Foundry Login Book A Call

Create an account on our custom learning platform, Foundry™, to access our free and premium content.

Create Free Account

 

New call-to-action

The Level Effect Blog

The intersection of cyber tradecraft, careers, and the latest news.

Wanna get notified of new content?

Subscribe
open_door-1

Training

2 min read

New Course: GTK Applied Data Science and Machine Learning

We couldn’t be more excited to be back on the blog to talk about a brand new course offering!

Read More

10 min read

Home Lab: Enabling and Configuring Threat Intelligence and Detections

This is part four of a four-part series on how to set up your own home lab with ELK. Read part one, part two, and part three.

Read More

7 min read

Home Lab: SIEM and Security Features

This is part two of a four-part series on how to set up your own home lab with ELK. Read part one.

Read More

9 min read

Home Lab: Ingesting Data with Agent and Fleet

This is part three of a four-part series on how to set up your own home lab with ELK. Read part one and part two.

Read More

7 min read

How to Set Up Your Own Home Lab with ELK

Note: This is a guide that I wrote for my own home lab setup. It is not using the latest version of ELK, and there are many other great ways to get an ELK stack set up using Docker, prebuilt virtual machines (VMs), and many other great projects.

Read More

4 min read

4 Tips to Develop Good Study Habits

Studying is an art as much as it is a science.

Read More

8 min read

Instructor Spotlight: Learn Cyber Defense From Former NSA Analysts

Picture this: you just moved into a new apartment with neighbors you don’t even know and on a street that you’ve never even heard of until you came across the apartment listing. One night in your first week, you forgot to lock your door.

Read More

6 min read

5 Ways DevOps Improves Security

DevOps (Development Operations) is defined in many ways, and some folks are really passionate about it. To keep terms simple, I define DevOps as a mesh between software development and software deployment operations.

Read More