<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Faizan Nazir</title>
    <description>The latest articles on Forem by Faizan Nazir (@faizan-nazir).</description>
    <link>https://forem.com/faizan-nazir</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3898753%2F7bea112e-9bf7-4a8b-a86d-8148dc0eba97.jpeg</url>
      <title>Forem: Faizan Nazir</title>
      <link>https://forem.com/faizan-nazir</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/faizan-nazir"/>
    <language>en</language>
    <item>
      <title>Day 3 Learning How Data Actually Moves (TCP/IP, TCP vs UDP, DHCP)</title>
      <dc:creator>Faizan Nazir</dc:creator>
      <pubDate>Fri, 01 May 2026 03:58:07 +0000</pubDate>
      <link>https://forem.com/faizan-nazir/day-3-learning-how-data-actually-moves-tcpip-tcp-vs-udp-dhcp-339d</link>
      <guid>https://forem.com/faizan-nazir/day-3-learning-how-data-actually-moves-tcpip-tcp-vs-udp-dhcp-339d</guid>
      <description>&lt;p&gt;Day 3 of my SOC journey — and things are getting real.&lt;/p&gt;

&lt;p&gt;Today I focused on how communication actually happens inside networks:&lt;/p&gt;

&lt;p&gt;TCP/IP basics&lt;br&gt;
4-layer model&lt;br&gt;
TCP vs UDP&lt;br&gt;
TCP handshake&lt;br&gt;
DHCP + DORA&lt;/p&gt;

&lt;p&gt;💡 Biggest insight:&lt;/p&gt;

&lt;p&gt;Everything in SOC — alerts, logs, attacks —&lt;br&gt;
depends on how data flows.&lt;/p&gt;

&lt;p&gt;If you don’t understand this, you’re just guessing.&lt;/p&gt;

&lt;p&gt;⚡ TCP = reliable&lt;br&gt;
⚡ UDP = fast&lt;/p&gt;

&lt;p&gt;Both matter.&lt;/p&gt;

&lt;p&gt;What’s next?&lt;br&gt;
MAC Address, ARP, ICMP, and Ping&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>networking</category>
      <category>learning</category>
      <category>infosec</category>
    </item>
    <item>
      <title>🚀 SOC Analyst Journey – Day 2: IP, DNS &amp; Basic Network Commands</title>
      <dc:creator>Faizan Nazir</dc:creator>
      <pubDate>Mon, 27 Apr 2026 10:28:07 +0000</pubDate>
      <link>https://forem.com/faizan-nazir/soc-analyst-journey-day-2-ip-dns-basic-network-commands-4him</link>
      <guid>https://forem.com/faizan-nazir/soc-analyst-journey-day-2-ip-dns-basic-network-commands-4him</guid>
      <description>&lt;p&gt;Day 2 of my SOC Analyst journey — and now I’m starting to see how the internet actually works behind the scenes.&lt;/p&gt;

&lt;p&gt;Today’s focus was on the core networking concepts and commands that SOC analysts rely on during investigations and alert triage.&lt;/p&gt;

&lt;p&gt;🧠 What I Covered&lt;br&gt;
🌐 IP Addressing&lt;/p&gt;

&lt;p&gt;Understanding how every device in a network is uniquely identified.&lt;/p&gt;

&lt;p&gt;IPv4 &amp;amp; IPv6 basics&lt;br&gt;
Source and Destination identification&lt;br&gt;
Foundation of all network communication&lt;br&gt;
🌍 DNS (Domain Name System)&lt;/p&gt;

&lt;p&gt;Learning how domain names are converted into IP addresses.&lt;/p&gt;

&lt;p&gt;Domain → IP resolution&lt;br&gt;
Role of DNS in browsing and communication&lt;br&gt;
How DNS can expose suspicious or malicious domains&lt;br&gt;
🛠️ nslookup&lt;/p&gt;

&lt;p&gt;A simple but powerful tool to query DNS records.&lt;/p&gt;

&lt;p&gt;Used to check domain resolution&lt;br&gt;
Helps analyze suspicious domains during investigations&lt;br&gt;
Useful for quick DNS verification&lt;br&gt;
📡 ping&lt;/p&gt;

&lt;p&gt;One of the most basic yet essential network tools.&lt;/p&gt;

&lt;p&gt;Checks if a host is reachable&lt;br&gt;
Measures response time (latency)&lt;br&gt;
Helps identify connectivity issues&lt;br&gt;
🧭 traceroute&lt;/p&gt;

&lt;p&gt;Understanding how data travels across networks.&lt;/p&gt;

&lt;p&gt;Shows the path (hops) packets take&lt;br&gt;
Helps identify where delays or failures occur&lt;br&gt;
Useful for deeper network troubleshooting&lt;br&gt;
🎯 Key Takeaways&lt;br&gt;
IP addresses are the identity of devices in a network&lt;br&gt;
DNS acts as the translator between domains and IPs&lt;br&gt;
nslookup is useful for domain investigation&lt;br&gt;
ping helps verify host availability&lt;br&gt;
traceroute reveals the full journey of packets&lt;br&gt;
🔍 Why This Matters in SOC&lt;/p&gt;

&lt;p&gt;In a real SOC environment:&lt;/p&gt;

