Practical Cybersecurity Training For every level.

Your career on the Blue team

Our academic content is overseen by our Academic Advisory Board, with a combined total of over 100 years experience in the security industry.

100k+

Students across the globe

16

Courses

3

Certifications

Image of Tom

Tom

Tier 2 SOC Analyst

My Experience with Security Blue Team

Back in 2020 I decided to transition from DevOps/Systems Engineering into a role with more focus on cyber security, in particular DFIR. I took BTL1 after months of decision making and was glad I did. The hands-on training gave me everything I needed to gain the coveted gold when I finally took the exam, and the confidence to jump straight into a senior SOC analyst role.

Image of Jay Jay

Jay Jay

Tier 2 SOC Analyst

My Experience with Security Blue Team

The Blue Team Level 1 Certification is a comprehensive exam that incorporated many different skills that a blue team operator may require depending on the role they wish to go into. The content is easy to follow and goes into more than sufficient detail. The Exam itself was undoubtedly challenging and took me approximately 18 hours to attain gold, the experience made me a much more confident and well-rounded analyst and has made me qualified for lead roles.

Image of Bohan

Bohan

SOC Analyst

My Experience with Security Blue Team

BTL1 has helped me tremendously on my journey to become a SOC Analyst. The skills I have learned from this course and exam gave me a great foundation on blue team and prepared me well for my job interview. Whether you are on your journey to become a blue teamer or already work in the industry for a while, BTL1 is the way to go!

Image of Steffan J

Steffan J

Cyber Security Services Manager, Fortra

My Experience with Security Blue Team

The practical training and courses offered by Security Blue Team require our analysts to not only learn the concepts through classic reading and reference material, but also apply them in a challenging capstone project which emulates a real network security compromise. This methodology helps Fortra ensure that our analysts have a consistent education with sufficient hands-on training to competently approach many of the complicated scenarios which they are likely to encounter, whilst providing profound expertise to our customers during security incidents.

Recent Posts

SBT Wrapped: A Year in Stats
Melissa Boyle 18/12/2024

SBT Wrapped: A Year in Stats

Welcome to the very first SBT Wrapped, where we’ll be sharing some stats from the past year.

Forensics 101: Live Acquisition USB and Digital Triaging with Kape
Malik Girondin 09/12/2024

Forensics 101: Live Acquisition USB and Digital Triaging with Kape

Live acquisition is a computer forensics technique that involves collecting data from a running computer system, rather than one that is powered off or dormant. The goal is to capture volatile forensic data, such as that in the main memory (RAM) while minimizing any impact on the system’s integrity. This...

Command and Control Chaos
Aditya Rai 13/11/2024

Command and Control Chaos

A Command and Control, also known as a C2 or C&C server, is an essential tool for cybercriminals and hackers, acting as the central hub for managing and coordinating malicious activities such as data breaches, malware distribution, and cyberattacks.