¡Disfruta de 1 año de Premium al 25% de dto! ¡Lo quiero!
Learn As I Learn - Technology, Product and Cyberse
Podcast

Learn As I Learn - Technology, Product and Cyberse

62
0

No time to learn? Take out few minutes from your life and learn new things every day!

Please subscribe to start learning for FREE now!

No time to learn? Take out few minutes from your life and learn new things every day!

Please subscribe to start learning for FREE now!

62
0

Series 5: Ep 1: Network Basics

Episode 1: Network Basics: Hubs vs. Switches ExplainedDescription: Understand the core of your network! This episode usesPacket Tracer to illustrate the fundamental differences between hub andswitched networks. See how data flows, the impact on efficiency, and thesecurity implications of each.
Children and education 3 weeks
0
0
0
11:55

Series 5 - Network & Vulnerability Deep Dives

We'll cover: 1. Network Basics: Hubs vs. Switches 2. Building Networks: Designing andSubnetting IP Schemes Description 3.DNS Demystified: Installing a DNS Serverin Windows Server 2022 Description 4: DHCP Dynamics: Implementing a DHCP Serverin Windows Server 2022 Description 5: Firewall & Proxy Bypassing: Metasploitfor Web Recon Description 6: Firewall & Proxy Bypassing: Nikto forEvasion & Vulnerability Scanning Description 7: Vulnerability Assessment: Real-timeScanning with Nessus Description 8: Network Traffic Analysis: TCP/IP, UDP, andWireshark Flags Description 9: IDS/IPS Evasion & Deceptionstudy intruders. 10: Web Server Security: Architecture, AttackSurface & Hardening Description
Children and education 1 month
0
0
0
03:47

Series 4: Ep 10: Locking It Down

Episode 10: Locking It Down: Restricting User Accesswith File Permissions Description: Secure your sensitive data! Learn thecritical skill of restricting user access to folders using NTFS permissions inWindows Server 2022. We'll demonstrate creating new users, setting explicit"Deny" permissions, and verifying their effectiveness, highlightingthe importance of granular access control.
Children and education 1 month
0
0
0
07:37

Series 4: Ep 9: Files & Formats

Episode 9: Files & Formats: Working with FAT32 andNTFS Description: Demystify file systems! This episode guides youthrough creating and managing files in both FAT32 and NTFS formats on WindowsServer 2022. You'll learn how to format drives, perform file operations, verifyallocation, and configure advanced NTFS permissions for security.
Children and education 1 month
0
0
0
11:55

Series 4: Ep 8: Memory Matters

Dig deep into system memory! Learn how to illustrate the memory layout of a basic program and use advanced PowerShell commands (WMI, security-focused queries) todebug, check process integrity, detect DLL injections, and identify suspicious processes on Windows Server 2022. Commands: Get-Process | Where-Object { $_.ProcessName -eq "notepad" } Get-WmiObject -Class Win32_OperatingSystem | Select-Object TotalVisibleMemorySize, FreePhysicalMemory Get-Process Get-WmiObject -Class Win32_Process | Select Name, ProcessId, ExecutablePath. For new powershell version simply use: Get-Process | Select-Object Name, Id, Path Get-WmiObject -Class Win32_Process | Select-Object Name, ProcessId, ParentProcessId Get-WmiObject -Class Win32_Process -Filter "Name = 'notepad.exe'" | Select-Object ProcessId, Name, @{Name='Owner';Expression={$_.GetOwner().User}} Get-Process -Name notepad | Select-Object -ExpandProperty Modules | Select ModuleName, FileName Get-WmiObject Win32_Process | Where-Object { $_.ExecutablePath -and ($_.ExecutablePath -notlike "C:Windows*" -and $_.ExecutablePath -notlike "C:Program Files*") } | Select Name, ProcessId, ExecutablePath Get-Process | Where-Object { $_.Modules.ModuleName -contains "ntdll.dll" } Get-WmiObject Win32_Process | Select-Object Name, ProcessId, CommandLine Get-Process | Sort-Object StartTime -Descending | Select-Object Name, Id, StartTime | Select-Object -First 10
Children and education 3 months
0
0
0
13:56

