Cybersecurity Student | SOC Analyst Path | Blue Team | Detection | Incident Analysis
- 3rd-year Cybersecurity student
- Focused on SOC operations, incident response, and practical security labs
- Interested in threat detection, log analysis, brute force detection, phishing analysis, and network security
- Building real cybersecurity projects and GitHub case studies
- Continuously improving Linux, networking, and defensive security skills
- SIEM Basics
- Event ID Analysis
- Incident Investigation
- Brute Force Detection
- Phishing Analysis
- Network Traffic Analysis
- Access Control Testing
- Web Security Basics
- Kali Linux
- Wireshark
- Burp Suite
- Hydra
- Nmap
- Wazuh (learning)
- Linux Terminal
- VirtualBox
- Git / GitHub
- Python (basic scripting)
MITM attack simulation in a controlled lab environment with traffic interception analysis and mitigation strategies.
Broken Access Control testing using PortSwigger and Burp Suite with unauthorized object reference manipulation.
Authentication attack simulation against DVWA login forms using Hydra and request analysis.
Brute force testing against SSH service on port 22 with authentication monitoring and defense recommendations.
Credential harvesting simulation using SEToolkit with phishing awareness and mitigation strategies.
OSINT-based exposure analysis using search engine indexing and security misconfiguration discovery.
- TryHackMe
- PicoCTF
- Linux Security Labs
- Wazuh Detection Labs
- SOC Incident Analysis
- Blue Team Fundamentals
Currently improving practical detection and incident response skills for junior SOC roles.
Build strong technical skills and practical experience to become a reliable Junior SOC Analyst and grow in Blue Team operations.