From Basics to Breaches
Go from opening up a browser to hunting down malware while learning all relevant IT skills along the way, with no need to stitch together different content and courses to accomplish this.
Many students still find Level Effect after spending tens of thousands on entry-level bootcamps or live training vendors with not a lot to show for, or getting lost in a sea of 20-30 hour high-level courses that were never designed to connect to one another.
Let's change that - together with SOC100:
You invest, We invest. The course is pay-what-you-can with an affordable minimum pricing. Additionally, what ever you pay we'll credit toward CDA or any one of our other courses after completion.
It's taught by many top professionals in the field and features over 20 modules, 400+ hours of content, and 180+ labs, all instructed live and available on-demand afterward
Go from opening an app to removing malware and using a SIEM, to working in a Virtual SOC as a Tier 1 Cybersecurity Analyst
It readies you for Intermediate training by starting you in Detection Engineering, DFIR, and more
It offers experience to put on your resume as a Community SOC Analyst helping others just like you
Let's make an impact.
"SOC100-1: Prepare" equips you with the hands-on skills needed to excel in IT HelpDesk and junior system administration roles, forming the technical foundation for your future in cybersecurity. Throughout the course, you’ll develop the ability to manage both Windows and Linux systems, diagnose and resolve common network and system issues, and configure key enterprise services like Domain Controllers, DNS, and DHCP. You’ll also learn to automate routine IT tasks through scripting, enhancing efficiency in day-to-day operations.
🔴 NOTE - This is Course 1 of the SOC100 Course Series here! If you want a visual you can check out the flowchart roadmap here.
SOC100-1 will be streamed on our Twitch channel here: https://www.twitch.tv/leveleffect
Perform Sysadmin Tasks: Manage user accounts, permissions, software, policies, and services in both Windows and Linux environments.
Diagnose and Troubleshoot Technical Issues: Resolve common HelpDesk issues such as locked accounts, broken services, and system errors by the GUI and CLI.
Perform Network Traffic & Protocol Analysis: Identify and resolve network connectivity issues, configure network shares, conduct protocol analysis, network scanning and diagnostics.
Enterprise Network Configuration: Set up and manage critical enterprise services like Domain Controllers, DNS, DHCP, and apply security policies and manage enterprise workstations.
Automate IT Tasks: Automate routine administrative tasks, including system backups, user account management, service monitoring, and software deployment.
This course has full on-demand content that will also be instructed live fully the first time. Review the Stream Schedule above for timing.
The stream recordings will then be added in as recordings to the course content where the course will remain completely on-demand after that.
The on-demand content will consist of:
Video lectures and labs
Quizzes and challenges
Portfolio projects to build of your own
Industry speakers & CDA Alumni
PRE-REQUISITES
Willingness to Learn: Strong interest and commitment to learning cybersecurity concepts and practices.
Basic Computer Skills: Understanding of fundamental computer and how to open up a browser.
WHO IS THIS FOR?
Complete newcomers looking to get started in IT and Cybersecurity with a clear roadmap.
Those with some experience looking to develop entry-level Cybersecurity or Security Engineering skill sets i.e. malware analysis, log analytics, detection engineering, etc. for further training or experience.
Current Cybersecurity professionals in the field looking to strengthen their foundations or undertake some additional experience.
Managers or those in positions supportive or adjacent to IT that wish to be more knowledgeable about this area or contribute more.
SOC100 students have access to an exclusive Discord help channel.
Help is provided during business hours.
You will find access to the channel within the SOC100 series of courses.
You will receive help from the Level Effect team as well as Community Analysts (see the next tab for more information on this).
Education is not enough. Our students can gain resume volunteer experience as per below and we will provide what you add on your resume:
SOC100 students can submit a form within the course to be Community Jr. SOC Analysts
CDA Students can submit a form to be Community SOC Analysts, and Community Malware & Challenge Developers
The expectations are as follows:
Community Jr. SOC Analysts are expected to help other SOC100 students in the Discord support channel get through the SOC100 series of content
Community SOC Analysts are expected to help SOC100 and CDA Students get through content
Community Malware & Challenge Developers are expected to contribute to our community GitHub
Pay what you can (PWYC) with a "You Invest, We Invest" model.
Minimum $19.
Suggested $29.
What you pay we'll credit toward our CDA course or one other course of your choice.
Owned forever after purchase, including updates.
50 lab hours are included in the purchase.
Additional lab time is $0.20 - $0.40 per hour and can be used on any courses you own in our platform.
Units
Hands On Labs
Weeks+
Hours+
You can check out the full curriculum clicking here.
SUMMARY
This module covers the fundamentals of Windows architecture, including how operating systems work, kernel vs user mode, navigating the Windows interface, and managing the Windows file system. You’ll learn about user accounts, how to set permissions, and handle Windows processes and services.
Additionally, you’ll explore scheduled tasks, installing/removing software, and making system changes via the Registry. You’ll also gain hands-on experience using CMD and PowerShell for basic automation and system troubleshooting.
LECTURES
Windows History & Architecture
What is an Operating System?
LABS
Navigating Windows
Windows File System
Windows User Accounts
User Permissions
Windows Processes
Windows Services
Scheduled Tasks
Installing and Removing Software
The Registry
Introduction to CMD
Introduction to PowerShell
Module Quiz
Challenge - Troubleshooting PowerShell
SUMMARY
In this module, you’ll delve into Linux architecture and the file system hierarchy, using the command-line interface (CLI) to manage files, directories, processes, and permissions with commands like chmod, chown, ps, and many more. You’ll learn about system monitoring, and controlling services with systemctl.
This module also introduces Bash scripting to automate tasks, log management via journalctl, and software package management. You’ll create and modify scripts, manage user permissions, and perform advanced text editing and searching.
LECTURES
Linux History & Architecture
Software & Shells
LABS
Navigating a Linux GUI
Interacting with Applications and Files
Everything is a File
System Monitor
Task Manager
System Logs
Operating the Terminal
The CLI (Command-Line Interface)
Command Flags & Relative vs Absolute Paths
Command Line File Administration
File Permissions
Creating Users and File Permissions
Group Permissions
Finding & Searching
Processes and Proc Files
Services with Systemctl
Command Redirection & Data Streams
Scheduled Tasks with Crontab
Software Administration with Package Managers
Advanced Text Editing with Vim
Scripting and Variables
Building a Security Backup Tool
Module Quiz
Challenge 1: Redirect the Streams!
Challenge 2: Improve or Build a Tool
SUMMARY
This module covers essential networking concepts like the OSI Model, IP addressing, and subnetting, as well as the roles of TCP/IP, DNS, and DHCP in network communication. You’ll practice network troubleshooting using tools like ping, traceroute, netstat, ss, wget, curl and Netcat.
Additionally, you’ll explore network scanning with Nmap, capture and analyze network traffic with Wireshark, and learn about common protocols such as TCP, UDP, and HTTP.
You'll even perform full protocol analysis and light malware traffic analysis!
LECTURES
History & OSI Model
Network Topology
Network Devices
Connections & VPNs
Internet Protocol and IPv4
Subnetting
CIDR and Variable Length Subnetting
NAT PAT and IPv6
Ports
TCP and UDP Protocols
LABS
Finding your IP Address and Host Info
Pinging and DNS Lookups
Curl the API & Wget the File
SSH Connections and SCP Transfers
Network Shares with SMB
Inspecting Ports
Netcat the Swiss Army Knife
Network Scanning with Nmap
Wireshark Overview and Pcaps
Wireshark ARP Analysis
The Three-Way Handshake & Client-Server Model
HTTP Requests & Headers
Following Protocols
Network Traffic Analysis - Endpoint Metadata
Network Traffic Analysis - Anomaly Detection
Module Quiz
Challenge: There Might be Torrents!
SUMMARY
In this module, you’ll configure core enterprise infrastructure, including Domain Controllers (DCs), DNS, and DHCP, while managing Domain Users, Admins, Groups, and workstations through OUs and RDP. You’ll enforce Group Policy Objects (GPOs) for user, endpoint, and security policies, and configure network policies like SMB and firewall rules.
Remote endpoint management will be done via RDP and CLI, and you’ll handle package management for enterprise automation. Additionally, you’ll implement enriched logging with tools like Sysmon, and create build scripts to automate deployments across the network.
LECTURES
Windows Enterprise Networks
SMBs (Small to Medium sized Businesses) Needs
LABS
Lecture: Windows Enterprise Networks
Lecture: SMBs (Small to Medium sized Businesses) Needs
Configuring a Domain Controller (DC)
Configuring a DNS server
Configuring DHCP for clients
Creating Domain Users and Domain Admins and Groups
Enrolling a Workstation into the DC, OUs, and RDP management
Group Policy Objects (GPOs)
User Policies
Endpoint Policies
Endpoint Security Policies
Network Policies (SMB & Firewall)
Enterprise Policy Management
Remote Endpoint Management by CLI
Package Management for Enterprise and Automation
Enriched Endpoint Logging with Sysmon
Build Scripts and Automating Deployment
Module Quiz
Challenge 1: Scalable GPOs
Challenge 2: Automated Threat Detection and Response
SUMMARY
This module equips you with troubleshooting skills for handling errors via playbooks, securing data with secrets management, and responding to account lockouts. You’ll conduct Kerberos analysis, troubleshoot with Event IDs, and resolve service failures related to PATH issues. You’ll also automate tasks using scripting, perform disk, CPU, memory, and service diagnostics, and master backup and restoration processes while addressing network and browser issues.
LECTURES
HelpDesk 101, SMBs, and MSPs
HelpDesk Tiers & Cybersecurity Analyst Tiers
LABS
Handling Errors and Playbooks
Secrets Management
Account Lockout Response
Kerberos Analysis
Event ID Troubleshooting
Service Failure & PATH
Scripting Policy and Execution
Disk Partitioning and Diagnostics
CPU Diagnostics
Memory Diagnostics
Service Diagnostics
Backups and Restoration
Network Troubleshooting
Browser Troubleshooting
Module Quiz
Challenge 1: HelpDesk Tier 1 Ticket
Challenge 2: HelpDesk Tier 2 Ticket
SUMMARY
In this module, you’ll learn how to strategically prepare for IT and cybersecurity careers by building a personal brand and developing a professional portfolio. Whether you’re starting from scratch or building on existing experience, you’ll explore career paths in both IT and cybersecurity, and gain insights into the future of these industries.
Practical skills include creating a portfolio website, setting up a GitHub repository to showcase projects, and designing your own home lab for hands-on experimentation and learning. This module will help you create a tangible portfolio that demonstrates your skills to potential employers, setting you apart in the competitive job market.
LECTURES
Starting from Scratch or From Experience?
Building your Brand
IT Jobs
Cybersecurity Jobs
Future of IT & Cybersecurity
LABS
Building a Portfolio Website
Building a GitHub Portfolio
Project Uploads to GitHub
Building your own Home Lab!
Go from opening up a browser to hunting down malware while learning all relevant IT skills along the way, with no need to stitch together different content and courses to accomplish this.
You have more than one top experienced professional teaching you here, and a Discord community where you can reach them directly for support. Level Effect has also been doing this for 4 years now - check out our testimonials.
Gain experience in a virtualized Security Operations Center (SOC) environment triage incidents just like on the job. Afterwards, take a 1-week practical NO multiple choice exam with report readout to an Instructor.
We're tired of overpriced content & bootcamps where you're paying for their marketing budget, and we bet that you are, too. This is our effort to put out a solid course with far better value, that shouldn't break your bank.
Once you own the content, you own it forever! This includes the updates we'll make to this course. The best part is once you learn the material, you can ask to help others and put various roles on your resume as Community SOC Analyst, or Malware Developer, and more.
The future of Cybersecurity at a technical level is Engineering. Develop your Tier 1 Analyst skills here to get going, as well as advanced foundations to get started on the needs of what's to come.
This is what John Hammond had to say about our Cyber Defense Analyst Program in its first iteration.
And guess what? It's only gotten better.
Sandra's reviewed a lot of training programs... hear what she has to say about our real SOC experience.
Learn about the origin story of Level Effect, why we made our original Cyber Defense Analyst program, and the problems we aimed to solve in the cybersecurity training landscape.
Yes.
And we'll credit you back what you pay for if you take future courses with us.
All content will be provided with enough VM hours for a single pass. We've kept the cost for additional hours as low as possible and will be within the $0.20 - 0.40 range per hour.
Any lab hours you purchase can be used in any other course you own in our https://training.leveleffect.com platform.
The majority if not 90% or more is completely fine to do on your own home lab.
Some students that come through are more proficient or “tech-savvy” and want to set up a virtual machine to continue their learning. We'll do our best to help you troubleshoot things in Discord if you choose this but we do also expect you to be willing to troubleshoot what we suggest so that we can maintain our time and resources for the delivery of this course to everyone.
Inside SOC100, you’ll have access to essential steps to build out some home lab virtual machines to continue the work there.
NOTE: This is not a requirement to complete SOC100; instead, this is optional for those who wish to step outside of the curriculum with their learning. You can still complete SOC100 without a home lab virtual machine.
It will be a 1 week practical exam for you to complete, write a report, then submit and schedule an Instructor review. You'll present the report 1 on 1 to one or more Instructors and be expected to provide answers and thoughts on how and why you completed the exam.
This will release around January 2025.
The exam will consist of Virtual SOC work around the following:
Network Traffic Analysis
Email Security
Log Analysis
Compromised Host (DFIR)
Cyber Threat Intelligence
Yes!
You can add all the SOC100 coursework as anything under Education and Training.
Afterwards you can add the following as Volunteer Experience:
You can also add any of the "Challenge" topics in the coursework under your portfolio as Home Lab based, as they will start you off but have you finish them on your own to your liking. We strongly recommend grouping up on this part for networking and feeling what it's like to work in technical teams!
Firstly, make sure to submit the Waitlist Form and provide your preferences for days and time for when you'd like the content to be instructed live.
If you want to see examples of what the classes might be like, click here to check out our Example Class section and more on our YouTube.
Live classes will be streamed on Twitch open to all to join. Questions can be asked live that can be answered right on the spot and we encourage it! Any further troubleshooting or deeper questions can be put inside our Discord where one of us will help you through it.
There is NO CAMERA for students, you will all be in the chat and it will be moderated.