PodcastsEducationInfosecTrain

InfosecTrain

InfosecTrain
InfosecTrain
Latest episode

1487 episodes

  • InfosecTrain

    AWS Security Specialty (SCS-C03) Exam Guide: Mastery & Practice

    21/1/2026 | 1h 7 mins.
    Is the AWS Security Specialty a beginner certification? How does the new SCS-C03 version differ from its predecessor? In this session, we break down the entire AWS certification hierarchy and pinpoint exactly where the Security Specialty stands. We explore the shifting weight of exam domains; like the increased focus on IAM and the introduction of the Open Cybersecurity Schema Framework (OCSF). Beyond the theory, we walk through real-world exam scenarios, from bypassing the internet for private service communication to mitigating large-scale DDoS attacks.
    šŸ” What You’ll Learn:
    AWS Certification Hierarchy: Understanding the four levels (Foundation, Associate, Professional, Specialty) and why Solution Architect Associate is the best starting point for security pros
    CS-C02 vs. SCS-C03: A domain-by-domain comparison, highlighting the jump in IAM weight from 16% to 20% and the new focus on logging and incident response.

    New Exam Content: Introduction to OCSF for universal log formatting, OWASP Top 10 for LLMs, and security for EKS/Kubernetes.

    Private Networking: How to use VPC Endpoints to ensure traffic between EC2 and S3 never leaves the AWS infrastructure.

    Advanced Threat Protection: Differentiating between Guard Duty (threat detection), Network Firewall (VPC protection), and AWS Shield/CloudFront (DDoS mitigation).

    Storage Lifecycle Management: Using S3 Life Cycle policies and Glacier Deep Archive for cost-effective, long-term (10-year) log retention.

    šŸŽ§ Mastering AWS security isn't just about knowing the tools; it's about designing an architecture where privacy, identity, and resilience are baked into every layer of the cloud.
  • InfosecTrain

    Gemini AI Masterclass: Transforming Google Workspace Productivity

    19/1/2026 | 1h 8 mins.
    Is Gemini just another chatbot? Not quite. While tools like ChatGPT are great for general search, Gemini is designed to be the "default engine" for your professional ecosystem. In this masterclass, we explore how Gemini 2.0 (and the latest 3.0 models) seamlessly integrates with Gmail, Docs, Sheets, and Slides to automate complex workflows, maintain enterprise-grade security, and act as a custom virtual assistant. Whether you're a student or a cybersecurity professional, mastering these integrations is the key to evolving from a general user to an AI-powered expert.
    šŸ” What You’ll Learn:
    The Gemini Ecosystem: Why integration into Google Workspace makes Gemini a superior "default" tool for professional environments.

    Choosing the Right Mode: Understanding when to use Fast (quick tasks), Thinking (longer reasoning), and Pro (complex problem solving) to manage tokens effectively.

    Deep Research & Citations: Using Gemini to surface real-time data from 80+ websites and converting that research into reports or infographics.

    Custom Gems & Agents: How to build your own virtual assistant by feeding it specific data from your drive or company database.

    Workspace Magic: * Sheets: Automating data validation, dropdowns, and complex calculations without writing formulas.

    Docs to PPT: Instantly transforming research documents into full presentation decks and infographics.

    Enterprise Security & Privacy: Crucial steps to disable audio tracking and personal context to protect sensitive data from being used in model training.
    šŸŽ§ AI is no longer just a separate tool you visit; it is the silent engine inside your daily workspace. Mastering it today ensures you aren't left behind in the agentic era of tomorrow.
  • InfosecTrain

    Firewall Evasion: 3 Sneaky Ways Hackers Bypass Defense

    14/1/2026 | 1 mins.
    Think your firewall is invincible? Think again. In the world of penetration testing and ethical hacking, knowing how to fly under the radar is just as important as the scan itself. In this episode, we dive into the stealthy side of Nmap, exploring how attackers manipulate packets and ports to bypass security guardrails without leaving a trace. Whether you're a defender looking to harden your network or a student of Infosec, these techniques are essential knowledge.