Series 4: Ep 7: Debugging Your Code

Don't let errors stop you! This episode focuses on practical debugging techniques for both PowerShell and Bash scripts. We'll intentionally introduce common errors (like typos or wrong parameters) and walk through how to identify and fix them, building crucial troubleshooting skills. Powershell Script: #Script to log multiple event IDs $BeginTime = (Get-Date).AddMinutes(-20) Get-EventLog -LogName "Securityy" -After $BeginTime | Where-Object { $_.EventID -in '4624', '4625'} | Select-Object TimeGenerated, EventID, Message | Format-Table -AutoSize | Out-Files C:EventLogs_MultipleEvents.txt BASH Script: #!/bin/bash #Variables USERNAME="testuser" # User accountname PASSWORD="P@ssw0rd" # User password GROUP="testgroup" # Custom groupname SSH_DIR="/home/$USERNAME/.ssh" PUB_KEY="ssh-rsa AAAAB3...your-public-key... user@kali" #Step 1: Check ifuser already exists if id "$USERNAME" &>/dev/null; then   echo "Error: User '$USERNAME'already exists!"   exit 1 fi #Step 2: Create userand set password echo "Creating user '$USERNAME'..." useradd -m -n -s /bin/bash "$USERNAME" # Error 1: -n is an invalidoption if [ $? -ne 0 ]; then   echo "Error: Failed to create user'$USERNAME'"   exit 1 fi echo "$USERNAME:$PASSWORD" | chpasswd echo "Password set for user '$USERNAME'." #Step 3: Add user tosudoers echo "Granting sudo access to '$USERNAME'..." usermod -aG sudo "$USERNAME" if [ $? -ne 0 ]; then   echo "Error: Failed to add'$USERNAME' to sudoers"   exit 1 fi #Step 4: Createcustom group and add user echo "Creating group '$GROUP' and adding user..." groupadd "$GROUP" 2>/dev/null usermod -aG "wronggroup" "$USERNAME" # Error 2:"wronggroup" does not exist if [ $? -ne 0 ]; then   echo "Error: Failed to add'$USERNAME' to group '$GROUP'"   exit 1 fi #Step 5: Setup SSHkey-based authentication echo "Setting up SSH key-based authentication..." mkdir -p "$SSH_DIR" echo "$PUB_KEY" > "$SSH_DIR/authorized_keys" chmod 600 "$SSH_DIR/authorized_keys" chmod 700 "$SSH_DIR" chown -R "$USERNAME:$USERNAME" "$SSH_DIR" if [ $? -ne 0 ]; then   echo "Error: Failed to set up SSHkeys"   exit 1 fi echo "SSH keys configured for '$USERNAME'." #Step 6: Setpassword expiry to 30 days echo "Setting password expiry policy for '$USERNAME'..." chage -M 30 "$USERNAME" if [ $? -ne 0 ]; then   echo "Error: Failed to setpassword expiry"   exit 1 fi #Step 7: Logactivity to/var/log/user_setup.log LOG_FILE="/var/log/user_setup.log" echo "$(date) - User '$USERNAME' created and configured" >>"$LOG_FILE" if [ $? -ne 0 ]; then   echo "Error: Failed to write logto $LOG_FILE"   exit 1 fi #Step 8:Confirmation Message echo "Testing SSH connection to '$USERNAME'@localhosts..." ssh "$USERNAME@localhost" if [ $? -ne 0 ]; then echo "Error: SSH connection failed." exit 1 fi echo "User '$USERNAME' created and configured successfully!"
Children and education 3 months
0
0
0
09:05

