Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Introduction
00:00 • 3min
What Really Keeps You Up at Night?
03:10 • 2min
How Did You Become a Civil Engineer?
05:18 • 3min
Is There a Space for Professional Hackers?
08:16 • 3min
The Barriers to Entry in the Cybersecurity Industry
11:28 • 3min
Is There a Way to Break Into the Hacker Industry?
14:50 • 2min
Is There an Imposter Syndrome?
16:28 • 2min
How Much Depends on Current Knowledge?
18:28 • 2min
Secure Works
20:35 • 4min
What Is Happening in the Cyberspace?
24:33 • 2min
Is CrowdSec a Cyber Security Company?
26:36 • 5min
Is It a Matter of Choice, It's Just Adjusting?
31:29 • 4min
What's the Kelchain?
35:08 • 4min
How Do You Harden an Attack Surface?
39:09 • 3min
Zero Days - The Quick Definition of Zero Days
42:25 • 4min
How Do Zero Days Come to Light?
45:56 • 3min
Is There a Zero Day on a Network?
48:51 • 2min
The Kill Chain in the Buckingham Palace Example
50:38 • 2min
The Crown Jewels Are All Right. Challenge Accepted
52:09 • 5min
Is There a Professional Hacker?
56:54 • 3min
Is There a Difference Between Cyber and Offense?
01:00:17 • 5min
Is the World's Best Hackers Working for Governments?
01:04:50 • 4min
Def Con 2324 and 25 - Wireless Capture of the Flag
01:08:50 • 5min
Hacker Movies
01:13:27 • 3min
What Kind of Tools Do Graphics Cards Use?
01:16:40 • 5min
You Know, I'm Not a Computer, but You Can't Make It Me
01:21:17 • 4min
Is Your Network Secure?
01:25:19 • 3min
Is Andrew's Password Summer 2022?
01:28:07 • 3min
The Hashcat Manual Is a Book That I Always Refer To
01:31:10 • 2min
Keeper Security - The Top-Rated Cybersecurity Platform
01:32:54 • 3min