By women. For women. About everything. Standard Issue is a podcast championing women's voices, and packed with interviews, news, film, opinion and humour. For advertising enquiries, email [email protected]
…
continue reading
Standard Issue Podcasts
Wake. Work. Win. Along with some firehouse kitchen table laughs.
…
continue reading
The Rachel Maddow Show airs Mondays at 9pm ET on MSNBC, and shortly thereafter in this feed. **SPECIAL TO THIS FEED: The January 6th hearings and corresponding analysis from Rachel Maddow and other MSNBC panelists is also archived here.
…
continue reading
Where feminism meets fringe. Host Cristen Conger dissects the myths, messes, and media shaping modern womanhood—and un-womanhood. From bisexual imposter syndrome to tall girl therapy, gun culture to birth control backlash, she mentions it all—backed by deep research, sharp interviews, and just enough unseriousness to demystify the uncanny valley of 21st-century patriarchy without doomspiraling. Gender. Power. Culture. Context. Unladylike.
…
continue reading
Podcast by EllensburgFoursquare
…
continue reading
Gary Stevenson – inequality economist, former trader and author of The Trading Game – explains how real world economics work.
…
continue reading
Welcome to The Everygirl Podcast, a resource and community for women that inspires you to become your best self, while also loving who you already are. Join our host–holistic health coach and The Everygirl’s wellness editor, Josie Santi–as she sits down with health experts, entrepreneurs, and pop-culture stars alike to offer insightful conversations designed for women looking to level up their well-being, careers, relationships, and overall lives. We inspire you to go after your goals and pr ...
…
continue reading
A world leading independent energy research institute
…
continue reading
A weekly look inside Oklahoma Politics with KOSU's Michael Cross, Republican political consultant Neva Hill and more.
…
continue reading
Meeting the challenges of an accelerated climate change process requires tackling the problem from the biggest base. With soils having the capability of both meeting our nutritive needs and capturing atmospheric carbon, regenerative agriculture holds promise. The Soilify podcast features short interviews with people from various walks of life working towards expanding regenerative agricultural practices and sequestering soil carbon. For more, visit https://medium.com/@soilify
…
continue reading
A world leading independent energy research institute
…
continue reading
Hosted by Northern Essex Community College students Courtney Spera and Tommy Matatall, Breaking the Norm is all about discussing topics that may at times be uncomfortable to discuss, including politics, social injustices, and current events.
…
continue reading
We need to talk about real life issues and how it takes it tolls on our mental health and well-being in general. The standard of life achievements and success is being raised to the top most pedestal by the day and it seems our inability to be on track with this rat race amounts to some volume of failure, it never suppose to be so we can stay on our own lane and do amazing things. Rule your world , never allow the world rule you.
…
continue reading
The Network Plus PrepCast is your comprehensive audio training series for mastering the CompTIA Network Plus certification. Designed for learners on the go, this prepcast transforms exam objectives into clear, structured, and engaging episodes tailored for auditory learning. Whether you're walking, commuting, or studying between shifts, each episode breaks down complex networking topics into digestible segments aligned with the official CompTIA blueprint. From OSI layers and IP addressing to ...
…
continue reading
