- 142
- 75 943
Level Effect
United States
เข้าร่วมเมื่อ 12 เม.ย. 2021
We make cybersecurity accessible and fun. Through focusing on practical skills and scenario-based learning, our on-demand courses and live training programs empower individuals with the skills they need to succeed in cybersecurity.
What is GRC? C19 - Governance, Risk, Compliance, Risk Assessment, Policy, Procedure Frameworks NIST
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400+ hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time.
Full playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html&si=TvuJWlDVeU0r_s99
Full course info 👉 www.leveleffect.com/soc100
Stream calendar 🗓️ docs.google.com/spreadsheets/d/12WRVm_52PmFkp6Lr8v9v8M1ONcRytOz8zizYBy10LHI/edit?gid=0#gid=0
Stream Details:
- Class 19
- Course: SOC100-2
- Domain: Governance, Risk, Compliance (GRC)
Website: leveleffect.com
Discord: discord.gg/level-effect
Twitch: www.twitch.tv/leveleffect
Newsletter & Blog: news.leveleffect.com/
LinkedIn: www.linkedin.com/school/leveleffect
00:00:00 - Greeting students; introduction to Class 19 and focus on GRC.
00:02:43 - Instructor emphasizes the importance of GRC in cybersecurity and its relevance to technical roles.
00:08:52 - Introduction to GRC: Governance, Risk, and Compliance-its importance for SOC analysts.
00:10:52 - GRC as the "designer of the castle," with SOC analysts being the "King's Guard."
00:13:28 - Discussion on transitioning from technical roles (SOC) to GRC positions.
00:14:53 - Balancing business-level thinking with technical security measures-what GRC analysts do differently.
00:19:52 - Real-world analogy: Kingdom defenses and avoiding the need for costly, technical firefighting.
00:22:07 - The value of strategic security decisions-putting up walls vs. tactical responses.
00:27:35 - Question to students: Is anyone interested in getting into GRC? Chat discussions follow.
00:33:18 - GRC identifies risks and optimizes defenses before threats reach the SOC.
00:37:09 - GRC as a business-level approach: Understanding organizational priorities and risks.
00:40:42 - Deep dive into the role of GRC: It ensures teams don’t "reinvent the wheel" with redundant efforts.
00:43:33 - Real-world example: Securing a home and aligning security solutions to assessed risks.
00:47:05 - How GRC and SOC teams complement each other-strategic vs. tactical responses.
00:50:18 - The first step in GRC: Defining cyber risk and understanding its two components-likelihood and impact.
00:54:12 - Key takeaway: Effective GRC ensures efficient use of resources by preventing avoidable incidents.
01:00:51 - Introduction to cyber risk: Understanding likelihood and impact as core metrics.
01:07:04 - Defining vulnerability and its role in assessing cyber risk.
01:12:07 - Four methods of risk management: Avoidance, Transference, Acceptance, and Mitigation.
01:15:45 - Risk transference explained using insurance as an example.
01:20:06 - Risk mitigation: Implementing technical controls like firewalls and backup solutions.
01:28:42 - Key takeaway: GRC optimizes resources to balance security needs with business operations.
01:33:18 - Governance begins: Defining security programs (password policies, permissions, and patch management).
01:37:55 - Governance as prevention-implementing best practices to reduce incidents for SOC analysts.
01:42:18 - Introduction to NIST frameworks as critical tools in GRC.
01:50:18 - Real-world impact: GRC as a cost-saver by reducing the need for large SOC teams.
02:02:19 - Breaking down governance vs. compliance: Recommendations vs. mandatory requirements.
02:08:32 - Example frameworks: NIST CSF and CIS benchmarks for best practices.
02:12:26 - Instructor demonstrates how frameworks guide implementation and decision-making.
02:18:07 - Students ask questions about balancing technical and managerial skill sets in GRC.
02:22:39 - Security maturity models: Assessing and improving organizational policies over time.
02:28:42 - Risk and compliance explained: Ensuring adherence to regulations and industry standards.
02:32:26 - Framework tools: CIS benchmarks for securing systems like Microsoft Office.
02:36:45 - Importance of technical understanding for GRC analysts-bridging business and IT.
02:45:20 - Real-world takeaway: GRC as the strategy behind efficient cybersecurity programs.
03:00:57 - GRC’s strategic role: How frameworks save organizations from "reinventing the wheel."
