All Episodes
Displaying 21 - 40 of 101 in total
Episode 21 — Wireless Hardening: Configs, Rogue APs, and WIDS/WIPS
Once you understand wireless fundamentals, the next step is learning how to harden them against misuse. This episode examines how configuration choices—SSID naming, en...
  
Episode 22 — Identity & Access Management I: AuthN vs AuthZ
Identity is the foundation of control, and this episode clarifies two of its most important pillars: authentication and authorization. You’ll hear how authentication v...
  
Episode 23 — Identity & Access Management II: Roles and Least Privilege
Building on the previous discussion, this episode moves from theory to design—showing how well-structured roles enforce control and accountability. You’ll learn how to...
  
Episode 24 — Password Policy, MFA, and Credential Hygiene
Credentials remain the front door to most systems, and this episode explores how to secure them with modern best practices. We unpack how password guidance has evolved...
  
Episode 25 — Session Management and Timeout Strategy
Once users are authenticated, managing that access safely becomes the next challenge. This episode explains how session management protects the continuity of trust whi...
  
Episode 26 — Windows Fundamentals: Filesystems and ACLs
Understanding the Windows filesystem is a cornerstone of both system administration and security analysis. This episode explains how file structures, permissions, and ...
  
Episode 27 — Windows Accounts: Users, Groups, and Privileges
Windows user management forms the identity layer of the operating system, and this episode explains how its structure enforces accountability and access control. You’l...
  
Episode 28 — Windows Domain Basics: AD Structure and Trusts
This episode dives into Active Directory (AD), the identity backbone of most enterprise Windows networks. You’ll learn how AD organizes resources into domains, trees, ...
  
Episode 29 — Group Policy: Security Settings and Enforcement
Group Policy is one of the most powerful management tools in the Windows ecosystem, and this episode shows how it translates governance into automation. You’ll learn h...
  
Episode 30 — Windows Services: RDP, SMB, IIS Hardening
Windows services provide the functionality users rely on, but they also represent key points of exposure. This episode examines three common services—Remote Desktop Pr...
  
Episode 31 — Windows Patching and Update Channels
Keeping Windows systems current is one of the most visible signs of a healthy security posture. This episode explains how Microsoft’s update ecosystem works—covering P...
  
Episode 32 — Windows Auditing: Event Logs and Policies
Auditing turns system behavior into evidence, and this episode focuses on how Windows logging makes that visibility possible. You’ll learn how audit policies determine...
  
Episode 33 — PowerShell for Security Tasks
PowerShell has become one of the most powerful tools in a Windows defender’s arsenal. This episode explores how administrators and analysts use it to automate security...
  
Episode 34 — Windows Investigation: Common Artifacts
When incidents occur, the clues often hide in plain sight across the Windows operating system. This episode guides you through where to look and what to look for when ...
  
Episode 35 — Linux Fundamentals: Files, Users, and Groups
Linux plays a major role in modern security operations, and this episode introduces its foundational structure. You’ll learn how everything in Linux—files, devices, pr...
  
Episode 36 — Linux Permissions: UGO, SUID/SGID, and Sticky Bits
Permissions are at the heart of Linux security, and this episode breaks down how the User, Group, and Other (UGO) model governs every file interaction. You’ll learn ho...
  
Episode 37 — Linux Networking: Interfaces, iptables, and nftables
This episode dives into how Linux handles network connectivity and control. You’ll learn how interfaces are configured, how IP addresses and routes are assigned, and h...
  
Episode 38 — Linux Services and Daemons: systemd Control
Behind every Linux workload runs a network of background services, or daemons, and this episode explores how systemd unifies their management. You’ll learn how systemd...
  
Episode 39 — Linux Logging: Syslog, Journald, and Log Rotation
Visibility defines resilience, and this episode explains how Linux records the events that matter. You’ll learn the roles of Syslog and Journald, how they differ, and ...
  
Episode 40 — Linux Hardening: SSH, PAM, and Auditd
Hardening Linux turns flexibility into security discipline, and this episode focuses on three pillars that make it possible: SSH, PAM, and Auditd. You’ll learn how Sec...