Series 4: Ep 6: Bash Scripting Essentials

Master automation in Linux with Bash scripts! Discover how to create and debug scripts for user setup, including creating new users, setting passwords, adding them to groups, configuring SSH key-based login, and setting password expiry. We’ll also cover testing and verification. Script: #!/bin/bash #Variables USERNAME="Jason" # User account name PASSWORD="P@ssw0rd" # User password GROUP="developers" # Custom group name SSH_DIR="/home/$USERNAME/.ssh" PUB_KEY="ssh-rsa AAAAB3...your-public-key... user@kali" # Replace with your actual public key #Step 1: Check if user already exists if id "$USERNAME" &>/dev/null; then   echo "Error: User '$USERNAME' already exists!"   exit 1 fi #Step 2: Create user and set password echo "Creating user '$USERNAME'..." useradd -m -s /bin/bash "$USERNAME" if [ $? -ne 0 ]; then   echo "Error: Failed to create user '$USERNAME'"   exit 1 fi echo "$USERNAME:$PASSWORD" | chpasswd echo "Password set for user '$USERNAME'." #Step 3: Add user to sudoers echo "Granting sudo access to '$USERNAME'..." usermod -aG sudo "$USERNAME" if [ $? -ne 0 ]; then   echo "Error: Failed to add '$USERNAME' to sudoers"   exit 1 fi #Step 4: Create custom group and add user echo "Creating group '$GROUP' and adding user..." groupadd "$GROUP" 2>/dev/null usermod -aG "$GROUP" "$USERNAME" if [ $? -ne 0 ]; then   echo "Error: Failed to add '$USERNAME' to group '$GROUP'"   exit 1 fi #Step 5: Setup SSH key-based authentication echo "Setting up SSH key-based authentication..." mkdir -p "$SSH_DIR" echo "$PUB_KEY" > "$SSH_DIR/authorized_keys" chmod 600 "$SSH_DIR/authorized_keys" chmod 700 "$SSH_DIR" chown -R "$USERNAME:$USERNAME" "$SSH_DIR" if [ $? -ne 0 ]; then   echo "Error: Failed to set up SSH keys"   exit 1 fi echo "SSH keys configured for '$USERNAME'." #Step 6: Set password expiry to 30 days echo "Setting password expiry policy for '$USERNAME'..." chage -M 30 "$USERNAME" if [ $? -ne 0 ]; then   echo "Error: Failed to set password expiry"   exit 1 fi #Step 7: Log activity to /var/log/user_setup.log LOG_FILE="/var/log/user_setup.log" echo "$(date) - User '$USERNAME' created and configured" >> "$LOG_FILE" if [ $? -ne 0 ]; then   echo "Error: Failed to write log to $LOG_FILE"   exit 1 fi #Step 8: Confirmation Message echo "User '$USERNAME' created and configured successfully!"
Children and education 3 months
0
0
0
12:26

Series 4: Ep 5: Powering Up with PowerShell

Unlock automation on Windows! We'll start with PowerShell basics, showing you how to write, execute, and expand simple scripts to display messages, get dates, list processes, and manage services. Learn to automate tasks efficiently on Windows Server 2022. Commands: .WelcomeScript.ps1 Get-Date Get-Process Get-Service | Where-Object { $_.Status -eq 'Running' } Get-WmiObject -Class Win32_Product | Select-Object Name,Version Get-NetIPAddress
Children and education 3 months
0
0
0
10:27

Series 4: Ep 4: Linux Reconnaissance

Explore active information gathering in Linux! This episode teaches you how to enumerate a vulnerable Bee-Box machine using Kali Linux tools. You'll learn Nmap for identifying open ports and services, and Metasploit for deeper SMTP enumeration, strengthening your reconnaissance skills. Link: Bee-Box official download page Commands: nmap -Pn -sS –sV <Bee-Box IP Address> nmap -Pn -sS -sV -p 25 <Bee-Box IP Address> auxiliary/scanner/smtp/smtp_enum set RHOSTS <IP of the Bee-Box> set THREADS <Number of Logical Processors>
Children and education 4 months
0
0
0
13:26

Series 4: Ep 3: Windows System Deep Dive

Uncover the hidden information on Windows systems! Learn how to use Microsoft's powerful PsTools suite to gather system information, track user sessions, enumerate services, and analyze event logs on a Windows Server 2022. We'll explorecommands like pslist.exe, psloglist.exe, and saving output to files. PsTools Link: https://learn.microsoft.com/en-us/sysinternals/downloads/pstools. Commands: .pslist.exe .psloggedon.exe .psloglist.exe .psservice.exe Save output by: .psloglist.exe >> C:Logdata.txt
Children and education 4 months
0
0
0
09:58

Series 4: Ep 2: Deploying Your Target

Get your target ready! This episodeguides you through downloading and setting up a Windows Server 2022 virtualmachine within VMware. We'll walk through the installation processstep-by-step, preparing a vulnerable environment for your ethical hacking adventures. Link I used for myself: https://www.microsoft.com/en-us/evalcenter/download-windows-server-2022.
Children and education 4 months
0
0
0
09:55

