Imagen de portada del programa CyberCode Academy

CyberCode Academy

Podcast de CyberCode Academy

inglés

Tecnología y ciencia

Empieza 7 días de prueba

$99 / mes después de la prueba.Cancela cuando quieras.

  • 20 horas de audiolibros al mes
  • Podcasts solo en Podimo
  • Podcast gratuitos
Prueba gratis

Acerca de CyberCode Academy

Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.Study anywhere, anytime — and level up your skills with CyberCode Academy.🚀 Learn. Code. Secure.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy

Todos los episodios

246 episodios

episode Course 35 - Footprinting and Reconnaissance | Episode 2: Gathering Intelligence with NSlookup and WHOIS artwork

Course 35 - Footprinting and Reconnaissance | Episode 2: Gathering Intelligence with NSlookup and WHOIS

In this lesson, you’ll learn about: network footprinting using NSlookup and WHOIS1. What is Network Footprinting? * The process of gathering technical information about a target domain * Focuses on: * DNS data * IP addresses * Domain ownership 👉 Goal: * Build a clear profile of the target’s infrastructure 2. Using NSlookup (DNS Intelligence)🔹 Tool Overview * NSlookup * A command-line tool used to query: * DNS (Domain Name System) records 🔹 What You Can Discover * Domain → IP address mapping * DNS servers * Network-related details 🔹 Interactive Mode * Allows advanced queries like: * MX Records (Mail Servers) * Identify email infrastructure 👉 Why it matters: * Reveals: * Email servers * Attack surface for phishing or targeting 3. Using WHOIS (Administrative Intelligence)🔹 Tool Overview * WHOIS * Often accessed via: * ICANN 🔹 What You Can Discover * Domain registrar * Registration & expiration dates * Name servers * Contact details: * Emails * Phone numbers * Addresses 4. Key Data ExtractedData TypeSourceValueIP AddressNSlookupNetwork targetingMX RecordsNSlookupEmail infrastructureRegistrar InfoWHOISDomain ownershipContact DetailsWHOISSocial engineeringName ServersBothInfrastructure mapping5. Strategic Importance * This data helps build: * A complete footprint of the target 🔹 Potential Use Cases (High-Level) * Identifying: * Entry points * Services to investigate * Supporting: * Security assessments * Risk analysis 6. Role in Footprinting Phase * Part of: * Early-stage reconnaissance 👉 It enables you to: * Move from: * Domain name → full infrastructure visibility Key Takeaways * NSlookup is used for DNS-level intelligence * WHOIS provides administrative and ownership data * MX records reveal email systems * Public data can expose critical infrastructure details * Footprinting is the foundation of any security assessment Big PictureThis stage is about:👉 Turning public data into actionable intelligence * Before any testing begins * You must understand: * Who owns the system * How it is structured * What services it exposes Mental Model * NSlookup → “Where is the system?” * WHOIS → “Who owns the system?” You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

23 de may de 2026 - 21 min
episode Course 35 - Footprinting and Reconnaissance | Episode 1: Methodology, OSINT Tools, and Lab Setup artwork

Course 35 - Footprinting and Reconnaissance | Episode 1: Methodology, OSINT Tools, and Lab Setup

In this lesson, you’ll learn about: footprinting, OSINT, and setting up a penetration testing lab1. Penetration Testing Methodology🔹 The First Rule: Legal Scope * Before any testing: * Define scope clearly * Get explicit permission 👉 Why it matters: * Protects you legally * Defines what systems you can test * Prevents unauthorized access issues 2. Footprinting & Reconnaissance🔹 Definition * The process of gathering information about a target before attacking 🔹 Types of Footprinting🟢 Passive Footprinting * No direct interaction with the target * Uses publicly available data 🔴 Active Footprinting * Direct engagement with the target * Higher risk of detection 🌐 OSINT (Open Source Intelligence) * Collecting intelligence from: * Public databases * Websites * Social platforms 3. Essential OSINT & Footprinting Tools🔹 Basic Network Tools * nslookup * DNS records and IP resolution * whois * Domain registration and ownership details 🔹 Search & Intelligence Platforms * Shodan * Discover exposed devices and services 🔹 Visual Intelligence Tool * Maltego * Maps relationships between: * Domains * Emails * Infrastructure 🔹 Website Analysis * HTTrack * Clone websites for offline analysis 🔹 Advanced Recon Frameworks * Recon-ng * theHarvester 👉 Used for: * Automated data collection * Email harvesting * Domain intelligence 4. Building a Safe Lab Environment🔹 Why You Need a Lab * Avoid testing on real systems * Practice safely and legally * Simulate real-world attacks 🔹 Virtualization Platform * Oracle VM VirtualBox 👉 Important: * Install: * Base platform * Extension Pack 🔹 Operating System for Pentesting * Kali Linux 👉 Includes: * Pre-installed security tools * Ready-to-use environment 5. Troubleshooting Setup * Always: * Follow guides specific to your OS (Windows / Linux / Mac) * Check virtualization support (VT-x / AMD-V) Key Takeaways * Always start with scope and permission * Footprinting is the foundation of pentesting * OSINT provides powerful public intelligence * Tools automate and enhance data gathering * A lab environment is essential for safe practice Big PictureThis phase is where you:👉 Move from zero knowledge → complete visibility * Understand the target * Map the attack surface * Prepare for deeper testing Mental Model * Methodology → “What am I allowed to do?” * Footprinting → “What can I learn?” * Lab → “Where can I practice safely?” You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

