Level Effect
Level Effect
  • Видео 121
  • Просмотров 37 621
What is Penetration Testing Really? Pentesting Explained in Cybersecurity.
Looks like that little audio mic buzz snuck back at times in this one. Apologies! this will be addressed before any further streams and recordings.
What Happened This Stream? 🚨
We walked through what pentesting really looks like from start to finish, what value it brings, and the place and time for it in Cybersecurity.
What are FAQing Fridays? 🗓️
Want to learn a little Cyber Defense tradecraft or brush up on some areas on your lunch or casually on Friday? or maybe just chat about certain topics? Welcome to FAQing Fridays hosted on our Twitch channel! Live every Friday typically at 12PM or 1PM EST. All are welcome to join in and ask questions as we go. Beginner to advanced friendly!
Follow our ...
Просмотров: 68

Видео

Cybersecurity Resumes Reviewed Live! Part 2
Просмотров 18116 часов назад
*Apologies for the weird mic glitch that happens through stream! Source has been identified and removed.* :) What Happened This Stream? 🚨 We reviewed your submitted Cybersecurity resumes live on the stream for a second round based on a lot of great reception! direct and immediate feedback on things to improve upon and advice on how you can stand out! What are FAQing Fridays? 🗓️ Want to learn a ...
Cybersecurity Resumes Reviewed Live!
Просмотров 37914 дней назад
What Happened This Stream? 🚨 We reviewed your submitted Cybersecurity resumes live on the stream! direct and immediate feedback on things to improve upon and advice on how you can stand out! What are FAQing Fridays? 🗓️ Want to learn a little Cyber Defense tradecraft or brush up on some areas on your lunch or casually on Friday? or maybe just chat about certain topics? Welcome to FAQing Fridays ...
Cybersecurity certifications, industry, and career Q&A stream! CompTIA Security+ and OSCC included.
Просмотров 1,9 тыс.21 день назад
What Happened This Stream? 🚨 Our first stream moving over to Twitch for our FAQing Friday series! we talked about Cybersecurity careers, job postings & resume questions, certifications and the differences in positions! Timestamps ⏳ 00:20 - Detection Engineering is looking at reflective activity of malicious behavior 01:20 - Get experience by Blue Teaming or mixing Red and Blue 03:10 - Does Digi...
Cyber Threat Intelligence Q&A - Getting started, best practices, mitigating risk, and more!
Просмотров 68728 дней назад
What Happened This Stream? 🚨 What started as a demo turned into a getting started conversation on Cyber Threat Intelligence Q&A type of podcast. The screen sharing messed up when the time came so it just turned into full on discussion! The questions and answers turned out to be very insightful. Hope you enjoy! Timestamps ⏳ 00:30 - What is the purpose of CTI? 01:50 - It’s not just for malicious ...
DLL Injection Rick Rolled Explorer.exe! Cybersecurity Analyst Live Triage - FAQing Friday July 12
Просмотров 428Месяц назад
What Happened This Stream? 🚨 We haphazardly walked into a DLL injection attack that rick rolled explorer.exe. A whole lot of pop ups and griefing by this malware as we wrangled it down, and removed the persistence mechanism behind it all! Note - feel free to skip through closing the popups 😅 Additionally - if you wanted to take this further toward the end there are a number of fun ways to have ...
Cybersecurity Analyst Live Triage: Zloader Malware Traffic Analysis - FAQing Friday June 21 Stream
Просмотров 4032 месяца назад
Stream: Cybersecurity Analyst (SOC) Triage Series with Zloader Malware Traffic Analysis. Recorded: June 21st 2024. Want to learn a little Cyber Defense tradecraft or brush up on some areas? Welcome to FAQing Fridays in the Level Effect Discord! FAQing Friday is live every Friday at 12PM EST typically 30m to 1hr. All are welcome to join in and ask questions as we go. Beginner to advanced friendl...
Data & Defense EP 05 - AMA With A Lead Data Scientist
Просмотров 892 месяца назад
Hosted in Level Effect Discord. We're back again with Summer more casually now answering anything and everything on Data Science with the community. We go deep into neural nets, relations of the brain to machine learning, and discussions of the future of AI Security.
Data & Defense EP 04 - Summer Rankin, PhD, the Origin Story & Course Review
Просмотров 2013 месяца назад
Get to know Summer Rankin, PhD, Instructor at GTK Cyber, and Senior Lead Data Scientist at Booz Allen Hamilton. Hear her origin story of how she got started in this field, the lessons learned, and the trajectory of starting in music to neuroscience to data science. We'll also review her upcoming ADS101: Python for Data Science course as a targeted approach for learners to get started in the fie...
Data & Defense EP 03 - AMA With Two Senior Detection Engineers
Просмотров 2214 месяца назад
Hosted in the Level Effect Discord server. Hear Greg Ake of Huntress and Tallis Jordan of 2K Games, both seniors in the Detection Engineering domain answer the community's questions. We covered a lot of ground here on the realities and challenges of working in the field and how to be as effective as possible in mitigating threats. 🖥️ leveleffect.com - our website www.leveleffect.com/cyber-defe...