Would you like to uncover how Leaders with Heart lead their teams and engage and retain them in the process? Join Heather R. Younger, J.D., the best-selling author of The 7 Intuitive Laws of Employee Loyalty, The Art of Caring Leadership, and The Art of Active Listening. Heather is the Founder and CEO of Customer Fanatix. Join her as she interviews amazing leaders from all over the world and all walks of life to find out what drives them to be more emotionally intelligent leaders with winnin ...
…
continue reading
Discussions about trends, insights and emerging issues impacting the accounts payable and payment functions
…
continue reading
RSS feed for Southeastern FWB College in Wendell, NC. News, Updates, and Current Events.
…
continue reading
Robert Gene, is one of America’s leading experts on stress, trauma, PTSD, addictions, physical healing, and neuroplasticity. He is the creator of eutaptics® FasterEFT™ and CEO of Skills to Change Institute, is a worldwide teacher, international speaker, neuroplastician, behavioral engineer, and drug rehab consultant. eutaptics® FasterEFT™ is a methodology developed by Robert after many years of studying and working with thousands of people from all walks of life. It is a collection of new cu ...
…
continue reading
Welcome to the official free Podcast site from SAGE Publications for Clinical Medicine & Research. SAGE is a leading international publisher of journals, books, and electronic media for academic, educational, and professional markets with principal offices in Los Angeles, London, New Delhi, and Singapore.
…
continue reading
Welcome to Billion Dollar Babie, the podcast designed to help you create YOUR billion-dollar life! This mind-shifting new show (available as a podcast or Youtube video) is hosted by serial entrepreneur Tara Electra, the CEO and Co-Founder of Unruly Agency, a full-scale agency that specializes in social media management, influencer marketing, content creation, and much more. But this isn't your standard entrepreneurial podcast. Tara is getting into bed (literally) with entrepreneurs, thought- ...
…
continue reading
Move more of your body more often and in more interesting ways with the Get-Fit Guy! If you want to begin an exercise routine and don't know where to start, or if you've been working out for a while and aren't getting the results you want, Kevin Don will give you the tips you need to reach your fitness and movement goals. Get expert information on the latest fitness trends and advice on everything from toning your arms to running a 5K or simply building more movement into your day. With his ...
…
continue reading
Music and "justice" as seen through the eyes of a prisoner on death row and musician at large. One-half of the duo Gil Scott-Heron and Brian Jackson, Brian and Keith LaMar talk about life growing through three generations of American conflict and how music has helped them to free themselves from the bondage of hate and resentment.
…
continue reading
Master Gordon Jue is an ITF 8th Dan and Mr. David Jue, 4th Dan and a 3 time ITF World Champion. They discusses the 24 ITF patterns, the principles and technical ideas of each pattern. To get more exclusive content by subscribing Tul World+ https://www.juestkd.com/virtual-membership
…
continue reading
Coming innovations, thought-provoking trends, questions that matter to the court community, these and more themes are covered by the Court Leader’s Advantage podcast series, a forum by court professionals for court professionals to share experiences and lessons learned.
…
continue reading
The Haitian-American experience is just that, an experience! As women, we live in duality. Most of us have had to operate under two schools of thought, the American way and the Haitian way. The two worlds are not the same. Despite being in our thirties, forties, and even fifties, we are still trying to find our place in a world that is not always so inviting or forgiving. Join Ritha and Freddie as they explore love, faith, friendship, family, and career.
…
continue reading

