Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

NTP Podcasts

show episodes
 
Welcome to Engineering Success! This NTP podcast features some of the brightest engineering and manufacturing minds in the Hunter region and beyond. Join us for insightful conversations with the folks behind the region's most exciting projects. We'll dive into their career stories, the challenges they've faced, and the awesome tech they're working on. Whether you're in the industry or just curious, Engineering Success will give you a peek into the vibrant world of local engineering and manuf ...
  continue reading
 
Artwork

1
IBS Freedom Podcast

Dr. Nicole DiNezza, DC, NTP and Amy Hollenkamp, RD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
You can treat your gut without restrictive, awful diets... You can trust us to show you how! Whether you're newly diagnosed with IBS or a veteran, the IBS Freedom Podcast will provide clarity for your healing journey. Each week your IBS experts will cover topics within the world of IBS including small intestinal bacterial overgrowth (SIBO), leaky gut syndrome, dysbiosis, the low FODMAP diet, candida, and so much more.Meet your hosts!- Dr. Nicole DiNezza, DC, NTP is a functional medicine doct ...
  continue reading
 
Artwork
 
A K12TechPro Podcast. This podcast is about trending K12 technology topics and issues. Josh, Chris, and Mark have real conversations, real arguments, and real banter on IT issues and trends in K12 Schools. Current and Past Sponsors: Absolute, HPE Aruba Networking, Blocksi, ClassLink, CTL, Eaton, Extreme Networks, Fortinet, Howard Technology Solutions, iDoc, Infoblox, INVZBL, Jupiter Education, K12TechPro, Luma Technologies, Managed Methods, MidwestTechTalk, NTP, Papercut, Provision Data Solu ...
  continue reading
 
Artwork

1
NTP Podcast

NewyTechPeople

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the NTP Podcast. Each episode highlights the incredible work of talented tech professionals in Australia. We chat with people who are at the top of their game to learn all about their craft—why they’re passionate about their work and what resources help power their success. By delving into their experiences, we gain insights into the constantly evolving tech scene, explore how it has changed, and see where it may be headed.
  continue reading
 
Artwork

1
Women of Calibre

Claire Fowler NTP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is a podcast for all the girls and women, who've ever worked for an employer or for themselves. I want to hear about your experiences of the workplace, whether it's virtual or a physical place you have to show up to every day and what it's like for you on a day-to-day basis. In the first series of episodes, I share my experience of working in a male-dominated industry in the UK. I worked as a consultant in Building Engineering and after nearly 15 years, I decided to take my talent, my e ...
  continue reading
 
Artwork
 
Welcome to the "Healthy Mom, Happy Home" podcast, a heartwarming and insightful exploration of holistic well-being for moms who believe that when they thrive, their families flourish. Hosted by Nutritional Therapy Practitioner Jenna Huff, a passionate advocate for both health and motherhood. This podcast is a place for moms seeking to embrace a healthy and joyful living, as we dive into the world of self- care, holistic health, and family life.
  continue reading
 
Artwork

1
Small Steps

Aimée Suen, NTP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Aimée Suen, Nutritional Therapy Practitioner Nutritional Therapy Practitioner, multi-passionate creative and mixed race woman of color is here to help mono and multiracial women of color get clear on what health and wellness truly means to them and leave the dominant narratives behind to feel aligned, empowered, and seen, one small step at a time. This podcast will share a health at every size, diet-free, social justice and culturally informed approach to health and wellness, as well as touc ...
  continue reading
 
Artwork

1
Digitally Diverse

NewyTechPeople

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Digitally Diverse! This podcast takes a deep dive into the journeys of the movers and shakers in the design and tech industry with the help of host Ellen Bennett. Join us as we sit down with industry leaders, innovators, and creative minds to explore their unique career paths, the lessons they've learned, and the fascinating stories they have to share. Whether you're a seasoned professional, a budding designer, or simply curious about the digital landscape, our episodes offer insi ...
  continue reading
 
The Network Plus PrepCast is your comprehensive audio training series for mastering the CompTIA Network Plus certification. Designed for learners on the go, this prepcast transforms exam objectives into clear, structured, and engaging episodes tailored for auditory learning. Whether you're walking, commuting, or studying between shifts, each episode breaks down complex networking topics into digestible segments aligned with the official CompTIA blueprint. From OSI layers and IP addressing to ...
  continue reading
 
