Home
>
Courses
>
Blue Team Challenge (Beginner)
Course

Blue Team Challenge (Beginner)

This program is designed for beginners who are new to Blue Team operations and possess a foundational understanding of cybersecurity concepts. It is ideal for individuals seeking to develop core Blue Team skills through engaging, hands-on activities using Splunk Enterprise and the Windows operating system.

Hour Course Icon
Hours
4 Academic Hours
Format Course Icon
Format
Online/On-site
depends on the client's needs
Duration Course Icon
Duration
1 day

LIVE, instructor-led training

An experienced instructor will be available throughout the course to provide guidance and support, ensuring participants build both the technical skills and confidence needed to succeed.

The course offers introductory, hands-on exploration of Defensive Security Operations Center (SOC) investigations. Participants assume the role of a SOC analyst at a fictitious organization tasked with identifying evidence of an active security breach and determining the attacker’s initial point of entry. This experiential learning approach provides practical exposure to real-world investigative scenarios.

An experienced instructor will be available throughout the course to provide guidance and support, ensuring participants build both the technical skills and confidence needed to succeed.

The course offers introductory, hands-on exploration of Defensive Security Operations Center (SOC) investigations. Participants assume the role of a SOC analyst at a fictitious organization tasked with identifying evidence of an active security breach and determining the attacker’s initial point of entry. This experiential learning approach provides practical exposure to real-world investigative scenarios.

Learning Outcomes

High School Cybersecurity Students

Entry-Level Cybersecurity Students

Novice SOC Analysts/Engineers

Key Topics Covered

• Initial Access: Identifying how the attack originated

Lateral Movement: Analyzing how the attacker moved within the environment

• Discovery: Understanding how the attacker identified and explored victim hosts

• Endpoint Analysis: Investigating Windows-based systems using Splunk Enterprise

Target Audience

High School Cybersecurity Students

Entry-Level Cybersecurity Students

Novice SOC Analysts/Engineers

Required Prior Knowledge

Foundational understanding of cybersecurity concepts

Technical Requirements

Workstation Requirements

Google Chrome browser with Remote Desktop Protocol (RDP) support

Supported operating systems: Windows, Linux, or macOS

Chromebooks, tablets, and mobile phones are not supported

Participants using systems with restrictive security configurations (e.g., Endpoint Detection and Response [EDR] solutions) are advised to temporarily disable these features, as they may interfere with lab activities

When possible, participants are encouraged to use personal laptops to avoid organizational security restrictions

If format is ONLINE Network Requirements

A minimum of 3 Mbps of internet bandwidth per participant

No firewall restrictions that block required ports or IP addresses

Preferred network access configuration:

 • Whitelist *.cywaria.net/ and ensure access to port 8443

 • An unrestricted internet connection with no port or IP filtering is idea

 • lIf feasible, participants are encouraged to bring or use personal mobile hotspots

Computing Requirements

Enroll
Arrow Icon

$ 799

* Special Launch Pricing - Act Fast
Enroll