In this course, you will build a live detection engineering lab from scratch, ingest real logs, and research adversary techniques mapped to MITRE ATT&CK. You won’t just write rules; you will validate them by executing live attacks using the Atomic Red Team framework.
Next scheduled date:April 10th, 2026 @ 12:00 PM EDT
Description
Detection Engineering is often treated as a “black box,” but this hands-on workshop transforms it into a scientific, repeatable process. Moving beyond simple alert fatigue, students will master the Detection Engineering Lifecycle, bridging the gap between abstract threat intelligence and practical, high-fidelity alerts.
In this course, you will build a live detection engineering lab from scratch, ingest real logs, and research adversary techniques mapped to MITRE ATT&CK. You won’t just write rules; you will validate them by executing live attacks using the Atomic Red Team framework. Finally, you will learn the essential art of tuning and risk acceptance to manage false positives and keep your SOC analysts happy.
System Requirements
A computer
Student Requirements
A MetaCTF Account: Labs will be performed via the MetaCTF Cloud Labs platform.
Cloud Trial Email: A valid email address ready to use to sign up for a 14-day free trial of a cloud-based SIEM provider.
Syllabus
Module 1: Architecture and Data Collection
We begin by demystifying the “stack.” Students will set up a cloud-based SIEM and deploy agents to a Windows victim machine. We will cover the flow of data from the endpoint to the analyst’s dashboard and how to verify agent health.
Module 2: The Language of Logs
Before you can detect, you must know how to search. This module covers the essentials of Query Languages. We will move beyond basic keyword searches to structured queries, utilizing Boolean logic and field-specific searching to find the needle in the haystack.
Module 3: The Detection Lifecycle & Research
Detection is science. We introduce the Detection Engineering Process: Research -> Query -> Backtest -> Canary -> Documentation -> Onboarding. We will look at sources for detection ideas (threat reports, CVEs) and how to document them effectively.
Module 4: Building the Logic
Students will construct their first detection rule mapped to MITRE ATT&CK techniques. We will cover rule components, including trigger logic, severity scoring, look-back times, and suppression techniques.
Module 5: Validation with Atomic Red Team
A rule isn’t finished until it’s tested. We will use the Atomic Red Team framework to execute a live attack simulation on our lab VM. Students will verify that their new detection triggers correctly against simulated malicious behavior.
Module 6: Tuning and Maintenance
The work doesn’t end at deployment. We will discuss the “Continuous Improvement” phase. Students will generate benign noise, analyze the alert volume, and implement precise exception logic to tune the rule without blinding the SOC to actual threats.
This workshop is designed for SOC Analysts, Security Engineers, Threat Hunters, and Detection Engineers. It is also highly beneficial for SOC Managers who want to understand the lifecycle of the alerts their team handles or anyone wanting to learn the basics of writing threat detections.
The Detection Engineering Lifecycle: Master the scientific method of detection: Research, Query, Backtest, Canary, Documentation, and Onboarding.
Data Normalization & Collection: Understand how logs flow from endpoints to the SIEM and the critical importance of normalizing fields for effective searching.
Writing & Optimizing Queries: Learn to write structured queries that balance performance with precision, avoiding common pitfalls like leading wildcards.
Adversary Emulation & Validation: Use Atomic Red Team to generate live “canary” data, ensuring your rules trigger against real malicious behavior.
Tuning & Risk Management: Learn to filter out noise, manage false positives, and understand how to document exclusions using frameworks like ADS (Alerting Detection Strategy).
Students will leave with a functioning detection engineering lab, a grasp of query logic, and the ability to validate security rules against real-world attack techniques. You will understand that detection is a lifecycle that requires research, testing, and continuous tuning, rather than a “set it and forget it” task.
"Security Engineer, Triathlete, and Analytics Addict"
Bio
Hayden Covington is a Senior Analyst in Black Hills Information Security’s SOC where he specializes in training, quality assurance, detection engineering, and investigative analysis. With a previous background as a SOC analyst for a US naval contractor, Hayden has extensive experience in Digital Forensics and Incident Response (DFIR), Security Orchestration, Automation, and Response (SOAR), and insider threat.
• Free ticket to the Antisyphon Training SOC Summit on March 25, 2026, a virtual event that offers a practical look at what it’s like to work in a SOC. More details here.
• Virtual Ticket to WWHF • $100 off next AT class • 12 months Cyber Range Access • T-Shirt • The Future Is ****** comic • Sticker Pack • Certificate of completion • 6 months class recording access via Discord • Pay it forward to 6 students • Free ACE-T Core certification test
• Free ticket to the Antisyphon Training SOC Summit on March 25, 2026, a virtual event that offers a practical look at what it’s like to work in a SOC. More details here.
• $50 off next AT class • 12 months Cyber Range Access • T-Shirt • The Future Is ****** comic • Sticker Pack • Certificate of completion • 6 months class recording access via Discord • Pay it forward to 3 students • Free ACE-T Core certification test
• Free ticket to the Antisyphon Training SOC Summit on March 25, 2026, a virtual event that offers a practical look at what it’s like to work in a SOC. More details here.
• T-Shirt • The Future Is ****** comic • Sticker Pack • Certificate of completion • 6 months class recording access via Discord • Pay it forward to 1 student • Free ACE-T Core certification test
• Free ticket to the Antisyphon Training SOC Summit on March 25, 2026, a virtual event that offers a practical look at what it’s like to work in a SOC. More details here.
• Certificate of completion • 6 months class recording access via Discord • Our appreciation for supporting PFWYC Training • Free ACE-T Core certification test
For tuition assistance with this course please send an email to: [email protected]