Field Guide

For security professionals, IT administrators, and SOC analysts using Claude

Claude Field Guide

The AI training your security team actually needs.

Practical Claude training with real M365 security examples throughout. From prompt fundamentals to security operations, IR documentation, detection engineering, and AI governance. No fluff. Production workflows from page one.

Claude — Security OperationsYou:Write a KQL detection rule fortoken replay after password reset.Check both sign-in tables.Claude:let PasswordResets = AuditLogs|whereOperationNamehas"Reset password"|extendResetUser =tostring(TargetResources[0]...✓ Detection rule generated

Overview

Eleven modules across two tracks. The Foundation track teaches Claude fundamentals — models, prompting, context management, and safety. The Security track applies Claude to the work you already do — alert triage, IR documentation, detection engineering, compliance, and AI governance.

Audience profile

SOC analysts who want to integrate Claude into daily operations. IT administrators managing M365 environments who are adopting AI tools. Security managers who need an AI governance framework. Anyone who wants to use Claude effectively with a security-first perspective. No prior Claude or AI experience required.

Course syllabus

Operational capability, not just knowledge

1

A Claude Project configured for your security operations

System prompt tuned to your environment, reference documents uploaded, naming conventions set. Every conversation produces output calibrated to your tenant, your tools, and your reporting format.

2

Prompt templates for every major security workflow

Alert triage, KQL generation, IR report drafting, detection rule documentation, threat briefings, compliance gap analysis. Copy-paste-adapt prompts that produce professional output on the first attempt.

3

The investigation feedback loop

Generate query → run in Sentinel → analyse results in Claude → generate follow-up. Each cycle: 2-3 minutes. Full investigation: 30-45 minutes instead of 2+ hours. The single highest-value Claude pattern for security work.

4

AI governance framework for your organisation

Shadow AI detection queries, data classification rules, vendor assessment criteria, acceptable use policy structure, and a CISO briefing template. The complete framework for governing AI tools across your security team.

5

The verification discipline

Output → Verify → Deploy. The operational discipline that separates professionals from amateurs. Know where Claude hallucinations occur, how to catch them, and when to trust vs verify. This is the habit that makes AI-assisted security work safe.

How to approach this course

Time commitment

Plan for roughly 4 hours across all 11 modules. Foundation takes about 90 minutes. Security track takes about 135 minutes. Each module is 15-25 minutes and can be completed independently.

What you need

A Claude account (any tier — even free works for exercises). For security track modules, access to a Microsoft 365 environment or developer tenant is recommended but not required.

Recommended path

Work through the Foundation first (F1-F5). If you already use Claude daily and understand prompting, skip to the Security track (S1-S6). Security professionals should complete both tracks — the Foundation covers safety and limitations that apply to every security use case.

What makes this different

This is not another "prompt engineering 101." Every module uses real security examples — KQL queries, Sentinel alerts, IR reports, compliance frameworks. The Security track covers workflows no other Claude course has: investigation feedback loops, detection rule documentation automation, and AI governance for security teams.

Start the Field Guide

Eleven modules across two tracks. Begin with Module F1 and work through to AI governance.