03:07:49 - Using NIST controls to prioritize and implement security solutions.
03:13:42 - Key discussion: How risk assessments align cybersecurity goals with business efficiency.
03:20:18 - Clarification: Security engineering vs. detection engineering-engineering as a solution provider.
03:28:11 - Addressing misconceptions: GRC’s strategic mindset compared to tactical SOC operations.
03:34:47 - Why GRC is critical for modern cybersecurity-building sustainable defense strategies.
03:40:39 - Final wrap-up: Key takeaways on balancing GRC with technical roles in cybersecurity.
03:45:28 - Instructor teases upcoming labs and technical assessments for next sessions.
Full playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html&si=TvuJWlDVeU0r_s99
Full course info 👉 www.leveleffect.com/soc100
Stream calendar 🗓️ docs.google.com/spreadsheets/d/12WRVm_52PmFkp6Lr8v9v8M1ONcRytOz8zizYBy10LHI/edit?gid=0#gid=0
Stream Details:
- Class 19
- Course: SOC100-2
- Domain: Governance, Risk, Compliance (GRC)
Website: leveleffect.com
Discord: discord.gg/level-effect
Twitch: www.twitch.tv/leveleffect
Newsletter & Blog: news.leveleffect.com/
LinkedIn: www.linkedin.com/school/leveleffect
00:00:00 - Greeting students; introduction to Class 19 and focus on GRC.
00:02:43 - Instructor emphasizes the importance of GRC in cybersecurity and its relevance to technical roles.
00:08:52 - Introduction to GRC: Governance, Risk, and Compliance-its importance for SOC analysts.
00:10:52 - GRC as the "designer of the castle," with SOC analysts being the "King's Guard."
00:13:28 - Discussion on transitioning from technical roles (SOC) to GRC positions.
00:14:53 - Balancing business-level thinking with technical security measures-what GRC analysts do differently.
00:19:52 - Real-world analogy: Kingdom defenses and avoiding the need for costly, technical firefighting.
00:22:07 - The value of strategic security decisions-putting up walls vs. tactical responses.
00:27:35 - Question to students: Is anyone interested in getting into GRC? Chat discussions follow.
00:33:18 - GRC identifies risks and optimizes defenses before threats reach the SOC.
00:37:09 - GRC as a business-level approach: Understanding organizational priorities and risks.
00:40:42 - Deep dive into the role of GRC: It ensures teams don’t "reinvent the wheel" with redundant efforts.
00:43:33 - Real-world example: Securing a home and aligning security solutions to assessed risks.
00:47:05 - How GRC and SOC teams complement each other-strategic vs. tactical responses.
00:50:18 - The first step in GRC: Defining cyber risk and understanding its two components-likelihood and impact.
00:54:12 - Key takeaway: Effective GRC ensures efficient use of resources by preventing avoidable incidents.
01:00:51 - Introduction to cyber risk: Understanding likelihood and impact as core metrics.
01:07:04 - Defining vulnerability and its role in assessing cyber risk.
01:12:07 - Four methods of risk management: Avoidance, Transference, Acceptance, and Mitigation.
01:15:45 - Risk transference explained using insurance as an example.
01:20:06 - Risk mitigation: Implementing technical controls like firewalls and backup solutions.
01:28:42 - Key takeaway: GRC optimizes resources to balance security needs with business operations.
01:33:18 - Governance begins: Defining security programs (password policies, permissions, and patch management).
01:37:55 - Governance as prevention-implementing best practices to reduce incidents for SOC analysts.
01:42:18 - Introduction to NIST frameworks as critical tools in GRC.
01:50:18 - Real-world impact: GRC as a cost-saver by reducing the need for large SOC teams.
02:02:19 - Breaking down governance vs. compliance: Recommendations vs. mandatory requirements.
02:08:32 - Example frameworks: NIST CSF and CIS benchmarks for best practices.
02:12:26 - Instructor demonstrates how frameworks guide implementation and decision-making.
02:18:07 - Students ask questions about balancing technical and managerial skill sets in GRC.
02:22:39 - Security maturity models: Assessing and improving organizational policies over time.
02:28:42 - Risk and compliance explained: Ensuring adherence to regulations and industry standards.
02:32:26 - Framework tools: CIS benchmarks for securing systems like Microsoft Office.
02:36:45 - Importance of technical understanding for GRC analysts-bridging business and IT.
