Level Effect
We make cybersecurity accessible and fun. Through focusing on practical skills and scenario-based learning, our on-demand courses and live training programs empower individuals with the skills they need to succeed in cybersecurity.
Cybersecurity Home Lab Part 2 - Threat Hunting Tests for Malware Analysis & Adversary Emulation
Defeating Packed Malware - Manual Unpacking & Memory Dumping Techniques - Reverse Engineering 4 of 4
Reverse Engineering Real Malware Finding the RAT Hiding Inside - RE 3 of 4 - Cybersecurity Analyst
Reverse Engineering 2/4 - Encoding, Encryption, & Obfuscation Patterns - Cybersecurity SOC Analyst
Vibe Coding CTI (Cyber Threat Intelligence) automation and a Workshop to learn how
Bypass Security Controls with the "Human Layer" of Cybersecurity
Reverse Engineering 1 of 3 - Programming Concepts with Python
Dangerous insecure browser extensions? Workshop author interview - John Tuckner in the AppSec space!
Pentesting Web Apps & AppSec - Getting Started After SOC T1 L1 in 2025 - SOC100-5 Content
Threat Hunting in Cybersecurity - Getting Started in 2025 - SOC100-5
DevSecOps and Cloud Security - Getting Started in 2025 for Cybersecurity Beginners
Neuropsych Student to Threat Intelligence Analyst - Cybersecurity Alumni Stories
PowerShell Scripting - Getting Started in 2025 for Cybersecurity Beginners
Detection Engineering - Your First Detection Rule, Getting Started in this Cybersecurity Domain 2025
Open Source Intelligence (OSINT) Overview
Cybersecurity Career Prep 3 in 2025 - Open Source Projects, GitHub Fork Clone Commit Push Pull
Virtual Security Operations Center (SOC) for Home Lab, Intro to DFIR, Playbooks, Incident Response
Evaluating Alert Classification in a SOC! Threat Detection and Response and SOC200 Teaser
Technical Report Writing for Cybersecurity! Lessons from a Pentester, best practices and tips
Cyber Threat Intelligence - CTI Lifecycle, CTI Types, Attack Lifecycle, Models and Reports
Cybersecurity Home Labs - Getting Started in 2025! Lessons learned from 25 years - good, bad, ugly!
Log Analytics with ELK, intro to Yara, using a SIEM for malicious suspicious event analysis
SOC Incident Response Tabletop! Senior SecOps & AppSec Manager Intro and Scenario
SOC100 C26 - URL Inspection, Email Header Analysis & Triage, Static Analysis, Cobalt Strike Payload
SOC100 C25 - Email Security Analysis 1, SMTP Breakdown, SPF DKIM DMARC, MUA MSA MTA MDA MUA
SOC100 C24 - Malware Analysis Windows Triage for Persistence, Process, Networking Activity
SOC100 C23 - DLLs, EXEs, PE Format, Thread Operations with ProcMon and ProcExp
SOC100 C22 - Asymmetric, Cyberchef & Windows Triage Malware Analysis Start - What is a Process?
SOC100 C21 Asymmetric & Symmetric Encryption, Hashing, Encoding, Decoding, Cryptography, TLS
Dark Web & APT Case Study - Combat Veteran of 15+ years in Cybersecurity