BrakeSec Education Podcast

A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.

http://www.brakeingsecurity.com

Eine durchschnittliche Folge dieses Podcasts dauert 49m. Bisher sind 459 Folge(n) erschienen. Jede Woche gibt es eine neue Folge dieses Podcasts.

Gesamtlänge aller Episoden: 16 days 13 hours 58 minutes

subscribe
share






recommended podcasts


2015-030: Bsides Austin panel Discussion (Red Team vs. Blue Team)


My podcast co-host Brian Boettcher, along with Kate Brew, an Austin, TX based security blogger, headed up this panel called "Red Team Vs. Blue Team". The idea was to ask people from various sides of the aisles (attackers and defenders) pressing...


share








 July 13, 2015  38m
 
 

2015-029: Big Brown cloud honeyblog with @theroxyd


Roxy, who we interviewed a few months ago on our podcast about hackerspaces, is back with us this week to discuss a project she is working on, called 'Big Brown Cloud'. If you've ever wanted to setup your own fake blog and send people to it to gain...


share








 July 6, 2015  49m
 
 

2015-028: using log analytics to discover Windows malware artifacts


In this podcast, you'll learn about: Log analytics software that can be used to parse system logs for naaty malware Detecting Malware artifacts learn about windows directory locations looking for indicators like packing, changed hashes, etc Tips...


share








 June 29, 2015  44m
 
 

2015-027- detecting malware in Windows Systems with Michael Gough


Michael Gough joined us again to discuss malware detection techniques on Windows systems. We talk about how you can modify Powershell's defaults to allow for better logging potential. Also, we find out some hidden gems that pretty much guarantee to...


share








 June 22, 2015  50m
 
 

2015-026- Cloud Security discussion with FireHost


This week, we discuss various methods of enabling companies to move applications to cloud based platforms.  We discuss containers, like Docker, and how various hosting services handle converting businesses from a traditional data centers to a...


share








 June 15, 2015  54m
 
 

2015-025: Blue Team Army, Powershell, and the need for Blue team education


With last week's revelation from Microsoft that they will support SSH, understanding powershell has become more important than ever as a tool to be used by blue teamers, both for adminstration, and to understand how bad guys will use it for nefarious...


share








 June 8, 2015  34m
 
 

2015-024: Is a good defense the best offense? Interview w/ Mick Douglas!


We had the opportunity to discuss with Mick Douglas the fact that there is a stigma of blue team always being on the losing end of the security. Is it because there are more tools for the pentesters or bad guys, or that it takes a massive IT budget to...


share








 May 31, 2015  49m
 
 

2015-023_Get to know a Security Tool: Security Onion!


Having a more secure network by deploying tools can be no easy task. This week, we show you a tool, Security Onion, that can give you an IDS and log analysis tool in less than 20 minutes.


share








 May 26, 2015  37m
 
 

2015-022: SANS Top 25 Critical Security Controls-#10 and #11


When you're working with network infrastructure, there's a real need for proper configuration management, as well as having a proper baseline to work from. Mr. Boettcher and I continue through the SANS Top25 Critical Security Controls. #10 and #11...


share








 May 17, 2015  56m
 
 

2015-021: 24 Deadly Sins: Command injection


We continue our journey on the 24 Deadly Programming Sins. If you listened to last week's podcast, we introduced the book we were using as a study tool: This week is on command injection. We first discussed command injection as part of our OWASP...


share








 May 11, 2015  40m