Courses That Close the Gap Between Certification and Capability.

You passed the exam but can't build the detection, investigate the incident, or present the architecture. These courses produce the artifacts that prove you can do the work — deployed in your environment, not a sandbox.

Every course produces artifacts you deploy at work.

Detection rules that fire on real attacks, playbooks that contain real incidents, architectures your CISO approves
Built in your own environment — persistent labs that never expire
Verification scripts confirm your work is production-ready before you move on
Written by practicing security engineers · 34 courses · New modules added regularly
From $179/year — every course includes free modules. See pricing →
Security Engineering

Identity, Endpoint & Platform Security

After these courses, your Conditional Access framework is documented and defensible, your endpoints are hardened to a verifiable baseline, and your M365 security stack is configured the way it should have been from day one — not the way the defaults left it.

Detection & Hunting

Detection Engineering, KQL & Threat Hunting

After these courses, threats that used to slip through your SIEM undetected are caught by rules you wrote, tested, and deployed. You produce 71 production KQL rules, execute 10 complete hunt campaigns, and build a detection-as-code pipeline that keeps your coverage current.

Advanced
Premium
Detection Engineering
71 KQL Rules · 6 Attack Chains · ATT&CK Mapped · Detection-as-Code
What you'll deploy71 production KQL detection rules + 6 full ATT&CK-mapped attack chains you can deploy today
DE · Detection
  • 14 Modules
  • 71 Production Detection Rules
  • 2 Free Modules — No Account Required
Start Free Module →See What You'll Deploy →
Essentials
Premium
Mastering KQL for Cybersecurity
Operators · Joins · Time-Series · Anomaly Detection · Performance
What you'll deploy68 production-grade KQL exercises + reusable query library you can use in every hunt
K · Query Language
  • 16 Modules
  • 68 KQL Exercises
  • 2 Free Modules — No Account Required
Start Free Module →See What You'll Deploy →
Advanced
Premium
Practical Threat Hunting in Microsoft 365
10 Hunt Campaigns · Hypothesis-Driven · Identity · OAuth · Exfiltration
What you'll deploy10 complete hypothesis-driven hunt campaigns + Sentinel playbooks ready for your environment
TH · Threat Hunting
  • 18 Modules
  • 10 Complete Hunt Campaigns
  • 2 Free Modules — No Account Required
Start Free Module →See What You'll Deploy →
Essentials
Premium
Security Automation and Orchestration
Sentinel Playbooks · Auto-Containment · Evidence Collection · Orchestration
What you'll deployFully built Sentinel + Logic Apps playbooks for auto-containment and evidence collection
SA · Automation
  • 15 Modules
  • Lab Exercises with Logic Apps, Sentinel
  • 2 Free Modules — No Account Required
Start Free Module →See What You'll Deploy →
Offensive Operations

Offensive Security & Campaign Analysis

After these courses, you understand how attackers plan and execute campaigns — infrastructure, payloads, movement, evasion — and you translate that operational logic into detection strategy. Your detections catch campaigns, not just individual alerts.

Investigation & Response

Incident Triage, Forensics & IR

After these courses, incidents that used to take days to investigate are triaged and contained in hours. You produce investigation playbooks, evidence collection procedures, containment workflows, and forensic timelines that hold up under legal scrutiny.

Advanced
Premium
Master Incident Triage and First Response
Cloud · Windows · Linux · KAPE · Velociraptor · KQL · Containment
What you'll deployComplete triage-to-containment playbook + KAPE + Velociraptor lab environment
TR · Triage
  • 17 Modules
  • Lab Exercises with KAPE, Velociraptor, PowerShell
  • 2 Free Modules — No Account Required
Start Free Module →See What You'll Deploy →
Advanced
Premium New
Network Detection and Forensics
Zeek · Suricata · Wireshark · tcpdump · PCAP · DNS · TLS · NetFlow
What you'll deploy5 full network investigation scenarios + Zeek/Suricata + Wireshark/PCAP analysis artifacts
NF · Network Forensics
  • 15 Modules
  • 5 NE Investigation Scenarios + Capstone
  • 2 Free Modules — No Account Required
Start Free Module →See What You'll Deploy →
Advanced
Premium
Practical Incident Response: Windows & Microsoft 365
KAPE · EZ Tools · Volatility 3 · Ransomware · BEC · Insider · APT
What you'll deploy4 complete Windows + M365 investigation scenarios + Volatility + BEC + ransomware response playbooks
IR · Forensics
  • 22 Modules
  • 4 Investigation Scenarios + Capstone
  • 2 Free Modules — No Account Required
Start Free Module →See What You'll Deploy →
Advanced
Premium
Practical Incident Response: Linux Systems
Filesystem · Memory · Logs · Containers · Cloud VMs · Persistence
What you'll deployFull Linux forensic investigation toolkit + Volatility + Log2Timeline labs on your own hardware
LX · Linux Forensics
  • 18 Modules
  • Lab Exercises with Volatility, Log2Timeline
  • 2 Free Modules — No Account Required
Start Free Module →See What You'll Deploy →
Specialist

