Imagen de portada del espectáculo CyberCode Academy

CyberCode Academy

Podcast de CyberCode Academy

inglés

Tecnología y ciencia

Oferta limitada

2 meses por 1 €

Después 4,99 € / mesCancela cuando quieras.

  • 20 horas de audiolibros / mes
  • Podcasts solo en Podimo
  • Podcast gratuitos
Empezar

Acerca de CyberCode Academy

Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.Study anywhere, anytime — and level up your skills with CyberCode Academy.🚀 Learn. Code. Secure.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy

Todos los episodios

245 episodios

Portada del episodio Course 35 - Footprinting and Reconnaissance | Episode 1: Methodology, OSINT Tools, and Lab Setup

Course 35 - Footprinting and Reconnaissance | Episode 1: Methodology, OSINT Tools, and Lab Setup

In this lesson, you’ll learn about: footprinting, OSINT, and setting up a penetration testing lab1. Penetration Testing Methodology🔹 The First Rule: Legal Scope * Before any testing: * Define scope clearly * Get explicit permission 👉 Why it matters: * Protects you legally * Defines what systems you can test * Prevents unauthorized access issues 2. Footprinting & Reconnaissance🔹 Definition * The process of gathering information about a target before attacking 🔹 Types of Footprinting🟢 Passive Footprinting * No direct interaction with the target * Uses publicly available data 🔴 Active Footprinting * Direct engagement with the target * Higher risk of detection 🌐 OSINT (Open Source Intelligence) * Collecting intelligence from: * Public databases * Websites * Social platforms 3. Essential OSINT & Footprinting Tools🔹 Basic Network Tools * nslookup * DNS records and IP resolution * whois * Domain registration and ownership details 🔹 Search & Intelligence Platforms * Shodan * Discover exposed devices and services 🔹 Visual Intelligence Tool * Maltego * Maps relationships between: * Domains * Emails * Infrastructure 🔹 Website Analysis * HTTrack * Clone websites for offline analysis 🔹 Advanced Recon Frameworks * Recon-ng * theHarvester 👉 Used for: * Automated data collection * Email harvesting * Domain intelligence 4. Building a Safe Lab Environment🔹 Why You Need a Lab * Avoid testing on real systems * Practice safely and legally * Simulate real-world attacks 🔹 Virtualization Platform * Oracle VM VirtualBox 👉 Important: * Install: * Base platform * Extension Pack 🔹 Operating System for Pentesting * Kali Linux 👉 Includes: * Pre-installed security tools * Ready-to-use environment 5. Troubleshooting Setup * Always: * Follow guides specific to your OS (Windows / Linux / Mac) * Check virtualization support (VT-x / AMD-V) Key Takeaways * Always start with scope and permission * Footprinting is the foundation of pentesting * OSINT provides powerful public intelligence * Tools automate and enhance data gathering * A lab environment is essential for safe practice Big PictureThis phase is where you:👉 Move from zero knowledge → complete visibility * Understand the target * Map the attack surface * Prepare for deeper testing Mental Model * Methodology → “What am I allowed to do?” * Footprinting → “What can I learn?” * Lab → “Where can I practice safely?” You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

Ayer - 14 min
Portada del episodio Course 34 - Cybersecurity Kill Chain | Episode 4: Command, Objectives, and Defense in Depth

Course 34 - Cybersecurity Kill Chain | Episode 4: Command, Objectives, and Defense in Depth

In this lesson, you’ll learn about: Command & Control (C2), Actions on Objectives, and Defense in Depth1. Command & Control (C2) Phase🔹 Definition * The stage where an attacker establishes a communication channel with a compromised system 🔹 Purpose * Send commands to the infected machine * Receive exfiltrated data * Maintain persistent remote access 🔹 Evasion Techniques * Attackers disguise communication as normal traffic 👉 Example: * Using platforms like: * Twitter * Why this works: * Traffic appears legitimate * Blends into normal user behavior * Harder for detection systems to flag 2. Actions on Objectives (Final Goal)🔹 Definition * The phase where the attacker achieves their intended objective 🔹 Common Targets * Sensitive data such as: * Financial records * Credit card data * Credentials * Intellectual property 🔹 Attacker Behavior * Operate stealthily * Maintain long-term access * Avoid detection while extracting value 3. Defense in Depth🔹 Definition * A layered security strategy designed to protect systems at multiple levels 🔹 Framework * Cyber Defense Matrix 4. Six Core Defensive Actions🛡️ Detect * Identify malicious or suspicious activity 🚫 Deny * Prevent unauthorized access ⚡ Disrupt * Interrupt attacker operations 📉 Degrade * Reduce the effectiveness of the attack 🎭 Deceive * Mislead attackers (e.g., honeypots, fake assets) 🔒 Contain * Limit the spread and impact of an attack 5. Why Defense in Depth Matters * No single security control is sufficient * Attacks occur in multiple stages 👉 Effective defense must: * Cover every phase of the Cyber Kill Chain Key Takeaways * C2 enables attackers to remotely control compromised systems * Attackers often hide communication within legitimate traffic * Actions on Objectives is where real damage or data theft occurs * Defense in Depth provides layered protection across all stages * Security should be proactive, not reactive Big Picture👉 This is the final stage of the attack lifecycle: * C2 → Control the system * Actions → Achieve the objective * Defense → Detect, limit, and stop the attack You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

