Omslagafbeelding van de show CyberCode Academy

CyberCode Academy

Podcast door CyberCode Academy

Engels

Technologie en Wetenschap

Tijdelijke aanbieding

2 maanden voor € 1

Daarna € 9,99 / maandElk moment opzegbaar.

  • 20 uur luisterboeken / maand
  • Podcasts die je alleen op Podimo hoort
  • Gratis podcasts
Begin hier

Over CyberCode Academy

Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.Study anywhere, anytime — and level up your skills with CyberCode Academy.🚀 Learn. Code. Secure.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy

Alle afleveringen

245 afleveringen

aflevering Course 35 - Footprinting and Reconnaissance | Episode 1: Methodology, OSINT Tools, and Lab Setup artwork

Course 35 - Footprinting and Reconnaissance | Episode 1: Methodology, OSINT Tools, and Lab Setup

In this lesson, you’ll learn about: footprinting, OSINT, and setting up a penetration testing lab1. Penetration Testing Methodology🔹 The First Rule: Legal Scope * Before any testing: * Define scope clearly * Get explicit permission 👉 Why it matters: * Protects you legally * Defines what systems you can test * Prevents unauthorized access issues 2. Footprinting & Reconnaissance🔹 Definition * The process of gathering information about a target before attacking 🔹 Types of Footprinting🟢 Passive Footprinting * No direct interaction with the target * Uses publicly available data 🔴 Active Footprinting * Direct engagement with the target * Higher risk of detection 🌐 OSINT (Open Source Intelligence) * Collecting intelligence from: * Public databases * Websites * Social platforms 3. Essential OSINT & Footprinting Tools🔹 Basic Network Tools * nslookup * DNS records and IP resolution * whois * Domain registration and ownership details 🔹 Search & Intelligence Platforms * Shodan * Discover exposed devices and services 🔹 Visual Intelligence Tool * Maltego * Maps relationships between: * Domains * Emails * Infrastructure 🔹 Website Analysis * HTTrack * Clone websites for offline analysis 🔹 Advanced Recon Frameworks * Recon-ng * theHarvester 👉 Used for: * Automated data collection * Email harvesting * Domain intelligence 4. Building a Safe Lab Environment🔹 Why You Need a Lab * Avoid testing on real systems * Practice safely and legally * Simulate real-world attacks 🔹 Virtualization Platform * Oracle VM VirtualBox 👉 Important: * Install: * Base platform * Extension Pack 🔹 Operating System for Pentesting * Kali Linux 👉 Includes: * Pre-installed security tools * Ready-to-use environment 5. Troubleshooting Setup * Always: * Follow guides specific to your OS (Windows / Linux / Mac) * Check virtualization support (VT-x / AMD-V) Key Takeaways * Always start with scope and permission * Footprinting is the foundation of pentesting * OSINT provides powerful public intelligence * Tools automate and enhance data gathering * A lab environment is essential for safe practice Big PictureThis phase is where you:👉 Move from zero knowledge → complete visibility * Understand the target * Map the attack surface * Prepare for deeper testing Mental Model * Methodology → “What am I allowed to do?” * Footprinting → “What can I learn?” * Lab → “Where can I practice safely?” You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

Gisteren - 14 min
aflevering Course 34 - Cybersecurity Kill Chain | Episode 4: Command, Objectives, and Defense in Depth artwork

Course 34 - Cybersecurity Kill Chain | Episode 4: Command, Objectives, and Defense in Depth

In this lesson, you’ll learn about: Command & Control (C2), Actions on Objectives, and Defense in Depth1. Command & Control (C2) Phase🔹 Definition * The stage where an attacker establishes a communication channel with a compromised system 🔹 Purpose * Send commands to the infected machine * Receive exfiltrated data * Maintain persistent remote access 🔹 Evasion Techniques * Attackers disguise communication as normal traffic 👉 Example: * Using platforms like: * Twitter * Why this works: * Traffic appears legitimate * Blends into normal user behavior * Harder for detection systems to flag 2. Actions on Objectives (Final Goal)🔹 Definition * The phase where the attacker achieves their intended objective 🔹 Common Targets * Sensitive data such as: * Financial records * Credit card data * Credentials * Intellectual property 🔹 Attacker Behavior * Operate stealthily * Maintain long-term access * Avoid detection while extracting value 3. Defense in Depth🔹 Definition * A layered security strategy designed to protect systems at multiple levels 🔹 Framework * Cyber Defense Matrix 4. Six Core Defensive Actions🛡️ Detect * Identify malicious or suspicious activity 🚫 Deny * Prevent unauthorized access ⚡ Disrupt * Interrupt attacker operations 📉 Degrade * Reduce the effectiveness of the attack 🎭 Deceive * Mislead attackers (e.g., honeypots, fake assets) 🔒 Contain * Limit the spread and impact of an attack 5. Why Defense in Depth Matters * No single security control is sufficient * Attacks occur in multiple stages 👉 Effective defense must: * Cover every phase of the Cyber Kill Chain Key Takeaways * C2 enables attackers to remotely control compromised systems * Attackers often hide communication within legitimate traffic * Actions on Objectives is where real damage or data theft occurs * Defense in Depth provides layered protection across all stages * Security should be proactive, not reactive Big Picture👉 This is the final stage of the attack lifecycle: * C2 → Control the system * Actions → Achieve the objective * Defense → Detect, limit, and stop the attack You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

