Categories
Cyber Security Incident Response

Book Recommendations for Incident Responders

Incident Responders can benefit from the books in order to obtain theoretical and practical information about the steps to be applied while responding to the incident. In this article, brief information will be given about 3 different books written about the incident response: Title: Incident Response & Computer Forensics Target Audience: SOC Analyst Tier 2Read More

Categories
Cyber Security SOC Analyst

Preparing for the CompTIA CySA+ Exam: Clayton’s Story

Clayton is a recent college graduate that has been studying cybersecurity and offensive security for two years. He has always enjoyed playing around with technology and only recently realized he would revolve his career around cybersecurity and technology. Why blue team certificate? In the cybersecurity/IT field there are so many different pathways and careers thatRead More

Categories
Cyber Security SOC Analyst

Book Recommendations for SOC Analyst Candidates

SOC Analyst candidates and students who would like to sharpen their Blue Team skills can benefit from the books in order to improve themselves and have information on this subject. In this article, we will talk about 3 different books that cover basic topics to introduce to the blue team subject. Title: Blue Team Handbook:Read More

Categories
Cyber Security SOC Analyst

SOC Analyst Interview Questions

There are lots of different interview questions for SOC analysts. You can find all the content on our GitHub repository. What should you expect? Below is a list of the topics on which questions can be asked in the interview. Security Analyst Basic terminologies Network fundamentals Operating system fundamentals Malware analysis fundamentals How to analyzeRead More

Categories
Cyber Security Detection Malware SOC Analyst

Book Recommendations for SOC Analysts

SOC analysts need a lot of theoretical and practical knowledge when detecting threats in their work routines. One of the best sources they can obtain this information is books. We will talk about 3 different books in this article: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Blue Team Field Manual (BTFM) AppliedRead More

Categories
Cyber Security SOC Analyst

The Best Blue Team Certifications

In this article, we will be discussing what the certificate is in general, its importance and the certificates in blue team based training programs. A certificate is a document that demonstrates competence in a particular subject. One of the most important elements in certificate programs is the training content. Candidates who want to achieve aRead More

Categories
Cyber Security SOC Analyst

SOC Analyst vs Penetration Tester: Which career path is the best?

Candidates who want to pursue a career in cyber security should have knowledge of the sub-branch of cyber security that they want to specialize in. In this article, we discuss penetration tester and SOC analyst, two important professions in the industry and explain what employees in both professions do, their daily work routines, what skillsRead More

Categories
Cyber Security SOC Analyst

The Best Tools for SOC Analysts

During the investigation, SOC analysts do a few things at the same time. For instance: checking IP reputation, malware analysis, looking log management etc. And for saving time, they use some security tools. We listed the best tools/services for security analysts can use during the job. Investigation Process Hacker Great tool for monitoring the systemRead More

Categories
Attacking Cyber Security News

How to Build Home Lab for Spring4Shell Exploit

Recently we heard an exploit about Spring4Shell like everyone else. We quickly built an incident on LetsDefend about it. Now, we are explaining how you can setup up a home lab yourself. Requirements: Vulnerable app Spring4Shell exploit Docker Stages: Build a vulnerable app Preparation for attack Exploitation By the way, we have already built anRead More

Categories
Cyber Security Detection SOC Analyst

Network Forensics: Log Sources

The network is a path to target systems for attackers. This path is divided into 2 sections: Paths inside the organization and the interface that faces outside the organization. Network connections between the devices facing the external interface of the institution and network connections of the devices within the institution are critical for attack detectionRead More