Blue Team Level 1
Join the thousands of successful technical defenders who have trusted Blue Team Level 1 (BTL1) since 2020! This comprehensive course covers six critical domains in cybersecurity, including Security Fundamentals, Phishing Analysis, Threat Intelligence, Digital Forensics, SIEM, and Incident Response. With hands-on training in skills and tools that are directly applicable to a range of security roles, you'll be equipped with the knowledge and experience you need to succeed in today's fast-paced, ever-changing cybersecurity landscape. Don't miss your chance to become a highly sought-after security expert with BTL1!
Exam
Certification by
per person
Level
Duration
Training Delivery Format
Face-to-face / Virtual Class
Associated Certification
per person
Level
Duration
Training Delivery Format
Face-to-face (F2F) / Virtual Class
Associated Certification
Class types
Public Class
Private Class
In-House Training
Bespoke
About this course
Since 2020, Blue Team Level 1 (BTL1) has been trusted around the world to train thousands of technical defenders in governments, CERTs, law enforcement, military units, MSSPs, financial institutions, critical national infrastructure, and more.
This course covers the following 6 domains:
- Security Fundamentals
- Phishing Analysis
- Threat Intelligence
- Digital Forensics
- SIEM
- Incident Response
Who should attend?
Blue Team Level 1 (BTL1) is perfect for security enthusiasts or professionals that want to develop their practical defensive cyber skills. Roles that we believe would benefit from this course include:
- Students/IT Personnel
- Security Analysts
- Incident Responders
- Threat Intelligence Analysts
- Forensics Analysts
Learning Outcome
Blue Team Level 1 (BTL1) is designed to train technical defenders that are capable of defending networks and responding to cyber incidents. Below are some examples of the skills and experience you will gain.
- Analysing and responding to phishing attacks
- Performing forensics investigations to collect and analyse digital evidence
- Using a SIEM platform to investigate malicious activity
- Log and network traffic analysis including malware infections
- Conducting threat actor research
- and much more!
Prerequisites
While no specific prerequisites are mandatory, it is advisable to have prior experience in IT security or a related field.
Course Content
Domain 1 – Security Fundamentals
This domain is designed to build the foundations for the rest of the course. Covering areas such as management principles, networking and soft skills, this domain will ensure you have the fundamental knowledge which you’ll build on throughout BTL1.
- Introduction to Security Fundamentals
- Soft Skills
- Security Controls
- Networking 101
- Management Principles
Domain 2 – Phishing Analysis
We all know phishing is bad – but trust us, it’s really bad. By the end of this domain you’ll be able to confidently identify, analyze, and write reports on phishing emails, including any malicious URLs or attachments.
- Introduction to Emails and Phishing
- Types of Phishing Emails
- Tactics and Techniques Used
- Analysing URLs, Attachments, and Artifacts
- Taking Defensive Measures
- Report Writing
- Lessons Learned
- Phishing Response Challenge
Domain 3 – Threat Intelligence
From threat actors to their techniques and motivations, you’ll learn core threat intelligence concepts such as the pyramid of pain, the MITRE ATT&CK framework, and intelligence sharing.
- Introduction to Threat Intelligence
- Threat Actors and APTs
- Operational Threat Intelligence
- Tactical Threat Intelligence
- Strategic Threat Intelligence
- Malware and Global Campaigns
Domain 4 – Digital Forensics
Sometimes we need to dig deeper, and that’s where forensics comes into play. Using special tools we can learn more about files, browsing history, and memory dumps to build up a timeline of events.
- Introduction to Digital Forensics
- Forensics Fundamentals
- Digital Evidence Collection
- Windows Investigations
- Linux Investigations
- Volatility
- Autopsy
Domain 5 – SIEM
SIEM is at the heart of what SOC analysts do. Pulling data from across the organisation, correlating it, and alerting on suspicious or malicious activity. You’ll learn how to conduct log analysis and investigate security events and incidents.
- Introduction to SIEM
- Logging
- Aggregation
- Correlation
- Using Splunk SIEM
Domain 6 – Incident Response
When a security event evolves into a security incident, it’s a race against the clock to limit the damage caused by the attack. Incident responders don’t just investigate reactively, they also work to implement defences to protect the organisation.
- Introduction to Incident Response
- Preparation Phase
- Detection and Analysis Phase
- Containment, Eradication, and Recovery Phase
- Lessons Learned
- MITRE ATT&CK
Certification
Blue Team Level 1
Response Exam
Students are able to start their practical 24-hour incident response exam immediately from the BTL1 course within 12 months of purchase. Students will have access to a cloud lab via an in-browser session for up to 24 hours and must complete answer 20 task-based questions.
This forces candidates to use different tools, investigate different systems, and identify activity across multiple ATT&CK Framework tactics.
Once the student has answered all the questions they can, they are able to submit the exam to receive immediate grading and feedback. 70% is required to pass and earn the silver challenge coin, while 90% (on the first attempt) is required for the gold challenge coin.
Certified Rewards
Once a student passes the practical exam and becomes Blue Team Level 1 (BTL1 certified), they will receive a number of rewards for their hard work:
- Become Blue Team Level 1 certified for life
- BTL1 digital PDF certificate
- BTL1 Credly digital badge
- BTL1 printed certificate
- BTL1 silver challenge coin (gold if score 90%+ on first attempt)
- Laptop Sticker
FAQs
Who is the course for?
Blue Team Level 1 (BTL1) is designed to train technical defenders that are capable of defending networks and responding to cyber incidents. Below are some examples of the skills and experience you will gain.
- Analysing and responding to phishing attacks
- Performing forensics investigations to collect and analyse digital evidence
- Using a SIEM platform to investigate malicious activity
- Log and network traffic analysis including malware infections
- Conducting threat actor research
- and much more!
Why choose Blue Team Level 1 (BTL1)?
BTL1 is perfect for security enthusiasts or professionals that want to develop their practical defensive cyber skills. Roles that we believe would benefit from this course include:
- Students/IT Personnel
- Security Analysts
- Incident Responders
- Threat Intelligence Analysts
- Forensics Analysts
Whilst our content is aimed primarily at entry-level or junior roles, read our course syllabus to see if BTL1 is the right choice for you or your team!
BTL1 meets 60% of the 125 requirements under the NICE Cyber Defense Analyst framework, including 67% of knowledge and 67% of ability.
Is this an HRDC claimable course?
Yes, this is an HRDC claimable course
At this time, this course is available for private class and in-house training only. Please contact us for any inquiries.