by Josh Daniels | May 14, 2025 | Learning, SOC
While TCM has traditionally offered training and certification for offensive security roles, we have expanded our offerings to include practical blue team security analyst training and certification. In cyber security, adopting the mindset of your adversary is a...
by TCMS Staff | Mar 19, 2025 | Security, SOC
In 2025, phishing is still one of the most ubiquitous and effective attack vectors cybercriminals use to steal credentials, distribute malware, and compromise organizations. Oftentimes, these phishing campaigns stem from deceptive URLs which are crafted to appear...
by TCMS Staff | Jan 15, 2025 | SOC
While each SOC may have its own unique structure and technology stack, there remains a core set of tools and methodologies that analysts should be familiar with to effectively handle a variety of investigations and evidence sources in the field. Rather than focusing...
by TCMS Staff | Dec 25, 2024 | SOC
Honeypots: Detection, Recon, and Misdirection A honeypot in cyber security is basically a trap that lures in attackers and can slow down the pace of an attack, gather actionable intelligence, and even alert an organization that an attack is occurring. In this blog,...
by TCMS Staff | Oct 30, 2024 | SOC
Introduction Are you preparing for the new Practical SOC Analyst Associate (PSAA) certification exam? As the creator of the certification and included SOC 101 training materials, I collected a few high-level tips to help you feel confident and prepared going into the...
by TCMS Staff | Oct 9, 2024 | Programming, SOC
In our roles as cybersecurity professionals, we often find ourselves drowning in a sea of data logs, unable to extract meaning and insight from the enormous amount of data. This is where the great trio of sed, awk, and grep can be put into action. In spite of the fact...