Artwork

Content provided by TEK or DIE. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by TEK or DIE or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

DEF CON: The Survival Guide

10:54
 
Share
 

Archived series ("Inactive feed" status)

When? This feed was archived on March 11, 2024 12:23 (6M ago). Last successful fetch was on September 14, 2024 18:04 (6d ago)

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 328994544 series 3322592
Content provided by TEK or DIE. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by TEK or DIE or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Send us a text

DEF CON is one of the world's largest and most notable hacker conventions, held annually in Las Vegas, Nevada. Ebony Nyenya breaks down how to enjoy the convention without getting hacked.
Concepts covered in this episode include:
Security+ Objective 1.4: Given a scenario, analyze potential indicators associated with network attacks.

  • Wireless
  • Radio frequency identification (RFID)
  • On-path attack (previously known as man-in-the-middle attack/ man-in-the-browser attack

Security+ Objective 2.7: Explain the importance of physical security controls.

  • Faraday cages

Security+ Objective 3.4: Given a scenario, install and configure wireless security settings.

  • Methods
  • Enterprise vs. Open

Security+ Objective 3.8: Given a scenario, implement authentication
and authorization solutions.

  • Authentication/authorization
  • 802.1X
  • RADIUS

If you got value out of this episode, subscribe to this podcast and please share this conversation with someone who will benefit from it.
I'm also on YouTube
so check it out for additional content, visuals, etc.

🎤 Don’t forget you can listen to the podcast here on Spotify

🎤 And here on Apple podcasts

  continue reading

38 episodes

Artwork
iconShare
 

Archived series ("Inactive feed" status)

When? This feed was archived on March 11, 2024 12:23 (6M ago). Last successful fetch was on September 14, 2024 18:04 (6d ago)

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 328994544 series 3322592
Content provided by TEK or DIE. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by TEK or DIE or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Send us a text

DEF CON is one of the world's largest and most notable hacker conventions, held annually in Las Vegas, Nevada. Ebony Nyenya breaks down how to enjoy the convention without getting hacked.
Concepts covered in this episode include:
Security+ Objective 1.4: Given a scenario, analyze potential indicators associated with network attacks.

  • Wireless
  • Radio frequency identification (RFID)
  • On-path attack (previously known as man-in-the-middle attack/ man-in-the-browser attack

Security+ Objective 2.7: Explain the importance of physical security controls.

  • Faraday cages

Security+ Objective 3.4: Given a scenario, install and configure wireless security settings.

  • Methods
  • Enterprise vs. Open

Security+ Objective 3.8: Given a scenario, implement authentication
and authorization solutions.

  • Authentication/authorization
  • 802.1X
  • RADIUS

If you got value out of this episode, subscribe to this podcast and please share this conversation with someone who will benefit from it.
I'm also on YouTube
so check it out for additional content, visuals, etc.

🎤 Don’t forget you can listen to the podcast here on Spotify

🎤 And here on Apple podcasts

  continue reading

38 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide