All Episodes

Displaying 81 - 91 of 91 in total

Episode 81 — Gain Linux Security Visibility: Auditing, Logs, and Evidence of Misuse

This episode explains how Linux visibility is built from auditing, logging, and disciplined evidence collection, and why GSEC questions often hinge on recognizing whic...

Episode 82 — Harden Linux Systems Safely: Services, Secure Defaults, and Verification Habits

This episode focuses on Linux hardening as a controlled, testable process that reduces attack surface while keeping systems usable, which matches the GSEC emphasis on ...

Episode 83 — Secure Linux Remote Access: SSH Configuration, Keys, MFA, and Safe Admin Patterns

This episode explains how SSH becomes either a secure administrative channel or a recurring breach path, and it aligns with GSEC questions that test whether you can se...

Episode 84 — Secure Containers Correctly: Images, Registries, Isolation Limits, and Runtime Controls

This episode teaches container security as a lifecycle problem that starts with image trust and continues through runtime enforcement, which is increasingly relevant t...

Episode 85 — Understand macOS Security Features: Gatekeeper, SIP, Sandboxing, and Encryption

This episode explains macOS security mechanisms in practical terms and ties them to the GSEC expectation that you can identify what a platform feature protects against...

Episode 86 — Understand Windows Security Infrastructure: Accounts, Groups, Domains, and Trust Relationships

This episode builds an exam-ready understanding of Windows security infrastructure by focusing on how accounts, groups, and domain relationships determine access and a...

Episode 87 — Apply Windows Access Controls Correctly: NTFS, Shares, Registry, AD, and Privileges

This episode explains Windows access controls as layered enforcement mechanisms that must align, which is a common GSEC exam trap when questions mix NTFS permissions, ...

Episode 88 — Enforce Windows Security Policy: Group Policy Concepts and INF Template Thinking

This episode focuses on Windows policy enforcement through Group Policy concepts and template-style configuration thinking, aligning with GSEC questions that test whet...

Episode 89 — Audit Windows and Use PowerShell Safely: Telemetry, Basics, and Forensic Readiness

This episode explains Windows auditing and PowerShell safety as two sides of the same operational reality: PowerShell is a legitimate admin tool and a common attacker ...

Episode 90 — Exam Acronyms and Essential Terms: High-Yield Glossary for GIAC GSEC

This episode consolidates high-yield acronyms and essential terms into a practical exam-readiness review, focusing on precision and context because GSEC questions ofte...

Welcome to the SANS GSEC Audio Course

Broadcast by