Artwork

4
The Between Meals Podcast

Beth Manos Brickey, RYT, NTP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Between Meals Podcast features Beth Manos Brickey, FNTP, RWS, RYT, of TastyYummies.com. Food and nutrition, while very important, this is JUST ONE piece of a much larger puzzle. Movement, stress, sleep, emotions, spirit, community, play – these are just as crucial to our wellness and vitality. And should too, be investigated as both potential causes and as cures. What happens between meals is equally as important to our health. We are complex machines. Our system is a delicate symphony o ...
  continue reading
 
Artwork

1
Number Two Podcast

Lourdes and Tello

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Number Two Podcast is the journey of two cousins from a dysfunctional Latino family trying to make it through life by laughing at it. Support this podcast: https://podcasters.spotify.com/pod/show/numtwopod/support
  continue reading
 
Artwork

1
The Balanced Babes Podcast

Amanda Montalvo & Kim Perez

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We're Kim & Amanda- functional nutritionists on a mission to help women learn how to nourish their bodies, balance their hormones, and feel good in their skin. Tune in every Wednesday to hear expert interviews with the best in women's health, Q&A episodes where we answer listener questions, and our deep dive episodes where we pick a topic and share our expertise. Join our Balanced Babes Community on Facebook where listeners can gather, relate, and connect with one another.
  continue reading
 
Do you worry you won’t get pregnant, stay pregnant, or have a healthy baby? Infertility rates are on the rise. Women are waiting until later in life to start a family. It is more important than ever to start understanding exactly how to take control of your fertility. Your host is Kristin Cornett, a functional nutritional therapy practitioner and fertility specialist at Tiny Feet. She dives deep into the true causes of infertility and what you can do to get your health and fertility back on ...
  continue reading
 
Artwork

1
The Talk with Chef Michael

Michael Silverstein

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Let’s talk about the unpopular opinions surrounding the keto diet, weight loss, and the food world, one guest at a time. Join Michael Silverstein, Published Author and TV Chef, as we explore the good, the bad, and ugly world of health and nutrition. Michael Silverstein is a Published Author, TV Chef, and blogger based in Austin, Texas. - Thank you to our sponsor, Redmond Real Salt. Go to www.redmond.life (Enter "CHEFMICHAEL" for 15% off). - Join Michael on PATREON at patreon.com/chefmichael ...
  continue reading
 
Artwork

1
Wellness Within Cancer Support

Wellness Within Cancer Support Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Wellness Within instructors, staff and special guests for relaxing meditations and thoughtful, enlivening conversation about pertinent treatment and survivorship topics supporting wellness in the presence of cancer. This podcast is offered freely to ensure everyone has access to these practices and conversations offered by Wellness Within Cancer Support Services. If you feel inspired to donate to support Wellness Within offerings, please visit wellnesswithin.org.
  continue reading
 
Loading …
show series
 
Christie Hayward, an apprentice Boilermaker at WesTrac, who bravely moved from Sydney to the Hunter Valley to pursue her passion for metalwork. You'll hear how her mechanical engineer parents fostered her love for hands-on learning, leading her to a career she truly loves. Christie pulls back the curtain on the daily life of a Boilermaker, from wel…
  continue reading
 
DNS and NTP are often invisible—until they fail. This episode shows how to diagnose and fix issues with domain name resolution and time synchronization, both of which affect authentication, connectivity, and performance. You’ll learn how to use nslookup, dig, and ntpq to troubleshoot problems and interpret server behavior. We also cover how expired…
  continue reading
 
Join us this week as we welcome our new AI co-host and delve into the unique challenges and opportunities of vendor support in small districts. From the highlights of the Midwest Tech Talk conference to the intricacies of tech support for small schools, we cover it all. Hear about the latest AI updates in education with Canvas integrating ChatGPT a…
  continue reading
 
To wrap up the series, this episode reviews the full troubleshooting methodology—from identifying the problem to documenting the fix. We walk through common scenarios, showing how the steps apply in real life and what tools are best suited for each phase. You’ll revisit techniques for isolating symptoms, confirming theories, and verifying solutions…
  continue reading
 
Not every issue fits into neat categories. In this episode, we address edge-case problems like Bring Your Own Device (BYOD) compatibility, expired licenses on security appliances, and odd client behaviors that defy conventional logic. You’ll learn how mobile OS updates, unsupported encryption protocols, or insufficient license capacity can cause my…
  continue reading
 