    šŸ” What You’ll Learn:
    The Art of Fragmentation: How splitting packets can blind an IDS to malicious patterns.
    Spoofing Legitimacy: Using source port manipulation to trick firewalls into trusting malicious traffic.
    The Decoy Effect: Hiding a real IP address behind a "crowd" of fake addresses to avoid detection.
    Nmap Mastery: The specific parameters (-f, -g, -D) used to execute these stealth scans.

    šŸŽ§In the game of cyber defense, the best attackers aren't just powerful; they're invisible. Master these evasion tactics to truly understand the gaps in your security perimeter.
  • InfosecTrain

    The AI Blueprint: Designing a Practical Governance Framework

    12/1/2026 | 54 mins.
    AI is no longer a "future project"—it’s a present-day reality. But while AI can scale your innovation, it can also scale your risks (bias, data leaks, and "black-box" decisions) even faster. This episode moves beyond the hype and dives into the Practical Guide to AI Governance. We break down the transition from vague "ethical principles" to a robust, cloud-integrated framework that keeps your organization secure, compliant, and accountable.
    Whether you are deploying generative AI on AWS, Azure, or GCP, learn the essential building blocks needed to turn a "Wild West" AI environment into a trusted, enterprise-grade system.
    šŸ—ļø The Core Building Blocks:
    The "Strategy" Layer: Aligning AI with business goals. Why governance must empower developers to innovate safely rather than acting as a bottleneck.

    Risk Tiering & Assessment: How to classify your AI use cases (Minimal, Limited, High, or Prohibited) to apply the right level of oversight without over-engineering.

    The Cloud Connection: Implementing governance at scale. A look at cloud-native tools for automated bias detection, drift monitoring, and immutable audit trails.

    Data & Model Integrity: Ensuring the "fuel" (data) and the "engine" (model) are secure, private, and explainable.

    Accountability Structures: Who owns the AI? Establishing cross-functional "AI Councils" that bring together Legal, Security, and Data Science.

    Lifecycle Governance: Moving from "Pilot" to "Production". Why governance must follow the AI from data collection to final decommissioning.

    šŸŽ§ Tune in to learn how to build a "Governance-by-Design" culture that turns ethical AI into your organization's strongest competitive advantage.
  • InfosecTrain

    Beyond the Screen: Top 5 Soft Skills Every Infosec Pro Needs

    08/1/2026 | 1 mins.
    Think a career in Cybersecurity is just about mastery over Linux and firewalls? Think again. While technical tools get you in the door, it’s your human skills that determine how far you’ll go. In this episode, we break down why the "human element" is the most underrated part of Information Security and how mastering it can prevent massive breaches. Whether you’re a SOC Analyst or a CISO, these five pillars are essential for surviving the ever-evolving threat landscape.

    šŸ” What You’ll Learn:
    The Translation Trap: How to turn complex technical jargon into clear, actionable insights for non-tech stakeholders.

    Connecting the Dots: Why critical thinking is your best weapon when an alert doesn't tell the full story.

    The Cost of a Click: Why "Attention to Detail" isn't just a buzzword, but a defense mechanism against misconfigurations.

    Future-Proofing Your Career: How adaptability ensures you stay relevant as tools and AI evolve.

    Security as a Team Sport: Strategies for better collaboration across departments to ensure smooth incident response.

    šŸŽ§ In a world of automated threats, your human insight is the ultimate firewall master these skills to move from being just a technician to a true security leader.

More Education podcasts

About InfosecTrain

InfosecTrain is one of the finest Security and Technology Training and Consulting organization, focusing on a range of IT Security Trainings and Information Security Services. InfosecTrain was established in the year 2016 by a team of experienced and enthusiastic professionals, who have more than 15 years of industry experience. We provide professional training, certification & consulting services related to all areas of Information Technology and Cyber Security. Website: https://www.infosectrain.com
Podcast website

Listen to InfosecTrain, The Mel Robbins Podcast and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v8.3.0 | Ā© 2007-2026 radio.de GmbH
Generated: 1/21/2026 - 5:22:18 PM