Kansikuva nÀyttelystÀ CyberCode Academy

CyberCode Academy

Podcast by CyberCode Academy

englanti

Teknologia & tieteet

Rajoitettu tarjous

3 kuukautta hintaan 7,99 €

Sitten 7,99 € / kuukausiPeru milloin tahansa.

  • Podimon podcastit
  • Lataa offline-kĂ€yttöön
Aloita nyt

LisÀÀ CyberCode Academy

Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.Study anywhere, anytime — and level up your skills with CyberCode Academy.🚀 Learn. Code. Secure.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy

Kaikki jaksot

246 jaksot

jakson Course 35 - Footprinting and Reconnaissance | Episode 2: Gathering Intelligence with NSlookup and WHOIS kansikuva

Course 35 - Footprinting and Reconnaissance | Episode 2: Gathering Intelligence with NSlookup and WHOIS

In this lesson, you’ll learn about: network footprinting using NSlookup and WHOIS1. What is Network Footprinting? * The process of gathering technical information about a target domain * Focuses on: * DNS data * IP addresses * Domain ownership 👉 Goal: * Build a clear profile of the target’s infrastructure 2. Using NSlookup (DNS Intelligence)đŸ”č Tool Overview * NSlookup * A command-line tool used to query: * DNS (Domain Name System) records đŸ”č What You Can Discover * Domain → IP address mapping * DNS servers * Network-related details đŸ”č Interactive Mode * Allows advanced queries like: * MX Records (Mail Servers) * Identify email infrastructure 👉 Why it matters: * Reveals: * Email servers * Attack surface for phishing or targeting 3. Using WHOIS (Administrative Intelligence)đŸ”č Tool Overview * WHOIS * Often accessed via: * ICANN đŸ”č What You Can Discover * Domain registrar * Registration & expiration dates * Name servers * Contact details: * Emails * Phone numbers * Addresses 4. Key Data ExtractedData TypeSourceValueIP AddressNSlookupNetwork targetingMX RecordsNSlookupEmail infrastructureRegistrar InfoWHOISDomain ownershipContact DetailsWHOISSocial engineeringName ServersBothInfrastructure mapping5. Strategic Importance * This data helps build: * A complete footprint of the target đŸ”č Potential Use Cases (High-Level) * Identifying: * Entry points * Services to investigate * Supporting: * Security assessments * Risk analysis 6. Role in Footprinting Phase * Part of: * Early-stage reconnaissance 👉 It enables you to: * Move from: * Domain name → full infrastructure visibility Key Takeaways * NSlookup is used for DNS-level intelligence * WHOIS provides administrative and ownership data * MX records reveal email systems * Public data can expose critical infrastructure details * Footprinting is the foundation of any security assessment Big PictureThis stage is about:👉 Turning public data into actionable intelligence * Before any testing begins * You must understand: * Who owns the system * How it is structured * What services it exposes Mental Model * NSlookup → “Where is the system?” * WHOIS → “Who owns the system?” You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

23. touko 2026 - 21 min
jakson Course 35 - Footprinting and Reconnaissance | Episode 1: Methodology, OSINT Tools, and Lab Setup kansikuva

Course 35 - Footprinting and Reconnaissance | Episode 1: Methodology, OSINT Tools, and Lab Setup

In this lesson, you’ll learn about: footprinting, OSINT, and setting up a penetration testing lab1. Penetration Testing MethodologyđŸ”č The First Rule: Legal Scope * Before any testing: * Define scope clearly * Get explicit permission 👉 Why it matters: * Protects you legally * Defines what systems you can test * Prevents unauthorized access issues 2. Footprinting & ReconnaissanceđŸ”č Definition * The process of gathering information about a target before attacking đŸ”č Types of Footprinting🟱 Passive Footprinting * No direct interaction with the target * Uses publicly available data 🔮 Active Footprinting * Direct engagement with the target * Higher risk of detection 🌐 OSINT (Open Source Intelligence) * Collecting intelligence from: * Public databases * Websites * Social platforms 3. Essential OSINT & Footprinting ToolsđŸ”č Basic Network Tools * nslookup * DNS records and IP resolution * whois * Domain registration and ownership details đŸ”č Search & Intelligence Platforms * Shodan * Discover exposed devices and services đŸ”č Visual Intelligence Tool * Maltego * Maps relationships between: * Domains * Emails * Infrastructure đŸ”č Website Analysis * HTTrack * Clone websites for offline analysis đŸ”č Advanced Recon Frameworks * Recon-ng * theHarvester 👉 Used for: * Automated data collection * Email harvesting * Domain intelligence 4. Building a Safe Lab EnvironmentđŸ”č Why You Need a Lab * Avoid testing on real systems * Practice safely and legally * Simulate real-world attacks đŸ”č Virtualization Platform * Oracle VM VirtualBox 👉 Important: * Install: * Base platform * Extension Pack đŸ”č Operating System for Pentesting * Kali Linux 👉 Includes: * Pre-installed security tools * Ready-to-use environment 5. Troubleshooting Setup * Always: * Follow guides specific to your OS (Windows / Linux / Mac) * Check virtualization support (VT-x / AMD-V) Key Takeaways * Always start with scope and permission * Footprinting is the foundation of pentesting * OSINT provides powerful public intelligence * Tools automate and enhance data gathering * A lab environment is essential for safe practice Big PictureThis phase is where you:👉 Move from zero knowledge → complete visibility * Understand the target * Map the attack surface * Prepare for deeper testing Mental Model * Methodology → “What am I allowed to do?” * Footprinting → “What can I learn?” * Lab → “Where can I practice safely?” You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