This episode revisits advanced troubleshooting at the hardware and optical layer. We cover transceiver problems, dirty fiber connectors, power mismatches, and switch backplane limitations. You'll learn how to read interface stats for clues, test suspect links, and isolate faults in a complex network environment. We also explain how hardware limits—…
  continue reading
 
Some network issues are subtle, involving advanced concepts like asymmetric routing, multicast flooding, and access control list (ACL) errors. This episode explains how asymmetric routing—where traffic returns on a different path than it arrived—can confuse firewalls and lead to dropped packets. We discuss how to diagnose and design around this beh…
  continue reading
 
Poor network segmentation can lead to serious Layer 2 and Layer 3 problems. In this episode, we explain how excessive collision domains on legacy hubs or poorly configured switches can slow performance and cause retransmissions. We also dive into broadcast storms—where unchecked broadcast traffic floods the network—and routing loops, which occur wh…
  continue reading
 
Routing issues can silently break connectivity—even if everything looks fine at Layer 2. In this episode, we diagnose common routing problems, including missing default routes, misconfigured static routes, and incorrectly advertised subnets. You'll learn how to use ping, traceroute, and routing tables to spot when traffic is being dropped or misrou…
  continue reading
 
Sometimes network issues stem from the basics: incorrect VLAN assignment, disabled interfaces, or outdated configurations. This episode walks through foundational network checks that resolve a surprising number of connectivity issues. You'll learn how to verify trunk ports, check interface status, review MAC address tables, and ensure endpoints are…
  continue reading
 
Even if the signal is strong, configuration mistakes can block connectivity. This episode addresses common wireless configuration errors such as mismatched SSIDs, incorrect security settings, or outdated drivers on client devices. You’ll learn how WPA2 vs. WPA3 affects compatibility, how authentication failures are logged, and what to check when cl…
  continue reading
 
Signal problems are among the most common wireless complaints—and many stem from poor antenna planning. This episode examines how antenna placement, orientation, and environment affect signal propagation. You'll learn the difference between omnidirectional and directional antennas and how line-of-sight, reflection, and absorption affect coverage. W…
  continue reading
 
Wireless technology is incredibly convenient—but also limited by physical and environmental factors. In this episode, we explore the inherent constraints of wireless communication, such as reduced throughput compared to wired networks, signal degradation over distance, and interference from walls, other devices, or even weather. You’ll learn how to…
  continue reading
 
Every device platform—whether Cisco, Juniper, or another—has its own diagnostic approach. In this episode, we explore common troubleshooting techniques across routers and switches, focusing on interface states, routing tables, and platform-specific commands. You’ll learn how to interpret “up/down” messages, diagnose err-disabled ports, and use comm…
  continue reading
 
Some of the most essential network management tools are also the most overlooked. This episode covers infrastructure tools such as TFTP servers for file transfers, terminal emulators like PuTTY and SecureCRT for CLI access, and core diagnostic commands including ping, traceroute, ipconfig, and netstat. You’ll learn how these tools assist with confi…
  continue reading
 
Network visibility starts with knowing what’s on your network. In this episode, we explain network discovery techniques using tools like ping sweeps, SNMP queries, and Nmap scans to identify devices, operating systems, and open services. You’ll learn how to distinguish active vs. passive discovery methods, the importance of using up-to-date invento…
  continue reading
 
To truly understand what’s happening on the network, you need to inspect the packets themselves. This episode introduces tools like Wireshark, tcpdump, and protocol analyzers that allow you to capture and analyze live traffic. You’ll learn how to filter by IP, port, or protocol, and how to identify patterns like retransmissions, failed handshakes, …
  continue reading
 
Wireless networks introduce a layer of complexity that often demands specialized tools for visibility. In this episode, we cover wireless troubleshooting utilities including site survey tools, spectrum analyzers, and signal heatmaps. These help you diagnose issues like dead zones, co-channel interference, and excessive client density. We also explo…
  continue reading
 
Fiber requires a different class of diagnostic tools due to its precision and sensitivity. In this episode, we cover devices like OTDRs (Optical Time Domain Reflectometers), power meters, and visual fault locators. You’ll learn how these tools detect breaks, signal loss, and connector issues with pinpoint accuracy. OTDRs, for example, send pulses o…
  continue reading
 
Troubleshooting starts with the right tools. In this episode, we walk through the essential cable testing and installation tools you’ll use on the job. These include crimpers for RJ-45 connectors, punchdown tools for keystone jacks and patch panels, and continuity testers for verifying wire maps. You’ll also learn how cable locators and tone genera…
  continue reading
 
