We make cybersecurity accessible and fun. Through focusing on practical skills and scenario-based learning, our on-demand courses and live training programs empower individuals with the skills they need to succeed in cybersecurity.
I know im on the right career path when i find this training video so good, i love being nosey and digging around I’m on a soc path and trying to find the right course I did have a look at your soc path coming up next month:)
haha yeah if you love digging around, investigating the inner workings of computer-based tech/data/problems, have some interest in human motives and adversarial focused careers - then probably a good fit! glad you're enjoying 💪
Its wicked training Enjoying the fundamentals training too I’ve applied for the vet tec too, although I’m a vet from the UK so lookong to get into soc work
@@deanhaycox awesome! those Fundamentals are pretty packed too, don't hesitate to reach out in our Discord to ask anything for them. Which program or benefits are you looking at for the vet tec side? As for SOC work - a SOC Analyst is a SOC Analyst wherever you go. Being able to triage all the common perimeter security types of incidents and events at a Tier 1 level is enough to do the work. The hardest part honestly will be the networking/brand building side to get in front of a recruiter or hiring manager so make sure you're working on that side as well.
So OSCC is a "entry" cybersecurity certification, and personally, I believe it is more than just entry level. The OSDA (OffSec Defense Analyst) is their defender course/cert. I think that is more along the lines of what the commenter was getting at and may have mixed up their acronyms.
Yeah possibly! Agreed on that "entry" cybersecurity certs are not exactly entry-level as Cybersecurity is subset of IT. Still, $899 is quite steep for that level of training in a market where entry-level Cybersecurity training is heavily saturated and ranges from free to $80 for some top tier stuff. Our Fundamentals covers arguably more in some areas at free/PWYC, TCM just launched a SOC101 that looks great for two months of sub payment, and plenty over at THM amongst good YT playlists. $899 I would argue is a price-point of the past, and brand name, even if the quality is premium.
How so? This was a conversation around mostly beginner and entry-level area of certifications with career Q&A, with a little discussion around intermediate at best.
This was absolutely awesome. It's insane how much the OS/Kernel does and how fast it executes these tasks! The high-level breakdown was pretty intriguing to hear knowing that Chrome, or any app, essentially opens immediately upon double-clicking.
It really is impressive once you break down computer operations step by step only to be marvelled at how fast and efficiently it operates in real-time before our eyes. Great to see you enjoying it! 💪
Hi. Appreciate the stream video. Good stuff. Probably not what you expected for a question/request but... The T skills conversion. Would it be possible to talk a little bit more on this topic? Maybe about what you would look for or recommend in either a role or career path that would define the skills needed for an ideal "T skill qualified candidate". Not sure if it's worth elaborating on or if you had anything else to add. I guess I can Google it. Nevermind. I'll Google it. Sorry
Happy to talk more about it and thanks for checking out the stream! no need to apologize though, googling is fine too and brings more perspective! T-Shaped professionals in Cybersecurity will vary a little differently from role to role but ultimately the point is that generalists in Cybersecurity will find themselves in a tough position trying to progress beyond SOC Tier 1 or entry-level Cybersecurity. That is because at that level your job is to be generally good in a lot of areas to handle a broad range of events at a surface level. An example would be that a T-Shaped Analyst should be good in Networking (web and Windows domain based included), System Internals (OS knowledge), Email Security, Cyber Threat Intelligence, and should have some skills using Log and Event Analysis tools. That would mean you're just about good to hop into any SOC Tier 1 type of role at that point and handle alerts coming in to determine if they require escalation or not. Now if you wanted to started becoming SOC Tier 2+ to get more into the territory of preventing these alerts from being tripped in the first place, then you're going to have to start getting stronger in one of those areas or others. That is simply because it's too much to ask for to be that good in multiple areas. It would be like saying you're looking for a plumber and welder or HVAC person all in one. There's a reason why the trades are split just as the domains in Cybersecurity are. Hope that helps!
We are moving our live streams over to Twitch from now on and will be able to bring the chat recorded into future videos for context! We have just created our channel here: www.twitch.tv/leveleffect/
This is why we are life long learners in this field. Ive been an analyst for a few years and admittedly would have had trouble getting through this alone. I might have to look into your training so I can refresh my skills and knowledge.
lol... yeah there's the "eat your vegetables, it's good for you!" portion to GRC and lecture/theory. Amount at once is key! watch 5 mins at a time, or and come back later after you've done a little hands on work in the other labs is our recommendation!
This is absolutely FANTASTIC! Thank you so much for your transparency and helping the cyber community. I am pivoting to this field and I'm so excited about your next "bootcamp" in August. I'm going through your free foundational courses now and look forward to joining you guys in August for the next CDA Program. This is exactly what I've been looking for!
Mimikatz can only be executed through a High integrity process...in that case, since you had a local admin, you should've bypassed UAC to get a the High integrity process. Then mimikatz would've worked just fine.
Another important detail. If the respond team connects via RDP to a compromised machine to further analyze it, if the attack is still ongoing, what happens is that now, the token for the user used for the RDP session by the first responder, will be generated, and as the user compromised by the attacker is local admin, that would allow the attacker to impersonate the first responder that is busy looking into the machine. Using that session, the attacker would be able to move laterally as the first responder.
Can’t wait to check out some of your other videos!!! You deserve more views! Do you know of PromoSM?? You could use it to help increase your subscribers!!!