Advanced Specialist Courses

After these courses, you operate at depth most practitioners never reach — complete M365 security architecture with 30+ ADRs, detection validation against 136 ATT&CK techniques, applied memory forensics with learner-captured images, and offensive campaign analysis that informs your detection program.

Specialist
Specialist
M365 Security Architecture
Entra ID · Conditional Access · PIM · Purview · Intune · Sentinel · Defender XDR
What you'll deploy30+ ADRs, decision matrices, risk register, architecture diagrams, and an executive summary — a complete, portfolio-grade architecture package
MSA · M365 Security Architecture
  • 17 Modules
  • M365 E5 Developer Tenant + Azure Subscription
  • 2 Free Modules — No Account Required
Start Free Module →See What You'll Deploy →
Specialist
Specialist
Identity and Access Management in Microsoft 365
Entra ID · Entra ID Governance · Conditional Access · PIM · Graph API · PowerShell
What you'll deployA governed identity program where every identity — human and machine — has an owner, a lifecycle, and compliance evidence
IAM · Identity and Access Management
  • 17 Modules
  • M365 E5 Developer Tenant + Entra ID Governance Trial
  • 2 Free Modules — No Account Required
Start Free Module →See What You'll Deploy →
Specialist
Specialist New
Advanced Windows Forensic Analysis
MFT · USN Journal · ShellBags · Amcache · Prefetch · SRUM · Registry · Event Logs
What you'll deploy2 full capstone investigations + court-ready forensic reports and testimony artifacts
WF · Windows Forensics
  • 15 Modules
  • 2 Capstone Investigations + Court Testimony
  • 2 Free Modules — No Account Required
Start Free Module →See What You'll Deploy →
Specialist
Specialist
Applied Memory Forensics: Attack, Capture, Analyse
Metasploit · Mimikatz · Volatility 3 · MemProcFS · WinDbg · YARA
What you'll deploy7 real attack techniques + 11 learner-captured memory images you can analyze end-to-end
DFIR · Memory
  • 11 Modules
  • 7 attack techniques · 11 learner-captured memory images
  • 2 Free Modules — No Account Required
Start Free Module →See What You'll Deploy →
Specialist
Specialist
Purple Teaming for Blue Teams
Sigma · KQL · Sentinel · Defender XDR · Splunk · Elastic · Atomic Red Team · Caldera · VECTR · ATT&CK Navigator
What you'll deploy61 ATT&CK techniques walked end-to-end across 4 environments + 3 SIEMs (Sigma + KQL + Splunk)
DH · Purple
  • 16 Modules
  • 61 ATT&CK Techniques Walked End-to-End
  • 2 Free Modules — No Account Required
Start Free Module →See What You'll Deploy →
12 Focused Skills

One Capability. Production-Ready.

Not every capability needs a 15-module course. Ridgeline Skills give you the same depth standard in a focused 4–8 hour format — one tool, one technique, one deployable outcome. Included with your subscription.

Same quality as full courses
4–8 hours to completion
Deploy what you build immediately

DFIR & Investigation

Detection & Hunting

Security Engineering

View All Skills →

Read the free modules. Then decide.

Every paid course opens with free foundation modules — no account, no email, no gate. Read the content, run the queries, and see for yourself whether this is the depth that closes the gap between where you are and where you need to be.