02:45:20 - Real-world takeaway: GRC as the strategy behind efficient cybersecurity programs.
03:00:57 - GRC’s strategic role: How frameworks save organizations from "reinventing the wheel."
03:07:49 - Using NIST controls to prioritize and implement security solutions.
03:13:42 - Key discussion: How risk assessments align cybersecurity goals with business efficiency.
03:20:18 - Clarification: Security engineering vs. detection engineering-engineering as a solution provider.
03:28:11 - Addressing misconceptions: GRC’s strategic mindset compared to tactical SOC operations.
03:34:47 - Why GRC is critical for modern cybersecurity-building sustainable defense strategies.
03:40:39 - Final wrap-up: Key takeaways on balancing GRC with technical roles in cybersecurity.
03:45:28 - Instructor teases upcoming labs and technical assessments for next sessions.
มุมมอง: 228
วีดีโอ
What is Cybersecurity? Class 18 - CIA Triad, Zero Trust, Defense in Depth, Threats, Threat Actors
มุมมอง 14114 วันที่ผ่านมา
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400 hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time. Full playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html&...
Cybersecurity SOC Analyst C17 - Home Lab Building, Kerberos PCAP Analysis, Virtual HelpDesk
มุมมอง 35021 วันที่ผ่านมา
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400 hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time. Full playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html&...
Cybersecurity SOC Analyst Training Pt 16 - Virtual HelpDesk, Event Viewer, Sysmon, Ticket Resolution
มุมมอง 20921 วันที่ผ่านมา
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400 hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time. Full playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html&...
Cybersecurity Analyst Training Pt 15 - Career, Jobs, Portfolio Building, Soft Skills, SOC Experience
มุมมอง 23528 วันที่ผ่านมา
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400 hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time. Full playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html&...
Cybersecurity Analyst Training Pt 14 - Group Policy, PowerShell Security, Automation, SOC Experience
มุมมอง 29528 วันที่ผ่านมา
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400 hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time. Full playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html&...
Cybersecurity Analyst Training Pt 13 - Active Directory Domain Controller, Enrolling, SOC Experience
มุมมอง 472หลายเดือนก่อน
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400 hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time. Full playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html&...
Cybersecurity Analyst Training Pt 12 - Malware Traffic Analysis with PCAP and OSINT SOC Experience
มุมมอง 271หลายเดือนก่อน
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400 hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time. Note - this stream is shorter wrapping up the Networking portion before...
Cybersecurity Analyst Training Pt 11 - Three Way & TLS Handshake, HTTP Headers - SOC Experience
มุมมอง 250หลายเดือนก่อน
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400 hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time. Full playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html&...
Cybersecurity Analyst Training Pt 10 - Nmap NAT PAT Ports Netstat Wireshark ARP - SOC 100 Experience
มุมมอง 341หลายเดือนก่อน
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400 hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time. Full playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html&...
Cybersecurity Analyst Pt 9 - Netcat Shell, Sockets, ICMP, DNS, curl, wget, APIs, SMB, SSH, SCH
มุมมอง 357หลายเดือนก่อน
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400 hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time. Full playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html&...
Cybersecurity Analyst Pt 8 - Routers, Switches, Modems, IP Class A B C, Subnetting, CIDR, CLI Utils
มุมมอง 435หลายเดือนก่อน
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400 hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time. Full playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html&...
Cybersecurity Analyst Pt 7 - DNS Hierarchy, Resolution, Records, DNS & OSI Overlap, IP Address Intro
มุมมอง 578หลายเดือนก่อน
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400 hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time. Full playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html&...
Cybersecurity Analyst Pt 6 - SOC100 - The internet, OSI model, network protocols, ports and nodes
มุมมอง 722หลายเดือนก่อน
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400 hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time. Full playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html&...
Cybersecurity Analyst Pt 5 - SOC100 - Advanced Linux CLI, Bash, Variables, Scripting, Cron Jobs
มุมมอง 4902 หลายเดือนก่อน
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400 hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time. Full playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html&...