Eilen - 14 min
jakson Course 34 - Cybersecurity Kill Chain | Episode 4: Command, Objectives, and Defense in Depth kansikuva

Course 34 - Cybersecurity Kill Chain | Episode 4: Command, Objectives, and Defense in Depth

In this lesson, you’ll learn about: Command & Control (C2), Actions on Objectives, and Defense in Depth1. Command & Control (C2) PhaseđŸ”č Definition * The stage where an attacker establishes a communication channel with a compromised system đŸ”č Purpose * Send commands to the infected machine * Receive exfiltrated data * Maintain persistent remote access đŸ”č Evasion Techniques * Attackers disguise communication as normal traffic 👉 Example: * Using platforms like: * Twitter * Why this works: * Traffic appears legitimate * Blends into normal user behavior * Harder for detection systems to flag 2. Actions on Objectives (Final Goal)đŸ”č Definition * The phase where the attacker achieves their intended objective đŸ”č Common Targets * Sensitive data such as: * Financial records * Credit card data * Credentials * Intellectual property đŸ”č Attacker Behavior * Operate stealthily * Maintain long-term access * Avoid detection while extracting value 3. Defense in DepthđŸ”č Definition * A layered security strategy designed to protect systems at multiple levels đŸ”č Framework * Cyber Defense Matrix 4. Six Core Defensive ActionsđŸ›Ąïž Detect * Identify malicious or suspicious activity đŸš« Deny * Prevent unauthorized access ⚡ Disrupt * Interrupt attacker operations 📉 Degrade * Reduce the effectiveness of the attack 🎭 Deceive * Mislead attackers (e.g., honeypots, fake assets) 🔒 Contain * Limit the spread and impact of an attack 5. Why Defense in Depth Matters * No single security control is sufficient * Attacks occur in multiple stages 👉 Effective defense must: * Cover every phase of the Cyber Kill Chain Key Takeaways * C2 enables attackers to remotely control compromised systems * Attackers often hide communication within legitimate traffic * Actions on Objectives is where real damage or data theft occurs * Defense in Depth provides layered protection across all stages * Security should be proactive, not reactive Big Picture👉 This is the final stage of the attack lifecycle: * C2 → Control the system * Actions → Achieve the objective * Defense → Detect, limit, and stop the attack You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

21. touko 2026 - 19 min
jakson Course 34 - Cybersecurity Kill Chain | Episode 3: Delivery, Exploitation, and Installation kansikuva

Course 34 - Cybersecurity Kill Chain | Episode 3: Delivery, Exploitation, and Installation

In this lesson, you’ll learn about: Delivery, Exploitation, and Installation in the Cyber Kill Chain1. Delivery Phase (Getting the Payload to the Target)đŸ”č Definition * The process of transferring the malicious payload to the victim đŸ”č Common Delivery Methods📡 Technical Methods * Using exposed services: * FTP uploads * Web downloads đŸ’Ÿ Physical Methods * Infected USB drives left in: * Offices * Public places 🎭 Social Engineering (Most Effective) * Tool: * Social Engineering Toolkit (SET) * Used for: * Spear-phishing campaigns * Mass phishing emails 👉 Key idea: * Trick the user into executing the payload themselves 2. Exploitation Phase (Triggering the Attack)đŸ”č Definition * The moment the payload: * executes successfully * bypasses security controls đŸ”č How Exploitation Happens * Exploiting: * Software vulnerabilities * Misconfigurations đŸ”č Most Common Weakness👉 Human behavior * Clicking malicious links * Entering credentials on fake pages 3. Installation Phase (Maintaining Access)đŸ”č Definition * Establishing a persistent foothold on the system đŸ”č Goal * Ensure attacker can: * Reconnect anytime * Maintain control đŸ”č Common Concept * Installing: * Backdoors * Persistent malware đŸ”č Tool Example * Metasploit * Used to: * Set up a listener * Wait for incoming connection from victim 👉 Once connected: * A session is opened * Attacker gains remote control 4. Exploitation vs Installation (Key Difference)PhasePurposeResultExploitationBreak into the systemInitial accessInstallationStay inside the systemPersistent access5. Full Flow Understanding * Delivery * Gets payload to victim * Exploitation * Executes payload successfully * Installation * Keeps long-term access Key Takeaways * Delivery relies heavily on social engineering * Exploitation is about triggering execution * Installation ensures persistence * Humans are often the weakest link * Tools automate the process, but logic remains consistent Big PictureThese phases represent:👉 From sending the attack → to owning the system * Delivery = Entry point * Exploitation = Break-in * Installation = Persistence Mental ModelThink of it like: * Delivery → “Send the package” * Exploitation → “Open the door” * Installation → “Stay inside the house” You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

