Skip to content
AyoKoding

Overview

Your application generates logs. When something goes wrong, those logs are the story. This by-example guide teaches threat detection, incident response, and SOC skills through annotated log samples and queries — built for software engineers who want to understand what happens after an attacker gets in.

Why Software Engineers Need This

You instrument your code with metrics and traces for reliability. Security monitoring is the same discipline applied to adversarial inputs. When you understand how to read an auth log, write a detection rule, or triage an alert, you become an invaluable partner during incidents — not a bystander waiting for the security team.

This track uses the same tools you already encounter in production: structured logs, query languages (Splunk, Elastic), and scripting. No SOC experience or prior security background required.

What Is Blue Team By-Example Learning?

Blue team by-example learning is a detection-first approach where you learn through annotated log samples, SIEM queries, and response procedures rather than abstract theory. Each example shows:

  • What it detects — the attack technique or anomaly the example identifies
  • Why it indicates compromise — the behavioral pattern or IOC and its significance
  • How to respond — triage steps, containment actions, and escalation criteria
  • False positive handling — how to distinguish malicious activity from legitimate behavior

Learning Progression

LevelEngineer ContextWhat You Learn
Beginner"I want to read security logs and write basic queries"Auth logs, Windows events, Apache logs, basic Splunk/Elastic queries, alert triage
Intermediate"I want to detect specific attacks and respond to incidents"AD attack detection, SIEM correlation, incident response, memory forensics
Advanced"I want to build and run a detection program"Threat hunting, detection engineering, cloud detection, SOAR, detection metrics

Start at Beginner even if you are a senior engineer. Log reading and basic query skills are the foundation everything else builds on.

Coverage

What Is Covered

  • Log analysis — Windows Event Logs, Linux syslogs, application logs, and network logs
  • SIEM queries — Splunk SPL, Elastic KQL/EQL, Microsoft Sentinel KQL, and Sigma rule writing for common attack patterns
  • Threat detection — detecting reconnaissance, initial access, execution, and persistence
  • Incident triage — alert prioritization, IOC extraction, timeline reconstruction
  • Incident response — containment, eradication, and recovery procedures
  • Threat hunting — hypothesis-driven hunting, anomaly baselines, and proactive detection
  • Detection engineering — writing, testing, and maintaining detection rules

What Is Not Covered

Prerequisites

  • Comfort reading structured text files (logs, JSON, CSV)
  • Basic understanding of HTTP, DNS, and Linux processes
  • No SIEM or SOC experience required — the first examples start from raw log files

If you have debugged a production incident using logs, you already have the instincts needed to start this track.

Structure of Each Example

Every example follows a consistent five-part format:

  1. What This Covers — what the example detects or responds to (2-3 sentences)
  2. Scenario — SOC or IR analyst context with the attack technique in scope
  3. Annotated Log Sample or Query — raw logs, SIEM queries, or scripts with inline comments explaining each indicator and decision point
  4. Key Takeaway — the core defensive insight to retain (1-2 sentences)
  5. Why It Matters — production SOC relevance (50-100 words)

Examples by Level

Beginner (Examples 1–28)

Intermediate (Examples 29–57)

Advanced (Examples 58–85)

Last updated May 20, 2026

Command Palette

Search for a command to run...