CyberBlueSOC Academy
The Complete Blue Team & SOC Training Program
From Zero to Battle-Ready SOC Analyst.
Course Path
Inside the SOC
Master your tools and become the eyes of the SOC
Deep Analysis
Know what's normal, spot what isn't, and triage with confidence
Module 3: OS Internals for Defenders
Know what normal looks like — so you can spot what isn't.
Module 4: Alert Triage — The Core Skill
SOC analysts do this 80% of the time. Get fast. Get accurate.
Module 5: Phishing Analysis & Email Security
The #1 attack vector. Learn to dissect it.
Threat Investigator
Follow the trail across network, intel, endpoint, and disk
Module 6: Network Detection & Forensics
Attacks cross the network. Catch them and dissect them.
Module 7: Threat Intelligence — Know Your Enemy
Don't investigate blind. Use intel to move faster and smarter.
Module 8: Endpoint Visibility & Response
The endpoint is where attacks land. Learn to look inside it.
Module 9: Digital Forensics
Recover evidence. Reconstruct the attack. Build the timeline.
Detection Engineer
Write the rules that catch tomorrow's threats
Module 10: YARA — Malware Detection & Hunting
Write rules that find malware. Hunt across files, endpoints, and memory.
Module 11: Malware Analysis Fundamentals
Understand what malware does — static, dynamic, and document-based.
Module 12: Sigma — Detection Engineering
Write universal detection rules. Make your SIEM smarter.
Threat Hunter
Hunt what detections miss, respond when it's real, automate the rest
Module 13: Threat Hunting — Find What Detections Miss
Don't wait for alerts. Go find the threats your detections missed.
Module 14: Incident Response & Case Management
When something is real — contain, investigate, document, close.
Module 15: Security Automation & AI-Assisted Operations
Automate the repetitive, augment with AI. Focus on what requires a human.
Battle-Ready Operator
Validate defenses, defend the cloud, prove you're ready
Module 16: Attack Simulation & Detection Validation
Test your defenses. Close the purple team loop.
Module 17: Cloud SOC — Defending Beyond the Perimeter
Cloud-native logging, attack patterns, and detection for AWS, Azure, and GCP.
Module 18: Final Mission — The Full Incident
One scenario. Every skill. Prove you're battle-ready.