All Episodes

Displaying 21 - 40 of 65 in total

Episode 21 — Decode DNS and DHCP Mechanics That Help Devices Find Each Other

This episode explores the essential protocols that manage how devices identify themselves and locate others across a network, specifically focusing on the Domain Name ...

Episode 22 — Tell the Story of TCP, UDP, and Web Communication Handshakes

Reliable data transport is the backbone of digital communication, and this episode tells the story of the Transmission Control Protocol (T C P) and the User Datagram P...

Episode 23 — Spaced Retrieval: Network Communication Essentials as a Spoken Traffic Walkthrough

This interactive episode utilizes a spoken traffic walkthrough to reinforce the network communication essentials required for the G I S F blueprint through high-intens...

Episode 24 — Design Network Security and Architecture with Segmentation and Security Zones

Strategic architectural choices are the first line of defense in an enterprise, and this episode focuses on designing network security through the use of segmentation ...

Episode 25 — Choose Firewalls, Proxies, and Filtering Strategies in Network Security Architecture

Selecting the right defensive tools is a critical professional skill, and this episode evaluates the different types of firewalls, proxies, and filtering strategies av...

Episode 26 — Secure Remote Access with VPNs and Encrypted Tunnels Without Confusion

Remote work has made secure connectivity a primary business requirement, and this episode focuses on operationalizing Virtual Private Networks (V P N) and encrypted tu...

Episode 27 — Operationalize Zero Trust Principles in Modern Network Security and Architecture

The traditional "castle-and-moat" security model is no longer sufficient, and this episode explores the operationalization of Zero Trust principles in modern network a...

Episode 28 — Spaced Retrieval: Network Security Architecture Controls and Common Misconfigurations

This spaced retrieval session is dedicated to reinforcing your command of network security architecture controls and the common misconfigurations that can lead to orga...

Episode 29 — Strengthen Identity, Access and Data Protection with Modern Authentication and MFA

Identity is the new perimeter in cybersecurity, and this episode focuses on strengthening data protection through the use of modern authentication and Multi-Factor Aut...

Episode 30 — Clarify Authorization Decisions Using RBAC, ABAC, and Least Privilege Thinking

Once an identity has been verified, the next critical step is determining what they are allowed to do, and this episode clarifies authorization decisions using R B A C...

Episode 31 — Control Identity Lifecycle: Provisioning, Deprovisioning, and Privileged Access Management

This episode examines the critical phases of the identity lifecycle, focusing on the professional management of accounts from initial creation to final removal. We def...

Episode 32 — Deploy Data Loss Prevention Concepts: Purpose, Types, and Integration with IAM

Data Loss Prevention (DLP) acts as a final safety net for sensitive information, and this episode deconstructs its purpose, types, and integration with Identity and Ac...

Episode 33 — Spaced Retrieval: Identity, Access, and DLP Fast Recall with Mini Scenarios

This high-intensity spaced retrieval session is designed to lock in your understanding of identity, access control, and Data Loss Prevention (DLP) through rapid-fire m...

Episode 34 — Recognize Intrusion and Initial Access Techniques from Recon to Targeting

Recognizing the early stages of a cyber attack is vital for a proactive defense, and this episode explores the transition from reconnaissance to specific targeting. We...

Episode 35 — Defend Against Phishing and Social Engineering as Initial Access Gateways

The human element is often the most targeted link in the security chain, and this episode focuses on defending against phishing and social engineering as primary initi...

Episode 36 — Spot Exploitation Paths Through Vulnerabilities, Misconfigurations, and Weak Credentials

Attackers turn technical weaknesses into authorized access with surprising speed, and this episode deconstructs the exploitation paths of vulnerabilities, misconfigura...

Episode 37 — Detect Malware Delivery, Persistence Footholds, and Early Intrusion Indicators

Early detection is the key to minimizing the impact of a breach, and this episode focuses on spotting malware delivery and the persistence footholds an intruder uses t...

Episode 38 — Spaced Retrieval: Initial Access Techniques and Defensive Clues for Quick Recognition

This spaced retrieval session is designed to make attacker behaviors familiar so you can recognize them under the high stress of a real-world incident. We move through...

Episode 39 — Turn Attacker Behavior into Clear Notes with Adversary Analysis Methods

Structured documentation is essential for a coordinated response, and this episode explores how to turn messy attacker behavior into clear, actionable notes using adve...

Episode 40 — Map TTPs Using MITRE ATT&CK Within Adversary Analysis and Threat Frameworks

Standardized language is the foundation of modern threat analysis, and this episode focuses on mapping Tactics, Techniques, and Procedures (TTPs) using the MITRE ATT&C...

Broadcast by