1
Thinking Transportation: Engaging Conversations about Transportation Innovations
Texas A&M Transportation Institute
Our ability to get from Point A to Point B is something lots of us take for granted. But transporting people and products across town or across the country every day is neither simple nor easy. Join us as we explore the challenges on Thinking Transportation, a podcast about how we get ourselves — and the things we need — from one place to another. Every other week, an expert from the Texas A&M Transportation Institute or other special guest will help us dig deep on a wide range of topics. Fi ...
…
continue reading
Hello inhabitants of the outside world!! You’ve cracked the code and arrived to a place beyond your reality. Welcome to the realm of IzzyLand, where creativity is endless!! I’m Ismail Bolden - a fellow content creator that dabbles with a wide range of issues and interests. That’s exactly what you’ll find here in the most uncut, uncensored, unscripted way possible. Every week a new discussion, a new idea, or a new problem arises. But what remains true is that you’ll leave mind blown and with ...
…
continue reading
This podcast contain an unnecessarily critical so just read between the lines, please P.S Kalo lo punya pertanyaan, masukan atau ide untuk buat gua bahas. bisa langsung kirim email ke [email protected]
…
continue reading
Each episode of AJP Audio brings you an in-depth look at one of the articles featured in that month’s issue of The American Journal of Psychiatry, the official journal of the American Psychiatric Association. Wide-ranging interviews with article authors cover the background, rationale, main findings, and future implications of the research. This podcast is subject to the Terms of Use at ww.psychiatry.org. The views and opinions expressed in this podcast are those of the individual speakers o ...
…
continue reading
Welcome to THE podcast dedicated to improving your life and your relationships. Join me weekly for an informative, no holds barred, straight - no chaser discussion of dating, sex, and relationships designed to help you navigate these dating streets. Want more? Head on over to the website - https://jamedareaves.com/ and sign up so you'll be notified once the site launches. Do you have comments, feedback, or requests? If so, you can reach out to me at [email protected]
…
continue reading
BMTT is an unscripted, no-holds-barred podcast based in Seoul. We talk pop culture, current issues, and pretty much whatever else holds our interest. It’s basically a volatile mixture of praising the good and trashing the bad according to the universal standard—us. Sheltered souls and members of the PC brigade beware: this ain’t your grandma’s bingo party.
…
continue reading
APA Journals Dialogue is an audio podcast series featuring interviews with authors of exciting research recently published in an APA journal. In each episode, authors describe their findings, methodologies, and implications for future work. The podcast series is an ideal resource for researchers, practitioners, and students in the behavioral and social sciences.
…
continue reading
Welcome to the ultimate Dynasty Fantasy Basketball Podcast! Tired of fantasy basketball podcasts that only mention Dynasty Leagues once or twice a year? You're not alone. Dynasty formats deserve more and that’s exactly what this pod delivers. Hosted by Mark C and powered by SportsEthos, this all-Dynasty Fantasy Basketball podcast dives deep into the NBA's long game. From buy-low/sell-high player advice, in-depth rookie scouting reports, long-term strategy breakdowns, to team breakdowns, we’v ...
…
continue reading
Butler is a civil litigation firm. We are unique because our practice is devoted entirely to defense and insurance litigation. At Butler, our goal is to stay on top of the latest alerts, trends and news so that we can provide you with the most up to date information possible. Stay tuned in for more Butler Podcasts coming soon.
…
continue reading
Welcome to the official free Podcast site from SAGE for Veterinary Science. SAGE is a leading international publisher of journals, books, and electronic media for academic, educational, and professional markets with principal offices in Los Angeles, London, New Delhi, and Singapore.
…
continue reading
Ready to finally get to the bottom of your skin issues? If you’ve been searching for answers beyond the standard prescriptions and creams — welcome! The Healthy Skin Show is your go-to podcast for sensitive skin warriors who are ready to dig deep, challenge the status quo, and uncover the real root causes behind stubborn skin problems that just won’t quit. Hosted by clinical nutritionist Jennifer Fugo — a leading expert in functional nutrition for chronic skin conditions — each episode takes ...
…
continue reading
Interviews with mathematics education researchers about recent studies. Hosted by Samuel Otten, University of Missouri. www.mathedpodcast.com Produced by Fibre Studios
…
continue reading
Covering ACC Football and beyond. We talk Atlantic Coast Conference football and NCAA news. Weekly recaps on the games, and predictions for the coming week are standard, and we branch out into conference realignment, players of the week, and award and draft chatter as they come up. Boston College Eagles, Virginia Cavaliers, Virginia Tech Hokies, North Carolina Tarheels, Duke Blue Devils, NC State Wolfpack, Wake Forest Demon Deacons, Clemons Tigers, Georgia Tech Yellow Jackets, Florida State ...
…
continue reading
This Food Industry focused podcast brings together Xtalks editorial staff to share insights into the latest B2B industry news. Xtalks connects professionals in the life science, medical device, and food industries with useful content like webinars, job opening, articles and virtual meetings.
…
continue reading
Karis Kelly's award-winning play Consumed is about to tour the UK, so Hannah grabbed the chance to chat with the playwright about Northern Ireland in the arts, mother-daughter relationships, religion, superstition, OCD, trans-generational trauma, blood on stage and a lot more. Tickets for Consumed can be bought here: https://painesplough.com/produc…
…
continue reading

