All Episodes

Displaying 21 - 40 of 91 in total

Episode 21 — Make Email Protocols Make Sense: SMTP, IMAP, POP, and Typical Exploits

This episode explains the core email protocols in practical terms and ties them to common GSEC exam scenarios involving credential theft, spoofing, and misconfiguratio...

Episode 22 — Understand HTTP Mechanics Clearly: Methods, Headers, Cookies, and Sessions

This episode builds a clean, exam-ready understanding of how HTTP works and why web mechanics are a security topic, not just a developer concern. You’ll review common ...

Episode 23 — Prevent Network Exposure Mistakes: NAT, Port Forwarding, and Shadow IT Risks

This episode focuses on the exposure mistakes that show up constantly in real incidents and frequently in GSEC questions that ask why an internal system became reachab...

Episode 24 — Design Defensible Networks: Zones, Segmentation, and Trust Boundaries That Hold

This episode explains network zoning and segmentation as a way to control blast radius and enforce policy, and it targets the GSEC skill of selecting architectures tha...

Episode 25 — Build Monitoring-Ready Architecture: Where to Collect Signals and Why It Works

This episode teaches monitoring as an architectural decision, not a tool purchase, which aligns with GSEC questions that test where visibility should be placed to dete...

Episode 26 — Resist Intrusion by Design: Egress Control, Chokepoints, and Lateral Movement Barriers

This episode explains why many defenses fail after the first compromise and how to design networks so attackers cannot move freely or exfiltrate quietly, a frequent GS...

Episode 27 — Control Remote Administration Safely: Jump Hosts, Bastions, and Management Networks

This episode covers secure remote administration patterns and explains why GSEC often treats management access as a separate risk domain from user access. You’ll defin...

Episode 28 — Use Network Security Devices Correctly: Firewalls, NIDS, NIPS, and Real Limits

This episode clarifies what core network security devices do, what they do not do, and how GSEC questions often test whether you can choose the right device for the ri...

Episode 29 — Write Firewall Rules That Survive Reality: Defaults, Exceptions, and Change Control

This episode teaches firewall rule quality as a discipline that directly affects both security and availability, and it targets GSEC scenarios where the “most secure” ...

Episode 30 — Understand Stateful Inspection Clearly: Sessions, Flows, and Policy Enforcement Reality

This episode explains stateful inspection as the mechanism that lets many firewalls enforce policy based on connection context, which is a common GSEC concept embedded...

Episode 31 — Tune Detection Thoughtfully: Signatures, Anomalies, False Positives, and Coverage Gaps

This episode explains how detection really works in practice and why the GSEC exam expects you to understand the strengths and limits of signature-based and anomaly-ba...

Episode 32 — Place Sensors with Purpose: Visibility, Encryption Limits, and Practical Tradeoffs

This episode teaches sensor placement as a design decision that shapes what you can prove during an investigation, which is a common GSEC theme hidden inside “why didn...

Episode 33 — Understand Endpoint Security Devices: Endpoint Firewalls, HIDS, HIPS, and Use Cases

This episode clarifies what endpoint security controls actually do on a host and why GSEC questions often test whether you can pick the right endpoint control for the ...

Episode 34 — Harden Endpoints with Confidence: Baselines, Patch Discipline, and Configuration Integrity

This episode focuses on endpoint hardening as a repeatable process that reduces attack surface and improves resilience, which aligns to GSEC questions that ask for the...

Episode 35 — Build Endpoint Visibility: What to Log, What to Alert, and What to Trust

This episode builds a practical approach to endpoint telemetry and explains why the GSEC exam expects you to distinguish between “we have logs” and “we can investigate...

Episode 36 — Control Application Execution: Allowlisting, Script Controls, and Common Bypass Patterns

This episode explains application execution control as a direct defense against malware and living-off-the-land abuse, and it targets GSEC scenarios where attackers su...

Episode 37 — Grasp Cryptography Goals: Confidentiality, Integrity, Authenticity, and Non-Repudiation

This episode establishes the core goals of cryptography and shows how GSEC questions often test whether you can match a security objective to the correct cryptographic...

Episode 38 — Understand Symmetric Cryptography: Keys, Modes, and Common Misuse That Breaks Security

This episode explains symmetric cryptography in a way that supports both exam answers and real implementation decisions, focusing on what symmetric encryption is good ...

Episode 39 — Understand Asymmetric Cryptography: Keypairs, Trust, and Where Confusion Causes Failure

This episode covers asymmetric cryptography as the foundation for modern trust and secure exchange, and it targets the GSEC requirement that you understand how keypair...

Episode 40 — Use Hashing Correctly: Digests, Salts, HMAC, and Integrity Without False Confidence

This episode explains hashing as a tool for integrity and secure comparison, and it aligns to GSEC questions that probe whether you understand what hashes can and cann...

Broadcast by