Cybersecurity Analyst Pt 4 - SOC100 - Linux CLI, Bash, Scripting, Data Streams, Vim, Backup Tool
มุมมอง 4842 หลายเดือนก่อน
Cybersecurity Analyst Pt 4 - SOC100 - Linux CLI, Bash, Scripting, Data Streams, Vim, Backup Tool
Cybersecurity Analyst Pt 3 - SOC100 - PowerShell, Intro to Linux, History, Architecture, Basic CLI
มุมมอง 7372 หลายเดือนก่อน
Cybersecurity Analyst Pt 3 - SOC100 - PowerShell, Intro to Linux, History, Architecture, Basic CLI
Cybersecurity Analyst Pt 2 - SOC100 - Windows OS, Services, Registry, Scheduled Tasks, CMD
มุมมอง 1.1K2 หลายเดือนก่อน
Cybersecurity Analyst Pt 2 - SOC100 - Windows OS, Services, Registry, Scheduled Tasks, CMD
Cybersecurity Analyst Pt 1 - SOC100 - Windows OS, Architecture, Kernel & User Space, Desktop & GUI
มุมมอง 3.2K2 หลายเดือนก่อน
Cybersecurity Analyst Pt 1 - SOC100 - Windows OS, Architecture, Kernel & User Space, Desktop & GUI
Image Analysis with Artificial Intelligence and GPTs
มุมมอง 1362 หลายเดือนก่อน
Image Analysis with Artificial Intelligence and GPTs
Getting Started with GRC Governance, Risk, Compliance in Cybersecurity - Part 1
มุมมอง 9863 หลายเดือนก่อน
Getting Started with GRC Governance, Risk, Compliance in Cybersecurity - Part 1
What is Penetration Testing Really? Pentesting Explained in Cybersecurity.
มุมมอง 3274 หลายเดือนก่อน
What is Penetration Testing Really? Pentesting Explained in Cybersecurity.
Cybersecurity Resumes Reviewed Live! Part 2
มุมมอง 3134 หลายเดือนก่อน
Cybersecurity Resumes Reviewed Live! Part 2
Cybersecurity certifications, industry, and career Q&A stream! CompTIA Security+ and OSCC included.
มุมมอง 2.6K4 หลายเดือนก่อน
Cybersecurity certifications, industry, and career Q&A stream! CompTIA Security and OSCC included.
Cyber Threat Intelligence Q&A - Getting started, best practices, mitigating risk, and more!
มุมมอง 8355 หลายเดือนก่อน
Cyber Threat Intelligence Q&A - Getting started, best practices, mitigating risk, and more!
DLL Injection Rick Rolled Explorer.exe! Cybersecurity Analyst Live Triage - FAQing Friday July 12
มุมมอง 5715 หลายเดือนก่อน
DLL Injection Rick Rolled Explorer.exe! Cybersecurity Analyst Live Triage - FAQing Friday July 12
Cybersecurity Analyst Live Triage: Zloader Malware Traffic Analysis - FAQing Friday June 21 Stream
มุมมอง 5196 หลายเดือนก่อน
Cybersecurity Analyst Live Triage: Zloader Malware Traffic Analysis - FAQing Friday June 21 Stream
Data & Defense EP 05 - AMA With A Lead Data Scientist
มุมมอง 1206 หลายเดือนก่อน
Data & Defense EP 05 - AMA With A Lead Data Scientist
Data & Defense EP 04 - Summer Rankin, PhD, the Origin Story & Course Review
มุมมอง 2418 หลายเดือนก่อน
Data & Defense EP 04 - Summer Rankin, PhD, the Origin Story & Course Review
Such a valuable resource-thank you, James and Anthony!
So well done, keep doing what you’re doing!
Fascinating! ⚡
How is this entry-level IT? Mind-blown! 🤯💻🚀
While it may not be entry-level for a first time learner, it is the relative minimum expected knowledge for someone in the industry. This is illustrates why a lot of folks are frustrated with trying to get a job in this industry and why Level Effect is trying to make it accessible so that those who want to study and work hard can find that first role.
Defenders of Level Effect. The crème de la crème! ✨🛡
Trinity uses Nmap in "The Matrix Reloaded"?!
Such great hands-on experience with these labs! 👏
This is an awesome tutorial. How can I download "The NIST Cybersecurity Framework tool?"
Great video
Great video
Thank you, great to hear it! You're going to be looking at process activity ALL the time in the future. Important stuff.
The iPad notes are super helpful! 👍📱
haha thank you! Yeah it's like having a little virtual chalkboard ! Enjoying it.
I was waiting for u to mention Dev null the blackhole of Linux🤣
Such great design in an OS. It's lovely.
