This isn't "learn attacks from the defender's side." It's about operating detection and response systems under process control — triage, escalation, documentation, and continuous tuning. 8 stages. SIEM, EDR/XDR, MITRE ATT&CK, cloud logging, and the full NIST IR lifecycle.
What You'll Learn
Tools & Platforms Covered
Telemetry literacy across the real-world blue team stack — not toy environments.
Curriculum — 8 Stages
120–150 hours. Each stage builds operational discipline — triage, documentation, and continuous tuning at every step.
-
01▾Blue Team FoundationsSOC roles, tools landscape, log sources, and what "good" detection looks like
Before you touch a SIEM, you need to understand what you're defending and why. This stage covers the SOC operating model — Tier 1/2/3 analyst roles, escalation paths, shift handoffs, and alert triage philosophy. You'll survey the blue team toolchain and dive into Windows and Linux log sources: Event IDs that matter, Sysmon configuration, syslog, auditd, and what "telemetry coverage" actually means. By the end, you'll have a lab environment ready and a clear mental model of how detection and response systems connect.
SOC tiers & escalation Windows Event IDs Sysmon configuration Linux auditd / syslog Log telemetry coverage Alert triage philosophy Lab environment setup -
02▾SIEM OperationsLog ingestion, KQL fundamentals (Sentinel), SPL fundamentals (Splunk), alert tuning
The SIEM is your single pane of glass — and most analysts barely scratch its surface. This stage is a deep dive into both query languages used in real enterprise SOCs. KQL in Microsoft Sentinel: table structure, filtering, joins, summarize, project, time ranges, and building analytic rules. SPL in Splunk: search commands, stats, eval, lookup tables, and building correlation searches. Then the unglamorous but critical work of alert tuning — reducing false positive volume, threshold calibration, and building a feedback loop that makes your detection rules smarter over time.
KQL syntax & operators Sentinel analytic rules SPL search commands Splunk correlation rules Log ingestion pipelines Alert threshold tuning False positive reductionMicrosoft Sentinel Splunk KQL SPL -
03▾EDR/XDR InvestigationsEndpoint timeline analysis, containment actions, correlating telemetry across sources
Alerts tell you something happened. The EDR tells you exactly what happened, in what order, and what else to look for. This stage covers endpoint timeline analysis with CrowdStrike Falcon and Microsoft Defender XDR: reading process trees, parent-child relationships, network connections, file writes, and registry changes. You'll practice real containment decisions — when to isolate an endpoint, how to do it without breaking business operations, and how to collect forensic artifacts before and after. Then cross-correlating EDR telemetry with SIEM data to build a complete picture of an intrusion.
Process tree analysis Parent-child relationships Network connection telemetry Registry & file event analysis Endpoint isolation decisions Forensic artifact collection SIEM + EDR correlationCrowdStrike Falcon Defender XDR -
04▾MITRE ATT&CK in PracticeTTP mapping, detection hypotheses, threat hunting basics, and D3FEND countermeasures
MITRE ATT&CK isn't a checklist — it's a shared language for describing adversary behavior. This stage teaches you to use it operationally: mapping alerts and incidents to specific Tactics, Techniques, and Procedures (TTPs), building detection hypotheses for gaps in your coverage, and writing your first threat hunts. You'll use ATT&CK Navigator to visualize your detection surface and identify blind spots. We also cover MITRE D3FEND — the companion framework for mapping defensive countermeasures to specific attack techniques — giving you a structured way to recommend defensive improvements, not just detect threats.
Tactics, Techniques, Procedures ATT&CK Navigator Detection hypothesis writing Coverage gap analysis Threat hunting fundamentals MITRE D3FEND Defensive countermeasure mappingMITRE ATT&CK ATT&CK Navigator MITRE D3FEND -
05▾Red-to-Blue TranslationTurn offensive techniques into detection hypotheses, SIEM queries, playbooks, and response actions
The bridge between offensive and defensive knowledge. For each major attack technique — credential dumping, lateral movement, persistence via scheduled tasks, living-off-the-land binaries, phishing payloads, C2 beaconing — you'll produce the complete defensive package: the log sources that capture it, the SIEM queries (KQL and SPL) that detect it, the indicators to hunt for, the investigation playbook, and the response actions to contain and remediate. Students who've completed the Ethical Hacking course will recognize the techniques from the other side. This stage operationalizes that knowledge into real defensive output.
