BLUE TEAM LEVEL 1
SECURITY OPERATIONS CERTIFICATION.
Lessons, VIDEOS, TESTS AND HANDS-ON ACTIVITIES
ACCESS TO THE TRAINING MATERIAL
rECOMMENDED EXPERIENCE IN IT/SECURITY
BTL1 is trusted around the world to train technical defenders in governments, law enforcement, military units, financial institutions, telecommunications giants, and many more. Built by industry experts, BTL1 transfers real-world knowledge and skills to students.
A hands-on defensive security training course and certification, showcasing practical ability in defending networks and systems from cyber threats. No more multiple choice exams – get genuine security operations experience with a realistic incident response scenario in our 24-hour practical assessment.
The training course and certification exam were created under the supervision of our Academic Advisory Board, comprised of Senior Security Analysts, SOC Managers, and other senior security roles; ensuring it is accurate, realistic, and applicable to modern security operations.
WHY CHOOSE BTL1?
BTL1 is designed to train technical defenders that are capable of defending networks and responding to cyber incidents. Below are some examples of the skills and experience you will gain.
- Analysing and responding to phishing attacks
- Performing forensics investigations to collect and analyse digital evidence
- Using a SIEM platform to investigate malicious activity
- Log and network traffic analysis including malware infections
- Conducting threat actor research
- and much more!
Who is the course for?
BTL1 is perfect for security enthusiasts or professionals that want to develop their practical defensive cyber skills. Roles that we believe would benefit from this course include:
- Students/IT Personnel
- Security Analysts
- Incident Responders
- Threat Intelligence Analysts
- Forensics Analysts
Whilst our content is aimed primarily at entry-level or junior roles, read our course syllabus to see if BTL1 is the right choice for you or your team!
Below you can download our course syllabus to view the content that is covered in both the training course and the practical assessment (we’ve also provided a high-level overview in the tabs below!). The certification is split into 6 domains:
This domain is designed to build the foundations for the rest of the course. Covering areas such as management principles, networking and soft skills, this domain will ensure you have the fundamental knowledge which you’ll build on throughout BTL1.
- Introduction to Security Fundamentals
- Soft Skills
- Security Controls
- Networking 101
- Management Principles
We all know phishing is bad – but trust us, it’s really bad. By the end of this domain you’ll be able to confidently identify, analyze, and write reports on phishing emails, including any malicious URLs or attachments.
- Introduction to Emails and Phishing
- Types of Phishing Emails
- Tactics and Techniques Used
- Analysing URLs, Attachments, and Artifacts
- Taking Defensive Measures
- Report Writing
- Lessons Learned
- Phishing Response Challenge
From threat actors to their techniques and motivations, you’ll learn core threat intelligence concepts such as the pyramid of pain, the MITRE ATT&CK framework, and intelligence sharing.
- Introduction to Threat Intelligence
- Threat Actors and APTs
- Operational Threat Intelligence
- Tactical Threat Intelligence
- Strategic Threat Intelligence
- Malware and Global Campaigns
Sometimes we need to dig deeper, and that’s where forensics comes into play. Using special tools we can learn more about files, browsing history, and memory dumps to build up a timeline of events.
- Introduction to Digital Forensics
- Forensics Fundamentals
- Digital Evidence Collection
- Windows Investigations
- Linux Investigations
SIEM is at the heart of what SOC analysts do. Pulling data from across the organisation, correlating it, and alerting on suspicious or malicious activity. You’ll learn how to conduct log analysis and investigate security events and incidents.
- Introduction to SIEM
- Using Splunk SIEM
When a security event evolves into a security incident, it’s a race against the clock to limit the damage caused by the attack. Incident responders don’t just investigate reactively, they also work to implement defences to protect the organisation.
- Introduction to Incident Response
- Preparation Phase
- Detection and Analysis Phase
- Containment, Eradication, and Recovery Phase
- Lessons Learned
- MITRE ATT&CK
Students are able to start their practical 24-hour incident response exam immediately from the BTL1 course whenever they feel ready. Students will have access to a cloud lab via an in-browser session for up to 12 hours and must complete the provided report template. Students will have an additional 12 hours once their lab access has expired if they need more time to finish their report.
Once the student has successfully submitted their report, we will mark the submissions and inform the student if they have passed or failed within 30 days.
If students fail the exam they will be permitted one free resit voucher. After using it additional resit vouchers can be purchased for £100. Students are not permitted to resit their exam within 10 days of failing.
We believe feedback is absolutely crucial to developing your skills, rather than just passing the certification. We will provide feedback to all students regardless of whether they pass or fail our exam, so you can understand your weak areas, and become a stronger security professionals.
Once a student passes the practical exam and becomes BTL1 certified, they will receive a number of rewards for their hard work:
- Become Blue Team Level 1 certified for life
- BTL1 Acclaim digital badge
- BTL1 printed certificate
- BTL1 silver challenge coin (gold if score 90%+ on first attempt)
- Laptop Stickers