<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=325921436538399&amp;ev=PageView&amp;noscript=1">
Skip to the main content.

The Level Effect Blog

The intersection of cyber tradecraft, careers, and the latest news.

Wanna get notified of new content?

Subscribe
open_door-1

Cybersecurity Education

2 min read

​​Common Types of Malware—and How to Defend Against Them

Malware, which is short for malicious software, is any software that is designed to cause damage to computer systems, networks, or devices. Malware...

Read More

4 min read

Mapping a Curriculum to the NICE Cybersecurity Workforce Framework

Here’s a scenario: a cybersecurity analyst might have to respond to a network that has been compromised by sophisticated malware evading traditional...

Read More

2 min read

Pause Before Clicking: Don't Swallow That Phishing Hook!

Senit Lutgen is a student in the Winter 2023 Cohort of our Cyber Defense Analyst Bootcamp. Below, he details some of the tell-tale signs that a...

Read More

3 min read

5 Cyber Hygiene Best Practices

Cyber hygiene. It’s a term thrown around quite a bit in the cybersecurity industry, but what is it?

Read More

10 min read

Home Lab: Enabling and Configuring Threat Intelligence and Detections

This is part four of a four-part series on how to set up your own home lab with ELK. Read part one, part two, and part three.

Read More

7 min read

Home Lab: SIEM and Security Features

This is part two of a four-part series on how to set up your own home lab with ELK. Read part one.

Read More

9 min read

Home Lab: Ingesting Data with Agent and Fleet

This is part three of a four-part series on how to set up your own home lab with ELK. Read part one and part two.

Read More

7 min read

How to Set Up Your Own Home Lab with ELK

Note: This is a guide that I wrote for my own home lab setup. It is not using the latest version of ELK, and there are many other great ways to get...

Read More