1
Standard ReIssue: Fire Service Generations
33:41
33:41
Play later
Play later
Lists
Like
Liked
33:41We revisit our conversation from a few years back with Bill Kraus and his son, Ben. We talk about working in the fire service for the same department, as well as competition, camaraderie, and the importance of surrounding themselves with better people. Wake Work & Win by joining our Patreon. Get access to more episodes, video …
…
continue reading

1
Episode 184: Network Troubleshooting Methodology Recap and Exam Readiness
13:04
13:04
Play later
Play later
Lists
Like
Liked
13:04To wrap up the series, this episode reviews the full troubleshooting methodology—from identifying the problem to documenting the fix. We walk through common scenarios, showing how the steps apply in real life and what tools are best suited for each phase. You’ll revisit techniques for isolating symptoms, confirming theories, and verifying solutions…
…
continue reading

1
Episode 183: BYOD, Licensing Issues, and Troubleshooting Oddities
18:10
18:10
Play later
Play later
Lists
Like
Liked
18:10Not every issue fits into neat categories. In this episode, we address edge-case problems like Bring Your Own Device (BYOD) compatibility, expired licenses on security appliances, and odd client behaviors that defy conventional logic. You’ll learn how mobile OS updates, unsupported encryption protocols, or insufficient license capacity can cause my…
…
continue reading

1
Episode 182: Optical, Hardware, and Performance Issues — Identifying and Resolving Problems
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23This episode revisits advanced troubleshooting at the hardware and optical layer. We cover transceiver problems, dirty fiber connectors, power mismatches, and switch backplane limitations. You'll learn how to read interface stats for clues, test suspect links, and isolate faults in a complex network environment. We also explain how hardware limits—…
…
continue reading

1
Episode 181: DNS and NTP Failures — Troubleshooting Name and Time Resolution
15:15
15:15
Play later
Play later
Lists
Like
Liked
15:15DNS and NTP are often invisible—until they fail. This episode shows how to diagnose and fix issues with domain name resolution and time synchronization, both of which affect authentication, connectivity, and performance. You’ll learn how to use nslookup, dig, and ntpq to troubleshoot problems and interpret server behavior. We also cover how expired…
…
continue reading

1
Episode 180: Asymmetric Routing, Multicast Flooding, and ACL Misconfigurations
14:54
14:54
Play later
Play later
Lists
Like
Liked
14:54Some network issues are subtle, involving advanced concepts like asymmetric routing, multicast flooding, and access control list (ACL) errors. This episode explains how asymmetric routing—where traffic returns on a different path than it arrived—can confuse firewalls and lead to dropped packets. We discuss how to diagnose and design around this beh…
…
continue reading

1
Episode 179: Collision Domains, Broadcast Storms, and Routing Loops
14:32
14:32
Play later
Play later
Lists
Like
Liked
14:32Poor network segmentation can lead to serious Layer 2 and Layer 3 problems. In this episode, we explain how excessive collision domains on legacy hubs or poorly configured switches can slow performance and cause retransmissions. We also dive into broadcast storms—where unchecked broadcast traffic floods the network—and routing loops, which occur wh…
…
continue reading

1
Episode 178: Routing Troubleshooting — Missing Routes, DHCP, and Address Conflicts
14:58
14:58
Play later
Play later
Lists
Like
Liked
14:58Routing issues can silently break connectivity—even if everything looks fine at Layer 2. In this episode, we diagnose common routing problems, including missing default routes, misconfigured static routes, and incorrectly advertised subnets. You'll learn how to use ping, traceroute, and routing tables to spot when traffic is being dropped or misrou…
…
continue reading

1
Episode 177: Network Foundations — VLAN, Interface, and Configuration Checks
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23Sometimes network issues stem from the basics: incorrect VLAN assignment, disabled interfaces, or outdated configurations. This episode walks through foundational network checks that resolve a surprising number of connectivity issues. You'll learn how to verify trunk ports, check interface status, review MAC address tables, and ensure endpoints are…
…
continue reading

1
Episode 176: Wireless Configuration Problems — SSID, Encryption, and Client Issues
14:40
14:40
Play later
Play later
Lists
Like
Liked
14:40Even if the signal is strong, configuration mistakes can block connectivity. This episode addresses common wireless configuration errors such as mismatched SSIDs, incorrect security settings, or outdated drivers on client devices. You’ll learn how WPA2 vs. WPA3 affects compatibility, how authentication failures are logged, and what to check when cl…
…
continue reading

1
Episode 175: Wireless Issues — Antenna Placement, Channels, and Signal Loss
14:53
14:53
Play later
Play later
Lists
Like
Liked
14:53Signal problems are among the most common wireless complaints—and many stem from poor antenna planning. This episode examines how antenna placement, orientation, and environment affect signal propagation. You'll learn the difference between omnidirectional and directional antennas and how line-of-sight, reflection, and absorption affect coverage. W…
…
continue reading

