Latest Cyber Defense News & Updates
Blue Team Certifications
Cyber defenders play an essential role in securing the enterprise. Defending against attacks is only possible with the right skill set - and confidence in your abilities as an all-around defender and those of your team. GIAC's Cyber Defense certifications span the entire defense spectrum and are focused in two areas: cyber defense essentials and blue team operations. Whether your needs are beginner-level, advanced, or for a specialized area of defense, GIAC has the credentials you need to keep your organization safe from the latest threats.
Graduate Certificate Program in Cyber Defense Operations
- Designed for working InfoSec and IT professionals
- Highly technical 12-credit-hour program
- Includes 4 industry-recognized GIAC certifications
Learn Blue Team Skills With These Experts
About SANS Blue Team Operations
SANS Blue Team Operations focuses on actionable techniques to better defend organizations through a collection of training courses, certification and a myriad of community initiatives.
Blue Team = Defense. The term Blue Team comes from the world of military simulation exercises. During exercises, the Red Team would be those playing the role of the adversary. The Blue Team would be acting as the friendly forces being attacked. So Red Team acts as Offense and Blue Team as Defense. Specifically emphasizing cyber security, the Blue Team's focus is to defend the organization from cyber attacks. In truth, while everything that improves the defensive security posture could be construed as Blue Team, there is an overt emphasis on discovering and defending against attacks.
Our SANS Blue Team Ops curriculum provides intensive, immersion training designed to help you and your staff master the practical steps necessary for defending systems and applications against the most dangerous threats. Our courses are full of important and immediately useful techniques that you can put to work as soon as you return to your office. The curriculum has been developed through a consensus process involving industry leading engineers, architects, administrators, developers, security managers, and information security professionals.