CB
CyberBlueAcademy
CoursesSyllabusToolsPricing
CoursesCyberBlue Detection EngineeringModule 6

Module 6: Intel-Driven Detections

Turn threat intelligence into detections — decompose reports, choose IOC vs behavioral approaches, and write structured threat briefs.

Tools:Wazuh
3
Lessons
2
Hands-on Labs

Lessons & Labs

Lesson 6.1 — From Threat Report to Detection

Decomposing threat reports into detectable behaviors — entity extraction, technique mapping, and detection gap identification.

Lab 6.1 — Threat Report to Sigma Rule

Decompose a simulated threat report, extract detectable behaviors, write a Sigma rule, and validate it fires on shared Wazuh data.

Advanced

Lesson 6.2 — IOC-Based vs Behavioral Detection

When to use each approach, IOC lifecycle, expiration policies, and the Pyramid of Pain for detection selection.

Lab 6.2 — IOC Lifecycle Exercise

Track IOCs through their lifecycle in the shared Wazuh environment — from initial detection to expiration, measuring detection value over time.

Intermediate

Lesson 6.3 — Writing Structured Threat Briefs

Converting analysis into actionable detection requirements — brief templates, stakeholder communication, and prioritization frameworks.

CB
CyberBlueAcademy

The SANS alternative you can actually afford. Real tools. Real labs. Real skills.

Course

  • Syllabus
  • Tools
  • Certification
  • Pricing

Platform

  • CyberBlueSOC (GitHub)
  • Installation Guide
  • Documentation

Community

  • Discord
  • Twitter / X
  • LinkedIn

© 2026 CyberBlue Academy. All rights reserved.

Privacy PolicyTerms of Service