1
Episode 174: Wireless Limitations — Throughput, Signal Strength, and Power
14:32
14:32
Play later
Play later
Lists
Like
Liked
14:32Wireless technology is incredibly convenient—but also limited by physical and environmental factors. In this episode, we explore the inherent constraints of wireless communication, such as reduced throughput compared to wired networks, signal degradation over distance, and interference from walls, other devices, or even weather. You’ll learn how to…
…
continue reading

1
Episode 173: Interface, Routing, and Platform-Specific Diagnostics
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51Every device platform—whether Cisco, Juniper, or another—has its own diagnostic approach. In this episode, we explore common troubleshooting techniques across routers and switches, focusing on interface states, routing tables, and platform-specific commands. You’ll learn how to interpret “up/down” messages, diagnose err-disabled ports, and use comm…
…
continue reading

1
Episode 172: Infrastructure Tools — TFTP, Terminal Emulators, and Basic Commands
14:28
14:28
Play later
Play later
Lists
Like
Liked
14:28Some of the most essential network management tools are also the most overlooked. This episode covers infrastructure tools such as TFTP servers for file transfers, terminal emulators like PuTTY and SecureCRT for CLI access, and core diagnostic commands including ping, traceroute, ipconfig, and netstat. You’ll learn how these tools assist with confi…
…
continue reading

1
Episode 171: Network Discovery and Performance Monitoring
14:12
14:12
Play later
Play later
Lists
Like
Liked
14:12Network visibility starts with knowing what’s on your network. In this episode, we explain network discovery techniques using tools like ping sweeps, SNMP queries, and Nmap scans to identify devices, operating systems, and open services. You’ll learn how to distinguish active vs. passive discovery methods, the importance of using up-to-date invento…
…
continue reading

1
Episode 170: Packet Inspection and Traffic Analysis Tools
15:17
15:17
Play later
Play later
Lists
Like
Liked
15:17To truly understand what’s happening on the network, you need to inspect the packets themselves. This episode introduces tools like Wireshark, tcpdump, and protocol analyzers that allow you to capture and analyze live traffic. You’ll learn how to filter by IP, port, or protocol, and how to identify patterns like retransmissions, failed handshakes, …
…
continue reading

1
Episode 169: Wireless Troubleshooting — Tools and Bandwidth Analysis
15:04
15:04
Play later
Play later
Lists
Like
Liked
15:04Wireless networks introduce a layer of complexity that often demands specialized tools for visibility. In this episode, we cover wireless troubleshooting utilities including site survey tools, spectrum analyzers, and signal heatmaps. These help you diagnose issues like dead zones, co-channel interference, and excessive client density. We also explo…
…
continue reading

1
Episode 168: Advanced Tools for Fiber Optics and Signal Testing
15:41
15:41
Play later
Play later
Lists
Like
Liked
15:41Fiber requires a different class of diagnostic tools due to its precision and sensitivity. In this episode, we cover devices like OTDRs (Optical Time Domain Reflectometers), power meters, and visual fault locators. You’ll learn how these tools detect breaks, signal loss, and connector issues with pinpoint accuracy. OTDRs, for example, send pulses o…
…
continue reading

1
Episode 167: Cable Testing Tools — Crimpers, Punchdowns, and Locators
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20Troubleshooting starts with the right tools. In this episode, we walk through the essential cable testing and installation tools you’ll use on the job. These include crimpers for RJ-45 connectors, punchdown tools for keystone jacks and patch panels, and continuity testers for verifying wire maps. You’ll also learn how cable locators and tone genera…
…
continue reading

1
Episode 166: Link Layer Diagnostics — Duplexing, Transceivers, and LEDs
14:54
14:54
Play later
Play later
Lists
Like
Liked
14:54Link-level problems are easy to overlook but frequently cause intermittent issues. This episode explores duplex mismatches—where one device is set to full duplex and the other to half—leading to collisions, retransmissions, and degraded performance. We explain how to spot and correct these mismatches using port configuration and interface statistic…
…
continue reading