20. touko 2026 - 20 min
jakson Course 34 - Cybersecurity Kill Chain | Episode 2: Active Reconnaissance and Weaponization Strategies kansikuva

Course 34 - Cybersecurity Kill Chain | Episode 2: Active Reconnaissance and Weaponization Strategies

In this lesson, you’ll learn about: Active Reconnaissance and Weaponization in the Cyber Kill Chain1. Transition: From Recon to Action * After passive recon, attackers move to: * Active Reconnaissance → direct interaction * Then → Weaponization → building attack tools 👉 This is the shift from: * Collecting information → Preparing the attack 2. Active Reconnaissance (Deep Target Profiling)đŸ”č Definition * Directly interacting with the target system to gather: * Technical details * Human-related intelligence đŸ”č Technical Techniques * Port Scanning & Fingerprinting * Tools: * Nmap * Zenmap * Discover: * Open ports * Running services * Operating system * Web Application Analysis * Tools: * Burp Suite * OWASP ZAP * Identify: * Hidden endpoints * Admin panels * Vulnerabilities đŸ”č Non-Technical Techniques * Social engineering using: * LinkedIn * Facebook * Build: * Spear-phishing attacks * Highly targeted emails/messages * Based on real employee data 3. Weaponization PhaseđŸ”č Definition * Building the attack payload based on gathered intel 👉 Important: * No interaction with the victim yet * Happens entirely on the attacker’s side 4. Why Reconnaissance Matters Here * Good recon → precise payload * Poor recon → failed attack 👉 Example: * If attacker knows: * OS version * Open ports * Installed software âžĄïž They can craft: * A payload that fits perfectly 5. Payload Concepts (High-Level) * A payload is: * Code designed to run on the target system đŸ”č Common Strategy * Use outbound connections: * Reverse TCP / HTTPS 👉 Why? * Firewalls usually: * Block incoming connections * Allow outgoing connections 6. Tools Used in WeaponizationđŸ”č Payload Generation * Metasploit * Create executable payloads đŸ”č Evasion Techniques * Unicorn * Generates: * PowerShell-based payloads * Less suspicious than executables 7. Key Differences Between the Two PhasesPhaseGoalInteractionActive ReconGather detailed target dataYesWeaponizationBuild attack payloadNoKey Takeaways * Active recon provides deep technical insight * Weaponization turns that insight into attack capability * Tools like Nmap and Burp reveal weaknesses * Payloads are tailored based on real target data * Outbound connections are commonly abused to bypass firewalls You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

19. touko 2026 - 20 min
Loistava design ja vihdoin on helppo löytÀÀ podcasteja, joista oikeasti tykkÀÀ
Loistava design ja vihdoin on helppo löytÀÀ podcasteja, joista oikeasti tykkÀÀ
Kiva sovellus podcastien kuunteluun, ja sisÀltö on monipuolista ja kiinnostavaa
Todella kiva Àppi, helppo kÀyttÀÀ ja paljon podcasteja, joita en tiennyt ennestÀÀn.

Valitse tilauksesi

Suosituimmat

Rajoitettu tarjous

Premium

  • Podimon podcastit

  • Ei mainoksia Podimon podcasteissa

  • Peru milloin tahansa

3 kuukautta hintaan 7,99 €
Sitten 7,99 € / kuukausi

Aloita nyt

Premium

20 tuntia ÀÀnikirjoja

  • Podimon podcastit

  • Ei mainoksia Podimon podcasteissa

  • Peru milloin tahansa

30 vrk ilmainen kokeilu
Sitten 9,99 € / kuukausi

Aloita maksutta

Premium

100 tuntia ÀÀnikirjoja

  • Podimon podcastit

  • Ei mainoksia Podimon podcasteissa

  • Peru milloin tahansa

30 vrk ilmainen kokeilu
Sitten 19,99 € / kuukausi

Aloita maksutta

Vain Podimossa

Suosittuja ÀÀnikirjoja

Aloita nyt

3 kuukautta hintaan 7,99 €. Sitten 7,99 € / kuukausi. Peru milloin tahansa.