Home
Categories
EXPLORE
True Crime
Comedy
Sports
Society & Culture
Business
News
History
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/b5/8e/f7/b58ef707-64e4-d9dd-5ba7-7c4a635c1f7f/mza_1869768669749763123.jpg/600x600bb.jpg
CyberLex Blue Team Academy
M.G. Vance
11 episodes
23 hours ago
CyberLex Blue Team Academy is the cinematic, scenario-based podcast that teaches real-world defensive skills for Security+, ISC2 CC, CySA+, and CCSP. Learn to analyze threats, investigate incidents, and build the defensive intuition needed for modern cybersecurity roles. Your journey to becoming a defender starts here.
Show more...
Technology
RSS
All content for CyberLex Blue Team Academy is the property of M.G. Vance and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
CyberLex Blue Team Academy is the cinematic, scenario-based podcast that teaches real-world defensive skills for Security+, ISC2 CC, CySA+, and CCSP. Learn to analyze threats, investigate incidents, and build the defensive intuition needed for modern cybersecurity roles. Your journey to becoming a defender starts here.
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/44882549/44882549-1764577915991-801c7e74eac3a.jpg
Scenario 10: The Device That Didn’t Belong on the Network | CyberLex Blue Team Academy
CyberLex Blue Team Academy
3 minutes 54 seconds
3 days ago
Scenario 10: The Device That Didn’t Belong on the Network | CyberLex Blue Team Academy

EPISODE 10 — “The Device That Didn’t Belong on the Network”A device appears on the network with no owner, no registration, and no reason to exist. It connects quietly, probes internal systems subtly, and blends into traffic patterns just enough to avoid basic detection. But not enough to escape a trained defender’s eye.In Episode 10 of CyberLex Blue Team Academy, you investigate a rogue device incident and uncover the techniques attackers use to bypass identity controls and gain physical footholds inside corporate networks. This episode teaches network intuition, rogue device detection, lateral movement awareness, and rapid containment strategy.What you’ll learn: • How rogue devices appear in network logs • Why naming conventions and MAC patterns matter • How stealth scanning works in low and slow patterns • How attackers use physical access to bypass identity • How to analyze ARP, DHCP, and switch-port logs • How to detect C2 callbacks from unauthorized hosts • Proper containment: isolate, trace, confiscate, imageIdeal for: • Security+ learners studying network fundamentals • CC students mastering basic network security • CySA+ students honing detection and correlation • CCSP learners understanding network + cloud interplay • SOC analysts, blue teamers, IT pros, physical security teams • Anyone building “network intuition” as a defender Some threats walk in quietlythrough the front door.Your awareness keeps them out.Listen to Episode 10 now — The Device That Didn’t Belong on the Network.Your network instincts strengthen here.



#Cybersecurity#BlueTeam#SecurityPlus#ISC2CC#CySAPlus#CCSP#NetworkSecurity#RogueDevice#ThreatDetection#SOCAnalyst#CyberDefense#BlueTeamAcademy#CyberLexLearning#InfoSecTraining#LearnCybersecurity

CyberLex Blue Team Academy
CyberLex Blue Team Academy is the cinematic, scenario-based podcast that teaches real-world defensive skills for Security+, ISC2 CC, CySA+, and CCSP. Learn to analyze threats, investigate incidents, and build the defensive intuition needed for modern cybersecurity roles. Your journey to becoming a defender starts here.