Channel Avatar

Level Effect @UC6L3yW03AMM3lww5c5GcyZQ@youtube.com

1.8K subscribers - no pronouns :c

We make cybersecurity accessible and fun. Through focusing o


03:08:28
Cybersecurity Analyst Part 5 - SOC100 - Advanced Linux CLI, Bash, Variables, Scripting, Cron Jobs
04:12:46
Cybersecurity Analyst Part 4 - SOC100 - Linux CLI, Bash, Scripting, Data Streams, Vim, Backup Tool
04:12:52
Cybersecurity Analyst Part 3 - SOC100 - PowerShell, Intro to Linux, History, Architecture, Basic CLI
04:06:47
Cybersecurity Analyst Part 2 - SOC100 - Windows OS, Services, Registry, Scheduled Tasks, CMD
03:54:45
Cybersecurity Analyst Part 1 - SOC100 - Windows OS, Architecture, Kernel & User Space, Desktop & GUI
43:13
Image Analysis with Artificial Intelligence and GPTs
01:11:53
Getting Started with GRC Governance, Risk, Compliance in Cybersecurity - Part 1
01:51:54
What is Penetration Testing Really? Pentesting Explained in Cybersecurity.
02:10:17
Cybersecurity Resumes Reviewed Live! Part 2
59:18
Cybersecurity Resumes Reviewed Live!
55:40
Cybersecurity certifications, industry, and career Q&A stream! CompTIA Security+ and OSCC included.
40:21
Cyber Threat Intelligence Q&A - Getting started, best practices, mitigating risk, and more!
57:17
DLL Injection Rick Rolled Explorer.exe! Cybersecurity Analyst Live Triage - FAQing Friday July 12
01:00:59
Cybersecurity Analyst Live Triage: Zloader Malware Traffic Analysis - FAQing Friday June 21 Stream
01:12:34
Data & Defense EP 05 - AMA With A Lead Data Scientist
46:13
Data & Defense EP 04 - Summer Rankin, PhD, the Origin Story & Course Review
59:48
Data & Defense EP 03 - AMA With Two Senior Detection Engineers
31:18
Data & Defense EP 02 - Detection Engineering Origin Story
59:29
Data & Defense EP 01 - Level Effect Origin Story
14:33
Governance, Risk, Compliance GRC Lecture 1 Cyber Risk
18:29
Governance, Risk, Compliance GRC Lecture 2 Governance
10:34
Governance, Risk, Compliance GRC Lecture 3 Risk
11:58
Governance, Risk, Compliance GRC Lecture 4 Compliance
08:36
Governance, Risk, Compliance GRC Lecture 5 Asset Management
09:30
Governance, Risk, Compliance GRC Lecture 6 Configuration Management
19:27
Governance, Risk, Compliance GRC Lecture 7 Patch Management
07:51
Governance, Risk, Compliance GRC Lecture 8 Vulnerability Management
14:38
Governance, Risk, Compliance GRC Lecture 9 Vulnerability Scanning
15:56
Governance, Risk, Compliance GRC Lecture 10 Vulnerability Triage
12:52
Governance, Risk, Compliance GRC Lab 1 Cyber Risk & Maturity Assessments
07:17
Governance, Risk, Compliance GRC Lab 2 Windows Server Hardening with CIS Benchmarks
12:06
Cyber Threat Intelligence Lab 4 Cyber Kill Chain, Pyramid of Pain, Diamond Model
10:10
Cyber Threat Intelligence Lab 3 Threat Actor TTPs with MITRE ATT&CK
06:48
Cyber Threat Intelligence Lab 2 Threat Actor Report Analysis
12:25
Cyber Threat Intelligence Lab 1 Industry Breach Reports with Verizon DBIR
16:28
Cyber Threat Intelligence Lecture 3 CTI Lifecycle and MITRE ATT&CK
09:24
Cyber Threat Intelligence Lecture 2 CTI Types and Sources
15:19
Cyber Threat Intelligence Lecture 1 Cyber Threat Intelligence CTI
15:15
Logging for Security Lecture 1 Logs and Sources
13:57
Logging for Security Lecture 2 SIEM and SOAR
11:46
Logging for Security Lab 1 Windows Event Logs
04:33
Logging for Security Lab 2 Linux Logs
11:51
Logging for Security Lab 3 Intro to ELK and Queries
06:37
Logging for Security Lab 4 ELK Investigation
12:19
Logging for Security Lab 5 Intrusion Detection with YARA
08:52
Cryptography Lab 4 Digital Signatures & Certificates
09:08
Cryptography Lab 3 Asymmetric Encryption
09:05
Cryptography Lab 2 Ciphers and Symmetric Encryption
08:17
Cryptography Lab 1 Hashing and Encoding
11:16
Cryptography Lecture 2 Hashing, Encoding, Symmetric & Asymmetric Encryption
09:38
Cryptography Lecture 1 What is Cryptography?
07:17
Cryptography Lab 5 Cooking with the Cyberchef
18:51
Cybersecurity Industry Lecture 1 Contexts of Security
20:02
Cybersecurity Industry Lecture 2 Security Controls
10:06
Cybersecurity Industry Lecture 3 CIA Triad and Defense in Depth
19:07
Cybersecurity Industry Lecture 4 IAM Zero Trust and Cyber Hygiene
11:11
Cybersecurity Industry Lecture 5 Cyber Threats and Nation State Threat Actors
11:35
Cybersecurity Industry Lecture 6 Threat Actors Continued
19:04
Cybersecurity Industry Lecture 7 Threat Vectors
19:44
Networking Lecture 1 History & OSI Model