Series 4: Ep 1: Building Your Digital Lab

Episode 1: Building Your Digital Lab – VMware & Kali Linux Setup Kick off your cybersecurity journey with the essentials! In this episode, we guide you through creating a secure virtualized environment by installing VMware Workstation and setting up your Kali Linux virtual machine for penetration testing. From downloading the ISO to configuring your VM settings, we’ll walk you through every step to build your personal digital lab. 👉 Download VMware Workstation here: https://www.techspot.com/downloads/189-vmware-workstation-for-windows.html
Children and education 4 months
0
0
0
09:49

Series 4 - Going a level deeper - Introduction

🎙️ Series 4: Laying the Foundations Kickstart your cybersecurity journey with hands-on labs and real-world skills! In this series, we’ll set up virtual machines, explore Windows and Linux systems, and dive into scripting, debugging, and securing environments. Perfect for beginners and aspiring ethical hackers. Episodes: 1️⃣ Building Your Digital Lab – Set up VMware Workstation and Kali Linux for penetration testing. 2️⃣ Deploying Your Target – Install Windows Server 2022 as a vulnerable lab machine. 3️⃣ Windows Deep Dive – Use PsTools to enumerate users, services, and event logs. 4️⃣ Linux Reconnaissance – Master Nmap and Metasploit against a Bee-Box target. 5️⃣ Powering Up with PowerShell – Learn the basics of scripting and automation on Windows. 6️⃣ Bash Scripting Essentials – Automate user management and SSH setup in Kali Linux. 7️⃣ Debugging Your Code – Fix common PowerShell and Bash scripting errors. 8️⃣ Memory Matters – Explore program memory layouts and forensic queries with PowerShell. 9️⃣ Files & Formats – Work with FAT32 and NTFS, file operations, and permissions. 🔟 Locking It Down – Restrict user access and secure folders with NTFS permissions.
Children and education 5 months
0
0
0
05:37

Series 3: Ep 8: The GRC Framework – Holding the Citadel Together

GRC - Governance, Risk and Compliance -> Team leading security at every organization
Children and education 8 months
0
0
0
08:04

Series 3: Ep 7: Breach Ready – Incident Detection & Response

In this episode, we dive into building breach-ready systems with strong incident detection and response strategies. Learn how to identify threats early, contain damage, and recover fast.
Children and education 8 months
0
0
0
10:39

Series 3: Ep 6: Infrastructure security

Let's learn about how to secure your infrastructure
Children and education 8 months
0
0
0
10:23

Series 3: Ep 4: Building Your Cyber Citadel

Today, we're diving headfirst into the fascinating world of Security and Risk Management.
Children and education 9 months
0
0
0
10:53

Series 3: Ep 5: How to identify and classify assets

Let's start by understanding the first step of building a cyber citadel
Children and education 9 months
0
0
0
13:12
You may also like View more
Cuentos para irse a Dormir En estos cuentos tan especiales que hacemos tenemos a nuestra protagonista Lara, una niña que lleva desde los 2 añitos y medio compartiendo cuentos de todo tipo con vosotros. Comenzamos con cuentos pero Lara va creciendo (ya tiene casi 7 añitos) y vamos incorporando cosas como lecturas o podcast y quien sabe que otras sorpresas tendremos Updated
La Canastilla de Mamá Soy madre de dos niños, profesora y periodista. Desde aquí compartiré con vosotros mis experiencias, dudas y vivencias relacionadas con la maternidad, la educación y la salud. Updated
Sapiensantes ¿Te imaginas meterte dentro de una boca para saber por qué hay que lavarse los dientes? ¿O en una cabeza y descubrir como se vive la vida siendo un piojo? Eso ocurre en 'Sapiensantes', este podcast de ciencia para niños y para toda la familia. Los niños y niñas hacen preguntas científicas y Xaviera Torres responde con frescura y mucha imaginación. El diseño de sonido, que firma Juan Luis Martín, ayuda a convertir el podcast en una experiencia inmersiva y muy divertida. Updated
Go to Children and education