Practical Cybersecurity Training For every level.

Your career on the Blue team

Our academic content is overseen by our Academic Advisory Board, with a combined total of over 100 years' experience in the security industry.

100k+

Students across the globe

18

Courses

3

Certifications

Image of Tom

Tom

Tier 2 SOC Analyst

My Experience with Security Blue Team

Back in 2020 I decided to transition from DevOps/Systems Engineering into a role with more focus on cyber security, in particular DFIR. I took BTL1 after months of decision making and was glad I did. The hands-on training gave me everything I needed to gain the coveted gold when I finally took the exam, and the confidence to jump straight into a senior SOC analyst role.

Image of Jay Jay

Jay Jay

Tier 2 SOC Analyst

My Experience with Security Blue Team

The Blue Team Level 1 Certification is a comprehensive exam that incorporated many different skills that a blue team operator may require depending on the role they wish to go into. The content is easy to follow and goes into more than sufficient detail. The Exam itself was undoubtedly challenging and took me approximately 18 hours to attain gold, the experience made me a much more confident and well-rounded analyst and has made me qualified for lead roles.

Image of Bohan

Bohan

SOC Analyst

My Experience with Security Blue Team

BTL1 has helped me tremendously on my journey to become a SOC Analyst. The skills I have learned from this course and exam gave me a great foundation on blue team and prepared me well for my job interview. Whether you are on your journey to become a blue teamer or already work in the industry for a while, BTL1 is the way to go!

Image of Steffan J

Steffan J

Cyber Security Services Manager, Fortra

My Experience with Security Blue Team

The practical training and courses offered by Security Blue Team require our analysts to not only learn the concepts through classic reading and reference material, but also apply them in a challenging capstone project which emulates a real network security compromise. This methodology helps Fortra ensure that our analysts have a consistent education with sufficient hands-on training to competently approach many of the complicated scenarios which they are likely to encounter, whilst providing profound expertise to our customers during security incidents.

Recent Posts

Essential Skills for Thriving in Cybersecurity Careers
Duncan Whitley 24/08/2025

Essential Skills for Thriving in Cybersecurity Careers

As the digital world becomes increasingly complex, the demand for skilled cybersecurity professionals is higher than ever. Success in this field requires a diverse skill set, from technical expertise in threat analysis and network security to crucial soft skills like communication and problem-solving. In this post, we’ll explore the key...

Cybersecurity in the Remote Work Era: Adapting to New Challenges
Duncan Whitley 21/08/2025

Cybersecurity in the Remote Work Era: Adapting to New Challenges

The shift to remote work has drastically transformed how businesses operate, but it has also introduced significant cybersecurity challenges. With employees connecting from various locations and using diverse devices, the potential for cyberattacks has expanded. This post explores the key cybersecurity issues arising from remote work and offers strategies for...

Exploring how VS Code extensions can be weaponized
Renmarc Andrada 08/08/2025

Exploring how VS Code extensions can be weaponized

Imagine installing a Visual Studio Code (VS Code) extension to enhance your development workflow, only to discover that it has been silently exfiltrating your sensitive information, such as SSH keys, and potentially opening a backdoor to your system. This isn’t just a “what if.” It’s already happening