<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=325921436538399&amp;ev=PageView&amp;noscript=1">
Skip to the main content.

SOC100-1

PREPARE

The Why Behind the SOC100 Course Series

Many students still find Level Effect after spending tens of thousands on entry-level bootcamps or live training vendors with not a lot to show for, or getting lost in a sea of 20-30 hour high-level courses that were never designed to connect to one another.

Let's change that - together with SOC100:

  1. You invest, We invest. The course is pay-what-you-can with an affordable minimum pricing. Additionally, what ever you pay we'll credit toward CDA or any one of our other courses after completion. 

  2. It's taught by many top professionals in the field and features over 20 modules, 400+ hours of content, and 180+ labs, all instructed live and available on-demand afterward

  3. Go from opening an app to removing malware and using a SIEM, to working in a Virtual SOC as a Tier 1 Cybersecurity Analyst

  4. It readies you for Intermediate training by starting you in Detection Engineering, DFIR, and more

  5. It offers experience to put on your resume as a Community SOC Analyst helping others just like you

Let's make an impact.

Course Description

"SOC100-1: Prepare" equips you with the hands-on skills needed to excel in IT HelpDesk and junior system administration roles, forming the technical foundation for your future in cybersecurity. Throughout the course, you’ll develop the ability to manage both Windows and Linux systems, diagnose and resolve common network and system issues, and configure key enterprise services like Domain Controllers, DNS, and DHCP. You’ll also learn to automate routine IT tasks through scripting, enhancing efficiency in day-to-day operations.

🔴 NOTE - This is Course 1 of the SOC100 Course Series here! If you want a visual you can check out the flowchart roadmap here.

SOC100-1 will be streamed on our Twitch channel here: https://www.twitch.tv/leveleffect

Perform Sysadmin Tasks: Manage user accounts, permissions, software, policies, and services in both Windows and Linux environments.

Diagnose and Troubleshoot Technical Issues: Resolve common HelpDesk issues such as locked accounts, broken services, and system errors by the GUI and CLI.

Perform Network Traffic & Protocol Analysis: Identify and resolve network connectivity issues, configure network shares, conduct protocol analysis, network scanning and diagnostics.

Enterprise Network Configuration: Set up and manage critical enterprise services like Domain Controllers, DNS, DHCP, and apply security policies and manage enterprise workstations.

Automate IT Tasks: Automate routine administrative tasks, including system backups, user account management, service monitoring, and software deployment.

This course has full on-demand content that will also be instructed live fully the first time. Review the Stream Schedule above for timing.

The stream recordings will then be added in as recordings to the course content where the course will remain completely on-demand after that.

The on-demand content will consist of:

  • Video lectures and labs

  • Quizzes and challenges

  • Portfolio projects to build of your own

  • Industry speakers & CDA Alumni

PRE-REQUISITES

  • Willingness to Learn: Strong interest and commitment to learning cybersecurity concepts and practices.

  • Basic Computer Skills: Understanding of fundamental computer and how to open up a browser.

 

WHO IS THIS FOR?

  • Complete newcomers looking to get started in IT and Cybersecurity with a clear roadmap.

  • Those with some experience looking to develop entry-level Cybersecurity or Security Engineering skill sets i.e. malware analysis, log analytics, detection engineering, etc. for further training or experience.

  • Current Cybersecurity professionals in the field looking to strengthen their foundations or undertake some additional experience.

  • Managers or those in positions supportive or adjacent to IT that wish to be more knowledgeable about this area or contribute more.

SOC100 students have access to an exclusive Discord help channel.

  • Help is provided during business hours.

  • You will find access to the channel within the SOC100 series of courses.

  • You will receive help from the Level Effect team as well as Community Analysts (see the next tab for more information on this).

Education is not enough. Our students can gain resume volunteer experience as per below and we will provide what you add on your resume:

  1. SOC100 students can submit a form within the course to be Community Jr. SOC Analysts

  2. CDA Students can submit a form to be Community SOC Analysts, and Community Malware & Challenge Developers

The expectations are as follows:

  1. Community Jr. SOC Analysts are expected to help other SOC100 students in the Discord support channel get through the SOC100 series of content

  2. Community SOC Analysts are expected to help SOC100 and CDA Students get through content

  3. Community Malware & Challenge Developers are expected to contribute to our community GitHub

 

Pay what you can (PWYC) with a "You Invest, We Invest" model.

