Home
Categories
EXPLORE
True Crime
Comedy
Sports
Society & Culture
Business
News
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/b5/8e/f7/b58ef707-64e4-d9dd-5ba7-7c4a635c1f7f/mza_1869768669749763123.jpg/600x600bb.jpg
CyberLex Blue Team Academy
M.G. Vance
11 episodes
1 day ago
CyberLex Blue Team Academy is the cinematic, scenario-based podcast that teaches real-world defensive skills for Security+, ISC2 CC, CySA+, and CCSP. Learn to analyze threats, investigate incidents, and build the defensive intuition needed for modern cybersecurity roles. Your journey to becoming a defender starts here.
Show more...
Technology
RSS
All content for CyberLex Blue Team Academy is the property of M.G. Vance and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
CyberLex Blue Team Academy is the cinematic, scenario-based podcast that teaches real-world defensive skills for Security+, ISC2 CC, CySA+, and CCSP. Learn to analyze threats, investigate incidents, and build the defensive intuition needed for modern cybersecurity roles. Your journey to becoming a defender starts here.
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/44882549/44882549-1764577739435-e7db34e0d4942.jpg
Scenario 9: The Process That Tried to Hide Itself | CyberLex Blue Team Academy
CyberLex Blue Team Academy
3 minutes 41 seconds
3 days ago
Scenario 9: The Process That Tried to Hide Itself | CyberLex Blue Team Academy

EPISODE 9 — “The Process That Tried to Hide Itself”

A suspicious background process appears at 3:12 a.m.—quiet, precise, and disguised as a legitimate Windows service. One character off. One behavior out of pattern. One outbound connection too many.

Episode 9 of CyberLex Blue Team Academy takes you deep into the world of endpoint detection, stealth malware behavior, process masquerading, and command-and-control reconnaissance. You’ll learn how attackers hide inside normal system activity, how they establish persistence, and how defenders detect anomalies that blend into routine telemetry.

What you’ll learn:

  • How malware disguises itself as legitimate processes

  • Why launch paths and parent processes matter

  • How to identify stealth C2 beaconing

  • How process behavior reveals compromise

  • Why persistence mechanisms expose attacker intent

  • How to isolate, investigate, and contain suspicious endpoints

  • Real-world detection logic used by SOC analysts

Ideal for:

  • Security+ learners studying malware basics

  • CC learners mastering process awareness

  • CySA+ students practicing endpoint analysis

  • CCSP learners examining identity and system behavior

  • SOC analysts, IT professionals, cloud defenders

  • Anyone sharpening their threat detection instincts

Some processes hide in plain sight.

Good defenders see the misdirection.

Listen to Episode 9 now — The Process That Tried to Hide Itself.

Your detection instincts sharpen here.

CyberLex Blue Team Academy
CyberLex Blue Team Academy is the cinematic, scenario-based podcast that teaches real-world defensive skills for Security+, ISC2 CC, CySA+, and CCSP. Learn to analyze threats, investigate incidents, and build the defensive intuition needed for modern cybersecurity roles. Your journey to becoming a defender starts here.