All Episodes

Displaying 21 - 40 of 101 in total

Episode 21 — Wireless Hardening: Configs, Rogue APs, and WIDS/WIPS

Once you understand wireless fundamentals, the next step is learning how to harden them against misuse. This episode examines how configuration choices—SSID naming, en...

Episode 22 — Identity & Access Management I: AuthN vs AuthZ

Identity is the foundation of control, and this episode clarifies two of its most important pillars: authentication and authorization. You’ll hear how authentication v...

Episode 23 — Identity & Access Management II: Roles and Least Privilege

Building on the previous discussion, this episode moves from theory to design—showing how well-structured roles enforce control and accountability. You’ll learn how to...

Episode 24 — Password Policy, MFA, and Credential Hygiene

Credentials remain the front door to most systems, and this episode explores how to secure them with modern best practices. We unpack how password guidance has evolved...

Episode 25 — Session Management and Timeout Strategy

Once users are authenticated, managing that access safely becomes the next challenge. This episode explains how session management protects the continuity of trust whi...

Episode 26 — Windows Fundamentals: Filesystems and ACLs

Understanding the Windows filesystem is a cornerstone of both system administration and security analysis. This episode explains how file structures, permissions, and ...

Episode 27 — Windows Accounts: Users, Groups, and Privileges

Windows user management forms the identity layer of the operating system, and this episode explains how its structure enforces accountability and access control. You’l...

Episode 28 — Windows Domain Basics: AD Structure and Trusts

This episode dives into Active Directory (AD), the identity backbone of most enterprise Windows networks. You’ll learn how AD organizes resources into domains, trees, ...

Episode 29 — Group Policy: Security Settings and Enforcement

Group Policy is one of the most powerful management tools in the Windows ecosystem, and this episode shows how it translates governance into automation. You’ll learn h...

Episode 30 — Windows Services: RDP, SMB, IIS Hardening

Windows services provide the functionality users rely on, but they also represent key points of exposure. This episode examines three common services—Remote Desktop Pr...

Episode 31 — Windows Patching and Update Channels

Keeping Windows systems current is one of the most visible signs of a healthy security posture. This episode explains how Microsoft’s update ecosystem works—covering P...

Episode 32 — Windows Auditing: Event Logs and Policies

Auditing turns system behavior into evidence, and this episode focuses on how Windows logging makes that visibility possible. You’ll learn how audit policies determine...

Episode 33 — PowerShell for Security Tasks

PowerShell has become one of the most powerful tools in a Windows defender’s arsenal. This episode explores how administrators and analysts use it to automate security...

Episode 34 — Windows Investigation: Common Artifacts

When incidents occur, the clues often hide in plain sight across the Windows operating system. This episode guides you through where to look and what to look for when ...

Episode 35 — Linux Fundamentals: Files, Users, and Groups

Linux plays a major role in modern security operations, and this episode introduces its foundational structure. You’ll learn how everything in Linux—files, devices, pr...

Episode 36 — Linux Permissions: UGO, SUID/SGID, and Sticky Bits

Permissions are at the heart of Linux security, and this episode breaks down how the User, Group, and Other (UGO) model governs every file interaction. You’ll learn ho...

Episode 37 — Linux Networking: Interfaces, iptables, and nftables

This episode dives into how Linux handles network connectivity and control. You’ll learn how interfaces are configured, how IP addresses and routes are assigned, and h...

Episode 38 — Linux Services and Daemons: systemd Control

Behind every Linux workload runs a network of background services, or daemons, and this episode explores how systemd unifies their management. You’ll learn how systemd...

Episode 39 — Linux Logging: Syslog, Journald, and Log Rotation

Visibility defines resilience, and this episode explains how Linux records the events that matter. You’ll learn the roles of Syslog and Journald, how they differ, and ...

Episode 40 — Linux Hardening: SSH, PAM, and Auditd

Hardening Linux turns flexibility into security discipline, and this episode focuses on three pillars that make it possible: SSH, PAM, and Auditd. You’ll learn how Sec...

Broadcast by