21 mei 2026 - 19 min
aflevering Course 34 - Cybersecurity Kill Chain | Episode 3: Delivery, Exploitation, and Installation artwork

Course 34 - Cybersecurity Kill Chain | Episode 3: Delivery, Exploitation, and Installation

In this lesson, you’ll learn about: Delivery, Exploitation, and Installation in the Cyber Kill Chain1. Delivery Phase (Getting the Payload to the Target)🔹 Definition * The process of transferring the malicious payload to the victim 🔹 Common Delivery Methods📡 Technical Methods * Using exposed services: * FTP uploads * Web downloads 💾 Physical Methods * Infected USB drives left in: * Offices * Public places 🎭 Social Engineering (Most Effective) * Tool: * Social Engineering Toolkit (SET) * Used for: * Spear-phishing campaigns * Mass phishing emails 👉 Key idea: * Trick the user into executing the payload themselves 2. Exploitation Phase (Triggering the Attack)🔹 Definition * The moment the payload: * executes successfully * bypasses security controls 🔹 How Exploitation Happens * Exploiting: * Software vulnerabilities * Misconfigurations 🔹 Most Common Weakness👉 Human behavior * Clicking malicious links * Entering credentials on fake pages 3. Installation Phase (Maintaining Access)🔹 Definition * Establishing a persistent foothold on the system 🔹 Goal * Ensure attacker can: * Reconnect anytime * Maintain control 🔹 Common Concept * Installing: * Backdoors * Persistent malware 🔹 Tool Example * Metasploit * Used to: * Set up a listener * Wait for incoming connection from victim 👉 Once connected: * A session is opened * Attacker gains remote control 4. Exploitation vs Installation (Key Difference)PhasePurposeResultExploitationBreak into the systemInitial accessInstallationStay inside the systemPersistent access5. Full Flow Understanding * Delivery * Gets payload to victim * Exploitation * Executes payload successfully * Installation * Keeps long-term access Key Takeaways * Delivery relies heavily on social engineering * Exploitation is about triggering execution * Installation ensures persistence * Humans are often the weakest link * Tools automate the process, but logic remains consistent Big PictureThese phases represent:👉 From sending the attack → to owning the system * Delivery = Entry point * Exploitation = Break-in * Installation = Persistence Mental ModelThink of it like: * Delivery → “Send the package” * Exploitation → “Open the door” * Installation → “Stay inside the house” You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

20 mei 2026 - 20 min
aflevering Course 34 - Cybersecurity Kill Chain | Episode 2: Active Reconnaissance and Weaponization Strategies artwork

Course 34 - Cybersecurity Kill Chain | Episode 2: Active Reconnaissance and Weaponization Strategies

