All Episodes

Displaying 41 - 60 of 101 in total

Episode 41 — Bash for Security Automation

Automation turns routine security work into scalable process, and Bash scripting remains one of the simplest and most flexible tools for doing just that. This episode ...

Episode 42 — Linux Incident Basics: Triage and Artifacts

When something goes wrong on a Linux system, knowing where to start determines how much truth you recover. This episode walks you through initial triage—stabilizing th...

Episode 43 — Endpoint Security I: EPP, HIDS/HIPS, Firewalls

Endpoint protection remains the front line of enterprise defense, and this episode explores the major technologies that define it. You’ll learn how Endpoint Protection...

Episode 44 — Endpoint Security II: Application Control and Sandboxing

The most effective security often focuses on what is allowed, not just what is blocked. This episode explains how application control enforces that principle by restri...

Episode 45 — Browser and Email Client Hardening

Browsers and email clients are constant targets because they sit at the crossroads of user behavior and external content. This episode explains how to harden both by r...

Episode 46 — Mobile Device Security: MDM, BYOD, and App Risks

Mobile devices blur the line between personal convenience and corporate exposure, and this episode explores how to manage that balance. You’ll learn how Mobile Device ...

Episode 47 — macOS Security Essentials and Hardening

Apple systems may be known for their usability, but they still demand deliberate hardening. This episode explains how macOS implements security through layered control...

Episode 48 — Network Security Devices I: Firewalls and Policy

Firewalls remain the cornerstone of perimeter defense, and this episode explores how they’ve evolved from simple packet filters to context-aware enforcement engines. Y...

Episode 49 — Network Security Devices II: IDS/IPS and Placement

Detection depends on visibility, and this episode explores how Intrusion Detection and Prevention Systems (IDS/IPS) turn network data into actionable security signals....

Episode 50 — Proxies, Gateways, and CASB Basics

This episode focuses on the middlemen of modern connectivity—devices and services that inspect, control, and secure traffic before it reaches its destination. You’ll l...

Episode 51 — Zero Trust Networking: Principles to Practice

Zero Trust has become one of the most discussed—and misunderstood—security models in recent years. This episode breaks down the concept into its practical core: never ...

Episode 52 — Logging Fundamentals: What, Where, and Why

Good logging turns invisible activity into actionable intelligence. This episode explains what to log, where to collect it, and why retention matters. You’ll learn how...

Episode 53 — Log Normalization and Time Synchronization (NTP)

Log normalization and time synchronization may sound like technical housekeeping, but they’re the foundation of credible analytics. This episode unpacks how normalizat...

Episode 54 — SIEM Use Cases: Alerts, Detections, and Tuning

A Security Information and Event Management (SIEM) platform is only as valuable as the detections it produces. This episode examines how SIEM systems aggregate, correl...

Episode 55 — Building Dashboards and Triage Routines

Dashboards transform raw data into visual understanding, and this episode explains how to design them for clarity and purpose. You’ll learn how to select metrics, defi...

Episode 56 — Retention, Chain of Custody, and Privacy Considerations

This episode explores what happens after logs and evidence are collected—the policies that determine how long to keep them, how to protect them, and how to handle priv...

Episode 57 — Cryptography I: Core Concepts and Threats

Encryption is the language of confidentiality, and this episode introduces the principles that make it work. You’ll learn the core goals of cryptography—confidentialit...

Episode 58 — Cryptography II: Symmetric, Asymmetric, and Hashing

Building on the previous episode, this discussion dives into the main families of cryptographic systems. You’ll learn how symmetric encryption uses a single shared key...

Episode 59 — PKI and Certificates: CA, CRL, and OCSP

Public Key Infrastructure (PKI) brings order to digital trust, and this episode unpacks how it works from the inside out. You’ll learn how certificate authorities (CAs...

Episode 60 — TLS in Practice: Ciphers, Versions, and Configs

Transport Layer Security (TLS) is the protocol that makes online trust visible to users, and this episode breaks down how it actually works. You’ll learn how TLS estab...

Broadcast by