Credential dumping detection Lateral movement signatures Persistence mechanism hunting LOLBins detection C2 beaconing patterns Phishing payload analysis KQL detection queries SPL detection queries Investigation playbooks Response action mapping -
06▾Cloud Security MonitoringAWS CloudTrail, Azure Monitor, GCP logging, identity anomalies, and cloud-native SIEM integration
Modern environments live in the cloud, and cloud incidents look different from on-prem ones. This stage covers the security telemetry available in each major cloud provider: AWS CloudTrail for API activity, VPC Flow Logs, GuardDuty findings, and Security Hub. Azure Monitor Logs, Entra ID sign-in logs, Defender for Cloud, and activity logs. GCP Cloud Audit Logs, Security Command Center, and Cloud Logging. You'll practice detecting cloud-specific attack patterns: IAM privilege escalation, impossible travel on service accounts, credential exfiltration from metadata services, and storage bucket exposure. All three providers covered in Sentinel and Splunk queries.
AWS CloudTrail analysis VPC Flow Logs GuardDuty findings Azure Entra ID sign-in logs Azure Defender for Cloud GCP Audit Logs IAM privilege escalation detection Identity anomaly detection Impossible travel alerts Metadata service abuseAWS CloudTrail Azure Monitor GCP Logging GuardDuty -
07▾Incident Response LifecycleNIST SP 800-61 Rev. 3 phases, documentation standards, stakeholder communication, and SOAR automation
Detection without response is just logging. This stage walks the complete NIST SP 800-61 Rev. 3 incident response lifecycle — aligned to the NIST Cybersecurity Framework 2.0 — as a professional operating procedure, not a theoretical framework. Preparation: runbooks, communication trees, jump bags, and IR plan documentation. Detection & Analysis: severity classification, triage criteria, and initial scoping. Containment: short-term isolation decisions vs. long-term containment strategies. Eradication: root cause removal and persistence cleanup. Recovery: system restoration and monitoring enhancement. Post-Incident: lessons-learned documentation, metrics, and tuning feedback loops. We also cover SOAR playbook automation — when to automate, what enrichment looks like, and how human-in-the-loop decisions fit into automated pipelines.
NIST 800-61 Rev. 3 CSF 2.0 alignment IR plan documentation Severity classification Containment strategies Eradication & recovery Post-incident review Stakeholder communication SOAR playbook design Audit trail requirementsNIST SP 800-61 NIST CSF 2.0 SOAR -
08▾Capstone — Full Incident ScenarioDetect, investigate, contain, document, and present a complete multi-phase intrusion end-to-end
Everything converges here. You'll be handed a realistic, multi-phase intrusion scenario spanning initial phishing delivery, credential theft, lateral movement, cloud pivot, and data staging. Your job is to run the full response: detect the initial indicator in the SIEM, pivot across SIEM and EDR data, build a timeline, map every observed action to MITRE ATT&CK TTPs, execute containment, perform root cause analysis, write the post-incident report, and present findings to a simulated executive audience. Deliverables include: SIEM queries, investigation timeline, MITRE ATT&CK Navigator layer, containment decision log, full incident report, and a lessons-learned memo with detection improvement recommendations.
Multi-phase scenario response SIEM pivoting Cross-source timeline construction ATT&CK TTP mapping Containment decision documentation Incident report writing Executive communication Detection improvement recommendations
Certification Alignment
This course is built around the knowledge domains that matter for the exams that matter for blue team careers.
The core blue team cert. All course domains map directly to CySA+ exam objectives. Recommended as your first certification goal after completing this course.
Covered in our Security+ SY0-701 course. Recommended as a baseline before starting this course if you're new to cybersecurity.
Sentinel-heavy. Stages 2, 5, and 6 directly build the KQL and Sentinel operational knowledge the SC-200 tests. Strong prep for Microsoft-centric SOC environments.
Azure security engineering. Stage 6 (Cloud Security Monitoring) and the IR lifecycle stages build direct AZ-500 domain coverage, especially identity and threat detection.
GIAC Certified Incident Handler. The entire IR lifecycle stage and capstone are built around GCIH-level incident handling competency. Strong prep for this advanced cert.
Intrusion analysis (GCIA) and enterprise defense (GCED). Stages 3–5 provide substantial preparation for these analyst-track GIAC certifications.
Who This Course Is For
Finished the Ethical Hacking or Kali Linux course? Stage 5 directly translates your offensive knowledge into detection and response capabilities.
Already working Tier 1? This course builds the query skills, investigation depth, and documentation discipline to move to Tier 2 and beyond.
Security+ gives you breadth. This course gives you the depth and operational tool experience to land a blue team role and perform on day one.
Stage 6 is built for you. Learn how your cloud infrastructure generates security telemetry and how to detect threats in environments you already know.
Start detecting. Start responding.
Join TechNodeX as a Founding Member and get full access to the SOC Blue Team course, every other course on the platform, and everything we ship next — all for $9/month, locked forever.
Become a Founding Member — $9/mo →