KC7 Cybersecurity Curriculum

Our Approach

We built KC7 to teach blue team cybersecurity skills through games. In KC7, you investigate realistic scenarios, query logs, and figure out what happened. This document describes the skills we are trying to develop through this process. Read more...

We built KC7 to teach blue team cybersecurity skills through games. In KC7, you investigate realistic scenarios, query logs, and figure out what happened. This document describes the skills we are trying to develop through this process.

Blue team means defense. Blue teamers detect malicious activity, investigate alerts, and respond to incidents. Whether you end up as a SOC analyst, incident responder, detection engineer, or threat intelligence analyst, the foundation is the same: looking at data, asking the right questions, and determining whether you are seeing normal activity or an attacker at work.

Some skills we teach explicitly: how logs work, what attackers do, where to look for evidence. You study these concepts, and games give you a place to apply them. Other skills develop implicitly through practice: judgment, pattern recognition, knowing when to stop digging. We design scenarios to exercise these skills, but there is no checklist. You build them by working through investigations, making mistakes, and reflecting on what worked.

The implicit skills take longer to develop. They also matter more.

Two analysts with the same technical knowledge will perform differently based on how they reason under uncertainty. We think about this a lot when designing games.

We organized the curriculum into three sections:

  • Core Analyst Competencies are judgment skills developed through practice.
  • Domain-Specific Knowledge covers technical concepts you study and memorize.
  • Advanced Specializations go deeper into threat intelligence, cloud investigations, and malware analysis.

Our goal is job-ready analysts, not walking encyclopedias. Every objective here answers the question: why does this matter during an investigation? This curriculum is not perfect and does not cover everything. But it should give you a solid foundation with clear paths into deeper learning.

  • Core Analyst Competencies
    Core Analyst Competencies are judgment skills that grow through practice. Each scenario you investigate builds pattern recognition and sharpens your decision-making. You will revisit these skills in every game, and you should expect progress to be gradual.
    • Analytical Thinking and Decision-Making
      Security analysis is reasoning under uncertainty. Analytical Thinking and Decision-Making skills help you think clearly when the data is messy, incomplete, or misleading.
    • Data Analysis
      Every investigation runs on data. Data Analysis skills help you find the right data, make sense of it, and connect pieces across sources.
    • Managing an Investigation
      You need to know where to start, how far to go, and when to stop. Managing an Investigation skills help you run an investigation from beginning to end.
    • Communication and Collaboration
      You need to explain what you found, document your work, and coordinate with people who are not security experts.
  • Domain-Specific Knowledge
    Domain-Specific Knowledge covers technical concepts you study and memorize. Games help you apply this knowledge and recognize patterns faster. If you hit a concept you do not understand, pause and look it up. We link to external resources where helpful. The goal is recognition and application, not memorization under pressure.
    • Understanding the Adversary
      Defending against attackers requires understanding them. Adversary Understanding covers who attacks organizations, why they do it, and how their operations unfold.
    • Security Logging and Monitoring
      Logs are your primary source of truth. You need to understand where they come from, what they capture, and how to work with them.
    • Host Forensics
      When something bad happens on an endpoint, you need to know where to look. This covers the artifacts and evidence sources telling you what happened on a machine.
    • Network Security Fundamentals
      Networks are how attackers get in, move around, and get data out. You need to understand how networks work to spot when something is wrong.
    • Identity and Access Management
      Attackers exploit access, not systems alone. Understanding how identity works helps you spot abuse.
    • Email Security Analysis
      Email is the most common way attackers get initial access. Analyzing suspicious messages is a daily task for most SOC teams.
    • Web Application Security
      Web apps are common targets. This covers how web attacks look from the defender's perspective, in your logs rather than in exploit code.
    • Tracing Attacker Activity
      You found something suspicious. Now you need to figure out what else the attacker did. Tracing Attacker Activity skills help you follow attacker movement, communication, and objectives.
    • Understanding Defenses
      Security controls work together. No single tool stops everything, but layered defenses force attackers to work harder and create more opportunities to catch them.
    • Understanding Detection
      Detection is about finding attacker activity in your telemetry. Some detections are more valuable than others. Understanding why helps you prioritize and recognize limitations.
  • Advanced Topics
    Advanced Specializations require both domain knowledge and analytical judgment. Games introduce core concepts and give you practice. Mastery requires continued study and real-world experience beyond what any curriculum provides.
    • Threat Intelligence
      Threat intel helps you understand the broader context: who is attacking, what they want, and how they operate. It turns isolated incidents into patterns.
    • Cloud Security Investigations
      Cloud environments have different logs, different attack surfaces, and different rules. If your organization uses cloud infrastructure, you need to know how to investigate there.
    • Basic Malware Analysis
      Sometimes you need to understand what a piece of malware does. This covers the basics of analyzing malicious files without becoming a reverse engineer.