Secure Digital Life

From Security Weekly Wiki
Revision as of 15:23, 1 October 2019 by Jeff (talk | contribs)
Jump to navigationJump to search


Watch Doug and Russ share their knowledge through the magic of the internet and into your brains. Check out the latest episodes in the playlist above!

Coming Soon

Episode #114 - Final Episode

Episode #115 - temp file for SCW Episode #1

Previously Recorded

Episode #113 - Producing a Podcast

Episode #112 - Game Consoles

Episode #111 - Pamela Fournier, Roger Williams University

Episode #110 - Preparing and Dealing with Ransomware

Episode #109 - The Lair of the White Worm

Episode #108 - Spy Cameras (LIVE Nudes)

Episode #107 - Getting Started: Dark Web

Episode #106 - What to do when the power is out?

Episode #105 - HateStream: Social Media in the Wake of the Christchurch Attacks

Episode #104 - Tim Broom, ITPro.TV

Episode #103 - Machine Learning (Book: Minority Report)

Episode #102 - Spying & Cyber Warfare, From Russia With Love

Episode #101 - Overview of Hacking

Episode #100 - Understanding Storage

Episode #99.5 - Terms & Acronyms pt.2

Episode #99 - Terms & Acronyms pt.1

Episode #98 - Containers

Episode #97 - Scott Coleman, Data Diode Days

Episode #96 - Quantum Computing 1

Episode #95 - Leonard Simon, Springboard

Episode #94 - New Year Resolutions

Episode #93 - Cross Site Scripting Attacks (XSS)

Episode #92 - Cybersecurity Christmas Gifts

Episode #91 - Killer Robot Special

Episode #90 - Bill Ottman, CEO & Co-Founder of Minds.com

Episode #89 - Jesse Endahl, Fleetsmith

Episode #88 - Permissions and Privileges

Episode #87 - Wireless Routers

Episode #86 - Eric Carlile, Zoom

Episode #85 - 2 Factor Authentication

Episode #84 - Robb Tracy, ActBrainy (Wiley)

Episode #83 - Zach Hill, I.T. Enthusiast

Episode #82 - Ned Pyle, Microsoft

Episode #81 - Back To School: Networking 101

Episode #80 - Codes & Languages

Episode #79 - Ed Sattar, QuickStart

Episode #78 - Understanding SSL and HTTPS

Episode #77 - Dylan Jensen, IOI Search

Episode #76 - Mark Mulvaney, Sr. Information Security Engineer

Episode #75 - Alain Nguyen, SMA

Episode #74 - Ron Gula, Gula Tech Adventures

Episode #73 - AI

Episode #72 - Warhorse

Episode #71 - Travel Security

Episode #70 - IoT

Episode #69 - Matthew Silva, RWU

Episode #68 - Digital Forensics

Episode #67 - SNAT and PAT

Episode #66 - Dangerous Grounds

Episode #65 - Firewalls

Episode #64 - Tech Interview

Episode #63 - Vulnerability Scanning pt. (Demo 2)

Episode #62 - Andy Pete, Vulnerability Scanning pt.3 (Demo)

Episode #61 - Andy Pete, Vulnerability Scanning pt.2

Episode #60 - Capture the Flag

Episode #59 - Intro to Vulnerability Scanning

Episode #58 - Virtual Labs

Episode #57 - Facebook

Episode #56 - SQL Injection

Episode #55 - Now With The NAS

Episode #54 - Online Backup Providers

Episode #53 - Stinkin' Backups

Episode #52 - Backup Strategies

Episode #51 - The Little Processor who could not...

Episode #50 - Wolf in the Fold pt.2

Episode #49 - Wolf in the Fold pt.1

Episode #48 - Fletcher Heisler, Hunter2

Episode #47 - Jim Langevin, Congressman of the Cybercaucus

Episode #46 - 2017 Wrap-Up

Episode #45 - Resume Building pt.2

Episode #44 - Resume Building

Episode #43 - Linux

Episode #42 - Cryptocurrency

Episode #41 - Jimi's Guitar and Blockchains

Episode #40 - Crypto Identities

Episode #39 - WiFi Security

Episode #38 - Encryption

Episode #37 - Wireshark Captures

Episode #36 - Wireshark and Packet Sniffing, Pt.2

Episode #35 - Packet Sniffing

Episode #34 - NMAP

Episode #33 - Port Scanning

Episode #32 - Network Attacks

Episode #31 - Killer Robots

Episode #30 - VLSM

Bonus Episode - Equifax Breach

Episode #29 - Congressman Jim Langevin

Episode #28 - Subnetting, Pt. 2

Episode #27 - Subnetting, Pt. 1

Episode #26 - IP Addresses

Episode #25 - Hexidecimal

Episode #24 - Binary (Zero and One are the Loneliest Numbers)

Episode #23 - Top 5 IoT Devices

Episode #22 - Pentesting Certification Shootout

Episode #21 - SCADA

Episode #20 - OSI Model

Episode #19 - Securing Backups

Episode #18 - College Degrees in Cybersecurity

Episode #17 - WannaCry

Episode #16 - Password Creation and Protection

Episode #15 - What you thought you knew but didn't actually know or maybe you did when it comes to Certification!

Episode #14 - Blacklists, Whitelists, and MAC filtering

Episode #13 - Port Forwarding, Pt. 2

Episode #12 - Port Forwarding and Firewalling

Episode #11 - Wireless Security at Home

Episode #10 - Net Neutrality, Pt. 2

Episode #9 - TOR

Episode #8 - Net Neutrality

Episode #7 - WikiLeaks

Episode #6 - Cybersecurity

Episode #5 - Firewalls

Episode #4 - IoT

Episode #3 - What Data Should You Submit on the Internet?

Episode #2 - VPNs

Episode #1 - How to Avoid Being Phished