Wireless ReviewDuration: 9:48
In this episode, Mike reviews basic wireless terms and protocols.
Living in Open NetworksDuration: 9:46
In this episode, Mike describes how to remain secure in a non-secure, open-network world.
Vulnerabilities with Wireless Access PointsDuration: 7:06
In this episode, Mike discusses rogue access points and their nefarious cousins, the evil twins.
Cracking 802.11, WEPDuration: 12:03
In this episode, Mike talks about WEP wireless security attacks and methods for cracking WEP passwords.
Cracking 802.11, WPA and WPA2Duration: 9:29
In this episode, Mike talks about WPA and WPA2 wireless security attacks and methods for cracking WPA passwords.
Cracking 802.11, WPSDuration: 9:52
In this episode, Mike talks about WPS wireless security attacks and methods for cracking WPS passwords.
Wireless HardeningDuration: 14:08
In this episode, Mike explores the processes behind securing wireless networks.
Wireless Access PointsDuration: 13:18
In this episode, Mike explains the different wireless devices and how the antenna signal effects the placement and usage.
Virtualization BasicsDuration: 7:20
In this episode, Mike explores virtualization technologies.
Virtual SecurityDuration: 15:10
In this episode, Mike talks about some of the security aspects of virtualization.
ContainersDuration: 10:51
In this episode, Mike discusses containers, their attributes, and the benefits that can be obtained from using containers.
Infrastructure as a Service (IaaS)Duration: 9:37
In this episode, Mike explores devices and purposes involved in Infrastructure as a Service (IaaS).
Platform as a Service (PaaS)Duration: 9:08
In this episode, Mike describes the purpose of devices used to set up Platform as a Service (PaaS) infrastructures.
Software as a Service (SaaS)Duration: 2:44
In this episode, Mike discusses the programmers and applications that enable companies to deploy Software as a Service (SaaS).
Deployment ModelsDuration: 8:46
In this episode, Mike discusses the ways to distribute software programs, web services and electronic data using various cloud models.
Static HostsDuration: 7:35
In this episode, Mike looks at network-aware devices, appliances, and industrial systems.
Mobile ConnectivityDuration: 12:08
In this episode, Mike explores the various methods used to interconnect mobile devices.
Deploying Mobile DevicesDuration: 5:29
In this episode, Mike delves into the opposing forces of corporate and personal use of mobile devices.
Mobile EnforcementDuration: 12:37
In this episode, Mike works through some of the security issues that need to be considered when putting together security policies on mobile devices.
Mobile Device ManagementDuration: 10:29
In this episode, Mike goes through the various device and application-level management that can take place on mobile devices.
Physical ControlsDuration: 8:49
In this episode, Mike explores preventative controls, such as guards and fences.
HVACDuration: 7:30
In this episode, Mike gives a quick overview of the importance and basic function of HVAC systems and how they keep servers and other important equipment happy.
Fire SuppressionDuration: 4:07
In this episode, Mike talks fire, the right ways to fight it and the best systems to have in place to save your equipment.