
Season 1
Episodes
What is SSO
SSO is like getting a VIP wristband—sign in once and get access everywhere. With Single Sign-On, you use one set of login credentials to access multiple applications or systems. It's convenient for users and more...
View Episode
What is a SOC
A SOC is the digital command center where cyber threats are detected, analyzed, and stopped. The Security Operations Center is a team of cybersecurity experts who monitor systems 24/7 (or during business hours) to...
View Episode
What is PKI
PKI is the trust network that makes secure communication on the internet possible. It’s like a digital passport system—verifying identities, encrypting data, and ensuring that when you connect to a website, it’s...
View Episode
What is DOS & DDOS
DoS is like blocking the front door; DDoS is like sending a mob to block every entrance. A DoS attack floods a system with traffic until it can’t handle real users. A DDoS attack does the same, but from thousands of...
View Episode
What is CVSS
CVSS is like the Richter scale for cybersecurity threats. It assigns a score from 0 to 10 to show how dangerous a vulnerability really is. This helps security teams prioritize what needs fixing first—because not all...
View Episode
What is CHAP
CHAP is like a secret handshake that changes every time. It’s a way for systems to verify your identity without ever revealing your actual password. Instead, it uses a challenge-response method, sending a new...
View Episode
What are APTs
APTs are like elite burglars who break in quietly, stay hidden, and slowly steal valuables over time. APTs (Advanced Persistent Threats) are stealthy, long-term cyberattacks usually carried out by highly skilled...
View Episode
What are APIs
APIs are like waiters at a restaurant—taking your request, delivering it to the kitchen (the system), and bringing back exactly what you ordered. APIs (Application Programming Interfaces) act as messengers between...
View Episode
What is AES
AES (Advanced Encryption Standard) is a symmetric encryption algorithm used across the internet and endorsed by NIST. After using DES since 1975 NIST adopted AES due to it's increased strength in 2001. It is important...
View Episode
What are ACLs
ACLs are the bouncer's list of who gets in or out. ACLs (Access Control List) are most popularly used within networking but the concept of a list that say who gets in or out is a concept used through out tech. While...
View Episode