Episode 32 — Network, Remote Access, and Endpoint Threat Sources (2.3)

This episode covers threat sources connected to infrastructure devices, virtualized systems, session keys, remote desktop, VNC, VPNs, mobile devices, servers, tablets, trusted devices, and built-in administrative tools. For the exam, students should recognize that attackers often target normal access paths rather than using unusual traffic that is easy to detect. Remote access services can expose credentials, weak configurations, unpatched systems, or excessive privileges, while endpoints can become entry points for malware, credential theft, or lateral movement. The episode also introduces living-off-the-land attacks, where adversaries use legitimate tools such as scripting utilities, remote management features, or administrator consoles for malicious activity. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!
Episode 32 — Network, Remote Access, and Endpoint Threat Sources (2.3)
Broadcast by