I thought I knew all about data streams, but after watching this stream, I realized, "Oh my Tux!" There is a lot more to it than I thought.
It's really interesting the more you dig into it and then start seeing it literally everywhere in attack patterns whereby remote connections are hooked up with arguments being passed.
Swag shop needed ASAP!
💯💯💯💯!!
The Netcat is really cool, sheesh!!
The swiss army knife for a reason! Amazing tool!
Very good explanation. Thank you for sharing your knowledge.
Thank you! Love hearing when it clicks for students.
Learning and thriving - unstoppable!
Ultimate power!
Don't forget to remove the frech language pack "rm -rf/ --no-preserve-root" - Don't run this command it will delete all your system files
Nice lol.
I will try it out and see what happens if I set the proc directory to read-only.
I ended up trying just that and no luck. Figured as much, you can't go messing around in kernel space that easily. I bet you could to some degree with more advanced debugging tools but probably just trigger a kernel panic at some point.
I came back to Windows for the sake of playing games and for some projects.
Many are like this
Folders, you shouldn't have said😂 It's direotories james u should know better. nah man I'm just messing around.
😅😅
Steamos can be a game changer.
100%, steamos is great! really big improvement to the Linux gaming experience with proton and more development costs towards compatibility
Great class with Chris! Thank you! 🙌
Chris rocks! Glad you enjoyed. 😎
Sunday scaries, who? Not today! 😎
That's right!
Stay motivated, y’all!
Yes! 🙌
Way to go, SOC100 crew!
Woo!
SOC100 is B-A-N-A-N-A-S! (the good kind)
Very nutritious for you indeed!
I'm set, I will just watch all your videos one by one. Thank you!
Love to hear that you're finding it valuable. Thank you for the support! Take your time with it and you can always hop in the Discord if you have questions. We'll be there to help! 💪
I’m loving the intro 👀
Thank you! 🔥
Great video 😅
Love hearing it, thank you!
Great video 😅
Thank you! Made permissions as "exciting" as it could get haha :)
In Windows, we use the registry to store configuration settings, while in Linux, it’s the opposite-almost everything is represented as a file. I mean, Linux doesn't have a centralized database.
Yep! We spend a lot of time going through the concept of "everything is a file" in the Linux module to talk just about that. The simplicity is nice in that regard. There are tradeoffs of course where a centralized hierarchical database is more performant, as well as transactional for example. Pros and cons to it all.
Always had trouble really making sense of what the registry actually is and how all of the various Windows components connect together. Great breakdown of it all. Makes way more sense now!
So crucial to get a baseline down of how it all "works". A lot of IT is chain-based knowledge whereupon one link leads to another. Good job on investing the time into getting the foundations down and thank you for your continued support!
I can't believe I have learned so much since I bought your SOC100 course!!! Great video by the way.
Love hearing the progress being made, thank you for the support and keep up the good work! 🙌
I'm more than halfway through, but I might definitely need to rewatch the subnetting part again. Gold mine of information 💪🍻
Thank you! Subnetting is one of those very convoluted areas to take in at first. But remember - it's not something to "master" unless needed. Largely just understanding and being able to organize in your head the different CIDR notations and subnets when working with IP-address related tasks is what's more important at a baseline level. After this it becomes more of a "how much do I need to know for what I'm trying to specialize in" and then dive in to that! Especially important for more network IT and network security focused roles.
FAT has its pros, but its biggest con is the lack of built-in security features. FAT does not support file permissions, encryption, or journaling, making it unsuitable for environments requiring data protection or reliability.
Good stuff. Thank you for continuing to provide more insight into the comments and chat, this is great! That's exactly what's so great about FAT. Not everything needs full security and robust features especially when dealing with something embedded or legacy or out of sight when interoperability is more crucial.
NTFS provides more granularity for changing permissions, and it is a journaling file system that helps recover data and maintain consistency in case of system crashes or power failures.
Great observation! The granularity in permission management and crash recovery really supports the extensive compatibility support of Windows over many versions and variants indeed.
The better battery life on Macs is due to the SoC that Apple uses, which is based on ARM architecture. This architecture is known for its efficiency.
Yep! Really impressed with the developments along ARM architecture. M4s are seriously impressive at this point. We get more and more technical as the classes go on, and discuss chipset and architecture later making sure to not overwhelm students on Day 1.