1
Episode 165: Common Cable Faults, Errors, and Hardware Issues
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39Even a well-designed network can experience hardware or cabling faults over time. This episode breaks down common problems such as broken connectors, bent pins, cable kinks, and worn insulation. We explain how these physical issues translate into dropped packets, CRC errors, and link flapping. Recognizing these symptoms early helps prevent widespre…
…
continue reading

1
Episode 164: Cable Performance Specifications and Specialized Applications
15:32
15:32
Play later
Play later
Lists
Like
Liked
15:32Cable problems can often look like application issues, but they require a different kind of troubleshooting. In this episode, we review cable specifications like length limits, signal loss, impedance, and interference resistance. You'll learn how to recognize mismatches between cable category and intended use, such as trying to run 10 Gbps over Cat…
…
continue reading

1
Episode 163: Troubleshooting Methodology — Implementing Solutions and Documentation
15:43
15:43
Play later
Play later
Lists
Like
Liked
15:43Once you’ve confirmed the cause of a network issue, it's time to solve it. This episode covers the final stages of the troubleshooting methodology: establishing a plan of action, implementing the solution, verifying functionality, and documenting everything. You’ll learn how to evaluate risk before making changes, how to plan rollback strategies, a…
…
continue reading

1
Episode 162: Troubleshooting Methodology — Identifying Problems and Probable Causes
15:51
15:51
Play later
Play later
Lists
Like
Liked
15:51The foundation of effective troubleshooting is a structured approach. In this episode, we introduce the CompTIA troubleshooting methodology, focusing on the first few steps: identifying the problem, establishing a theory of probable cause, and testing that theory. You'll learn how to ask the right questions, collect information from logs and users,…
…
continue reading

1
Episode 161: Welcome to Domain 5 — Network Troubleshooting
16:15
16:15
Play later
Play later
Lists
Like
Liked
16:15In this final domain, we turn our focus to troubleshooting—a skill that ties together everything you’ve learned so far. This episode introduces Domain 5 and outlines the key areas it covers, including troubleshooting methodology, cable testing, routing diagnostics, wireless issues, and performance analysis. Unlike previous domains that focused on s…
…
continue reading

1
Episode 160: Detection Methods and Prevention through Training
15:01
15:01
Play later
Play later
Lists
Like
Liked
15:01Security tools can’t catch every threat—but informed users often can. This episode looks at the balance between technical detection methods and user-driven prevention. We start by examining detection tools like antivirus, IDS/IPS, SIEM platforms, and anomaly-based monitoring. You’ll learn how these systems generate alerts, how tuning reduces false …
…
continue reading

1
Episode 159: Physical Security Fundamentals — Access Control and Asset Disposal
17:09
17:09
Play later
Play later
Lists
Like
Liked
17:09While cyber defenses are critical, physical security is just as important. In this episode, we explain how physical access controls protect infrastructure from unauthorized tampering, theft, or sabotage. You’ll learn about badge systems, biometrics, mantraps, camera placement, and hardware locks. These controls help restrict access to wiring closet…
…
continue reading

1
Episode 158: Advanced Wireless Security — MAC Filters, Client Isolation, and Captive Portals
13:21
13:21
Play later
Play later
Lists
Like
Liked
13:21Wireless networks require layered security controls to keep unauthorized users out and ensure a clean client experience. In this episode, we cover advanced wireless protections including MAC filtering, client isolation, and captive portals. MAC filtering adds a basic layer of access control by allowing or denying clients based on their hardware add…
…
continue reading

1
Episode 157: Firewall Rules and ACL Management
13:56
13:56
Play later
Play later
Lists
Like
Liked
13:56Firewalls and access control lists are the gatekeepers of your network, and understanding how to configure them correctly is essential. This episode explains how to structure firewall rules and ACLs (Access Control Lists) using principles like implicit deny, least privilege, and rule order. You'll learn how rules are evaluated top-down and why a mi…
…
continue reading

1
Episode 156: Hardening Network Devices — Interfaces, Passwords, and Firmware Management
9:28
9:28
Play later
Play later
Lists
Like
Liked
9:28Securing the network starts with securing its devices. In this episode, we focus on hardening best practices for routers, switches, and firewalls. This includes disabling unused interfaces, enforcing strong password policies, and limiting access with ACLs and administrative timeouts. We also explore remote access security—ensuring SSH replaces Teln…
…
continue reading

