All Episodes

Displaying 141 - 160 of 185 in total

Episode 141: Principle of Least Privilege and RBAC

Security in networking isn’t just about blocking attacks—it’s about minimizing exposure by limiting what users and systems can access. In this episode, we examine the ...

Episode 142: Zero Trust and Defense in Depth Models

Zero Trust networking flips the traditional perimeter-based security model on its head. In this episode, we unpack the Zero Trust principle of “never trust, always ver...

Episode 143: Advanced Security Mechanisms — NAC, Honeypots, and Authentication Models

Beyond basic firewalls and access controls, advanced security mechanisms offer deeper visibility and proactive defense. In this episode, we explore Network Access Cont...

Episode 144: Centralized Authentication — TACACS+, RADIUS, SSO, and Directory Services

Centralized authentication simplifies user management while enhancing security. In this episode, we compare two core protocols—TACACS+ and RADIUS—and explain their rol...

Episode 145: Securing Access with 802.1X and EAP

802.1X is the gatekeeper of modern enterprise networks, ensuring only authenticated users and devices can connect. This episode explains how 802.1X works as a port-bas...

Episode 146: Risk Management, Security Assessments, and SIEM

Every security decision is about balancing risk, and in this episode, we dive into how organizations identify, measure, and manage those risks. You’ll learn the compon...

Episode 147: Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks

Denial-of-Service attacks aim to disrupt services by overwhelming a system’s resources—and understanding how they work is key to protecting against them. This episode ...

Episode 148: On-Path Attacks and DNS Poisoning — Network Compromise Techniques

On-path attacks, formerly known as man-in-the-middle attacks, are some of the most dangerous network threats. In this episode, we explain how attackers insert themselv...

Episode 149: VLAN Hopping and Layer 2 Exploits

VLANs offer segmentation—but they’re not invulnerable. In this episode, we look at how attackers can bypass VLAN boundaries using VLAN hopping techniques like double-t...

Episode 150: ARP Spoofing, MAC Spoofing, and Rogue Devices

When devices pretend to be something they’re not, serious security problems can follow. This episode focuses on spoofing attacks—specifically ARP spoofing and MAC addr...

Episode 151: Ransomware, Malware, and Password Attacks

Malicious software remains one of the most common and destructive threats to networks and users alike. In this episode, we examine different types of malware, focusing...

Episode 152: IP Spoofing, Deauthentication, and Social Engineering

Some of the most dangerous network threats don’t rely on malware—they rely on deception. In this episode, we explore IP spoofing, a method where attackers forge source...

Episode 153: Phishing, Tailgating, and Physical Threats

Security doesn’t stop at the firewall—physical access and social manipulation play a major role in network compromise. In this episode, we explore phishing in its many...

Episode 154: Network Hardening Essentials — SNMP, Router Advertisements, and Port Security

Hardening your network means reducing its attack surface and securing its services. In this episode, we look at three high-priority hardening practices: securing SNMP,...

Episode 155: Dynamic ARP Inspection, DHCP Snooping, and Control Plane Policing

Advanced network protection mechanisms focus on securing internal traffic and device behavior. This episode introduces three such features: Dynamic ARP Inspection (DAI...

Episode 156: Hardening Network Devices — Interfaces, Passwords, and Firmware Management

Securing the network starts with securing its devices. In this episode, we focus on hardening best practices for routers, switches, and firewalls. This includes disabl...

Episode 157: Firewall Rules and ACL Management

Firewalls and access control lists are the gatekeepers of your network, and understanding how to configure them correctly is essential. This episode explains how to st...

Episode 158: Advanced Wireless Security — MAC Filters, Client Isolation, and Captive Portals

Wireless networks require layered security controls to keep unauthorized users out and ensure a clean client experience. In this episode, we cover advanced wireless pr...

Episode 159: Physical Security Fundamentals — Access Control and Asset Disposal

While cyber defenses are critical, physical security is just as important. In this episode, we explain how physical access controls protect infrastructure from unautho...

Episode 160: Detection Methods and Prevention through Training

Security tools can’t catch every threat—but informed users often can. This episode looks at the balance between technical detection methods and user-driven prevention....

Broadcast by