All Episodes
Displaying 41 - 60 of 119 in total
Episode 41 — Social Engineering Indicators: Smishing, Vishing, Whaling, Quishing, and Deepfakes
This episode explains social engineering indicators across message, voice, executive-targeted, QR-code, impersonation, and synthetic media attacks. Students should und...
Episode 42 — Indicators of Compromise: Hashes, Domains, Timestamps, Log Manipulation, and Impossible Travel
This episode covers indicators of compromise as clues that help analysts connect events to malicious activity. Students should understand how hashes can identify known...
Episode 43 — Application Attacks: Injection, Buffer Overflow, Replay, Privilege Escalation, Forgery, and Traversal
This episode explains common application attack indicators and what attackers are trying to accomplish when they exploit application weaknesses. Injection attacks atte...
Episode 44 — Credential Attacks: Password Spraying, Brute Force, User Enumeration, and MFA Bypass
This episode covers credential attack patterns and how they differ in visibility, speed, and detection. Password spraying uses a small number of common passwords acros...
Episode 45 — AI Threats: Model Manipulation, Poisoning, and Prompt Injection
This episode introduces AI security threats at a Security+ level, focusing on how attackers may manipulate models, poison data, or use prompt injection to influence ou...
Episode 46 — AI Failure Risks: Data Loss, Bias, Explainability, Hallucinations, and Ethics
This episode explains AI risks that can occur even when there is no traditional attacker. Data loss may happen when sensitive information is entered into tools, retain...
Episode 47 — AI Abuse: Jailbreaking, Evasion, Privacy, Session Hijacking, and Code Execution
This episode covers ways AI-enabled systems can be abused when boundaries, permissions, or integrations are weak. Jailbreaking attempts to bypass safety or policy rest...
Episode 48 — Architecture Models: Cloud, On-Premises, Hybrid, Private, Public, and Community Cloud
This episode compares major architecture and deployment models and the security responsibilities each creates. On-premises environments usually give the organization m...
Episode 49 — Serverless, Multicloud, and Infrastructure as Code
This episode explains serverless computing, multicloud environments, and infrastructure as code as modern architecture concepts with important security implications. S...
Episode 50 — OT, Air-Gapped Networks, Microservices, and Segmentation
This episode covers operational technology, air-gapped networks, microservices, and segmentation as architecture choices that affect isolation, monitoring, and risk. O...
Episode 51 — Technical Architecture Tradeoffs: Availability, Resilience, Open Source, and Usability (3.1)
This episode explains how technical architecture decisions create tradeoffs across availability, resilience, responsibility, compute, power, recovery, and usability. F...
Episode 52 — Business Architecture Tradeoffs: Data Sovereignty, Classification, Cost, and Ownership (3.1)
This episode covers business architecture tradeoffs that influence secure design beyond purely technical preferences. Students should understand how data sovereignty a...
Episode 53 — Scalability, Environmental Requirements, Risk, and Recovery Decisions (3.1)
This episode explains how scalability, environmental needs, risk, and recovery expectations influence secure architecture. Scalability means a system can grow to meet ...
Episode 54 — Infrastructure Protection: Device Placement, Security Zones, Attack Surface, and Diversity (3.2)
This episode introduces infrastructure protection by focusing on where controls are placed and how environments are divided. Students should understand that device pla...
Episode 55 — Zero Trust Architecture: User, Device, and Application Decisions (3.2)
This episode explains Zero Trust architecture as a practical design approach where access decisions are based on identity, device health, application sensitivity, cont...
Episode 56 — Secure Access: VPNs, Remote Access, Tunneling, and Encrypted Messaging (3.2)
This episode covers secure access technologies used to protect communication and allow users to reach systems from different locations. VPNs create encrypted connectio...
Episode 57 — Out-of-Band Management, File Transfer, and Security Service Edge (3.2)
This episode explains out-of-band management, secure file transfer, and Security Service Edge as architecture concepts tied to secure operations and access. Out-of-ban...
Episode 58 — Identity Architecture: gMSAs, Least Privilege Accounts, Privilege Creep, and Failure Modes (3.2)
This episode covers identity architecture as a core part of secure system design, especially where service accounts and administrative access are involved. Group manag...
Episode 59 — Data Types and States: Structured, Unstructured, At Rest, In Use, and In Transit (3.3)
This episode explains data types and data states, which are central to choosing the correct protection method. Structured data is organized in predictable formats such...
Episode 60 — Data Classification: Public to Top Secret, Sensitive to Restricted (3.3)
This episode covers data classification labels and how they guide security decisions. Students should recognize common labels such as public, sensitive, confidential, ...