All Episodes
Displaying 211 - 221 of 221 in total
Episode 211: Fundamentals of Penetration Testing (Domain 5)
Penetration testing goes beyond identifying vulnerabilities—it simulates real-world attacks to see how systems, defenses, and teams hold up under pressure. In this epi...

Episode 212: Penetration Testing Environments (Domain 5)
The value of a penetration test is closely tied to how realistic the environment is—and in this episode, we examine the types of environments in which pen tests are co...

Episode 213: Reconnaissance Techniques (Domain 5)
Reconnaissance is the first phase of any attack—and the first opportunity for defenders to detect malicious intent. In this episode, we break down both passive and act...

Episode 214: Effective Phishing Awareness (Domain 5)
Phishing remains one of the most effective—and dangerous—forms of cyberattack because it targets people, not systems. In this episode, we explore how to build an effec...

Episode 215: Anomalous Behavior Recognition (Domain 5)
Cyber threats often hide in plain sight, masquerading as normal user activity until they trigger something unexpected—and that’s why recognizing anomalous behavior is ...

Episode 216: User Guidance and Training (Part 1) (Domain 5)
Users are often the first and last line of defense in cybersecurity, and their success depends on clear guidance and ongoing training. In this episode, we focus on pol...

Episode 217: User Guidance and Training (Part 2) (Domain 5)
Beyond basic policy understanding, users need targeted training in key risk areas that attackers frequently exploit—especially insiders, passwords, and privileged acce...

Episode 218: User Guidance and Training (Part 3) (Domain 5)
Security training must evolve with the threat landscape—and that means addressing common but high-risk topics like removable media, social engineering, and operational...

Episode 219: Hybrid and Remote Work Security Awareness (Domain 5)
Remote and hybrid work models create new layers of security complexity—blending corporate environments with home networks, personal devices, and cloud-first workflows....

Episode 220: Security Reporting and Monitoring (Domain 5)
A well-informed workforce should be empowered not just to avoid risk—but to report it. In this episode, we explore how organizations build clear, accessible reporting ...

Episode 221: Developing and Executing Security Awareness Programs (Domain 5)
Security awareness programs don’t happen by accident—they’re built with intent, tested with feedback, and refined over time. In this final episode of the series, we wa...
