• Level Effect
  • Posts
  • Blue Team CTF, Reddit AMA, PDE (Practical Detection Engineer) Cert

Blue Team CTF, Reddit AMA, PDE (Practical Detection Engineer) Cert

May is stacked.

Hey,

Big content drops, plus a recap of where we've been since Guardian Foundry launched.

So Far…

  • Guardian Foundry went live April 7

  • Our first CTF, a business email compromise scenario, dropped April 10

  • Detection Engineering challenges rolled out May 1

  • Continuous upgrades to existing content including full endpoint triage reports

  • Full report submissions, trial gates

  • Purchasable content

  • Unified search bar for content

We've shipped something new every couple of weeks since launch, and the pace is picking up.

What's Coming!

1. Reddit AMA - May 14, 9AM EST on r/cybersecurity.

All three of us (Rob, Jonny, Anthony) on for the full 24 hours. Bring questions about hiring, mid-career moves, EDR development, training, whatever you've got.

2. Content Drop + New Cert + Live Stream Kickoff - May 15, 1PM EST

Detection Engineering quests:

  • Snort Rules for Network Intrusion Detection

  • Sigma for Vendor-Agnostic Detection

  • CI/CD Pipelines for Detection Engineering

  • Threat Hunting Through Adversary Emulation

  • Endpoint Emulation and Detection

Practical Detection Engineer (PDE) Certification

Write detections. Justify alerts. Build emulations. 16 challenges across real datasets and real TTPs. Every step instructor-reviewed. You have to prove you can earn this cert.

Stay tuned Fri morning for a social post with full cert information.

3. Blue Team CTF with Live Leaderboard + Feedback - May 22, 1PM EST

Friday May 22, 1PM EST.

First CTF with a live leaderboard. Head-to-head competition inside Foundry.

NOT JUST FLAGS!! Some will be graded with feedback with full context. This is a huge leap in the CTF experience. Being able to have to explain why your finding was correct is equally as important as finding it in the first place.

CTF details drop next week. Bring your malware analysis skills. Test your DFIR might.

4. May Developer Stream - May 28

May 28. Big developer stream this time showcasing all the features making this all work. Including the CTF, and what’s coming up next!

What Are People Saying?

Some of the feedback that's stuck with us:

"I've filled one task so far. Document cybersecurity incidents. I was able to instantly write better cases at work." — jcork4real, working through Iron Sentinel

"It's one thing to find artifacts. It's another to clearly explain what happened and why it matters. This lab forced both." — William, after Compromised Windows Endpoint Triage 1

"There are like 4 schools I'd consider worth the money for cyber. Carnegie Mellon, MIT, Purdue, Georgia Tech. School gets you the cert to get over HR. Level Effect gives you the knowledge and hands-on project to show recruiters." — Augusto

"I've been a NetEng guy for around 15 years. Held MCSE, taken CCIE Lab. Took a Cybersecurity bootcamp at USF, Security+, other things. This by far has been solid." — CrashOverride

Multiple students have also tested the Instructor On-Demand grading by feeding it off-topic answers to see what happens. It calls them out. That's exactly what it should be doing.

Haven’t tried out the platform yet? Check out our Guardian Foundry!👇

What’s next?

Content Cadence

Expect monthly:

  • First Friday = new content drops

  • Second/Third Friday = challenge / CTF, open to all then stays closed to subscribers or purchasers

  • Continued upgrade of older content into Foundry upgraded format

And more… we actually have 2 brand new courses coming to the platform by one of the top detection engineers out there. Stay tuned.

ContinuumCon!

Also a stacked list of training coming to ContinuumCon.

Got your ticket yet?

  1. Roll Your Own Analyst by Rain Jordan

  2. Killing Active Directory Attack Paths Once and For All by Spencer Alessi

  3. Hacking Over & Under The Wire by Andy Piazza

  4. Practical Security Engineering by Mark El-Khoury

  5. Prompt Injection Fundamentals & Hack-Along by Eva Benn and Andrew Bellini

  6. Escaping Sandboxes with AI by Zack Korman

  7. Instant API Hacker by Corey J. Ball

  8. Smarter AWS WAF: Reduce Noise, Detect Threats & Automate Response by Ihor S.

  9. Tactical GRC - Turning Governance Into a Force Multiplier for Security Teams by Fletus Poston III

  10. How to Analyze Malware by Matthew N.

  11. Analyzing WannaCry: A Forensic Method for Recovering Ransomware Data with Open-Source Software by Smit Nayak

  12. StegoDefender: Hunting Malware Hidden in Plain Sight - Advanced Steganography Detection & Payload Extraction by Christopher Dio C.

See you in the Foundry!

Level Effect

Reply

or to participate.