Black Friday Sale Happening Now! Learn More

Workshop: SOC Detection Engineering Crash Course

Course Authored by .

In this course, you will build a live detection engineering lab from scratch, ingest real logs, and research adversary techniques mapped to MITRE ATT&CK. You won’t just write rules; you will validate them by executing live attacks using the Atomic Red Team framework.

Live Training $25 - $300

Course Length: 4 Hours

Includes a Certificate of Completion



Next scheduled date: April 10th, 2026 @ 12:00 PM EDT

Description

Detection Engineering is often treated as a “black box,” but this hands-on workshop transforms it into a scientific, repeatable process. Moving beyond simple alert fatigue, students will master the Detection Engineering Lifecycle, bridging the gap between abstract threat intelligence and practical, high-fidelity alerts.

In this course, you will build a live detection engineering lab from scratch, ingest real logs, and research adversary techniques mapped to MITRE ATT&CK. You won’t just write rules; you will validate them by executing live attacks using the Atomic Red Team framework. Finally, you will learn the essential art of tuning and risk acceptance to manage false positives and keep your SOC analysts happy.

 

  • System Requirements
    • A computer
  • Student Requirements
    • A MetaCTF Account: Labs will be performed via the MetaCTF Cloud Labs platform.
    • Cloud Trial Email: A valid email address ready to use to sign up for a 14-day free trial of a cloud-based SIEM provider.

Syllabus

Module 1: Architecture and Data Collection

We begin by demystifying the “stack.” Students will set up a cloud-based SIEM and deploy agents to a Windows victim machine. We will cover the flow of data from the endpoint to the analyst’s dashboard and how to verify agent health.

Module 2: The Language of Logs

Before you can detect, you must know how to search. This module covers the essentials of Query Languages. We will move beyond basic keyword searches to structured queries, utilizing Boolean logic and field-specific searching to find the needle in the haystack.

Module 3: The Detection Lifecycle & Research

Detection is science. We introduce the Detection Engineering Process: Research -> Query -> Backtest -> Canary -> Documentation -> Onboarding. We will look at sources for detection ideas (threat reports, CVEs) and how to document them effectively.

Module 4: Building the Logic

Students will construct their first detection rule mapped to MITRE ATT&CK techniques. We will cover rule components, including trigger logic, severity scoring, look-back times, and suppression techniques.

Module 5: Validation with Atomic Red Team

A rule isn’t finished until it’s tested. We will use the Atomic Red Team framework to execute a live attack simulation on our lab VM. Students will verify that their new detection triggers correctly against simulated malicious behavior.

Module 6: Tuning and Maintenance

The work doesn’t end at deployment. We will discuss the “Continuous Improvement” phase. Students will generate benign noise, analyze the alert volume, and implement precise exception logic to tune the rule without blinding the SOC to actual threats.

FAQ

Who Should Take This Course

This workshop is designed for SOC Analysts, Security Engineers, Threat Hunters, and Detection Engineers. It is also highly beneficial for SOC Managers who want to understand the lifecycle of the alerts their team handles or anyone wanting to learn the basics of writing threat detections.

Audience Skill Level

Introductory. A basic level of fundamental knowledge is helpful but is not strictly necessary.

Learning Objectives
  • The Detection Engineering Lifecycle: Master the scientific method of detection: Research, Query, Backtest, Canary, Documentation, and Onboarding.

  • Data Normalization & Collection: Understand how logs flow from endpoints to the SIEM and the critical importance of normalizing fields for effective searching.

  • Writing & Optimizing Queries: Learn to write structured queries that balance performance with precision, avoiding common pitfalls like leading wildcards.

  • Adversary Emulation & Validation: Use Atomic Red Team to generate live “canary” data, ensuring your rules trigger against real malicious behavior.

  • Tuning & Risk Management: Learn to filter out noise, manage false positives, and understand how to document exclusions using frameworks like ADS (Alerting Detection Strategy).

Key Takeaways 

Students will leave with a functioning detection engineering lab, a grasp of query logic, and the ability to validate security rules against real-world attack techniques. You will understand that detection is a lifecycle that requires research, testing, and continuous tuning, rather than a “set it and forget it” task.

About the Instructor

Pixel splash background
"Security Engineer, Triathlete, and Analytics Addict"
Bio

Hayden Covington is a Senior Analyst in Black Hills Information Security’s SOC where he specializes in training, quality assurance, detection engineering, and investigative analysis. With a previous background as a SOC analyst for a US naval contractor, Hayden has extensive experience in Digital Forensics and Incident Response (DFIR), Security Orchestration, Automation, and Response (SOAR), and insider threat.

Register for Upcoming

  • Filter by Product Date
  • Filter by Product Instructor
  • Filter by Product Type

This event is part of the SOC Summit

Workshop: SOC Detection Engineering Crash Course

Complete Package

Live Training Hayden Covington

Virtual

Includes:

• Free ticket to the Antisyphon Training SOC Summit on March 25, 2026, a virtual event that offers a practical look at what it’s like to work in a SOC. More details here.

• Virtual Ticket to WWHF 
• $100 off next AT class 
• 12 months Cyber Range Access 
• T-Shirt 
• The Future Is ****** comic 
• Sticker Pack 
• Certificate of completion 
• 6 months class recording access via Discord 
• Pay it forward to 6 students 
• Free ACE-T Core certification test 

Pay Forward What You Can

Live Training Hayden Covington

Virtual

Includes:

• Free ticket to the Antisyphon Training SOC Summit on March 25, 2026, a virtual event that offers a practical look at what it’s like to work in a SOC. More details here.

• $50 off next AT class 
• 12 months Cyber Range Access 
• T-Shirt 
• The Future Is ****** comic 
• Sticker Pack 
• Certificate of completion 
• 6 months class recording access via Discord 
• Pay it forward to 3 students 
• Free ACE-T Core certification test 

Pay Forward What You Can

Live Training Hayden Covington

Virtual

Includes:

• Free ticket to the Antisyphon Training SOC Summit on March 25, 2026, a virtual event that offers a practical look at what it’s like to work in a SOC. More details here.

• T-Shirt 
• The Future Is ****** comic 
• Sticker Pack 
• Certificate of completion 
• 6 months class recording access via Discord 
• Pay it forward to 1 student 
• Free ACE-T Core certification test 

Pay Forward What You Can

Live Training Hayden Covington

Virtual

Includes:

• Free ticket to the Antisyphon Training SOC Summit on March 25, 2026, a virtual event that offers a practical look at what it’s like to work in a SOC. More details here.

• Certificate of completion 
• 6 months class recording access via Discord 
• Our appreciation for supporting PFWYC Training 
• Free ACE-T Core certification test 

For tuition assistance with this course please send an email to: [email protected]

Content is loading, please wait.
Content is loading, please wait.
$25 - $300
April 10th, 2026 12:00 PM EDT - 4:00 PM EDT

Registration End Date: 10:00 PM, EDT April 9th 2026

Shopping Cart

No products in the cart.