Alerts to Adversaries
Advanced Alert Investigation for Tomorrow's Threats.
Check out our live stream where we had Jonathan Johnson, the course creator and Instructor discuss Alert Classification! and reveal this course!
This is a snippet to get a sense of what Jonny's teaching is like and the knowledge has to offer!
"As someone who's worked side-by-side with Jonny his consistent ability to communicate nuanced security concepts sets him apart. His talks blend Windows internals, contagious enthusiasm, and actionable detection content. After each talk I left feeling smarter and better equipped to approach my own work. I can’t recommend Jonny’s trainings enough for anyone with the opportunity."
"Jonathan brings his years of Windows expertise and experience developing defensive solutions to the forefront in his teaching. The breadth of his background and care towards each student creates a positive learning environment for anyone who takes his course."
"Jonathan Johnson’s content is the perfect blend of deep technical research and real-world program-building wisdom. He not only demystifies adversarial tradecraft and telemetry, but also shows how to translate detection concepts into a scalable, strategic vision for maturing security programs. It’s rare to find someone who can bridge that gap so effectively."
"Jonny and I taught dozens of classes together over several years. Jonny is an adept instructor with excellent communication skills with students, often spending time after class to continue chatting about topics of interests or in-depth questions. Even during overnight or off-hours classes, Jonny brings an unparalleled level of enthusiasm and deep research background to every session. In addition to instructing, Jonny has background and experience in content creation and development, both in slide and long-form-blog format. I wouldn't hesitate to teach with him again, and cannot recommend him enough as a resource for learning in the future."
Course Description
This is an advanced course for security analysts and engineers that goes beyond basic alert triage, equipping you with advanced techniques for alert investigation, event correlation, and adversary tracking across host and network environments.
By the end of this course, you will be able to:
-
Analyze and correlate security events to detect sophisticated cyber threats and attack patterns.
-
Leverage threat intelligence for proactive defense and adversary profiling.
-
Utilize advanced analysis tools for host, process, registry, and network investigation.
-
Apply MITRE ATT&CK frameworks, TTPs, and adversary emulation techniques for predictive defense.
-
Implement strategic methodologies for building detection capabilities and analytical workflows.
-
Execute advanced analytical practices to improve investigation efficiency and accuracy.
- Introductions
- Course Goals/Setup
- Lab 1: Setup
- SOC Methodology
- Alert Classification
- SOC and Detection Lifecycle
- Lab 2: Discovering MITRE ATT&CK
- Detection Engineering
- Operational Drift
- SOC Maturity Model
- Walkthrough a SOC Maturity Model
- Lab 3: Build Your Own SOC Maturity Model
- Introduction to Alert Investigation
- Alert Fatigue
- Classification Bias
- Lab 4: Microsoft Sentinel Setup
- Host-Based Alerting
- Introduction into Processes
- Lab 5: Discovering Processes
- Lab 6: Process Examination
- Examining Processess
- Lab 7: Investigate a Process Alert
- Introduction into Threads
- Thread Actions
- Lab 8: Thread Examination
- Lab 9: Investigate a Thread Alert
- Introduction into Files
- Introduction into the Registry
- Lab 11: Registry Examination
- Lab 12: Investigate a Registry Alert
- Introduction into Scripting
- Lab 13: Analyzing a Script-Based Alert
- Network-Based Alerting
- Networking Basics
- Lab 14: Examining Network Data
- Host-Based Network Logs
- Network Directions
- Lab 15: Investigate a Network Alert
- Introduction into Correlation
- Interprocess Communication
- Lab 16: Investigate a Named Pipe Alert
- Correlation Types
- Parent/Child Correlation
- Logon Session Correlation
- Transitional Correlation
- Lab 17: Identify the Bad Outside of the Alert
- Advanced SOC Processes
- Alert Correlation & Playbooks
- Feedback Loops
- Lab 19: Alert Feedback
The SOC Endgame Capstone is a comprehensive, multi-day culminating exercise where students apply all skills learned throughout the course to conduct real-world SOC analyst operations. You will assume the role of a SOC analyst team tasked with investigating a complex, multi-stage attack across an enterprise-like environment, correlating alerts, discovering hidden malicious activity, and providing comprehensive incident response recommendations.
This capstone simulates a realistic enterprise compromise scenario where multiple attack vectors, persistence mechanisms, and lateral movement techniques have been employed across a domain environment. Students must demonstrate proficiency in alert investigation and incident correlation while working under time pressure with potentially incomplete or misleading information.
Students that complete the capstone will be awarded a Certification after successfully completing Capstone: Project SOC Endgame.
Students will be faced with multiple alerts from various sources. They will need to:
-
Correlate and classify alerts
-
Find other malicious activity that did not fire alerts
-
Write-up Incident:
-
Maliciously Classified Alerts
-
Other activity identified
-
Detection Logic
-
Feedback (new and existing)
-
Playbook Generation Ideas
-
Containment Strategy
-
Live instruction is capped to 25 students maximum.
Each day of class will be 7-8 hours including breaks. You will go through lectures and labs. The days will be very practical lab heavy.
Please plan accordingly.
You will retain access for 1 week after the live course ends.
A full time table will be provided closer to the start date.
This course is targeted at SOC Tier 1 Analysts and up, as well as Technical Leadership that is supporting, managing, or any role adjacent to Security Operations.
At a technical level we recommend to have at least completed:
And to be familiar with the content at a minimum in:
Help is provided during class and in your private Discord channels for the duration of your training and up to 1 week after.
Your channel will be in the Level Effect Discord community.
$2500
CDA Live or On-Demand students receive a $250 discount, paying $2250.
You invest, we invest.
Your Instructor - Jonny Johnson
Founder of Johnson Security Research LLC and Principal EDR Product Researcher at Huntress.
Formerly:
-
Sr. Detection Engineering Consultant at SpecterOps
-
Sr. Threat Researcher at RedCanary
-
Sr. Threat Researcher at BinaryDefense
Interests: Windows Internals, Extracting and Exposing Telemetry, Reverse Engineering, Detection Engineering
Open-Source Author/Contributor: Atomic Test Harnesses, The Defender’s Guide, MSRPC-To-ATT&CK, TelemetrySource, JonMon

cmd.exe
with detailed event metadata like command line, PID, and timestamp.procdump
or rundll32 comsvcs.dll.
jkli.exe
(from C:\Temp
) with a network connection spawned rundll32.exe
, which in turn launched whoami /all
, suggesting suspicious process behavior chaining.FAQ
-
What hardware do I need?
All you need is a browser.
We provide the rest on our learning platform over at https://training.leveleffect.com with all virtual machines and lab time provided.
-
How do lab hours work?
Enough lab hours are provided for full in-depth learning of the content. If you need any more hours added during the duration of your training we can top you up at no charge.
-
What if I build my own lab?
You could, and we encourage you to apply what you've learned in your home lab! We don't officially provide support to your home lab however and expect you to be familiar with what is required in setting it up.
We also do have a #home-lab channel in Discord for general chat and support with the community.