1
Episode 155: Dynamic ARP Inspection, DHCP Snooping, and Control Plane Policing
12:03
12:03
Play later
Play later
Lists
Like
Liked
12:03Advanced network protection mechanisms focus on securing internal traffic and device behavior. This episode introduces three such features: Dynamic ARP Inspection (DAI), DHCP Snooping, and Control Plane Policing (CoPP). DAI helps detect and block ARP spoofing attempts by validating ARP packets against known trusted entries. This is especially impor…
…
continue reading

1
Episode 154: Network Hardening Essentials — SNMP, Router Advertisements, and Port Security
11:41
11:41
Play later
Play later
Lists
Like
Liked
11:41Hardening your network means reducing its attack surface and securing its services. In this episode, we look at three high-priority hardening practices: securing SNMP, managing router advertisements, and implementing port security. You’ll learn how to disable or reconfigure SNMPv1/v2 in favor of SNMPv3, ensuring encrypted and authenticated device m…
…
continue reading

1
Episode 153: Phishing, Tailgating, and Physical Threats
11:03
11:03
Play later
Play later
Lists
Like
Liked
11:03Security doesn’t stop at the firewall—physical access and social manipulation play a major role in network compromise. In this episode, we explore phishing in its many forms, including spear phishing, whaling, and smishing (SMS-based phishing). You’ll learn how attackers use psychological manipulation and trust to trick users into revealing credent…
…
continue reading

1
Episode 152: IP Spoofing, Deauthentication, and Social Engineering
12:11
12:11
Play later
Play later
Lists
Like
Liked
12:11Some of the most dangerous network threats don’t rely on malware—they rely on deception. In this episode, we explore IP spoofing, a method where attackers forge source IP addresses to disguise their origin or impersonate trusted devices. You’ll learn how spoofed packets can bypass access controls, flood systems, or launch man-in-the-middle and ampl…
…
continue reading

1
Episode 151: Ransomware, Malware, and Password Attacks
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17Malicious software remains one of the most common and destructive threats to networks and users alike. In this episode, we examine different types of malware, focusing on ransomware, spyware, and trojans—each with unique goals and attack vectors. You’ll learn how ransomware encrypts data and demands payment, often targeting entire organizations wit…
…
continue reading

1
Episode 150: ARP Spoofing, MAC Spoofing, and Rogue Devices
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55When devices pretend to be something they’re not, serious security problems can follow. This episode focuses on spoofing attacks—specifically ARP spoofing and MAC address spoofing—that allow attackers to intercept or redirect traffic within a local network. You’ll learn how ARP spoofing poisons the ARP table of nearby devices to reroute traffic thr…
…
continue reading

1
Episode 149: VLAN Hopping and Layer 2 Exploits
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47VLANs offer segmentation—but they’re not invulnerable. In this episode, we look at how attackers can bypass VLAN boundaries using VLAN hopping techniques like double-tagging and switch spoofing. You’ll learn how misconfigured trunk ports, native VLANs, and default switch behaviors create opportunities for unauthorized access between VLANs. We also …
…
continue reading

1
Episode 148: On-Path Attacks and DNS Poisoning — Network Compromise Techniques
13:57
13:57
Play later
Play later
Lists
Like
Liked
13:57On-path attacks, formerly known as man-in-the-middle attacks, are some of the most dangerous network threats. In this episode, we explain how attackers insert themselves into the communication path between devices to intercept, modify, or impersonate data. You’ll learn about ARP spoofing, rogue gateways, and SSL stripping—each with their own vector…
…
continue reading

1
Episode 147: Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51Denial-of-Service attacks aim to disrupt services by overwhelming a system’s resources—and understanding how they work is key to protecting against them. This episode covers the types of DoS attacks, including protocol, volumetric, and application-layer variants. We then examine how Distributed DoS (DDoS) attacks scale the damage by launching traff…
…
continue reading