Link-level problems are easy to overlook but frequently cause intermittent issues. This episode explores duplex mismatches—where one device is set to full duplex and the other to half—leading to collisions, retransmissions, and degraded performance. We explain how to spot and correct these mismatches using port configuration and interface statistic…
  continue reading
 
Even a well-designed network can experience hardware or cabling faults over time. This episode breaks down common problems such as broken connectors, bent pins, cable kinks, and worn insulation. We explain how these physical issues translate into dropped packets, CRC errors, and link flapping. Recognizing these symptoms early helps prevent widespre…
  continue reading
 
Cable problems can often look like application issues, but they require a different kind of troubleshooting. In this episode, we review cable specifications like length limits, signal loss, impedance, and interference resistance. You'll learn how to recognize mismatches between cable category and intended use, such as trying to run 10 Gbps over Cat…
  continue reading
 
Once you’ve confirmed the cause of a network issue, it's time to solve it. This episode covers the final stages of the troubleshooting methodology: establishing a plan of action, implementing the solution, verifying functionality, and documenting everything. You’ll learn how to evaluate risk before making changes, how to plan rollback strategies, a…
  continue reading
 
The foundation of effective troubleshooting is a structured approach. In this episode, we introduce the CompTIA troubleshooting methodology, focusing on the first few steps: identifying the problem, establishing a theory of probable cause, and testing that theory. You'll learn how to ask the right questions, collect information from logs and users,…
  continue reading
 
In this final domain, we turn our focus to troubleshooting—a skill that ties together everything you’ve learned so far. This episode introduces Domain 5 and outlines the key areas it covers, including troubleshooting methodology, cable testing, routing diagnostics, wireless issues, and performance analysis. Unlike previous domains that focused on s…
  continue reading
 
Security tools can’t catch every threat—but informed users often can. This episode looks at the balance between technical detection methods and user-driven prevention. We start by examining detection tools like antivirus, IDS/IPS, SIEM platforms, and anomaly-based monitoring. You’ll learn how these systems generate alerts, how tuning reduces false …
  continue reading
 
While cyber defenses are critical, physical security is just as important. In this episode, we explain how physical access controls protect infrastructure from unauthorized tampering, theft, or sabotage. You’ll learn about badge systems, biometrics, mantraps, camera placement, and hardware locks. These controls help restrict access to wiring closet…
  continue reading
 
Wireless networks require layered security controls to keep unauthorized users out and ensure a clean client experience. In this episode, we cover advanced wireless protections including MAC filtering, client isolation, and captive portals. MAC filtering adds a basic layer of access control by allowing or denying clients based on their hardware add…
  continue reading
 
Firewalls and access control lists are the gatekeepers of your network, and understanding how to configure them correctly is essential. This episode explains how to structure firewall rules and ACLs (Access Control Lists) using principles like implicit deny, least privilege, and rule order. You'll learn how rules are evaluated top-down and why a mi…
  continue reading
 
Securing the network starts with securing its devices. In this episode, we focus on hardening best practices for routers, switches, and firewalls. This includes disabling unused interfaces, enforcing strong password policies, and limiting access with ACLs and administrative timeouts. We also explore remote access security—ensuring SSH replaces Teln…
  continue reading
 
Advanced network protection mechanisms focus on securing internal traffic and device behavior. This episode introduces three such features: Dynamic ARP Inspection (DAI), DHCP Snooping, and Control Plane Policing (CoPP). DAI helps detect and block ARP spoofing attempts by validating ARP packets against known trusted entries. This is especially impor…
  continue reading
 
Hardening your network means reducing its attack surface and securing its services. In this episode, we look at three high-priority hardening practices: securing SNMP, managing router advertisements, and implementing port security. You’ll learn how to disable or reconfigure SNMPv1/v2 in favor of SNMPv3, ensuring encrypted and authenticated device m…
  continue reading
 
Security doesn’t stop at the firewall—physical access and social manipulation play a major role in network compromise. In this episode, we explore phishing in its many forms, including spear phishing, whaling, and smishing (SMS-based phishing). You’ll learn how attackers use psychological manipulation and trust to trick users into revealing credent…
  continue reading
 
Some of the most dangerous network threats don’t rely on malware—they rely on deception. In this episode, we explore IP spoofing, a method where attackers forge source IP addresses to disguise their origin or impersonate trusted devices. You’ll learn how spoofed packets can bypass access controls, flood systems, or launch man-in-the-middle and ampl…
  continue reading
 