Ayer - 14 min
episode Course 34 - Cybersecurity Kill Chain | Episode 4: Command, Objectives, and Defense in Depth artwork

Course 34 - Cybersecurity Kill Chain | Episode 4: Command, Objectives, and Defense in Depth

In this lesson, you’ll learn about: Command & Control (C2), Actions on Objectives, and Defense in Depth1. Command & Control (C2) Phase🔹 Definition * The stage where an attacker establishes a communication channel with a compromised system 🔹 Purpose * Send commands to the infected machine * Receive exfiltrated data * Maintain persistent remote access 🔹 Evasion Techniques * Attackers disguise communication as normal traffic 👉 Example: * Using platforms like: * Twitter * Why this works: * Traffic appears legitimate * Blends into normal user behavior * Harder for detection systems to flag 2. Actions on Objectives (Final Goal)🔹 Definition * The phase where the attacker achieves their intended objective 🔹 Common Targets * Sensitive data such as: * Financial records * Credit card data * Credentials * Intellectual property 🔹 Attacker Behavior * Operate stealthily * Maintain long-term access * Avoid detection while extracting value 3. Defense in Depth🔹 Definition * A layered security strategy designed to protect systems at multiple levels 🔹 Framework * Cyber Defense Matrix 4. Six Core Defensive Actions🛡️ Detect * Identify malicious or suspicious activity 🚫 Deny * Prevent unauthorized access ⚡ Disrupt * Interrupt attacker operations 📉 Degrade * Reduce the effectiveness of the attack 🎭 Deceive * Mislead attackers (e.g., honeypots, fake assets) 🔒 Contain * Limit the spread and impact of an attack 5. Why Defense in Depth Matters * No single security control is sufficient * Attacks occur in multiple stages 👉 Effective defense must: * Cover every phase of the Cyber Kill Chain Key Takeaways * C2 enables attackers to remotely control compromised systems * Attackers often hide communication within legitimate traffic * Actions on Objectives is where real damage or data theft occurs * Defense in Depth provides layered protection across all stages * Security should be proactive, not reactive Big Picture👉 This is the final stage of the attack lifecycle: * C2 → Control the system * Actions → Achieve the objective * Defense → Detect, limit, and stop the attack You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

21 de may de 2026 - 19 min
episode Course 34 - Cybersecurity Kill Chain | Episode 3: Delivery, Exploitation, and Installation artwork

Course 34 - Cybersecurity Kill Chain | Episode 3: Delivery, Exploitation, and Installation

In this lesson, you’ll learn about: Delivery, Exploitation, and Installation in the Cyber Kill Chain1. Delivery Phase (Getting the Payload to the Target)🔹 Definition * The process of transferring the malicious payload to the victim 🔹 Common Delivery Methods📡 Technical Methods * Using exposed services: * FTP uploads * Web downloads 💾 Physical Methods * Infected USB drives left in: * Offices * Public places 🎭 Social Engineering (Most Effective) * Tool: * Social Engineering Toolkit (SET) * Used for: * Spear-phishing campaigns * Mass phishing emails 👉 Key idea: * Trick the user into executing the payload themselves 2. Exploitation Phase (Triggering the Attack)🔹 Definition * The moment the payload: * executes successfully * bypasses security controls 🔹 How Exploitation Happens * Exploiting: * Software vulnerabilities * Misconfigurations 🔹 Most Common Weakness👉 Human behavior * Clicking malicious links * Entering credentials on fake pages 3. Installation Phase (Maintaining Access)🔹 Definition * Establishing a persistent foothold on the system 🔹 Goal * Ensure attacker can: * Reconnect anytime * Maintain control 🔹 Common Concept * Installing: * Backdoors * Persistent malware 🔹 Tool Example * Metasploit * Used to: * Set up a listener * Wait for incoming connection from victim 👉 Once connected: * A session is opened * Attacker gains remote control 4. Exploitation vs Installation (Key Difference)PhasePurposeResultExploitationBreak into the systemInitial accessInstallationStay inside the systemPersistent access5. Full Flow Understanding * Delivery * Gets payload to victim * Exploitation * Executes payload successfully * Installation * Keeps long-term access Key Takeaways * Delivery relies heavily on social engineering * Exploitation is about triggering execution * Installation ensures persistence * Humans are often the weakest link * Tools automate the process, but logic remains consistent Big PictureThese phases represent:👉 From sending the attack → to owning the system * Delivery = Entry point * Exploitation = Break-in * Installation = Persistence Mental ModelThink of it like: * Delivery → “Send the package” * Exploitation → “Open the door” * Installation → “Stay inside the house” You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