Data & Defense EP 02 - Detection Engineering Origin Story
Просмотров 4605 месяцев назад
Detection Engineering is rapidly becoming a pivotal focus in Cybersecurity, drawing increasing resources and attention. Tune in to discover what Detection Engineering is all about, why it matters to the industry, and how our upcoming course, “Detection Engineering 100,” aims to bridge the skill gap. Gain insights into developing the competencies you need to thrive in this exciting and essential...
Data & Defense EP 01 - Level Effect Origin Story
Просмотров 7749 месяцев назад
How it all started! peel back the curtain and discover how and why Level Effect came to be with our start of a single live training course, designing our own LMS, our own infrastructure, and most importantly - what we stand for. Listen to this podcast hosted with ITSPmagazine! 🖥️ leveleffect.com - our website www.leveleffect.com/cyber-defense-analyst - our premium training program ✏️ training....
Governance, Risk, Compliance GRC Lecture 1 Cyber Risk
Просмотров 1,1 тыс.10 месяцев назад
1️⃣ Gain access to the virtual machines, quizzes, and challenges by accessing the course here: training.leveleffect.com 2️⃣ Check out the syllabus for all three Fundamentals courses here including the CDA Program they are pre-requisites for: docs.google.com/spreadsheets/d/1QJb5mMOe_DIcXujxo1nBf9o0Pcl_AhLA7PH8hlgGwxk/edit#gid=1747231724 3️⃣ For more information check out our CDA Program in depth...
Governance, Risk, Compliance GRC Lecture 2 Governance
Просмотров 74310 месяцев назад
1️⃣ Gain access to the virtual machines, quizzes, and challenges by accessing the course here: training.leveleffect.com 2️⃣ Check out the syllabus for all three Fundamentals courses here including the CDA Program they are pre-requisites for: docs.google.com/spreadsheets/d/1QJb5mMOe_DIcXujxo1nBf9o0Pcl_AhLA7PH8hlgGwxk/edit#gid=1747231724 3️⃣ For more information check out our CDA Program in depth...
Governance, Risk, Compliance GRC Lecture 3 Risk
Просмотров 37810 месяцев назад
1️⃣ Gain access to the virtual machines, quizzes, and challenges by accessing the course here: training.leveleffect.com 2️⃣ Check out the syllabus for all three Fundamentals courses here including the CDA Program they are pre-requisites for: docs.google.com/spreadsheets/d/1QJb5mMOe_DIcXujxo1nBf9o0Pcl_AhLA7PH8hlgGwxk/edit#gid=1747231724 3️⃣ For more information check out our CDA Program in depth...
Governance, Risk, Compliance GRC Lecture 4 Compliance
Просмотров 31310 месяцев назад
Governance, Risk, Compliance GRC Lecture 4 Compliance
Governance, Risk, Compliance GRC Lecture 5 Asset Management
Просмотров 31410 месяцев назад
Governance, Risk, Compliance GRC Lecture 5 Asset Management
Governance, Risk, Compliance GRC Lecture 6 Configuration Management
Просмотров 22710 месяцев назад
Governance, Risk, Compliance GRC Lecture 6 Configuration Management
Governance, Risk, Compliance GRC Lecture 7 Patch Management
Просмотров 23410 месяцев назад
Governance, Risk, Compliance GRC Lecture 7 Patch Management
Governance, Risk, Compliance GRC Lecture 8 Vulnerability Management
Просмотров 20410 месяцев назад
Governance, Risk, Compliance GRC Lecture 8 Vulnerability Management
Governance, Risk, Compliance GRC Lecture 9 Vulnerability Scanning
Просмотров 17810 месяцев назад
Governance, Risk, Compliance GRC Lecture 9 Vulnerability Scanning
Governance, Risk, Compliance GRC Lecture 10 Vulnerability Triage
Просмотров 17810 месяцев назад
Governance, Risk, Compliance GRC Lecture 10 Vulnerability Triage
Governance, Risk, Compliance GRC Lab 1 Cyber Risk & Maturity Assessments
Просмотров 4,6 тыс.10 месяцев назад
Governance, Risk, Compliance GRC Lab 1 Cyber Risk & Maturity Assessments
Governance, Risk, Compliance GRC Lab 2 Windows Server Hardening with CIS Benchmarks
Просмотров 78210 месяцев назад
Governance, Risk, Compliance GRC Lab 2 Windows Server Hardening with CIS Benchmarks
Cyber Threat Intelligence Lab 4 Cyber Kill Chain, Pyramid of Pain, Diamond Model
Просмотров 18510 месяцев назад
Cyber Threat Intelligence Lab 4 Cyber Kill Chain, Pyramid of Pain, Diamond Model
Cyber Threat Intelligence Lab 3 Threat Actor TTPs with MITRE ATT&CK
Просмотров 26610 месяцев назад
Cyber Threat Intelligence Lab 3 Threat Actor TTPs with MITRE ATT&CK
Cyber Threat Intelligence Lab 2 Threat Actor Report Analysis
Просмотров 17110 месяцев назад
Cyber Threat Intelligence Lab 2 Threat Actor Report Analysis
Cyber Threat Intelligence Lab 1 Industry Breach Reports with Verizon DBIR
Просмотров 21110 месяцев назад
Cyber Threat Intelligence Lab 1 Industry Breach Reports with Verizon DBIR
Cyber Threat Intelligence Lecture 3 CTI Lifecycle and MITRE ATT&CK
Просмотров 30810 месяцев назад
Cyber Threat Intelligence Lecture 3 CTI Lifecycle and MITRE ATT&CK
Cyber Threat Intelligence Lecture 2 CTI Types and Sources
Просмотров 27110 месяцев назад
Cyber Threat Intelligence Lecture 2 CTI Types and Sources

