Experimental · YouTube channel

The Pentest School YouTube channel.

Videos, tips, and memos. Attack and defense. 15 years of security architect experience, condensed and shared in the open.

Join the CyberWarrior waitlist €9/month
Follow Pentest School

Five places to follow.

Pick the format that fits your week. It all starts on the YouTube channel.

Community

Talk to me on Discord.

To trade ideas directly, ask questions, share your path, or get a quick opinion. The Pentest School Discord is open.

💬

Join the Discord and message Fabien-Cybersec

A quick question about an attack, a video topic to suggest, a blocker in your learning. The server is the easiest way to reach me. Tag @Fabien-Cybersec and I read every day.

Open the Discord →
The coach

The person behind the channel.

Fabien Soulis

Fabien Soulis. Multicloud security architect, pentester, incident responder. 15+ years securing global enterprises across North America and Europe.

CISSP. Microsoft Certified Azure Solutions Architect Expert. Instructor at Paris 1 Panthéon-Sorbonne, teaching security architecture. Founder of a SaaS cybersecurity business with dozens of enterprise clients. Zero major incidents across 150K+ employee environments.

I have analyzed every attack path and designed controls against them. I have written the risk memos and presented them to executives. The channel is the format I wish existed when I was learning. Direct, no fluff, what actually works.

15+
Years in the field
150K+
Users secured
0
Major incidents
1-on-1 Coaching

For those who want a personalized path.

If the YouTube channel and Discord are not enough. If you want a tailored journey, calibrated to your goals and your context. Here is what I offer in advanced coaching.

CyberWarrior Program · €9/month

The program.

A video-based path, structured the way I wished it had been when I started. Attack and defense. All my security architect knowledge, distilled week after week.

01 · Hacking fundamentals
The phases of a pentest. Reconnaissance, scanning, exploitation, post-exploitation, persistence, exfiltration. The vocabulary and logic of the attacker, before everything else.
02 · The targets attackers love
HR and admin workstations. Active Directory, Microsoft Entra ID, Microsoft 365. Cloud providers: Azure, GCP, AWS, OCI. Why these targets, and how they chain together.
03 · Security controls and their weaknesses
Firewall, antivirus, EDR, SIEM, anti-spam, DLP. What each tool sees, what it misses, and how attackers slip past it. You will read a defensive setup the way an attacker reads it.
04 · Attacks on the targets that matter
Phishing with MFA bypass. Fake help desk. Booby-trapped documents. Lateral movement: internal scanning, privilege escalation, persistence. Across every component of an enterprise environment: AD DS, M365, cloud, Windows, Linux.
05 · One video per topic
Every concept, every tool, every attack, every defense gets its own video. 15 years of security architect experience, attack and defense, transmitted without detours.
06 · Cadence
Every week: videos, tips, memos. A continuous thread, so watching becomes reflex and practice becomes habit.
€9/month
The program launches as soon as 100 people have joined the waitlist.
Waitlist

Join the CyberWarrior waitlist.

The program will be shaped by the needs of the people who sign up. The more precise you are about your situation and your goals, the more the program will fit you. A few minutes, and you are on the list.

Your answers are used only to calibrate the program. No spam, no resale.

You are on the list.

Thank you. I will write to you as soon as the program launches, and earlier if a content decision deserves your input. In the meantime, subscribe to the YouTube channel and stop by the Discord.