1
Episode 146: Risk Management, Security Assessments, and SIEM
14:21
14:21
Play later
Play later
Lists
Like
Liked
14:21Every security decision is about balancing risk, and in this episode, we dive into how organizations identify, measure, and manage those risks. You’ll learn the components of a risk management framework, including risk identification, assessment, mitigation, and ongoing monitoring. We explain the difference between qualitative and quantitative asse…
…
continue reading

1
Episode 145: Securing Access with 802.1X and EAP
15:28
15:28
Play later
Play later
Lists
Like
Liked
15:28802.1X is the gatekeeper of modern enterprise networks, ensuring only authenticated users and devices can connect. This episode explains how 802.1X works as a port-based network access control mechanism, acting as the foundation for many secure wireless and wired deployments. You’ll learn about the three roles in 802.1X: the supplicant (client), th…
…
continue reading

1
Episode 144: Centralized Authentication — TACACS+, RADIUS, SSO, and Directory Services
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:39Centralized authentication simplifies user management while enhancing security. In this episode, we compare two core protocols—TACACS+ and RADIUS—and explain their roles in authenticating access to network infrastructure devices. You’ll learn how TACACS+ provides command-level control and full separation of authentication, authorization, and accoun…
…
continue reading

1
Episode 143: Advanced Security Mechanisms — NAC, Honeypots, and Authentication Models
15:02
15:02
Play later
Play later
Lists
Like
Liked
15:02Beyond basic firewalls and access controls, advanced security mechanisms offer deeper visibility and proactive defense. In this episode, we explore Network Access Control (NAC), a system that evaluates a device’s health and compliance status before granting access to the network. NAC solutions can quarantine non-compliant systems, require updates, …
…
continue reading

1
Episode 142: Zero Trust and Defense in Depth Models
14:55
14:55
Play later
Play later
Lists
Like
Liked
14:55Zero Trust networking flips the traditional perimeter-based security model on its head. In this episode, we unpack the Zero Trust principle of “never trust, always verify,” and explore how it applies to network design. You’ll learn how Zero Trust assumes breach by default and demands continuous authentication, authorization, and monitoring regardle…
…
continue reading

1
Episode 141: Principle of Least Privilege and RBAC
14:53
14:53
Play later
Play later
Lists
Like
Liked
14:53Security in networking isn’t just about blocking attacks—it’s about minimizing exposure by limiting what users and systems can access. In this episode, we examine the Principle of Least Privilege (PoLP), which states that users should have only the access they need to perform their duties—no more, no less. You’ll learn how this concept applies not …
…
continue reading

1
Episode 140 — Vulnerabilities, Exploits, and Exposure Concepts
13:59
13:59
Play later
Play later
Lists
Like
Liked
13:59This episode dives into the foundational security concepts of vulnerabilities, exploits, and exposures—terms that appear throughout the Network Plus exam and underpin much of what cybersecurity involves. We begin by defining what constitutes a vulnerability, whether it’s a flaw in software, a misconfiguration in hardware, or a weakness in protocol …
…
continue reading

1
Episode 139: The CIA Triad and Types of Network Threats
14:46
14:46
Play later
Play later
Lists
Like
Liked
14:46Every security strategy begins with the CIA Triad—Confidentiality, Integrity, and Availability. In this episode, we explore how these three principles guide all security policies and how various threats can undermine each one. Confidentiality threats include unauthorized access and data breaches. Integrity threats involve tampering, spoofing, or un…
…
continue reading

1
Episode 138: Welcome to Domain 4 — Network Security
13:52
13:52
Play later
Play later
Lists
Like
Liked
13:52Domain 4 marks a transition from availability and performance into security—protecting the integrity and confidentiality of the network. In this episode, we introduce the core topics that make up Network Security, including authentication, access control, attack types, and hardening techniques. The goal of this domain is to teach you how to prevent…
…
continue reading

1
Episode 137: Backup and Restore for Network Devices
13:52
13:52
Play later
Play later
Lists
Like
Liked
13:52Configuration data is as critical as hardware—and losing it can lead to hours of downtime. In this episode, we walk through backup and restore procedures for routers, switches, firewalls, and other network appliances. You’ll learn how to use TFTP, FTP, or USB-based methods to copy and store configurations, and how to schedule automated backups usin…
…
continue reading