▶ IN PROGRESS
MODULE 01
Blue Team Introduction
Start your defensive security career by exploring the Blue Team and the Security Operations Centre (SOC). Understand why defensive security is essential.
Junior Security Analyst IntroSOC Role in Blue TeamHumans as Attack VectorsSystems as Attack Vectors
20% — 1 of 5 rooms
⬜ UPCOMING
MODULE 02
SOC Team Internals
Explore the essential SOC analyst skills to help you triage, classify, and escalate alerts in real-world SOC environments.
SOC L1 Alert TriageAlert ReportingSOC WorkbooksSOC MetricsIntro to Phishing
0% — not started
⬜ UPCOMING
MODULE 03
Core SOC Solutions
This module covers SIEM, EDR and SOAR — the core security solutions used in every SOC. Understanding these tools is essential for any analyst.
Intro to EDRIntro to SIEMSplunk: The BasicsElastic Stack: The BasicsIntro to SOAR
0% — not started
⬜ UPCOMING
MODULE 04
Cyber Defence Frameworks
Learn how frameworks such as Pyramid of Pain, Cyber Kill Chain, and MITRE ATT&CK help you understand adversarial behaviour and harden detection and response.
Pyramid of PainCyber Kill ChainUnified Kill ChainMITRESummitEviction
0% — not started
⬜ UPCOMING
MODULE 05
Threat Analysis Tools
Understand how to leverage threat intelligence to detect, investigate and defend against adversaries using enrichment techniques and analysis workflows.
Intro to Cyber Threat IntelFile & Hash Threat IntelIP & Domain Threat IntelInvite Only
0% — not started
⬜ UPCOMING
MODULE 06
Network Traffic Analysis
Learn the basics of network traffic analysis and get hands-on with Wireshark to detect various types of attacks through packet inspection.
Network Traffic BasicsWireshark: BasicsWireshark: Packet OpsWireshark: Traffic AnalysisNetworkMiner
0% — not started
⬜ UPCOMING
MODULE 07
Network Security Monitoring
Learn about key fundamentals of Network Security — monitoring perimeters and analysing network traffic for footprints of MITM, discovery, and exfiltration attacks.
Network Security EssentialsNetwork Discovery DetectionData Exfiltration DetectionMITM DetectionIDS FundamentalsSnort
0% — not started
⬜ UPCOMING
MODULE 08
Web Security Monitoring
Learn how to protect and monitor the web ecosystem — detecting web attacks, web shells, and DDoS through log and traffic analysis.
Web Security EssentialsDetecting Web AttacksDetecting Web ShellsDetecting Web DDoS
0% — not started
⬜ UPCOMING
MODULE 09
Windows Security Monitoring
Learn how Windows logging works and use it to detect common Windows attacks — all through real-world examples and hands-on threat detection labs.
Windows Logging for SOCWindows Threat Detection 1Windows Threat Detection 2Windows Threat Detection 3
0% — not started
⬜ UPCOMING
MODULE 10
Linux Security Monitoring
Learn how Linux logging works and use it to detect common Linux attacks through real-world examples and challenging hands-on detection labs.
Linux Logging for SOCLinux Threat Detection 1Linux Threat Detection 2Linux Threat Detection 3
0% — not started
⬜ UPCOMING
MODULE 11
Malware Concepts for SOC
Learn to identify common malware types, understand their purpose, analyse files, and detect Living Off the Land attacks using trusted Windows tools.
Malware ClassificationIntro to Malware AnalysisLiving Off the Land AttacksShadow Trace
0% — not started
⬜ UPCOMING
MODULE 12
Phishing Analysis
Learn how to analyse and defend against phishing emails. Investigate real-world phishing attempts using email headers, URLs, and attachment analysis.
Phishing FundamentalsPhishing Emails in ActionPhishing Analysis ToolsPhishing PreventionThe Greenholt PhishSnapped Phish-ing LinePhishing Unfolding
0% — not started
⬜ UPCOMING
MODULE 13
SIEM Triage for SOC
Explore how SIEM solutions detect early signs of attacks, investigate SOC alerts, and correlate logs from multiple sources to build an incident timeline.
Log Analysis with SIEMAlert Triage With SplunkAlert Triage With ElasticItsyBitsyBenign
0% — not started
⬜ UPCOMING
MODULE 14
SOC L1 Capstone Challenges
Investigate critical incidents and apply all the skills needed to be an effective SOC analyst while handling various real-world artefacts and attack chains.
TempestBoogeyman 1Boogeyman 2Boogeyman 3
0% — not started