Our Blog
Resources and insights
The latest industry news, interviews, technologies, and resources.
How To Become A SOC Analyst
This blog explores the duties of a SOC analyst, lasting motivations for pursuing defensive cyber security, and resources to get started and progress in the SOC.
Networking Fundamentals for Pentesters
We will take a look at networking concepts you should focus on, why they matter, and resources for learning for beginning pentesters without an IT background.
The PSAA: SOC Experience Certification
The PSAA certification is designed to give you knowledge and hands-on SOC experience, while signaling to employers that you can contribute on day one.
Will AI Replace or Enhance Cybersecurity Professionals?
AI is often viewed as a threat to cybersecurity jobs, but it is a powerful tool that can make cybersecurity professionals more efficient and effective.
Hiring for the Help Desk: A CIO’s Take
Learn the thoughts of a CIO on hiring Help Desk employees, how to identify good IT support candidates, and feedback on the PHDA certification.
TCM Web Pentester Certification Roadmap
TCM Security offers a web app pentesting pathway of learning and certification, from complete beginner to practitioner of professional-level techniques.
Course Retirements: Windows & Linux Privilege Escalation for Beginners
Starting on May 7, 2025, the Windows and Linux Privilege Escalation for Beginners courses in TCM Security Academy, will no longer be available as part of the All-Access Membership. Why Were The Courses Retired? We are constantly evaluating our courses for improvements...
How To Pass The PORP Certification Exam
The Practical OSINT Research Professional exam isn’t about memorization but about skill. Here are some tips and tricks to prepare you to pass.
Top 3 Help Desk Certifications for 2025
In this blog, we’ll take a look at 3 of the most significant help desk certifications in 2025 and how they can help you land an entry-level IT role.
Stay Ahead of Cyber Threats
Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.
Loading form...
We care about your data in our privacy policy.








