Practical Cybersecurity Training For every level.

Your career on the Blue team

Our academic content is overseen by our Academic Advisory Board, with a combined total of over 100 years experience in the security industry.

100k+

Students across the globe

17

Courses

3

Certifications

Image of Tom

Tom

Tier 2 SOC Analyst

My Experience with Security Blue Team

Back in 2020 I decided to transition from DevOps/Systems Engineering into a role with more focus on cyber security, in particular DFIR. I took BTL1 after months of decision making and was glad I did. The hands-on training gave me everything I needed to gain the coveted gold when I finally took the exam, and the confidence to jump straight into a senior SOC analyst role.

Image of Jay Jay

Jay Jay

Tier 2 SOC Analyst

My Experience with Security Blue Team

The Blue Team Level 1 Certification is a comprehensive exam that incorporated many different skills that a blue team operator may require depending on the role they wish to go into. The content is easy to follow and goes into more than sufficient detail. The Exam itself was undoubtedly challenging and took me approximately 18 hours to attain gold, the experience made me a much more confident and well-rounded analyst and has made me qualified for lead roles.

Image of Bohan

Bohan

SOC Analyst

My Experience with Security Blue Team

BTL1 has helped me tremendously on my journey to become a SOC Analyst. The skills I have learned from this course and exam gave me a great foundation on blue team and prepared me well for my job interview. Whether you are on your journey to become a blue teamer or already work in the industry for a while, BTL1 is the way to go!

Image of Steffan J

Steffan J

Cyber Security Services Manager, Fortra

My Experience with Security Blue Team

The practical training and courses offered by Security Blue Team require our analysts to not only learn the concepts through classic reading and reference material, but also apply them in a challenging capstone project which emulates a real network security compromise. This methodology helps Fortra ensure that our analysts have a consistent education with sufficient hands-on training to competently approach many of the complicated scenarios which they are likely to encounter, whilst providing profound expertise to our customers during security incidents.

Recent Posts

The MacGyver Escape: How to Transfer Files from a Restricted Windows Computer
Luis Suastegui 26/03/2025

The MacGyver Escape: How to Transfer Files from a Restricted Windows Computer

Have you ever needed to transfer data from one computer to another but found yourself blocked by strict security policies? Perhaps you cannot connect any USB devices, most of your programs (including PowerShell and Command Prompt) are disabled, and internet access is heavily restricted.

Security Blue Team’s Global Connect: A Chilly Team Adventure in Lapland
Duncan Whitley 14/03/2025

Security Blue Team’s Global Connect: A Chilly Team Adventure in Lapland

Picture a team diving into a winter wonderland where snowmobiles hunt the Northern Lights, huskies charge through snowy trails, and drinks come in glasses chiseled from ice. That’s what SBT got up to during our annual Global Connect, a company get-together that took us from Stockholm to the icy wilds...