Home
Categories
EXPLORE
True Crime
Comedy
Sports
Society & Culture
Business
News
History
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/b5/8e/f7/b58ef707-64e4-d9dd-5ba7-7c4a635c1f7f/mza_1869768669749763123.jpg/600x600bb.jpg
CyberLex Blue Team Academy
M.G. Vance
11 episodes
1 day ago
CyberLex Blue Team Academy is the cinematic, scenario-based podcast that teaches real-world defensive skills for Security+, ISC2 CC, CySA+, and CCSP. Learn to analyze threats, investigate incidents, and build the defensive intuition needed for modern cybersecurity roles. Your journey to becoming a defender starts here.
Show more...
Technology
RSS
All content for CyberLex Blue Team Academy is the property of M.G. Vance and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
CyberLex Blue Team Academy is the cinematic, scenario-based podcast that teaches real-world defensive skills for Security+, ISC2 CC, CySA+, and CCSP. Learn to analyze threats, investigate incidents, and build the defensive intuition needed for modern cybersecurity roles. Your journey to becoming a defender starts here.
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/44882549/44882549-1764576403736-4659608e0285.jpg
Scenario 3: The Configuration Change No One Admitted To | CyberLex Blue Team Academy
CyberLex Blue Team Academy
3 minutes 49 seconds
3 days ago
Scenario 3: The Configuration Change No One Admitted To | CyberLex Blue Team Academy

EPISODE 3 — “The Configuration Change No One Admitted To”

A single configuration change.

No ticket.

No approval.

No explanation.

This is where attackers start quiet… and defenders learn to listen.

In Episode 3 of CyberLex Blue Team Academy, we investigate a subtle modification that turns into a full lesson in early reconnaissance, privilege misuse, and the psychology of stealth attacks. What looks harmless becomes a deep dive into system integrity, audit trails, and how real defenders uncover the truth behind “innocent” settings.

What you’ll learn in this episode:

  • How attackers alter configurations to reduce visibility

  • How to detect unauthorized changes using logs & baselines

  • Why timestamp drift exposes hidden activity

  • How to correlate login anomalies with configuration edits

  • The difference between “system changes” and attacker obfuscation

  • How endpoint behavior reveals lateral movement

  • Why visibility reduction is often the first phase of a breach

What we cover:

  • Unauthorized config drift

  • Event correlation and timeline reconstruction

  • Beaconing patterns in outbound DNS traffic

  • Admin session anomalies

  • How attackers test visibility gaps before escalating

  • Real-world stealth TTPs

  • Defender response strategy

Perfect for:

  • Security+ learners building real system awareness

  • CC beginners wanting to understand log integrity

  • CySA+ students mastering anomaly detection

  • CCSP learners exploring cloud and system changes

  • SOC analysts, sysadmins, IT professionals

  • Anyone learning to catch subtle attacker movements

One setting changed everything.

And noticing it changed the outcome.

Listen to Episode 3 now — The Configuration Change No One Admitted To.

Your awareness sharpens here.

CyberLex Blue Team Academy
CyberLex Blue Team Academy is the cinematic, scenario-based podcast that teaches real-world defensive skills for Security+, ISC2 CC, CySA+, and CCSP. Learn to analyze threats, investigate incidents, and build the defensive intuition needed for modern cybersecurity roles. Your journey to becoming a defender starts here.