Episode 62 — Web Communication Security I: HTTPS, Cookies, and Sessions
Web traffic security is at the core of modern cyber defense, and this episode unpacks how HTTPS, cookies, and sessions protect—or sometimes expose—data in transit. You’ll learn how HTTPS builds on TLS to ensure encryption, authentication, and integrity, and how browser indicators help users verify secure connections. The discussion explores how cookies maintain state in the otherwise stateless HTTP protocol, explaining attributes like Secure, HttpOnly, and SameSite that guard against theft or misuse. We also clarify how session IDs tie these elements together, representing authenticated users within an application.
Listeners will then explore how these mechanisms can fail—through weak session handling, mixed content, or expired certificates—and what administrators can do to prevent exploitation. The episode demonstrates how developers can enforce secure flags, use short session lifetimes, and avoid transmitting sensitive data through cookies altogether. These lessons connect directly to GSEC objectives and real-world defense techniques that protect credentials, prevent hijacking, and keep data safe as it moves across the web. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.