20 de may de 2026 - 20 min
episode Course 34 - Cybersecurity Kill Chain | Episode 2: Active Reconnaissance and Weaponization Strategies artwork

Course 34 - Cybersecurity Kill Chain | Episode 2: Active Reconnaissance and Weaponization Strategies

In this lesson, you’ll learn about: Active Reconnaissance and Weaponization in the Cyber Kill Chain1. Transition: From Recon to Action * After passive recon, attackers move to: * Active Reconnaissance → direct interaction * Then → Weaponization → building attack tools 👉 This is the shift from: * Collecting information → Preparing the attack 2. Active Reconnaissance (Deep Target Profiling)🔹 Definition * Directly interacting with the target system to gather: * Technical details * Human-related intelligence 🔹 Technical Techniques * Port Scanning & Fingerprinting * Tools: * Nmap * Zenmap * Discover: * Open ports * Running services * Operating system * Web Application Analysis * Tools: * Burp Suite * OWASP ZAP * Identify: * Hidden endpoints * Admin panels * Vulnerabilities 🔹 Non-Technical Techniques * Social engineering using: * LinkedIn * Facebook * Build: * Spear-phishing attacks * Highly targeted emails/messages * Based on real employee data 3. Weaponization Phase🔹 Definition * Building the attack payload based on gathered intel 👉 Important: * No interaction with the victim yet * Happens entirely on the attacker’s side 4. Why Reconnaissance Matters Here * Good recon → precise payload * Poor recon → failed attack 👉 Example: * If attacker knows: * OS version * Open ports * Installed software ➡️ They can craft: * A payload that fits perfectly 5. Payload Concepts (High-Level) * A payload is: * Code designed to run on the target system 🔹 Common Strategy * Use outbound connections: * Reverse TCP / HTTPS 👉 Why? * Firewalls usually: * Block incoming connections * Allow outgoing connections 6. Tools Used in Weaponization🔹 Payload Generation * Metasploit * Create executable payloads 🔹 Evasion Techniques * Unicorn * Generates: * PowerShell-based payloads * Less suspicious than executables 7. Key Differences Between the Two PhasesPhaseGoalInteractionActive ReconGather detailed target dataYesWeaponizationBuild attack payloadNoKey Takeaways * Active recon provides deep technical insight * Weaponization turns that insight into attack capability * Tools like Nmap and Burp reveal weaknesses * Payloads are tailored based on real target data * Outbound connections are commonly abused to bypass firewalls You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

19 de may de 2026 - 20 min
Muy buenos Podcasts , entretenido y con historias educativas y divertidas depende de lo que cada uno busque. Yo lo suelo usar en el trabajo ya que estoy muchas horas y necesito cancelar el ruido de al rededor , Auriculares y a disfrutar ..!!
Muy buenos Podcasts , entretenido y con historias educativas y divertidas depende de lo que cada uno busque. Yo lo suelo usar en el trabajo ya que estoy muchas horas y necesito cancelar el ruido de al rededor , Auriculares y a disfrutar ..!!
Fantástica aplicación. Yo solo uso los podcast. Por un precio módico los tienes variados y cada vez más.
Me encanta la app, concentra los mejores podcast y bueno ya era ora de pagarles a todos estos creadores de contenido

Elige tu suscripción

Más populares

Premium

20 horas de audiolibros

  • Podcasts solo en Podimo

  • Disfruta los shows de Podimo sin anuncios

  • Cancela cuando quieras

Empieza 7 días de prueba
Después $99 / mes

Prueba gratis

Sólo en Podimo

Audiolibros populares

Prueba gratis

Empieza 7 días de prueba. $99 / mes después de la prueba. Cancela cuando quieras.