&lt;p&gt;Alerts are often tied to IP addresses and domains&lt;br&gt;
Analysts investigate suspicious DNS queries&lt;br&gt;
Network commands help validate and trace activity&lt;/p&gt;

&lt;p&gt;Without understanding these basics, it’s difficult to analyze logs or respond to incidents effectively.&lt;/p&gt;

&lt;p&gt;📌 Progress Mindset&lt;/p&gt;

&lt;p&gt;No tools yet. No dashboards yet.&lt;/p&gt;

&lt;p&gt;Just building the foundation — step by step.&lt;/p&gt;

&lt;p&gt;Because strong fundamentals make everything easier later.&lt;/p&gt;

&lt;p&gt;💬 Let’s discuss:&lt;br&gt;
Have you ever used nslookup to investigate a suspicious domain? What did you find?&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>networking</category>
      <category>infosec</category>
      <category>learning</category>
    </item>
    <item>
      <title># Day 1 – The Biggest Beginner Mistake in SOC: Ignoring Networking 🚀</title>
      <dc:creator>Faizan Nazir</dc:creator>
      <pubDate>Sun, 26 Apr 2026 13:01:18 +0000</pubDate>
      <link>https://forem.com/faizan-nazir/-day-1-the-biggest-beginner-mistake-in-soc-ignoring-networking-3mb8</link>
      <guid>https://forem.com/faizan-nazir/-day-1-the-biggest-beginner-mistake-in-soc-ignoring-networking-3mb8</guid>
      <description>&lt;p&gt;When I first thought about becoming a SOC Analyst, I imagined dashboards, alerts, and powerful security tools.&lt;/p&gt;

&lt;p&gt;But Day 1 of my journey changed that completely.&lt;/p&gt;

&lt;p&gt;Instead of jumping into tools, I started with the real foundation: &lt;strong&gt;networking&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why Networking Matters More Than Tools
&lt;/h2&gt;

&lt;p&gt;At its core, networking is just communication between devices.&lt;/p&gt;

&lt;p&gt;Every time we:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Open a website&lt;/li&gt;
&lt;li&gt;Send an email&lt;/li&gt;
&lt;li&gt;Use an app&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Data moves across a network.&lt;/p&gt;

&lt;p&gt;Here’s what most beginners miss:&lt;/p&gt;

&lt;p&gt;👉 &lt;strong&gt;Every cyber attack uses the same path.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If there’s no network, there’s no attack.&lt;/p&gt;

&lt;p&gt;That’s why networking isn’t optional — it’s essential.&lt;/p&gt;




&lt;h2&gt;
  
  
  What I Learned Today
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Networking basics&lt;/li&gt;
&lt;li&gt;Data communication&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Communication components&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Sender&lt;/li&gt;
&lt;li&gt;Receiver&lt;/li&gt;
&lt;li&gt;Message&lt;/li&gt;
&lt;li&gt;Medium&lt;/li&gt;
&lt;li&gt;Protocol&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;Simple concepts, but they explain how systems interact — and how attackers exploit them.&lt;/p&gt;




&lt;h2&gt;
  
  
  Client–Server Model (Game Changer)
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Client → sends request&lt;/li&gt;
&lt;li&gt;Server → sends response&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We use this every day while browsing.&lt;/p&gt;

&lt;p&gt;But attackers use it too.&lt;/p&gt;

&lt;p&gt;Malware can act as a client and communicate with a malicious server.&lt;/p&gt;

&lt;p&gt;That’s where detection starts.&lt;/p&gt;




&lt;h2&gt;
  
  
  LAN vs WAN (Important for SOC)
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;LAN&lt;/strong&gt; → Private, trusted&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;WAN&lt;/strong&gt; → Public, untrusted&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Most attacks come from WAN and try to enter LAN.&lt;/p&gt;

&lt;p&gt;Understanding this helps in prioritizing threats.&lt;/p&gt;




&lt;h2&gt;
  
  
  SOC Reality
&lt;/h2&gt;

&lt;p&gt;SOC is not about chasing hackers.&lt;/p&gt;

&lt;p&gt;It’s about understanding behavior.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Logs = records&lt;/li&gt;
&lt;li&gt;Alerts = warnings&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;👉 Tools show data&lt;br&gt;
👉 Networking helps you understand it&lt;/p&gt;




&lt;h2&gt;
  
  
  Key Takeaway
&lt;/h2&gt;

&lt;p&gt;👉 &lt;strong&gt;SOC work starts with understanding behavior, not tools.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Networking is the language of SOC.&lt;/p&gt;

&lt;p&gt;Without it:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Logs = confusing&lt;/li&gt;
&lt;li&gt;Alerts = overwhelming&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;With it:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Everything connects&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Final Thoughts
&lt;/h2&gt;

&lt;p&gt;This is just Day 1, but it already changed my mindset.&lt;/p&gt;

&lt;p&gt;I’m focusing on fundamentals first — tools later.&lt;/p&gt;

&lt;p&gt;Let’s see where this journey goes 🚀&lt;/p&gt;




&lt;h2&gt;
  
  
  Discussion
&lt;/h2&gt;

&lt;p&gt;Are you also starting in cybersecurity or SOC?&lt;/p&gt;

&lt;p&gt;What did you focus on in your early days?&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>learning</category>
      <category>networking</category>
    </item>
  </channel>
</rss>
