Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Juan Rodriguez. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Juan Rodriguez or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Cybersecurity Fundamentals : Hacking Humans: The Art of Social Engineering Chapter 2 Part 2

23:49
 
Share
 

Manage episode 506166478 series 2820603
Content provided by Juan Rodriguez. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Juan Rodriguez or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

[email protected]

Cybersecurity isn't just about firewalls and antivirus software—it's about understanding the complex interplay between technical systems and human psychology. In this continuation of our Security+ series, we explore the multifaceted world of attack surfaces, threat vectors, and social engineering techniques that cybercriminals employ.
We start by breaking down what constitutes an attack surface—those vulnerable points where unauthorized users might attempt to breach your systems. From physical hardware and network components to applications and human elements, each represents a potential entry point for attackers. We then explore the pathways attackers use to exploit these vulnerabilities, from vulnerable software and network vectors to more devious approaches like lure-based and message-based vectors.
The episode takes a deep dive into social engineering—the art of manipulating human behavior rather than exploiting technical flaws. Through real-world examples, including my own experience with an attempted password reset scam, we demonstrate how attackers use techniques like impersonation, pretexting, phishing, and business email compromise to bypass even the most sophisticated security systems. One of my students shared how his sister's company lost $10,000 when an attacker impersonated the vacationing CEO and requested a wire transfer—a stark reminder that human vulnerabilities often pose the greatest security risk.
Whether you're studying for Security+ certification or simply want to better protect yourself and your organization, this episode provides essential insights into the psychological aspects of cybersecurity. Understanding these concepts is crucial not just for IT professionals, but for everyone who uses digital technology. Have you ever encountered a social engineering attempt? How did you recognize and respond to it?

Inspiring Tech Leaders - The Technology Podcast
Interviews with Tech Leaders and insights on the latest emerging technology trends.
Listen on: Apple Podcasts Spotify

Support the show

Art By Sarah/Desmond
Music by Joakim Karud
Little chacha Productions
Juan Rodriguez can be reached at
TikTok @ProfessorJrod
[email protected]
@Prof_JRod
Instagram ProfessorJRod

  continue reading

Chapters

1. Cybersecurity Fundamentals : Hacking Humans: The Art of Social Engineering Chapter 2 Part 2 (00:00:00)

2. Introduction to Security+ Chapter 2 (00:00:25)

3. Attack Surfaces and Threat Vectors (00:03:11)

4. Network and Software Vulnerabilities (00:07:00)

5. [Ad] Inspiring Tech Leaders - The Technology Podcast (00:10:53)

6. (Cont.) Network and Software Vulnerabilities (00:11:27)

7. Social Engineering Techniques (00:13:11)

8. Phishing, Impersonation and BEC Attacks (00:16:51)

9. Episode Wrap-up and Next Topics (00:22:27)

103 episodes

Artwork
iconShare
 
Manage episode 506166478 series 2820603
Content provided by Juan Rodriguez. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Juan Rodriguez or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

[email protected]

Cybersecurity isn't just about firewalls and antivirus software—it's about understanding the complex interplay between technical systems and human psychology. In this continuation of our Security+ series, we explore the multifaceted world of attack surfaces, threat vectors, and social engineering techniques that cybercriminals employ.
We start by breaking down what constitutes an attack surface—those vulnerable points where unauthorized users might attempt to breach your systems. From physical hardware and network components to applications and human elements, each represents a potential entry point for attackers. We then explore the pathways attackers use to exploit these vulnerabilities, from vulnerable software and network vectors to more devious approaches like lure-based and message-based vectors.
The episode takes a deep dive into social engineering—the art of manipulating human behavior rather than exploiting technical flaws. Through real-world examples, including my own experience with an attempted password reset scam, we demonstrate how attackers use techniques like impersonation, pretexting, phishing, and business email compromise to bypass even the most sophisticated security systems. One of my students shared how his sister's company lost $10,000 when an attacker impersonated the vacationing CEO and requested a wire transfer—a stark reminder that human vulnerabilities often pose the greatest security risk.
Whether you're studying for Security+ certification or simply want to better protect yourself and your organization, this episode provides essential insights into the psychological aspects of cybersecurity. Understanding these concepts is crucial not just for IT professionals, but for everyone who uses digital technology. Have you ever encountered a social engineering attempt? How did you recognize and respond to it?

Inspiring Tech Leaders - The Technology Podcast
Interviews with Tech Leaders and insights on the latest emerging technology trends.
Listen on: Apple Podcasts Spotify

Support the show

Art By Sarah/Desmond
Music by Joakim Karud
Little chacha Productions
Juan Rodriguez can be reached at
TikTok @ProfessorJrod
[email protected]
@Prof_JRod
Instagram ProfessorJRod

  continue reading

Chapters

1. Cybersecurity Fundamentals : Hacking Humans: The Art of Social Engineering Chapter 2 Part 2 (00:00:00)

2. Introduction to Security+ Chapter 2 (00:00:25)

3. Attack Surfaces and Threat Vectors (00:03:11)

4. Network and Software Vulnerabilities (00:07:00)

5. [Ad] Inspiring Tech Leaders - The Technology Podcast (00:10:53)

6. (Cont.) Network and Software Vulnerabilities (00:11:27)

7. Social Engineering Techniques (00:13:11)

8. Phishing, Impersonation and BEC Attacks (00:16:51)

9. Episode Wrap-up and Next Topics (00:22:27)

103 episodes

Alle episoder

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play