  • Minimum $19.

  • Suggested $29.

  • What you pay we'll credit toward our CDA course or one other course of your choice.

  • Owned forever after purchase, including updates.

  • 50 lab hours are included in the purchase.

  • Additional lab time is $0.20 - $0.40 per hour and can be used on any courses you own in our platform.

0

Units

0

Hands On Labs

0

Weeks+

0

Hours+

Curriculum

You can check out the full curriculum clicking here.

SUMMARY

This module covers the fundamentals of Windows architecture, including how operating systems work, kernel vs user mode, navigating the Windows interface, and managing the Windows file system. You’ll learn about user accounts, how to set permissions, and handle Windows processes and services.

Additionally, you’ll explore scheduled tasks, installing/removing software, and making system changes via the Registry. You’ll also gain hands-on experience using CMD and PowerShell for basic automation and system troubleshooting.

LECTURES

Windows History & Architecture
What is an Operating System?

LABS

Navigating Windows
Windows File System
Windows User Accounts
User Permissions
Windows Processes
Windows Services
Scheduled Tasks
Installing and Removing Software
The Registry
Introduction to CMD
Introduction to PowerShell
Module Quiz
Challenge - Troubleshooting PowerShell

SUMMARY

In this module, you’ll delve into Linux architecture and the file system hierarchy, using the command-line interface (CLI) to manage files, directories, processes, and permissions with commands like chmod, chown, ps, and many more. You’ll learn about system monitoring, and controlling services with systemctl.

This module also introduces Bash scripting to automate tasks, log management via journalctl, and software package management. You’ll create and modify scripts, manage user permissions, and perform advanced text editing and searching.

 

LECTURES

Linux History & Architecture
Software & Shells

LABS

Navigating a Linux GUI
Interacting with Applications and Files
Everything is a File
System Monitor
Task Manager
System Logs
Operating the Terminal
The CLI (Command-Line Interface)
Command Flags & Relative vs Absolute Paths
Command Line File Administration
File Permissions
Creating Users and File Permissions
Group Permissions
Finding & Searching
Processes and Proc Files
Services with Systemctl
Command Redirection & Data Streams
Scheduled Tasks with Crontab
Software Administration with Package Managers
Advanced Text Editing with Vim
Scripting and Variables
Building a Security Backup Tool
Module Quiz
Challenge 1: Redirect the Streams!
Challenge 2: Improve or Build a Tool

SUMMARY

This module covers essential networking concepts like the OSI Model, IP addressing, and subnetting, as well as the roles of TCP/IP, DNS, and DHCP in network communication. You’ll practice network troubleshooting using tools like ping, traceroute, netstat, ss, wget, curl and Netcat.

Additionally, you’ll explore network scanning with Nmap, capture and analyze network traffic with Wireshark, and learn about common protocols such as TCP, UDP, and HTTP.

You'll even perform full protocol analysis and light malware traffic analysis!

LECTURES

History & OSI Model
Network Topology
Network Devices
Connections & VPNs
Internet Protocol and IPv4
Subnetting
CIDR and Variable Length Subnetting
NAT PAT and IPv6
Ports
TCP and UDP Protocols

LABS

Finding your IP Address and Host Info
Pinging and DNS Lookups
Curl the API & Wget the File
SSH Connections and SCP Transfers
Network Shares with SMB
Inspecting Ports
Netcat the Swiss Army Knife
Network Scanning with Nmap
Wireshark Overview and Pcaps
Wireshark ARP Analysis
The Three-Way Handshake & Client-Server Model
HTTP Requests & Headers
Following Protocols
Network Traffic Analysis - Endpoint Metadata
Network Traffic Analysis - Anomaly Detection
Module Quiz
Challenge: There Might be Torrents!

SUMMARY

In this module, you’ll configure core enterprise infrastructure, including Domain Controllers (DCs), DNS, and DHCP, while managing Domain Users, Admins, Groups, and workstations through OUs and RDP. You’ll enforce Group Policy Objects (GPOs) for user, endpoint, and security policies, and configure network policies like SMB and firewall rules.

Remote endpoint management will be done via RDP and CLI, and you’ll handle package management for enterprise automation. Additionally, you’ll implement enriched logging with tools like Sysmon, and create build scripts to automate deployments across the network.

