This curriculum spans the design, implementation, and governance of threat detection systems across enterprise environments, comparable in scope to a multi-phase security operations transformation or an extended detection and response (XDR) deployment project.
Module 1: Establishing Detection Objectives and Risk Prioritization
- Selecting critical assets for monitoring based on business impact, regulatory exposure, and exploit likelihood
- Defining detection thresholds that balance sensitivity with operational feasibility across departments
- Aligning detection strategy with existing risk frameworks such as NIST CSF or ISO 27001
- Deciding whether to prioritize insider threat detection or external attack patterns based on historical incident data
- Integrating threat intelligence feeds to inform detection scope without overwhelming analyst capacity
- Determining acceptable false positive rates in alignment with SOC staffing and escalation workflows
Module 2: Designing and Deploying Detection Infrastructure
- Choosing between agent-based and agentless collection for endpoint telemetry based on OS diversity and performance impact
- Architecting log aggregation pipelines to handle volume spikes during incident investigations
- Configuring network TAPs and SPAN ports to ensure complete packet capture without degrading network performance
- Implementing encrypted log transmission paths to prevent tampering in transit
- Segmenting detection environments to isolate high-fidelity sensors from general monitoring systems
- Validating sensor coverage across cloud workloads, especially serverless and containerized environments
Module 3: Developing Detection Rules and Signatures
- Writing Sigma rules that generalize across multiple EDR platforms while preserving detection accuracy
- Calibrating threshold-based alerts (e.g., failed logins, file encryption volume) to reduce noise in privileged accounts
- Using MITRE ATT&CK to map detection rules to specific adversary techniques, not just tools
- Version-controlling detection logic in Git to track changes and enable rollback during tuning
- Testing new rules in passive mode before enabling active alerting to assess false positive impact
- Deciding when to use behavioral baselines versus static indicators for detecting lateral movement
Module 4: Integrating Threat Intelligence into Detection Workflows
- Filtering commercial threat feeds to exclude indicators irrelevant to the organization’s technology stack
- Automating IOC ingestion into SIEM via STIX/TAXII while validating source credibility
- Mapping threat actor TTPs from intelligence reports to internal detection capabilities
- Establishing refresh cycles for threat data to prevent reliance on stale indicators
- Blocking high-confidence IOCs at the firewall only after confirming no collateral impact on business systems
- Using dark web monitoring outputs to trigger proactive hunts for compromised credentials
Module 5: Conducting Proactive Threat Hunting
- Scheduling regular hypothesis-driven hunts based on recent industry breaches and internal risk changes
- Using EDR query languages to search for process injection patterns across endpoints
- Correlating anomalous authentication events with unusual data transfer volumes to identify data exfiltration
- Documenting hunting playbooks to ensure repeatability and knowledge transfer across shifts
- Isolating suspect systems in a controlled environment for memory and disk analysis without tipping off attackers
- Coordinating hunting activities with blue team members to avoid conflicting operations
Module 6: Managing Alert Triage and Escalation
- Implementing alert scoring models that factor in asset criticality, user role, and behavior deviation
- Assigning tiered response protocols based on alert severity and available containment options
- Automating enrichment tasks such as DNS lookups and user role checks to reduce triage time
- Defining escalation paths that include legal and PR teams for incidents with regulatory implications
- Rotating analysts through different detection domains to prevent alert fatigue and blind spots
- Conducting post-escalation reviews to refine alert logic and reduce recurrence of misclassified events
Module 7: Evaluating and Tuning Detection Efficacy
- Running purple team exercises to test detection coverage against simulated adversary techniques
- Measuring mean time to detect (MTTD) across incident types to identify systemic gaps
- Adjusting rule thresholds based on seasonal or business-cycle variations in user behavior
- Decommissioning legacy rules that consistently generate noise without yielding incidents
- Using detection engineering metrics such as precision, recall, and rule half-life to guide improvements
- Conducting quarterly reviews of detection coverage against the full MITRE ATT&CK matrix
Module 8: Governance and Compliance in Detection Operations
- Documenting data retention policies for security logs in accordance with jurisdictional requirements
- Obtaining legal approval for monitoring privileged user activities to comply with privacy regulations
- Auditing access controls to detection systems to prevent unauthorized modification of rules
- Reporting detection performance metrics to executive leadership and board-level risk committees
- Ensuring detection activities do not violate third-party contracts involving shared environments
- Implementing change management procedures for detection rule modifications to maintain audit trails