Blue Team Level 1 Exam Resit
This course is purely for the re-sit of BTL1 for students that took the exam prior to elearning.securityblue.team.
This course is purely for the re-sit of BTL1 for students that took the exam prior to elearning.securityblue.team.
Welcome! Welcome to our course for Threat Hunting! This specialised purple-team role focuses on detecting advanced threats that are already within the network, and have so far remained undetected. Using both manual and automated techniques, Threat Hunters search for malicious artefacts over the network and on systems. This role is highly technical and is ever-changing, …
Welcome! Our Introduction to Darkweb Operations course will introduce you to the clear, deep, and dark web, and how this part of the internet is used by law enforcement, security teams, and cyber criminals. You will be using the TOR browser to access dark web resources securely for education, privacy, and fun! By purchasing this …
BTL2 HAS MOVED The BTL2 training course, labs, forum, and exam have all moved to SBT’s new website. Please login using the credentials from the BTL2 lab platform here: https://elearning.securityblue.team. Can’t login? Email contact@securityblue.team and ask to have your account migrated (we’ll need your username/email).
BLUE TEAM LEVEL 1 > practical defensive cyber certification // Junior level Student Forum Blue Team Labs Online Our gamified lab platform is the perfect place for BTL1 students to get more practice, especially if you want to earn the rare gold challenge coin! With content covering Incident Response, Digital Forensics, Security Operations, Reverse Engineering, …
Welcome to our entry-level course for Vulnerability Management! Using written material, knowledge tests, and practical challenges, this entry-level introduction course will give you a great insight into this area of defensive security. We hope you enjoy this course! Below are the practical aspects that are included in this course, giving you a chance to put the …
Welcome to our entry-level course for Digital Forensics! You’ll learn about evidence types, the Chain of Custody, as well as practical skills such as basic Linux commands, steganography and file carving techniques, as well as passworded ZIP file cracking. Using written material and practical challenges, this entry-level introduction course will give you a great insight …
Welcome! Welcome to our course for Network Analysis! We will be teaching you how to effectively use Wireshark and TCPDump for recording network traffic, and analysing packet captures. To reinforce everything you’ve learned, we have created a number of PCAPs that you will be analysing with the tools covered in this course. For the final …
By purchasing this course you agree that you have read and understand our Refunds Policy. Welcome to our course for Open-Source Intelligence! We will cover what OSINT is, and why it’s used by law enforcement, cyber defenders, malicious actors, and even businesses. We will also cover a wide range of tools, to help you understand OSINT …
By purchasing any of Security Blue Team’s courses, you acknowledge that you have read and agree to the Refunds Policy (https://securityblue.team/refunds-policy) What Will I Learn? We have combined a number of hands-on exercises along with written challenges, all aimed at developing experience that will be useful when applying for a security role, or expanding on …