Practical Cybersecurity Training For every level.

Your career on the Blue team

Our academic content is overseen by our Academic Advisory Board, with a combined total of over 100 years experience in the security industry.

100k+

Students across the globe

16

Courses

3

Certifications

Image of Tom

Tom

Tier 2 SOC Analyst

My Experience with Security Blue Team

Back in 2020 I decided to transition from DevOps/Systems Engineering into a role with more focus on cyber security, in particular DFIR. I took BTL1 after months of decision making and was glad I did. The hands-on training gave me everything I needed to gain the coveted gold when I finally took the exam, and the confidence to jump straight into a senior SOC analyst role.

Image of Jay Jay

Jay Jay

Tier 2 SOC Analyst

My Experience with Security Blue Team

The Blue Team Level 1 Certification is a comprehensive exam that incorporated many different skills that a blue team operator may require depending on the role they wish to go into. The content is easy to follow and goes into more than sufficient detail. The Exam itself was undoubtedly challenging and took me approximately 18 hours to attain gold, the experience made me a much more confident and well-rounded analyst and has made me qualified for lead roles.

Image of Bohan

Bohan

SOC Analyst

My Experience with Security Blue Team

BTL1 has helped me tremendously on my journey to become a SOC Analyst. The skills I have learned from this course and exam gave me a great foundation on blue team and prepared me well for my job interview. Whether you are on your journey to become a blue teamer or already work in the industry for a while, BTL1 is the way to go!

Image of Steffan J

Steffan J

Cyber Security Services Manager, Fortra

My Experience with Security Blue Team

The practical training and courses offered by Security Blue Team require our analysts to not only learn the concepts through classic reading and reference material, but also apply them in a challenging capstone project which emulates a real network security compromise. This methodology helps Fortra ensure that our analysts have a consistent education with sufficient hands-on training to competently approach many of the complicated scenarios which they are likely to encounter, whilst providing profound expertise to our customers during security incidents.

Recent Posts

Logging Windows file tampering attempts
John Jonusauskas 30/10/2024

Logging Windows file tampering attempts

Imagine you’re working in a company, and an insider threat tampers with a critical file, like a financial document or a system configuration file. If you don’t know who, when, or what was modified, you may not even realize something is wrong until it’s too late. This can lead to...

Cloud Security: A Defender's Perspective
Aditya Rai 16/10/2024

Cloud Security: A Defender's Perspective

Cloud security involves a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing.