SOC200
ALERTS TO ADVERSARIES
Strategic SOC Training for Tomorrow’s Threats.
"As someone who's worked side-by-side with Jonny his consistent ability to communicate nuanced security concepts sets him apart. His talks blend Windows internals, contagious enthusiasm, and actionable detection content. After each talk I left feeling smarter and better equipped to approach my own work. I can’t recommend Jonny’s trainings enough for anyone with the opportunity."
"Jonathan brings his years of Windows expertise and experience developing defensive solutions to the forefront in his teaching. The breadth of his background and care towards each student creates a positive learning environment for anyone who takes his course."
"Jonathan Johnson’s content is the perfect blend of deep technical research and real-world program-building wisdom. He not only demystifies adversarial tradecraft and telemetry, but also shows how to translate detection concepts into a scalable, strategic vision for maturing security programs. It’s rare to find someone who can bridge that gap so effectively."
"Jonny and I taught dozens of classes together over several years. Jonny is an adept instructor with excellent communication skills with students, often spending time after class to continue chatting about topics of interests or in-depth questions. Even during overnight or off-hours classes, Jonny brings an unparalleled level of enthusiasm and deep research background to every session. In addition to instructing, Jonny has background and experience in content creation and development, both in slide and long-form-blog format. I wouldn't hesitate to teach with him again, and cannot recommend him enough as a resource for learning in the future."
Course Description
This is an advanced SOC analyst course that goes beyond basic alert triage and incident handling, equipping you with advanced techniques for host and network-based triage and adversary tracking.
By the end of this course, you will be able to:
-
Analyze and correlate security events to detect sophisticated cyber threats.
-
Leverage threat intelligence for proactive defense and adversary profiling.
-
Leverage advanced analysis tools for host, binary, and network analysis.
-
Understand MITRE ATT&CK, TTPs, and adversary emulation for predictive defense.
-
Understand strategic methodologies for building and advancing SOC teams.
-
Understand advanced SOC analytical practices for improved analysis efficiency.
Introductions
Course Goals/Setup
Lab 1: Setup
SOC Methodology
Alert Classification
SOC and Detection Lifecycle
Lab 2: Discovering MITRE ATT&CK
Detection Engineering
Operational Drift
SOC Maturity Model
Lab 3: Walkthrough a SOC Maturity Model
Lab 4: Build Your Own SOC Maturity Model
Introduction to Alert Investigation
Alert Fatigue
Classification Bias
Lab 5: Microsoft Sentinel Setup
Host-Based Alerting
Introduction into Processes
Lab 6: Discovering Processes
Lab 7: Process Examination via ProcMon
Examining Processes
Lab 8: Investigate a Process-Based Alert
Introduction into Threads
Thread Actions
Lab 9: Thread Examination via ProcMon
Lab 10: Investigate a Thread-Based Alert
Introduction into Files
Lab 11: File Examination via ProcMon
Introduction into the Registry
Lab 12: Registry Examination via ProcMon
Lab 13: Investigate a Registry Alert
Introduction into Scripting
Lab 14: Analyzing a Script-Based Alert
Network-Based Alerting
Networking Basics
Lab 15: Examining Network Data via ProcMon
Host-Based Network Logs
Network Directions
Lab 16: Analyzing North to South Traffic
Lab 17: Analyzing East to West Traffic
Introduction into Correlation
Interprocess Communication
Lab 18: Investigate a Named Pipe Alert
Correlation Types
Parent/Child Correlation
Logon Session Correlation
Transitional Correlation
Lab 19: Identify the Bad Outside of the Alert
Advanced SOC Processes
Alert Correlation & Playbooks
Feedback Loops
Lab 20: Bad Alert Feedback
Scenario
Alert Classification Submission
Other Activity Submission
Detection Logic Submission
Playbook Submission
Containment Strategy Submission
Note - completing the capstone and receiving the certification of completion is optional.
Students that complete the capstone will be awarded a Certification after successfully completing Capstone: Project SOC Endgame.
Students will be faced with multiple alerts from various sources. They will need to:
-
Correlate and classify alerts
-
Find other malicious activity that did not fire alerts
-
Write-up Incident:
-
Maliciously Classified Alerts
-
Other activity identified
-
Detection Logic
-
Feedback (new and existing)
-
Playbook Generation Ideas
-
Containment Strategy
-
Live instruction is capped to 25 students maximum.
Each day of class will be 7-8 hours including breaks. You will go through lectures and labs. The days will be very practical lab heavy.
Please plan accordingly.
You will retain access for 1 week after the live course ends.
A full time table will be provided closer to the start date.
This course is targeted at SOC Tier 1 Analysts and up, as well as Technical Leadership that is supporting, managing, or any role adjacent to Security Operations.
At a technical level we recommend to have at least completed:
And to be familiar with the content at a minimum in:
Help is provided during class and in your private Discord channels for the duration of your training and up to 1 week after.
Your channel will be in the Level Effect Discord community.
$2500
CDA Live or On-Demand students receive a $250 discount, paying $2250.
You invest, we invest.
Your Instructor - Jonny Johnson
Founder of Johnson Security Research LLC and Principal EDR Product Researcher at Huntress.
Formerly:
-
Sr. Detection Engineering Consultant at SpecterOps
-
Sr. Threat Researcher at RedCanary
-
Sr. Threat Researcher at BinaryDefense
Interests: Windows Internals, Extracting and Exposing Telemetry, Reverse Engineering, Detection Engineering
Open-Source Author/Contributor: Atomic Test Harnesses, The Defender’s Guide, MSRPC-To-ATT&CK, TelemetrySource, JonMon

cmd.exe
with detailed event metadata like command line, PID, and timestamp.procdump
or rundll32 comsvcs.dll.
jkli.exe
(from C:\Temp
) with a network connection spawned rundll32.exe
, which in turn launched whoami /all
, suggesting suspicious process behavior chaining.FAQ
-
What hardware do I need?
All you need is a browser.
We provide the rest on our learning platform over at https://training.leveleffect.com with all virtual machines and lab time provided.
-
How do lab hours work?
Enough lab hours are provided for full in-depth learning of the content. If you need any more hours added during the duration of your training we can top you up at no charge.
-
What if I build my own lab?
You could, and we encourage you to apply what you've learned in your home lab! We don't officially provide support to your home lab however and expect you to be familiar with what is required in setting it up.
We also do have a #home-lab channel in Discord for general chat and support with the community.