fbpx
TCM SOC Analyst Certification Roadmap

TCM SOC Analyst Certification Roadmap

While TCM has traditionally offered training and certification for offensive security roles, we have expanded our offerings to include practical blue team security analyst training and certification. In cyber security, adopting the mindset of your adversary is a...
How To Identify URL Phishing Techniques

How To Identify URL Phishing Techniques

In 2025, phishing is still one of the most ubiquitous and effective attack vectors cybercriminals use to steal credentials, distribute malware, and compromise organizations. Oftentimes, these phishing campaigns stem from deceptive URLs which are crafted to appear...
SOC Tools Every Analyst Should Know

SOC Tools Every Analyst Should Know

While each SOC may have its own unique structure and technology stack, there remains a core set of tools and methodologies that analysts should be familiar with to effectively handle a variety of investigations and evidence sources in the field. Rather than focusing...
Protecting Your Network With Honeypots

Protecting Your Network With Honeypots

Honeypots: Detection, Recon, and Misdirection A honeypot in cyber security is basically a trap that lures in attackers and can slow down the pace of an attack, gather actionable intelligence, and even alert an organization that an attack is occurring. In this blog,...
How to Pass the Practical SOC Analyst Associate (PSAA) Exam

How to Pass the Practical SOC Analyst Associate (PSAA) Exam

Introduction Are you preparing for the new Practical SOC Analyst Associate (PSAA) certification exam? As the creator of the certification and included SOC 101 training materials, I collected a few high-level tips to help you feel confident and prepared going into the...