All Episodes
Displaying 1 - 20 of 61 in total
Designing & Defending Secure Systems
The capstone week brings together all prior concepts, emphasizing integration as the defining quality of resilient design. Students learn that resilience arises not fr...

Emerging Threats & Defensive Strategies
This week addresses the rapidly evolving threat landscape. Ransomware is studied from its early origins to its present role as a multimillion-dollar business model, wh...

Application and API Security
Applications and APIs form the backbone of digital services, enabling everything from online banking to global supply chains. Students study common weaknesses cataloge...

Infrastructure, Cloud, and Supply Chain Security
Modern infrastructure has evolved from physical servers to cloud-native platforms, redefining both opportunities and risks. Students explore Infrastructure as Code, co...

Secure Systems & Network Architecture
This week highlights the role of architecture as the skeleton of security. Students learn how flat networks and perimeter-based models have failed under modern conditi...

Identity, Authentication, and Access Control
With the dissolution of traditional network perimeters, identity has emerged as the central gatekeeper of enterprise security. This week explores authentication, autho...

Cryptography in Context
Cryptography serves as the scientific bedrock of confidentiality, authenticity, and integrity. Students will explore both symmetric and asymmetric encryption, comparin...

Security Foundations & Risk in the Modern Enterprise
This week introduces security as a foundational discipline rather than a collection of scattered tools. Learners will examine the enduring concepts of confidentiality,...

Mobile Application Security
In this Bare Metal Cyber episode, we’re tackling mobile application security—the must-have protection for the apps on your phone or tablet that hold your life, from ba...

The Cybersecurity Maturity Model
Join us on Bare Metal Cyber as we unpack the Cybersecurity Maturity Model—a roadmap to level up your security game from chaotic basics to slick, proactive defenses, pe...

Security Hardening
This Bare Metal Cyber episode is all about security hardening—turning your systems into fortresses by plugging holes that hackers love to exploit, like outdated softwa...

Data Privacy
In this Bare Metal Cyber episode, we dive into data privacy—the essential shield keeping your personal info, like names or bank details, safe from prying eyes in a wor...

Cybersecurity Insurance
Tune into Bare Metal Cyber as we unpack cybersecurity insurance—a financial lifeline that picks up the tab for breaches, ransomware, or downtime when cyber nasties hit...

Bug Bounty Programs
This Bare Metal Cyber episode shines a light on Bug Bounty Programs, where ethical hackers get paid to sniff out your system’s weak spots—think XSS flaws or remote cod...

Application Whitelisting
In this Bare Metal Cyber episode, we spotlight application whitelisting—a slick way to lock down endpoints by only letting approved software run, slamming the door on ...

Multi-Cloud Security
Join us on Bare Metal Cyber as we tackle multi-cloud security, the art of keeping data and apps safe when you’re juggling platforms like AWS, Azure, and Google Cloud f...

Active Directory Security
This Bare Metal Cyber episode digs into Active Directory security, the linchpin of Microsoft’s network management system that keeps user identities and permissions saf...

Basics of Digital Footprints
In this Bare Metal Cyber episode, we unravel the world of digital footprints—the data trails we leave behind every time we browse, post, or shop online, shaping both o...

Open Source Intelligence
On this Bare Metal Cyber episode, we’re cracking open Open Source Intelligence (OSINT)—the art of turning public data from tweets, news, or court filings into a cybers...
