Learning Paths

Not sure where to start? Choose the path that matches your current role and goals. Each path is a recommended sequence of courses and modules — with the free content clearly marked so you can evaluate the platform before committing.

SOC Analyst — Level Up from L1 to L2

150–200 hours across 3 courses

A SOC analyst who can triage alerts but wants to investigate end-to-end, write detection rules, and produce IR reports.

1
Mastering KQL — Phase 1 Modules 0–3 · 15 hours
Free
2
M365 Security Operations — Free modules Modules 0, 1, 6 · 15 hours
Free
3
Mastering KQL — Phases 2–4 Modules 4–13 · 35 hours
4
M365 Security Operations — Full course Modules 2–16 · 60 hours
5
SOC Operations Modules 0–12 · 50 hours
What you build: Detection rules, investigation playbooks, IR report templates, hardening checklists, a threat hunting query library, and a complete operational framework.
Start Free — Mastering KQL Module 0

Detection Engineer

100–130 hours across 2 courses

A security analyst or SOC team member who wants to specialise in writing, testing, and maintaining detection rules.

1
Mastering KQL — Complete course Modules 0–13 · 50 hours
Phase 1 free
2
SOC Operations — Detection modules Modules 0–6, 12 · 50 hours
3
SOC Operations — Automation & metrics Modules 10–11 · 15 hours
What you build: Complete KQL mastery, production detection rules across 4 domains, detection-as-code methodology, and a threat intelligence integration.
Start Free — Mastering KQL Module 0

IT Admin Transitioning into Security

80–100 hours across 2 courses

An IT administrator managing an M365 tenant who has been told "you're also responsible for security now."

1
M365 Security Operations — Free modules Modules 0, 1, 6 · 15 hours
Free
2
Mastering KQL — Phase 1 Modules 0–3 · 15 hours
Free
3
M365 Security Operations — Full course Modules 2–16 · 60 hours
What you build: Complete understanding of the M365 security stack, KQL investigation skills, and the ability to configure, investigate, and report within Defender XDR and Sentinel.
Start Free — M365 Module 0

Security Manager / Team Lead

80–100 hours across 2 courses

A security manager who needs governance frameworks, team processes, and the ability to measure and improve team performance.

1
Claude for Security Professionals Modules 0–10 · 25 hours
2
SOC Operations Modules 0–1, 7–12 · 40 hours
3
Claude Field Guide All modules · 4 hours
Free
What you build: AI governance framework, acceptable use policy, team deployment playbook, SOC charter, operating model, IR documentation standards, metrics dashboard, and threat intelligence programme.
Start Free — Claude Field Guide

AI-Augmented Security Professional

30–35 hours across 2 courses

An experienced security professional who wants to integrate AI into investigation, detection, documentation, and governance workflows.

1
Claude Field Guide All modules · 4 hours
Free
2
Claude for Security Professionals Modules 0–10 · 25 hours
What you build: Investigation prompt library, AI-assisted detection engineering pipeline, IR documentation capability, automation scripts, compliance automation, governance framework, and adversarial AI defences.
Start Free — Claude Field Guide

Every path includes free starting modules. Evaluate the content quality and depth before subscribing.

Create Free Account View Pricing