21 de may de 2026 - 19 min
Portada del episodio Course 34 - Cybersecurity Kill Chain | Episode 3: Delivery, Exploitation, and Installation

Course 34 - Cybersecurity Kill Chain | Episode 3: Delivery, Exploitation, and Installation

In this lesson, you’ll learn about: Delivery, Exploitation, and Installation in the Cyber Kill Chain1. Delivery Phase (Getting the Payload to the Target)🔹 Definition * The process of transferring the malicious payload to the victim 🔹 Common Delivery Methods📡 Technical Methods * Using exposed services: * FTP uploads * Web downloads 💾 Physical Methods * Infected USB drives left in: * Offices * Public places 🎭 Social Engineering (Most Effective) * Tool: * Social Engineering Toolkit (SET) * Used for: * Spear-phishing campaigns * Mass phishing emails 👉 Key idea: * Trick the user into executing the payload themselves 2. Exploitation Phase (Triggering the Attack)🔹 Definition * The moment the payload: * executes successfully * bypasses security controls 🔹 How Exploitation Happens * Exploiting: * Software vulnerabilities * Misconfigurations 🔹 Most Common Weakness👉 Human behavior * Clicking malicious links * Entering credentials on fake pages 3. Installation Phase (Maintaining Access)🔹 Definition * Establishing a persistent foothold on the system 🔹 Goal * Ensure attacker can: * Reconnect anytime * Maintain control 🔹 Common Concept * Installing: * Backdoors * Persistent malware 🔹 Tool Example * Metasploit * Used to: * Set up a listener * Wait for incoming connection from victim 👉 Once connected: * A session is opened * Attacker gains remote control 4. Exploitation vs Installation (Key Difference)PhasePurposeResultExploitationBreak into the systemInitial accessInstallationStay inside the systemPersistent access5. Full Flow Understanding * Delivery * Gets payload to victim * Exploitation * Executes payload successfully * Installation * Keeps long-term access Key Takeaways * Delivery relies heavily on social engineering * Exploitation is about triggering execution * Installation ensures persistence * Humans are often the weakest link * Tools automate the process, but logic remains consistent Big PictureThese phases represent:👉 From sending the attack → to owning the system * Delivery = Entry point * Exploitation = Break-in * Installation = Persistence Mental ModelThink of it like: * Delivery → “Send the package” * Exploitation → “Open the door” * Installation → “Stay inside the house” You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

20 de may de 2026 - 20 min
Portada del episodio Course 34 - Cybersecurity Kill Chain | Episode 2: Active Reconnaissance and Weaponization Strategies

Course 34 - Cybersecurity Kill Chain | Episode 2: Active Reconnaissance and Weaponization Strategies

In this lesson, you’ll learn about: Active Reconnaissance and Weaponization in the Cyber Kill Chain1. Transition: From Recon to Action * After passive recon, attackers move to: * Active Reconnaissance → direct interaction * Then → Weaponization → building attack tools 👉 This is the shift from: * Collecting information → Preparing the attack 2. Active Reconnaissance (Deep Target Profiling)🔹 Definition * Directly interacting with the target system to gather: * Technical details * Human-related intelligence 🔹 Technical Techniques * Port Scanning & Fingerprinting * Tools: * Nmap * Zenmap * Discover: * Open ports * Running services * Operating system * Web Application Analysis * Tools: * Burp Suite * OWASP ZAP * Identify: * Hidden endpoints * Admin panels * Vulnerabilities 🔹 Non-Technical Techniques * Social engineering using: * LinkedIn * Facebook * Build: * Spear-phishing attacks * Highly targeted emails/messages * Based on real employee data 3. Weaponization Phase🔹 Definition * Building the attack payload based on gathered intel 👉 Important: * No interaction with the victim yet * Happens entirely on the attacker’s side 4. Why Reconnaissance Matters Here * Good recon → precise payload * Poor recon → failed attack 👉 Example: * If attacker knows: * OS version * Open ports * Installed software ➡️ They can craft: * A payload that fits perfectly 5. Payload Concepts (High-Level) * A payload is: * Code designed to run on the target system 🔹 Common Strategy * Use outbound connections: * Reverse TCP / HTTPS 👉 Why? * Firewalls usually: * Block incoming connections * Allow outgoing connections 6. Tools Used in Weaponization🔹 Payload Generation * Metasploit * Create executable payloads 🔹 Evasion Techniques * Unicorn * Generates: * PowerShell-based payloads * Less suspicious than executables 7. Key Differences Between the Two PhasesPhaseGoalInteractionActive ReconGather detailed target dataYesWeaponizationBuild attack payloadNoKey Takeaways * Active recon provides deep technical insight * Weaponization turns that insight into attack capability * Tools like Nmap and Burp reveal weaknesses * Payloads are tailored based on real target data * Outbound connections are commonly abused to bypass firewalls You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

19 de may de 2026 - 20 min
Portada del episodio Course 34 - Cybersecurity Kill Chain | Episode 1: Reconnaissance and Footprinting Fundamentals

Course 34 - Cybersecurity Kill Chain | Episode 1: Reconnaissance and Footprinting Fundamentals

In this lesson, you’ll learn about: reconnaissance in the Cyber Kill Chain1. What is Reconnaissance? * Reconnaissance is the first phase of the Cyber Kill Chain * It focuses on: * Gathering information about a target 👉 Why it matters: * It forms the foundation of the entire attack * Poor recon = weak attack * Strong recon = precise targeting 2. Passive Reconnaissance (Footprinting)🔹 Definition * Collecting information without directly interacting with the target 👉 Low risk of detection🔹 Common Techniques🌐 Network Information Gathering * Tools like: * whois → domain ownership & contacts * nslookup → DNS & IP mapping 🔍 Search Engines & Specialized Platforms * Shodan * Censys Used to find: * Open ports * Running services * Technologies used 👥 Social Media Intelligence (OSINT) * LinkedIn * Employee roles * Tech stack hints * Facebook * Personal interests * Behavior patterns 👉 Useful for: * Phishing attacks * Social engineering 🗑️ Physical Recon (Dumpster Diving) * Searching discarded materials for: * Passwords * Internal documents * Configurations 3. Active Reconnaissance🔹 Definition * Direct interaction with the target system 👉 Higher risk of detection🔹 Common Techniques📡 Ping Sweeps * Identify: * Live hosts on a network 🔎 Port Scanning & Fingerprinting * Tool: * Nmap Used to detect: * Open ports (e.g., SSH, FTP, VNC) * Operating system details 4. Passive vs Active ReconTypeInteractionRisk LevelExamplePassiveNoLowShodan, LinkedInActiveYesHighNmap scan5. Why Reconnaissance is Critical * Builds a complete target profile * Identifies: * Weak points * Entry points * Makes later stages: * Faster * More effective Key Takeaways * Recon = information gathering phase * Passive recon is stealthy and preferred * Active recon is powerful but detectable * Tools like Shodan and Nmap reveal technical exposure * Social media provides human attack vectors Big PictureReconnaissance is where attackers:👉 Move from guessing → knowing * Instead of blind attacks * They perform data-driven targetin You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

18 de may de 2026 - 13 min
Soy muy de podcasts. Mientras hago la cama, mientras recojo la casa, mientras trabajo… Y en Podimo encuentro podcast que me encantan. De emprendimiento, de salid, de humor… De lo que quiera! Estoy encantada 👍
Soy muy de podcasts. Mientras hago la cama, mientras recojo la casa, mientras trabajo… Y en Podimo encuentro podcast que me encantan. De emprendimiento, de salid, de humor… De lo que quiera! Estoy encantada 👍
MI TOC es feliz, que maravilla. Ordenador, limpio, sugerencias de categorías nuevas a explorar!!!
Me suscribi con los 14 días de prueba para escuchar el Podcast de Misterios Cotidianos, pero al final me quedo mas tiempo porque hacia tiempo que no me reía tanto. Tiene Podcast muy buenos y la aplicación funciona bien.
App ligera, eficiente, encuentras rápido tus podcast favoritos. Diseño sencillo y bonito. me gustó.
contenidos frescos e inteligentes
La App va francamente bien y el precio me parece muy justo para pagar a gente que nos da horas y horas de contenido. Espero poder seguir usándola asiduamente.

Elige tu suscripción

Más populares

Oferta limitada

Premium

20 horas de audiolibros

  • Podcasts solo en Podimo

  • Disfruta los shows de Podimo sin anuncios

  • Cancela cuando quieras

2 meses por 1 €
Después 4,99 € / mes

Empezar

Premium Plus

100 horas de audiolibros

  • Podcasts solo en Podimo

  • Disfruta los shows de Podimo sin anuncios

  • Cancela cuando quieras

Disfruta 30 días gratis
Después 9,99 € / mes

Prueba gratis

Sólo en Podimo

Audiolibros populares

Empezar

2 meses por 1 €. Después 4,99 € / mes. Cancela cuando quieras.