All Episodes

Displaying 61 - 80 of 137 in total

Episode 61: Secure Routing and Switching

Secure routing and switching are foundational elements of network security. In this episode, we explore how routers and switches operate, and how attackers exploit the...

Episode 63: Wireless Network Security (WEP, WPA2/3, 802.1X)

Wireless networks present a unique set of vulnerabilities due to their reliance on open air transmission. In this episode, we examine wireless security protocols and c...

Episode 64: VOIP and Secure Communication Channels

Voice over IP (VOIP) technologies have replaced traditional telephony in many organizations, but they come with their own set of security concerns. This episode explor...

Episode 65: Network Address Translation and Proxy Usage

NAT and proxy servers play important roles in hiding internal IP addresses, enforcing access policies, and controlling traffic flow. In this episode, we explore how Ne...

Episode 66: Network Monitoring and Traffic Analysis

Continuous monitoring and traffic analysis are essential for detecting threats, performance issues, and policy violations. In this episode, we explore tools and techni...

Episode 67: Zero Trust and Software-Defined Networking (SDN)

Zero Trust has emerged as a powerful model for modern cybersecurity, shifting the focus from perimeter defenses to granular, identity-centric control. In this episode,...

Episode 68: Content Delivery Networks and Edge Security

Content Delivery Networks (CDNs) accelerate access to web content by distributing it across global edge nodes, but they also introduce new attack surfaces. In this epi...

Episode 69: Cloud Network Security (CASB, SASE, Virtual Firewalls)

As more organizations move to the cloud, network security must evolve. This episode focuses on cloud-native controls including Cloud Access Security Brokers (CASB), Se...

Episode 70: DDoS Protection and High Availability Networks

Distributed Denial of Service (DDoS) attacks are designed to overwhelm systems and take down critical services. In this episode, we explain how these attacks work—volu...

Episode 71: Authentication Factors and Methods

Authentication is the process of verifying identity, and it forms the first line of defense in access control. In this episode, we explore the different authentication...

Episode 72: Identity Proofing and Registration Processes

Before you can authenticate someone, you must first establish their identity through a process called identity proofing. In this episode, we cover how identity proofin...

Episode 73: Authorization Techniques: RBAC, ABAC, MAC, DAC

Once a user’s identity is authenticated, the system must decide what they are allowed to do. This episode focuses on common authorization models: Role-Based Access Con...

Episode 74: IAM Lifecycle and Governance

Identity and Access Management (IAM) is not just about technology—it’s a continuous lifecycle that requires strong governance. This episode walks through each stage of...

Episode 75: Password Policy Design and Management

Passwords remain one of the most widely used—but frequently abused—authentication methods. In this episode, we explore how to design and manage effective password poli...

Episode 76: Biometric Authentication Strengths and Weaknesses

Biometric authentication uses unique physical or behavioral traits—like fingerprints, facial features, or voice—to verify identity. In this episode, we explore how bio...

Episode 77: Federation and SSO: SAML, OAuth, OpenID

Federated identity systems allow users to authenticate across multiple platforms using a single identity, often enabling Single Sign-On (SSO). In this episode, we expl...

Episode 78: Privileged Access Management (PAM)

Privileged accounts have elevated access and are among the most targeted assets in any organization. In this episode, we examine Privileged Access Management (PAM) sol...

Episode 79: Directory Services: LDAP, Active Directory

Directory services are centralized databases that store and manage user credentials, permissions, and group memberships. In this episode, we explore how Lightweight Di...

Episode 80: Multi-Factor Authentication and Implementation

Multi-Factor Authentication (MFA) significantly strengthens identity verification by requiring more than one authentication factor. In this episode, we break down the ...

Broadcast by