Комментарии

  • @tmm-thirtyfive
    @tmm-thirtyfive 7 часов назад

    So OSCC is a "entry" cybersecurity certification, and personally, I believe it is more than just entry level. The OSDA (OffSec Defense Analyst) is their defender course/cert. I think that is more along the lines of what the commenter was getting at and may have mixed up their acronyms.

    • @leveleffect
      @leveleffect 3 часа назад

      Yeah possibly! Agreed on that "entry" cybersecurity certs are not exactly entry-level as Cybersecurity is subset of IT. Still, $899 is quite steep for that level of training in a market where entry-level Cybersecurity training is heavily saturated and ranges from free to $80 for some top tier stuff. Our Fundamentals covers arguably more in some areas at free/PWYC, TCM just launched a SOC101 that looks great for two months of sub payment, and plenty over at THM amongst good YT playlists. $899 I would argue is a price-point of the past, and brand name, even if the quality is premium.

  • @93ksj
    @93ksj 22 часа назад

    Another great episode 👏🏼

  • @DedesFewscres
    @DedesFewscres 23 часа назад

    1 hour video and no mention or thoughts on CISM is mind boggling

    • @leveleffect
      @leveleffect 22 часа назад

      How so? This was a conversation around mostly beginner and entry-level area of certifications with career Q&A, with a little discussion around intermediate at best.

