Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Introduction
00:00 • 3min
Barricade Cyber Solutions
02:38 • 4min
How to Get Into Cyberspace With the Help of a Router Switchcard
07:06 • 2min
Russia Linked a P T Behavior
08:51 • 6min
The Threat Actors' Platform for Malware
14:21 • 4min
Mikeers Off's Investigation Into the Forging of Government Email Accounts
18:23 • 3min
The White House's Cyber Security Strategy
21:43 • 3min
Anti-Siphon Training
24:46 • 3min
How to Be a Successful Cyber Community Member
27:34 • 4min
Ufe Bootkit Leaked on Github
31:31 • 5min
The Rise of Dark Web Marketplaces
36:47 • 4min
Geofencing Malware
40:28 • 4min
Move It: A Software That Helps With Backups
44:48 • 6min
The Seventies Funk
50:25 • 3min
Alan Norse and Andrew Colman on Pro
52:57 • 1min
How to Wear Suits to a Job Interview
54:12 • 2min
How to Be a Better Runner
56:14 • 5min
How to Transition to a Cafe Light
01:01:30 • 2min
The Jesse Johnson Study Group
01:03:53 • 3min
How to Build a Security Conscious Dev Ops Pipeline
01:06:33 • 3min
How to Get Callbacks From Employers
01:09:09 • 2min
How to Get a Five-Dollar Hauler
01:11:12 • 2min
How to Get a Master's Degree in Cyber Security
01:13:09 • 2min
How to Be a Successful Sock Analyst
01:15:08 • 3min


