work unless you want to “wake up” 20 min into a row at 180 beats per minute heart rate. Also, don’t be afraid to just walk (in the sun if possible)

james fitzgerald crossfit for Sale,Up To OFF 66%

Next Steps

MAP 10 is just tapping into one of the body’s three energy systems. If you are looking to become a professional coach and develop your programming ability download our free guide Energy System Training, today.

For more information visit Opexfit.com today!

Enhancing Explosiveness in Olympic Lifts with Plyometric Training

Plyometric training is an excellent way to develop the explosive power necessary for Olympic lifts like the snatch and clean and jerk. These dynamic movements help improve muscle recruitment, speed, and power, all of which are essential for successful Olympic lifting. By incorporating a weekly plyometric session into your training regimen, you can enhance your explosiveness and overall performance. This article outlines a comprehensive once-a-week plyometric workout designed to complement your Olympic lifting training.

Plyometric Training Overview

Plyometrics, or jump training, involves explosive movements that require rapid stretching and contracting of muscles. This type of training enhances the stretch-shortening cycle (SSC) of muscles, which is crucial for generating maximal force in a short amount of time. Plyometric exercises target the fast-twitch muscle fibers, which are responsible for explosive movements.

Key Benefits of Plyometric Training for Olympic Lifters:

  • Increased power output
  • Improved rate of force development
  • Enhanced neuromuscular coordination
  • Greater agility and balance
  • Reduced risk of injury through improved proprioception

Weekly Plyometric Workout

Perform this plyometric workout once a week, preferably on a day when you are not doing heavy lifting, to ensure you are fresh and can maximize your effort in each exercise. Always start with a proper warm-up and finish with a cool-down to reduce the risk of injury.

Warm-Up (10-15 minutes):

  • 2-3 mins on an Ski, bike or row erg
  • Dynamic Stretching: Leg swings, arm circles, hip rotations
  • Light Jogging or Jump Rope: 5-10 minutes to increase heart rate and blood flow
  • Mobility Drills: Ankle hops, high knees, butt kicks, hammie sweeps, et cetera

Plyometric Exercises:

Sets: 3
Reps: 2-3
Rest: rest :10-:12 between reps and 90 seconds

Description: Stand in front of a sturdy box or platform. 1/4 squat down, then explode upward, landing softly on the box with both feet. Step down and repeat.

Depth Jumps

Sets: 3
Reps: 3-5
Rest: rest :10-:12 between reps and 90 seconds

Description: Stand on a box, step off, and upon landing, immediately jump as high as possible. Focus on minimizing ground contact time to develop reactive strength.

Broad Jumps

Sets: 3
Reps: 2-3
Rest: :10-:12 between reps and 90 seconds

Description: Stand with feet shoulder-width apart. Perform a powerful squat jump forward, aiming for maximum distance. Land softly and reset for the next jump.

Single-Leg Bounding

Sets: 3
Reps: 3-4
Rest :10-:12 between reps and 90 seconds

Description: Hop forward on one leg, focusing on distance and height. Land softly and immediately bound forward again. Complete all reps on one leg before switching.

Tuck Jumps

Sets: 3
Reps: 3-5
Rest: 90 seconds

Description: Stand with feet shoulder-width apart. Jump as high as possible, tucking your knees toward your chest at the peak of the jump. Land softly and reset.

Medicine Ball Slams

Sets: 3
Reps: 3-5
Rest: 90 seconds

Description: Hold a medicine ball overhead. Explosively slam the ball into the ground, using your whole body. Pick up the ball and repeat.

Cool-Down (10 minutes):

Static Stretching: Hamstrings, quadriceps, calves, hip flexors
Foam Rolling: Focus on the legs and lower back to alleviate any tightness or soreness

How to Improve Your Deadlift for Olympic Weightlifting

Here’s a great exercise The Barbell Physio just dropped on their IG page:

Until next time…

Discover & Fingerprint: Nmap flags you should actually know (and when to use them)

Discovery and fingerprinting are where recon stops being guesswork and starts being a map. Over the next few weeks I’ll dig into Nmap and other recon tools — for now, here’s a compact, practical list of Nmap switches worth committing to memory for pentesting exams and real-world ops. Don’t just memorize the letters — learn the purpose and the use case.

Basic target input / listing

  • nmap -iL targets.txt
    Scan targets from a file. Use when you have a long list to automate.
  • nmap -iR 100
    Scan 100 random hosts. Good for practice/learning about global scanning patterns in a lab.
  • nmap 192.168.1.10 -sL
    List-only — no probes. Use to verify target resolution without touching ports.

Host discovery vs port scan

  • nmap 192.168.1.1/24 -sn
    Ping/host discovery only (no port scan). Fast way to find live hosts on a subnet.
  • nmap 192.168.1.1-5 -Pn
    Skip host discovery (treat hosts as up). Useful when ICMP/ARP are blocked but you still want to try ports.

Port specification

  • nmap 192.168.1.1 -p 21
    Scan a single port (FTP, in this example).
  • nmap 192.168.1.1 -p 21-100
    Scan a specific port range. Use when you want targeted scanning (faster than full 65k).

Service & OS fingerprinting

  • nmap 192.168.1.1 -sV
    Service/version detection. Helps identify vulnerable versions (e.g., out-of-date FTP/SSH).
  • nmap 192.168.1.1 -O
    Remote OS detection (TCP/IP stack fingerprinting). Useful when you need OS-level attack vectors.
  • nmap 192.168.1.1 -A
    Aggressive: OS detection + version detection + scripts + traceroute. Good for a quick, deep look — loud and obvious on the network.

Timing / IDS evasion

Timing templates adjust scan speed and stealth. Choose based on network reliability and detection risk.

  • -T0 Paranoid — ultra-slow. Used to evade IDS or noisy logging systems.
  • -T1 Sneaky — very slow.
  • -T2 Polite — slows scans to reduce bandwidth/impact on target.
  • -T3 Normal — default.
  • -T4 Aggressive — faster, assumes stable network.
  • -T5 Insane — very fast; only on extremely reliable links or internal lab networks.

Memory tricks & practical tips

  • I/O flags: -iL = Input List. File-based scanning automation.
  • List-only: -sL — “List targets only.” No probing.
  • Host discovery: -sn = scan no ports (ping only).
  • Skip discovery: -Pn = treat hosts as Up (No ping).
  • Service info: -sV for service Version, -O for OS.
  • One-shot vs range: -p 21 vs -p 21-100. Single vs range.
  • Aggressive -A = one-shot deep recon; loud but thorough.
  • Timing -T# = speed vs stealth. 0 is slowest/most stealthy; 5 fastest.

Mini workflows (real use-cases)

  • Quick inventory on a subnet:
    nmap 10.0.0.0/24 -sn → find live hosts, then nmap -sV -p 22,80,443 <host> for details.
  • When ICMP blocked:
    nmap -Pn -p 1-1000 <host> → skip discovery, probe ports directly.
  • Stealth check in an IDS lab:
    nmap -T1 -sV <host> → slow timing to reduce IDS noise.
  • Full noisy recon in a lab environment:
    nmap -A -T4 <target> → quick comprehensive view.

Closing — don’t memorize blindly

The exam question isn’t “what flag is X” — it’s “which flag solves this problem.” Memorize the purpose and practice applying them in labs. Over the coming weeks I’ll publish deeper examples for each of these switches, show script usage, and map Nmap output to real exploitation workflows.