BLUE TEAM LEVEL 2
CERTIFICATION

300+

Lessons, VIDEOS, TESTS AND labs

4 Months

ACCESS TO THE TRAINING MATERIAL

2-4 Years

rECOMMENDED EXPERIENCE

10 Weeks

aVERAGE TIME TO BECOME CERTIFIED

£2499

certification price

BTL2 Academic Advisory Board & Technical Writers

With almost 100 years experience in the security industry, these security experts have ensured that the content and practical exam for BTL2 are scoped correctly, and reflect industry best-practice. This ensures that our students will have the most beneficial experience, and get the most value out of our certification. 






Shawn Thomas

SOC Manager
Shawn is a SOC Manager, incident responder, threat hunter, podcaster, and speaker. He builds and manages detection and analysis programs for large enterprises whilst mentoring analysts.






Sean Pattee

Senior Threat Analyst
CISSP, OSCP, GCFA, GCIA, GCIH, GDAT
Sean is a Senior Threat Analyst, Incident Responder, and co-runs a Cybersecurity & Digital Forensics firm located in Phoenix, AZ.






Mat Lyons

Senior Security Consultant
GCED
Mat is an Enterprise Incident Management Consultant focusing on incident response, threat hunting, and proactive services.






Andrew Tomlinson

Senior Security Analyst
GCIA, GDAT, eCPPTv2
Andrew is a Senior Security Analyst, working as the defensive use case and assurance function lead with an adjacent focus on vulnerability risk management. Previously worked as a network security engineer consultant.






Jai Minton

Principal Security Analyst
OSCP, CCFH, CCFR






Ismael Briones-Vilar

Senior Security Analyst
GCFA, GREM, GASF, ENCE
Ismael is a Senior Security Analyst, specializing in malware analysis and digital forensics, with 15 years experience in this field.






Joshua Beaman (Lead/Vuln Management)

Security Analyst
GDAT, eCIR, eCTHP






Sabastian Hague (Advanced SIEM)

Cyber Security Specialist
GMON, GCDA, GCIH, GCIA






Venkatesh Sathya​
(Malware Analysis)

Senior Security Analyst






Andrew Huange (Threat Hunting)

Security Engineer
GNFA, OSCP, SSCP

Overview

A hands-on defensive security training course and certification, showcasing practical ability in defending networks and systems from cyber threats. No more multiple choice exams, get genuine security operations experience with a realistic incident response scenario in our 24-hour practical assessment.

BTL1 has been used around the world to train technical defenders in governments, law enforcement, military units, financial institutions, telecommunications giants, and many more.

benefits of btl1

BTL1 is designed to train technical defenders that are capable of defending networks and responding to cyber incidents. Below are some examples of the skills and experience you will gain.

  • Analysing and responding to phishing attacks
  • Performing forensics investigations to collect digital evidence
  • Using a SIEM platform to investigate malicious activity
  • Log and network traffic analysis including malware infections
  • Conducting threat actor research
  • and much more!

Who is the course for?

BTL1 is perfect for security enthusiasts or professionals that want to develop their practical defensive cyber skills. Roles that we believe would benefit from this course include:

  • Security Analysts
  • Incident Responders
  • Threat Intelligence Analysts
  • Forensics Analysts

Whilst our content is aimed primarily at entry-level or junior roles, read our course syllabus to see if BTL1 is the right choice for you or your team!

COURSE CONTENT

Below you can download our course syllabus to view the content that is covered in both the training course and the practical assessment (we’ve also provided a high-level overview in the tabs below!). The certification is split into 6 domains:

  • Security Fundamentals
  • Phishing Analysis
  • Threat Intelligence
  • Digital Forensics
  • Incident Response
  • SIEM

This domain is designed to build the foundations for the rest of the course. Covering areas such as management principles, networking and soft skills, this domain will ensure you have the fundamental knowledge which you’ll build on throughout BTL1.

  • Introduction to Security Fundamentals
  • Soft Skills
  • Security Controls
  • Networking 101
  • Management Principles

We all know phishing is bad – but trust us, it’s really bad. By the end of this domain you’ll be able to confidently identify, analyze, and write reports on phishing emails, including any malicious URLs or attachments.

  • Introduction to Emails and Phishing
  • Types of Phishing Emails
  • Tactics and Techniques Used
  • Analysing URLs, Attachments, and Artifacts
  • Taking Defensive Measures
  • Report Writing
  • Lessons Learned
  • Phishing Response Challenge

From threat actors to their techniques and motivations, you’ll learn core threat intelligence concepts such as the pyramid of pain, the MITRE ATT&CK framework, and intelligence sharing.

  • Introduction to Threat Intelligence
  • Threat Actors and APTs
  • Operational Threat Intelligence
  • Tactical Threat Intelligence
  • Strategic Threat Intelligence
  • Malware and Global Campaigns

Sometimes we need to dig deeper, and that’s where forensics comes into play. Using special tools we can learn more about files, browsing history, and memory dumps to build up a timeline of events.

