Cross-team training programs

Curriculum structure

Module

Red → Blue Topics

Blue → Red Topics

Telemetry Deep Dives

How EDR/SIEM processes API calls

How to evade heuristic analysis

Tool Exchanges

C2 framework internals
(e.g., Mythic agents)

Writing Sigma rules that catch subtle anomalies

Log Literacy

“Why your phishing email triggered 7 alerts”

“Why your IR playbook missed our living-off-the-land attack”


Last update: 2025-05-12 12:50