LECTURES

Windows Enterprise Networks
SMBs (Small to Medium sized Businesses) Needs

LABS

Lecture: Windows Enterprise Networks
Lecture: SMBs (Small to Medium sized Businesses) Needs
Configuring a Domain Controller (DC)
Configuring a DNS server
Configuring DHCP for clients
Creating Domain Users and Domain Admins and Groups
Enrolling a Workstation into the DC, OUs, and RDP management
Group Policy Objects (GPOs)
User Policies
Endpoint Policies
Endpoint Security Policies
Network Policies (SMB & Firewall)
Enterprise Policy Management
Remote Endpoint Management by CLI
Package Management for Enterprise and Automation
Enriched Endpoint Logging with Sysmon
Build Scripts and Automating Deployment
Module Quiz
Challenge 1: Scalable GPOs
Challenge 2: Automated Threat Detection and Response

 

SUMMARY

This module equips you with troubleshooting skills for handling errors via playbooks, securing data with secrets management, and responding to account lockouts. You’ll conduct Kerberos analysis, troubleshoot with Event IDs, and resolve service failures related to PATH issues. You’ll also automate tasks using scripting, perform disk, CPU, memory, and service diagnostics, and master backup and restoration processes while addressing network and browser issues.

LECTURES

HelpDesk 101, SMBs, and MSPs
HelpDesk Tiers & Cybersecurity Analyst Tiers

LABS

Handling Errors and Playbooks
Secrets Management
Account Lockout Response
Kerberos Analysis
Event ID Troubleshooting
Service Failure & PATH
Scripting Policy and Execution
Disk Partitioning and Diagnostics
CPU Diagnostics
Memory Diagnostics
Service Diagnostics
Backups and Restoration
Network Troubleshooting
Browser Troubleshooting
Module Quiz
Challenge 1: HelpDesk Tier 1 Ticket
Challenge 2: HelpDesk Tier 2 Ticket

SUMMARY

In this module, you’ll learn how to strategically prepare for IT and cybersecurity careers by building a personal brand and developing a professional portfolio. Whether you’re starting from scratch or building on existing experience, you’ll explore career paths in both IT and cybersecurity, and gain insights into the future of these industries.

Practical skills include creating a portfolio website, setting up a GitHub repository to showcase projects, and designing your own home lab for hands-on experimentation and learning. This module will help you create a tangible portfolio that demonstrates your skills to potential employers, setting you apart in the competitive job market.

LECTURES

Starting from Scratch or From Experience?
Building your Brand
IT Jobs
Cybersecurity Jobs
Future of IT & Cybersecurity

LABS

Building a Portfolio Website
Building a GitHub Portfolio
Project Uploads to GitHub
Building your own Home Lab! 

Why the SOC100 Course Series?

From Basics to Breaches 

Go from opening up a browser to hunting down malware while learning all relevant IT skills along the way, with no need to stitch together different content and courses to accomplish this.

Senior Instructors, Proven Track Record, Community

You have more than one top experienced professional teaching you here, and a Discord community where you can reach them directly for support. Level Effect has also been doing this for 4 years now - check out our testimonials.

SOC Training & 1 Week Practical Certification

Gain experience in a virtualized Security Operations Center (SOC) environment triage incidents just like on the job. Afterwards, take a 1-week practical NO multiple choice exam with report readout to an Instructor.

Pay What You Can for "Content" not Marketing

We're tired of overpriced content & bootcamps where you're paying for their marketing budget, and we bet that you are, too. This is our effort to put out a solid course with far better value, that shouldn't break your bank.

Lifelong Access & Experience

Once you own the content, you own it forever! This includes the updates we'll make to this course. The best part is once you learn the material, you can ask to help others and put various roles on your resume as Community SOC Analyst, or Malware Developer, and more.

Ready for Intermediate & Advanced

The future of Cybersecurity at a technical level is Engineering. Develop your Tier 1 Analyst skills here to get going, as well as advanced foundations to get started on the needs of what's to come.

John Hammond's Thoughts

This is what John Hammond had to say about our Cyber Defense Analyst Program in its first iteration.

And guess what? It's only gotten better.

 

Sandra - Tech & Lifestyle's Review

Sandra's reviewed a lot of training programs... hear what she has to say about our real SOC experience.

 

Hear From the Co-Founders How We Started

Learn about the origin story of Level Effect, why we made our original Cyber Defense Analyst program, and the problems we aimed to solve in the cybersecurity training landscape.

 

 

FAQ