Malicious software remains one of the most common and destructive threats to networks and users alike. In this episode, we examine different types of malware, focusing on ransomware, spyware, and trojans—each with unique goals and attack vectors. You’ll learn how ransomware encrypts data and demands payment, often targeting entire organizations wit…
  continue reading
 
When devices pretend to be something they’re not, serious security problems can follow. This episode focuses on spoofing attacks—specifically ARP spoofing and MAC address spoofing—that allow attackers to intercept or redirect traffic within a local network. You’ll learn how ARP spoofing poisons the ARP table of nearby devices to reroute traffic thr…
  continue reading
 
VLANs offer segmentation—but they’re not invulnerable. In this episode, we look at how attackers can bypass VLAN boundaries using VLAN hopping techniques like double-tagging and switch spoofing. You’ll learn how misconfigured trunk ports, native VLANs, and default switch behaviors create opportunities for unauthorized access between VLANs. We also …
  continue reading
 
On-path attacks, formerly known as man-in-the-middle attacks, are some of the most dangerous network threats. In this episode, we explain how attackers insert themselves into the communication path between devices to intercept, modify, or impersonate data. You’ll learn about ARP spoofing, rogue gateways, and SSL stripping—each with their own vector…
  continue reading
 
Denial-of-Service attacks aim to disrupt services by overwhelming a system’s resources—and understanding how they work is key to protecting against them. This episode covers the types of DoS attacks, including protocol, volumetric, and application-layer variants. We then examine how Distributed DoS (DDoS) attacks scale the damage by launching traff…
  continue reading
 
Every security decision is about balancing risk, and in this episode, we dive into how organizations identify, measure, and manage those risks. You’ll learn the components of a risk management framework, including risk identification, assessment, mitigation, and ongoing monitoring. We explain the difference between qualitative and quantitative asse…
  continue reading
 
802.1X is the gatekeeper of modern enterprise networks, ensuring only authenticated users and devices can connect. This episode explains how 802.1X works as a port-based network access control mechanism, acting as the foundation for many secure wireless and wired deployments. You’ll learn about the three roles in 802.1X: the supplicant (client), th…
  continue reading
 
Centralized authentication simplifies user management while enhancing security. In this episode, we compare two core protocols—TACACS+ and RADIUS—and explain their roles in authenticating access to network infrastructure devices. You’ll learn how TACACS+ provides command-level control and full separation of authentication, authorization, and accoun…
  continue reading
 
Beyond basic firewalls and access controls, advanced security mechanisms offer deeper visibility and proactive defense. In this episode, we explore Network Access Control (NAC), a system that evaluates a device’s health and compliance status before granting access to the network. NAC solutions can quarantine non-compliant systems, require updates, …
  continue reading
 
Zero Trust networking flips the traditional perimeter-based security model on its head. In this episode, we unpack the Zero Trust principle of “never trust, always verify,” and explore how it applies to network design. You’ll learn how Zero Trust assumes breach by default and demands continuous authentication, authorization, and monitoring regardle…
  continue reading
 
Security in networking isn’t just about blocking attacks—it’s about minimizing exposure by limiting what users and systems can access. In this episode, we examine the Principle of Least Privilege (PoLP), which states that users should have only the access they need to perform their duties—no more, no less. You’ll learn how this concept applies not …
  continue reading
 
This episode dives into the foundational security concepts of vulnerabilities, exploits, and exposures—terms that appear throughout the Network Plus exam and underpin much of what cybersecurity involves. We begin by defining what constitutes a vulnerability, whether it’s a flaw in software, a misconfiguration in hardware, or a weakness in protocol …
  continue reading
 
Every security strategy begins with the CIA Triad—Confidentiality, Integrity, and Availability. In this episode, we explore how these three principles guide all security policies and how various threats can undermine each one. Confidentiality threats include unauthorized access and data breaches. Integrity threats involve tampering, spoofing, or un…
  continue reading
 
Domain 4 marks a transition from availability and performance into security—protecting the integrity and confidentiality of the network. In this episode, we introduce the core topics that make up Network Security, including authentication, access control, attack types, and hardening techniques. The goal of this domain is to teach you how to prevent…
  continue reading
 
Configuration data is as critical as hardware—and losing it can lead to hours of downtime. In this episode, we walk through backup and restore procedures for routers, switches, firewalls, and other network appliances. You’ll learn how to use TFTP, FTP, or USB-based methods to copy and store configurations, and how to schedule automated backups usin…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play