Episodios

  • Welcome to the SANS GSEC Audio Course
    1 m
  • Episode 90 — Exam Acronyms and Essential Terms: High-Yield Glossary for GIAC GSEC
    Oct 22 2025

    This episode consolidates high-yield acronyms and essential terms into a practical exam-readiness review, focusing on precision and context because GSEC questions often turn on subtle wording differences and overlapping definitions. You’ll connect common security vocabulary across access control, networking, cryptography, monitoring, incident response, and governance, and you’ll practice distinguishing terms that are frequently confused, such as authentication versus authorization, hashing versus encryption, stateful versus stateless filtering, and policy versus standard versus procedure. We’ll use short scenario-style cues to show how the exam signals which term it is really testing, and we’ll reinforce best practices for eliminating distractors by matching the term to the control objective and the failure mode described. The goal is not memorization in isolation, but faster recognition and more consistent answer selection under time pressure, with emphasis on reading carefully, identifying scope, and validating the most defensible interpretation of the question stem. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Más Menos
    11 m
  • Episode 89 — Audit Windows and Use PowerShell Safely: Telemetry, Basics, and Forensic Readiness
    Oct 22 2025

    This episode explains Windows auditing and PowerShell safety as two sides of the same operational reality: PowerShell is a legitimate admin tool and a common attacker tool, so visibility and discipline must be built in from the start, which is a frequent GSEC scenario pattern. You’ll learn what useful Windows telemetry looks like for investigations, including authentication events, privilege changes, process and service activity, and script execution evidence, then connect that to how PowerShell can be used for automation, remote administration, and also living-off-the-land attacks. We’ll use scenarios like suspicious remote script execution, encoded command usage, and abnormal administrative activity that blends with normal operations, then focus on best practices such as restricting who can run privileged scripts, using signed scripts where feasible, monitoring high-risk execution patterns, and ensuring logs are centrally collected and retained. Troubleshooting includes determining whether a PowerShell alert is benign automation or malicious activity, validating that audit policies are actually enabled, and ensuring systems are time-synced and configured so event records support reliable timelines. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Más Menos
    11 m
  • Episode 88 — Enforce Windows Security Policy: Group Policy Concepts and INF Template Thinking
    Oct 22 2025

    This episode focuses on Windows policy enforcement through Group Policy concepts and template-style configuration thinking, aligning with GSEC questions that test whether you understand how consistent settings are applied and audited at scale. You’ll connect policy objects to organizational units, inheritance, and precedence, then explain why policy design affects both security and operational stability when settings collide or are overridden by local changes. We’ll discuss security baselines as standardized configurations that reduce drift, and how template-driven approaches help ensure repeatability, evidence, and quick recovery when systems deviate from approved settings. Scenarios include enforcing password and lockout policies, restricting local admin rights, hardening auditing settings, and applying firewall configurations across fleets, with troubleshooting guidance for common problems like policy not applying due to scope, conflicting settings, slow refresh cycles, or mislinked objects. Best practices emphasize change control, staged deployment, verification through reporting, and documentation that ties each policy to a control objective and a measurable security outcome. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Más Menos
    11 m
  • Episode 87 — Apply Windows Access Controls Correctly: NTFS, Shares, Registry, AD, and Privileges
    Oct 22 2025

    This episode explains Windows access controls as layered enforcement mechanisms that must align, which is a common GSEC exam trap when questions mix NTFS permissions, share permissions, registry permissions, and directory-based authorization. You’ll learn how NTFS controls protect files and folders, how share permissions add an additional layer for network access, and why the effective permission is the intersection of both, not whichever looks more permissive in isolation. We’ll connect registry access to system integrity and persistence risk, and we’ll explain how Active Directory permissions and privilege assignments can enable powerful actions even when file access seems locked down. Scenarios include a file share exposed more broadly than intended, a user able to modify a service configuration through permissions inheritance, and a troubleshooting case where access is denied because of conflicting share and NTFS settings. Best practices emphasize role-based group assignment, minimal explicit denies, careful inheritance design, separation of administrative accounts, and verification of effective permissions using real access tests and logs rather than assumptions based on one configuration screen. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Más Menos
    12 m
  • Episode 86 — Understand Windows Security Infrastructure: Accounts, Groups, Domains, and Trust Relationships
    Oct 22 2025

    This episode builds an exam-ready understanding of Windows security infrastructure by focusing on how accounts, groups, and domain relationships determine access and attack paths, which is central to many GSEC scenario questions. You’ll review local versus domain identities, how group membership drives privileges, and why domain architecture and trust relationships can extend both capability and risk across environments. We’ll discuss how attackers exploit weak identity hygiene through credential theft, excessive group membership, shared admin usage, and poorly controlled trusts that enable lateral movement. Scenarios include a workstation compromise that escalates via cached credentials, an admin group that unintentionally includes non-admin users through nesting, and a trust that allows access where segmentation and policy assumed separation. Best practices emphasize least privilege group design, clear administrative tiers, strong authentication for privileged accounts, and logging that supports attribution of high-impact actions, with troubleshooting guidance for interpreting access failures without “fixing” them by granting broad permissions that create persistent risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Más Menos
    12 m
  • Episode 85 — Understand macOS Security Features: Gatekeeper, SIP, Sandboxing, and Encryption
    Oct 22 2025

    This episode explains macOS security mechanisms in practical terms and ties them to the GSEC expectation that you can identify what a platform feature protects against and where its limits are. You’ll connect Gatekeeper to application trust and execution control, SIP to protecting critical system areas from tampering even by privileged processes, sandboxing to limiting what apps can access, and disk encryption to reducing exposure when devices are lost or stolen. We’ll use scenarios such as a user installing unverified software, malware attempting persistence by modifying protected paths, and a device theft where encryption and recovery controls determine whether data is exposed. Best practices emphasize keeping OS updates current, enforcing secure configuration baselines, controlling admin privileges, and using monitoring and policy to detect risky behaviors like unsigned binaries, unusual permission prompts, or security feature disablement attempts. Troubleshooting includes distinguishing legitimate developer workflows from risky bypasses and validating that platform protections are enabled and effective, not just assumed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Más Menos
    13 m
  • Episode 84 — Secure Containers Correctly: Images, Registries, Isolation Limits, and Runtime Controls
    Oct 22 2025

    This episode teaches container security as a lifecycle problem that starts with image trust and continues through runtime enforcement, which is increasingly relevant to GSEC-style questions about modern infrastructure risk. You’ll define the difference between an image and a running container, then connect supply chain risks to registries, image provenance, and the danger of pulling untrusted or outdated images that include vulnerabilities and hidden tooling. We’ll explain isolation limits by clarifying that containers share a host kernel, so misconfigurations and excessive privileges can turn a container compromise into host compromise or lateral movement. Scenarios include a container running as root with broad host mounts, secrets baked into images, and a runtime that allows unrestricted outbound access for command-and-control. Best practices include minimal base images, vulnerability scanning with remediation workflows, signed images where feasible, least privilege runtime settings, network segmentation, and monitoring for container behavior anomalies, plus troubleshooting guidance for balancing security controls with deployment reliability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Más Menos
    12 m