  • @brittany_nadiee
    @brittany_nadiee 4 дня назад

    This was absolutely awesome. It's insane how much the OS/Kernel does and how fast it executes these tasks! The high-level breakdown was pretty intriguing to hear knowing that Chrome, or any app, essentially opens immediately upon double-clicking.

    • @leveleffect
      @leveleffect 3 дня назад

      It really is impressive once you break down computer operations step by step only to be marvelled at how fast and efficiently it operates in real-time before our eyes. Great to see you enjoying it! 💪

  • @leveleffect
    @leveleffect 7 дней назад

    That random mic glitch has been addressed! sorry about that and hope it wasn't too distracting at times. 😅

  • @93ksj
    @93ksj 7 дней назад

    Great discussion as always, been watching these like it’s a season of Breaking Bad lol

    • @leveleffect
      @leveleffect 7 дней назад

      haha let's cook. Thank you for watching and glad to see you're enjoying the discussions!

  • @Gigi-zy1kx
    @Gigi-zy1kx 13 дней назад

    Good stuff.

  • @jessicalanda4538
    @jessicalanda4538 14 дней назад

    You consistently deliver content that matters! 🎧

  • @annecaminer2988
    @annecaminer2988 15 дней назад

    OMG you're a Pepper too!

    • @leveleffect
      @leveleffect 15 дней назад

      Dr. Pepper and A&W is where it's at! 😎

    • @annecaminer2988
      @annecaminer2988 15 дней назад

      @@leveleffect A&W and Mexican Coke made with cane sugar

  • @jordanlinden1411
    @jordanlinden1411 15 дней назад

    Awesome, tons of good insight

    • @leveleffect
      @leveleffect 15 дней назад

      @@jordanlinden1411 glad you found it of value!

  • @robnoeth8140
    @robnoeth8140 15 дней назад

    Great review!

    • @leveleffect
      @leveleffect 15 дней назад

      @@robnoeth8140 Thank you!

  • @Gigi-zy1kx
    @Gigi-zy1kx 21 день назад

    Hi. Appreciate the stream video. Good stuff. Probably not what you expected for a question/request but... The T skills conversion. Would it be possible to talk a little bit more on this topic? Maybe about what you would look for or recommend in either a role or career path that would define the skills needed for an ideal "T skill qualified candidate". Not sure if it's worth elaborating on or if you had anything else to add. I guess I can Google it. Nevermind. I'll Google it. Sorry

    • @leveleffect
      @leveleffect 21 день назад

      Happy to talk more about it and thanks for checking out the stream! no need to apologize though, googling is fine too and brings more perspective! T-Shaped professionals in Cybersecurity will vary a little differently from role to role but ultimately the point is that generalists in Cybersecurity will find themselves in a tough position trying to progress beyond SOC Tier 1 or entry-level Cybersecurity. That is because at that level your job is to be generally good in a lot of areas to handle a broad range of events at a surface level. An example would be that a T-Shaped Analyst should be good in Networking (web and Windows domain based included), System Internals (OS knowledge), Email Security, Cyber Threat Intelligence, and should have some skills using Log and Event Analysis tools. That would mean you're just about good to hop into any SOC Tier 1 type of role at that point and handle alerts coming in to determine if they require escalation or not. Now if you wanted to started becoming SOC Tier 2+ to get more into the territory of preventing these alerts from being tripped in the first place, then you're going to have to start getting stronger in one of those areas or others. That is simply because it's too much to ask for to be that good in multiple areas. It would be like saying you're looking for a plumber and welder or HVAC person all in one. There's a reason why the trades are split just as the domains in Cybersecurity are. Hope that helps!

    • @Gigi-zy1kx
      @Gigi-zy1kx 21 день назад

      @@leveleffect Awesome. look forward to it. Thanks

  • @leveleffect
    @leveleffect 27 дней назад

    We are moving our live streams over to Twitch from now on and will be able to bring the chat recorded into future videos for context! We have just created our channel here: www.twitch.tv/leveleffect/

  • @forheuristiclifeksh7836
    @forheuristiclifeksh7836 27 дней назад

    1:00

    • @leveleffect
      @leveleffect 27 дней назад

      That's the one to click on yes!