In this lesson, you’ll learn about: Active Reconnaissance and Weaponization in the Cyber Kill Chain1. Transition: From Recon to Action * After passive recon, attackers move to: * Active Reconnaissance → direct interaction * Then → Weaponization → building attack tools 👉 This is the shift from: * Collecting information → Preparing the attack 2. Active Reconnaissance (Deep Target Profiling)🔹 Definition * Directly interacting with the target system to gather: * Technical details * Human-related intelligence 🔹 Technical Techniques * Port Scanning & Fingerprinting * Tools: * Nmap * Zenmap * Discover: * Open ports * Running services * Operating system * Web Application Analysis * Tools: * Burp Suite * OWASP ZAP * Identify: * Hidden endpoints * Admin panels * Vulnerabilities 🔹 Non-Technical Techniques * Social engineering using: * LinkedIn * Facebook * Build: * Spear-phishing attacks * Highly targeted emails/messages * Based on real employee data 3. Weaponization Phase🔹 Definition * Building the attack payload based on gathered intel 👉 Important: * No interaction with the victim yet * Happens entirely on the attacker’s side 4. Why Reconnaissance Matters Here * Good recon → precise payload * Poor recon → failed attack 👉 Example: * If attacker knows: * OS version * Open ports * Installed software ➡️ They can craft: * A payload that fits perfectly 5. Payload Concepts (High-Level) * A payload is: * Code designed to run on the target system 🔹 Common Strategy * Use outbound connections: * Reverse TCP / HTTPS 👉 Why? * Firewalls usually: * Block incoming connections * Allow outgoing connections 6. Tools Used in Weaponization🔹 Payload Generation * Metasploit * Create executable payloads 🔹 Evasion Techniques * Unicorn * Generates: * PowerShell-based payloads * Less suspicious than executables 7. Key Differences Between the Two PhasesPhaseGoalInteractionActive ReconGather detailed target dataYesWeaponizationBuild attack payloadNoKey Takeaways * Active recon provides deep technical insight * Weaponization turns that insight into attack capability * Tools like Nmap and Burp reveal weaknesses * Payloads are tailored based on real target data * Outbound connections are commonly abused to bypass firewalls You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

19 mei 2026 - 20 min
aflevering Course 34 - Cybersecurity Kill Chain | Episode 1: Reconnaissance and Footprinting Fundamentals artwork

Course 34 - Cybersecurity Kill Chain | Episode 1: Reconnaissance and Footprinting Fundamentals

In this lesson, you’ll learn about: reconnaissance in the Cyber Kill Chain1. What is Reconnaissance? * Reconnaissance is the first phase of the Cyber Kill Chain * It focuses on: * Gathering information about a target 👉 Why it matters: * It forms the foundation of the entire attack * Poor recon = weak attack * Strong recon = precise targeting 2. Passive Reconnaissance (Footprinting)🔹 Definition * Collecting information without directly interacting with the target 👉 Low risk of detection🔹 Common Techniques🌐 Network Information Gathering * Tools like: * whois → domain ownership & contacts * nslookup → DNS & IP mapping 🔍 Search Engines & Specialized Platforms * Shodan * Censys Used to find: * Open ports * Running services * Technologies used 👥 Social Media Intelligence (OSINT) * LinkedIn * Employee roles * Tech stack hints * Facebook * Personal interests * Behavior patterns 👉 Useful for: * Phishing attacks * Social engineering 🗑️ Physical Recon (Dumpster Diving) * Searching discarded materials for: * Passwords * Internal documents * Configurations 3. Active Reconnaissance🔹 Definition * Direct interaction with the target system 👉 Higher risk of detection🔹 Common Techniques📡 Ping Sweeps * Identify: * Live hosts on a network 🔎 Port Scanning & Fingerprinting * Tool: * Nmap Used to detect: * Open ports (e.g., SSH, FTP, VNC) * Operating system details 4. Passive vs Active ReconTypeInteractionRisk LevelExamplePassiveNoLowShodan, LinkedInActiveYesHighNmap scan5. Why Reconnaissance is Critical * Builds a complete target profile * Identifies: * Weak points * Entry points * Makes later stages: * Faster * More effective Key Takeaways * Recon = information gathering phase * Passive recon is stealthy and preferred * Active recon is powerful but detectable * Tools like Shodan and Nmap reveal technical exposure * Social media provides human attack vectors Big PictureReconnaissance is where attackers:👉 Move from guessing → knowing * Instead of blind attacks * They perform data-driven targetin You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

18 mei 2026 - 13 min
Super app. Onthoud waar je bent gebleven en wat je interesses zijn. Heel veel keuze!
Super app. Onthoud waar je bent gebleven en wat je interesses zijn. Heel veel keuze!
Makkelijk in gebruik!
App ziet er mooi uit, navigatie is even wennen maar overzichtelijk.

Kies je abonnement

Meest populair

Tijdelijke aanbieding

Premium

20 uur aan luisterboeken

  • Podcasts die je alleen op Podimo hoort

  • Geen advertenties in Podimo shows

  • Elk moment opzegbaar

2 maanden voor € 1
Daarna € 9,99 / maand

Begin hier

Premium Plus

Onbeperkt luisterboeken

  • Podcasts die je alleen op Podimo hoort

  • Geen advertenties in Podimo shows

  • Elk moment opzegbaar

Probeer 7 dagen gratis
Daarna € 13,99 / maand

Probeer gratis

Alleen bij Podimo

Populaire luisterboeken

Begin hier

2 maanden voor € 1. Daarna € 9,99 / maand. Elk moment opzegbaar.