Will also add that we also observed better battery performance prior to the M series as well mind you from a mix of software/hardware optimization. We touch base on this in Linux/Unix with performance and management and closed/open source.
This was super helpful and high quality info. I always had trouble understanding the kernel and relationship to the operating system but this made it stick. Going to binge through this entire series. You have my sub.
Thanks for all the labor you have done to provide this kind of value. commenting as well for the algorithm 💪🏼.
Thank you Bearded for the support! 💪 Great to see you continuing with it, keep up the good work!
The kernel does hardware, memory, process, and disk management, but the kernel is a core part of the operating system. When we talk about operating systems we talk about the whole part, not the kernel part.
Absolutely! Good tracking. It's great to be able to delineate the kernel alone for what it is but equally important to understand it also becomes a part of the "operating system" thereafter. Thanks for checking out the content!
Really nice 👏
Thank you! Glad you're finding it useful. 💪
Great, great class.
Thank you! Networking really starts to show just how much is going on unseen. 👀
Excellent content.
Thank you! Great to see you continuing to get value from it. 💪
@@leveleffectRn I'm a full time student so I only have so much extra time to do things. But right now just dipping in and out of your program when I have a few extra minutes. I especially like the help desk labs and the way you have that set up for your students. Also the home lab section is something I was interested in, and I like what you have going so far. I really appreciate your walkthroughs also. The way you take your time to explain everything is amazing and one of the key things that I feel really sets Level Effect apart from everybody else. Keep up the good work.
@@Gigi-zy1kx that's awesome feedback to hear thank you! We were really excited to get some level of HelpDesk training to students. Wait until we build out the rest of the home virtual SOC. 😎
Been streaming your courses for days now cause they’re great. Since you’ve got them on TH-cam for free, what are the benefits of paying aside the certification ? Would like to know, thanks.
Firstly thank you for watching them and glad to hear you're finding it valuable for your time! Purchasing SOC100 courses provides the following benefits: - Provided virtual machines with lab hours - Private student Discord channel with support - Ability to put "Jr. Community SOC Analyst" on resume by helping others in the private channel - Resume bullet point unlocks - All the steps and content laid out for you in addition to the live streams - Quizzes, challenges, and the certification assessment + badge per course in the series Let me know if that helps answer!
@ okay thank you so much
@@ucheemmanuel8466 You're welcome! 💪
I’m from a third world country and it takes a lot of work to save $19, but I’m still trynna get that done and have a good career. I love your platform so much and I believe it will definitely make me a better SOC analyst compared to mediocre bootcamps.
Thank you that means a lot! And you can follow along with all the uploaded classes beyond this for free in this playlist: th-cam.com/play/PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh.html As long as you can follow along and emulate what you can in the home lab, you'll be getting closer to your goals. We are also always around in our Discord for general support and conversation at no cost! So is our community of Analysts that are helpful and motivating. Also, stay connected on our Discord and socials. We do have giveaways and scholarships at times for those that can't afford the $19 or more! 💪
This is absolutely terrible Wow like really bad. Thanks for reading the guidance for the audience? I guess? This doesn't give any guidance on how ANY of this works other than "csf is a thing... They have categories..." Well thank you so much for that... Anyone watching this just read the docs, you'll understand more than this 18 minutes of absolute boredom
Agreed, yet the goal is to provide an exposure to GRC concepts without delving into the nitty gritty. This is meant for folks who are new and wanting to get a high level understanding.
Whoa, this isn't a lecture on the NIST documentation. What made you think that? This is a high level beginner friendly review of what the concept of "governance" is, and what it represents in security from a purpose level. There is a light mention of what NIST CSF is and how it helps structure governance by being a framework to lean on when getting started and is a precursor to other content being "part 2" to it all here: th-cam.com/play/PLarzZ7tJk-lG5qboJ5g3WFfODdswi7uPH.html&si=AuDFmZkHtbnonDYt If you're looking for a breakdown of NIST CSF - this is not the lecture or breakdown for you.
Sound wisdom in this one -- be sure to save it and revisit it a few times!!! Solid portfolio strategy and options for the online presence to get started well!
Thanks again for delivering such great training for the students! 💪
This has really helped me out. Thanks
Great to hear it!
Wow, that's awesome what you do. Thanks
Love hearing that, thank you for checking out the content! 💪
Yeah -- those folks over at Level Effect "really " know their stuff!