  • @angelogmuller
    @angelogmuller Месяц назад

    that's really good stuff. thanks for sharing!

  • @Fracasse-0x13
    @Fracasse-0x13 Месяц назад

    Great video

  • @ItzZerooooY2K
    @ItzZerooooY2K 2 месяца назад

    This is why we are life long learners in this field. Ive been an analyst for a few years and admittedly would have had trouble getting through this alone. I might have to look into your training so I can refresh my skills and knowledge.

    • @leveleffect
      @leveleffect 2 месяца назад

      The life long learning is the best part! always something new to glean or a skill to polish and refine. Glad you found it helpful! 💪-Anthony

  • @feji7994
    @feji7994 2 месяца назад

    God this stuff is boring how do I cope with the learning 😹

    • @leveleffect
      @leveleffect 2 месяца назад

      lol... yeah there's the "eat your vegetables, it's good for you!" portion to GRC and lecture/theory. Amount at once is key! watch 5 mins at a time, or and come back later after you've done a little hands on work in the other labs is our recommendation!

  • @ronniemeyer6812
    @ronniemeyer6812 4 месяца назад

    P R O M O S M 😊

  • @richscaglione
    @richscaglione 4 месяца назад

    This is absolutely FANTASTIC! Thank you so much for your transparency and helping the cyber community. I am pivoting to this field and I'm so excited about your next "bootcamp" in August. I'm going through your free foundational courses now and look forward to joining you guys in August for the next CDA Program. This is exactly what I've been looking for!

  • @Tridib_Tinkel
    @Tridib_Tinkel 4 месяца назад

    So grateful

  • @mohan_0076
    @mohan_0076 4 месяца назад

    dude y wont u make these videos into audio podcast...!

    • @leveleffect
      @leveleffect 4 месяца назад

      definitely! we were just talking about that this morning! we're going to get these and future ones into an audio podcast platform soon 📢

    • @mohan_0076
      @mohan_0076 4 месяца назад

      @@leveleffect Thx for the response dude...personally waiting for ur future plans keep it up...!

    • @leveleffect
      @leveleffect 2 месяца назад

      @@mohan_0076 it's official - Data & Defense is the podcast! ruclips.net/p/PLarzZ7tJk-lEkbRtiYAgNRYOTWiBhpO2W

  • @joshuagoodell9881
    @joshuagoodell9881 5 месяцев назад

    Great video. Thanks.

  • @jj1221ify
    @jj1221ify 5 месяцев назад

    Lovely content thank you!!

  • @infidon9229
    @infidon9229 5 месяцев назад

    okay, this is epic

  • @thechamith
    @thechamith 7 месяцев назад

    Thanks!

  • @cashchronicles974
    @cashchronicles974 7 месяцев назад

    excellent job dude

  • @jagatkrishna1543
    @jagatkrishna1543 7 месяцев назад

    Thanks 🙏😇🎊

  • @jayamanh4758
    @jayamanh4758 Год назад

    thanks for explaining

  • @helmijasni6366
    @helmijasni6366 2 года назад

    i tried all the step but it was frustrating when i still cannot find the hidden software

  • @youcefkel4743
    @youcefkel4743 2 года назад

    excellent work dude

  • @userx9166
    @userx9166 2 года назад

    Mimikatz can only be executed through a High integrity process...in that case, since you had a local admin, you should've bypassed UAC to get a the High integrity process. Then mimikatz would've worked just fine.

    • @userx9166
      @userx9166 2 года назад

      Another important detail. If the respond team connects via RDP to a compromised machine to further analyze it, if the attack is still ongoing, what happens is that now, the token for the user used for the RDP session by the first responder, will be generated, and as the user compromised by the attacker is local admin, that would allow the attacker to impersonate the first responder that is busy looking into the machine. Using that session, the attacker would be able to move laterally as the first responder.

  • @rubenhawkins6721
    @rubenhawkins6721 3 года назад

    Can’t wait to check out some of your other videos!!! You deserve more views! Do you know of PromoSM?? You could use it to help increase your subscribers!!!