  • Introduction to Digital Forensics
  • Forensics Fundamentals
  • Digital Evidence Collection
  • Windows Investigations
  • Linux Investigations
  • Volatility
  • Autopsy

SIEM is at the heart of what SOC analysts do. Pulling data from across the organisation, correlating it, and alerting on suspicious or malicious activity. You’ll learn how to conduct log analysis and investigate security events and incidents.

  • Introduction to SIEM
  • Logging
  • Aggregation
  • Correlation
  • Using Splunk SIEM

When a security event evolves into a security incident, it’s a race against the clock to limit the damage caused by the attack. Incident responders don’t just investigate reactively, they also work to implement defences to protect the organisation.

  • Introduction to Incident Response
  • Preparation Phase
  • Detection and Analysis Phase
  • Containment, Eradication, and Recovery Phase
  • Lessons Learned
  • MITRE ATT&CK

CERTIFICATION PROCESS

Students are able to start their exam immediately from the BTL1 course and will have access to the lab via an in-browser virtual session for up to 12 hours and must complete the provided report template. Students will have an additional 12 hours once their lab access has expired if they need more time to finish their report.

Once the student has successfully submitted their report, we will mark the submissions and inform the student if they have passed or failed within 30 days.

If students fail the exam they will be permitted one free resit voucher. After using it additional resit vouchers can be purchased for £100. Students are not permitted to resit their exam within 10 days of failing.

EXAM FEEDBACK

We believe feedback is absolutely crucial to developing your skills, rather than just passing the certification. We will provide feedback to all students regardless of whether they pass or fail our exam, so you can understand your weak areas, and become a stronger security professionals.

certified rewards

Once a student passes the practical exam and becomes BTL1 certified, they will receive a number of rewards for their hard work:

  • Become Blue Team Level 1 certified for life
  • BTL1 Acclaim digital badge
  • BTL1 printed certificate
  • BTL1 silver challenge coin (gold if score 90%+ on first attempt)
  • SBT and PhishTool merch

BTL1 STUDENT REVIEWS

Are You Ready To BOOST YOUR BLUE TEAM CAREER?

Course Details

WHO IS THIS COURSE FOR?

BTL2 is aimed at security professionals with 2-5 years experience in a practical role, but is suitable for anyone. Roles that we believe would benefit from this course include:

  • Security Analysts
  • Incident Responders
  • Security Consultants
  • Threat Hunters
  • Malware Analysts

COURSE PREREQUISITES

Students must meet the following criteria to start Blue Team Level 2:

  • Blue Team Level 1 Certified (to earn BTL2+).
  • Fundamental understanding of security operations.
  • Fundamental understanding of Windows and Unix systems.
  • A stable internet connection (for videos and labs).
  • A genuine passion for cybersecurity.

HOW WILL BTL2 BENEFIT ME?

Below are just a few examples of the practical skills that you will have acquired upon successful completion of the BTL2 exam:

  • Identify, analyze, prioritize, and remediate vulnerabilities and security issues.
  • Conduct static and dynamic malware analysis to gather indicators of compromise and details of the malware’s purpose.
  • Writing SIEM detection rules, and tuning them to ensure they’re as efficient as possible by performing adversary emulation.
  • Hunt on a simulated network to detect covert adversaries that have already breached the perimeter.

In this domain of Blue Team Level 2, students will become familiar with the entire vulnerability management process, ensuring that they can detect, analyze, prioritize, and remediate vulnerabilities based on the risk posed to an organization.

  • VM1) Introduction to Vulnerability Management
  • VM2) Vulnerability Management Lifecycle
  • VM3) Host Discovery
  • VM4) Vulnerability Disocvery
  • VM5) Analysis, Prioritization, and Threat Intelligence
  • VM6) Reporting and Remediation

In this domain of Blue Team Level 2 students will learn exactly what malware is, and how to analyze it using static and dynamic tools and techniques, determining what the functionality is and collecting indicators of compromise that can be shared to protect other organizations.

  • MA1) Introduction to Malware Analysis
  • MA2) Setting up a a Malware Analysis Lab
  • MA3) Static Malware Analysis
  • MA4) Dynamic Malware Analysis
  • MA5) Malware Analysis Practice

In this domain of Blue Team Level 2 students will use Splunk SIEM to write detection rules, tune rules to ensure they are as effective as possible and reduce false positives, and analyze data to detect and triage security events, similar to the role of a Senior SOC Analyst.

  • AS1) Introduction to Advanced SIEM
  • AS2) Setting up a SIEM Lab
  • AS3) Detection Rule Writing
  • AS4) Rule Tuning
  • AS5) Adversary Emulation, Detection, and Analysis

In this domain of Blue Team Level 2 students will learn the methodology and techniques to perform threat hunts, working to identify covert and undetected threats that are already inside of the environment. Students will become familiar with Hunting ELK (HELK) to identify and combat threats.

  • TH1) Introduction to Threat Hunting
  • TH2) Setting up a Threat Hunting Lab
  • TH3) Hunting on Endpoints
  • TH4) Hunting Over the Network
  • TH5) Threat Hunt Report Writing

Security Blue Team is dedicated to providing affordable, practical, and high-quality defensive cybersecurity training, certifications, and community events.