All Episodes

Displaying 211 - 221 of 221 in total

Fundamentals of Penetration Testing (Domain 5)

Penetration testing goes beyond identifying vulnerabilities—it simulates real-world attacks to see how systems, defenses, and teams hold up under pressure. In this epi...

Penetration Testing Environments (Domain 5)

The value of a penetration test is closely tied to how realistic the environment is—and in this episode, we examine the types of environments in which pen tests are co...

Reconnaissance Techniques (Domain 5)

Reconnaissance is the first phase of any attack—and the first opportunity for defenders to detect malicious intent. In this episode, we break down both passive and act...

Effective Phishing Awareness (Domain 5)

Phishing remains one of the most effective—and dangerous—forms of cyberattack because it targets people, not systems. In this episode, we explore how to build an effec...

Anomalous Behavior Recognition (Domain 5)

Cyber threats often hide in plain sight, masquerading as normal user activity until they trigger something unexpected—and that’s why recognizing anomalous behavior is ...

User Guidance and Training (Part 1) (Domain 5)

Users are often the first and last line of defense in cybersecurity, and their success depends on clear guidance and ongoing training. In this episode, we focus on pol...

User Guidance and Training (Part 2) (Domain 5)

Beyond basic policy understanding, users need targeted training in key risk areas that attackers frequently exploit—especially insiders, passwords, and privileged acce...

User Guidance and Training (Part 3) (Domain 5)

Security training must evolve with the threat landscape—and that means addressing common but high-risk topics like removable media, social engineering, and operational...

Hybrid and Remote Work Security Awareness (Domain 5)

Remote and hybrid work models create new layers of security complexity—blending corporate environments with home networks, personal devices, and cloud-first workflows....

Security Reporting and Monitoring (Domain 5)

A well-informed workforce should be empowered not just to avoid risk—but to report it. In this episode, we explore how organizations build clear, accessible reporting ...

Developing and Executing Security Awareness Programs (Domain 5)

Security awareness programs don’t happen by accident—they’re built with intent, tested with feedback, and refined over time. In this final episode of the series, we wa...

Broadcast by