Decoded: The Cybersecurity Podcast

By Edward Henriquez

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 1
Reviews: 0
Episodes: 217

Description

This cybersecurity study guide presents a comprehensive overview of key cybersecurity concepts through short answer questions and essay prompts. Topics covered include data security measures like encryption and message digests, authentication methods and their vulnerabilities, disaster recovery and business continuity planning, risk management strategies, and malware types.

Episode Date
Agents of Chaos: The Race for Autonomous AI Control
Apr 25, 2026
Anthropic and the Governance of Frontier AI Wealth and Safety
Apr 14, 2026
OAuth Abuse: The Rise of Device Code Phishing Campaigns
Mar 29, 2026
Codex Security: An Agentic Approach to Vulnerability Remediation
Mar 10, 2026
AI Red Teaming and LLM Security Fundamentals Handbook
Feb 23, 2026
The Rise of Agentic Misalignment and AI Code Gatekeeping
Feb 15, 2026
Authentication Downgrade Attacks: Deep Dive into MFA Bypass
Feb 07, 2026
FS-ISAC Strategic Framework for Financial AI Risk Management
Jan 29, 2026
Cybersecurity Weekly Briefing: Emerging Threats and Defensive Innovation
Jan 26, 2026
Under Armour Data Breach and MIGP Security Analysis
Jan 23, 2026
Zero Trust Segmentation: Halting Lateral Movement and Legacy Risk
Jan 20, 2026
Operation MoneyMount-ISO: Phantom Stealer Deployment via ISO
Dec 16, 2025
Browser Zero Trust: Hardening Security Controls
Dec 08, 2025
Weaponizing Language: Red Teaming the Claude Code Agent
Nov 26, 2025
SABSA: Business-Driven Enterprise Security Architecture and Risk Management
Nov 14, 2025
TOGAF ADM and Enterprise Architecture Concepts
Nov 14, 2025
Digital Trust and Risk Management: The Invisible Armor
Nov 11, 2025
Technology and Enterprise Risk Governance
Oct 21, 2025
Garrett Gee's Hacker Mindset and Travel Empire
Oct 16, 2025
AI Transforms SOC: Reactive to Proactive Defense
Oct 08, 2025
Zero-Click Spyware: Pegasus, WhatsApp, and iOS Attacks
Oct 07, 2025
Security Architecture Episode 7: Final - Review
Oct 03, 2025
Security Architecture Episode 2: Core Security Architecture: IAM, Applications, Cloud
Oct 02, 2025
Security Architecture Episode 3: Advanced Security Architecture: Design and Resilience
Oct 02, 2025
Security Architecture Episode 4: Cybersecurity Security Operations: MDRR and Essential Tools
Oct 02, 2025
Security Architecture Episode 5: Cybersecurity Incident Response: The PICERL Framework
Oct 02, 2025
Security Architecture Episode 6: Security Monitoring and Continuous Cybersecurity Improvement
Oct 02, 2025
Security Architecture Episode 1: Foundations of Security Architecture Principles and Frameworks
Oct 01, 2025
Microsoft Entra ID Global Admin Hijacking Flaw
Sep 23, 2025
AI, Social Engineering, and CAPTCHA Security
Sep 22, 2025
Chrome's Seventeen-Year Journey: Speed, Security, Stability, and Simplicity
Sep 12, 2025
September 2025 Windows Security Update Overview
Sep 10, 2025
The GhostAction Supply Chain Attack
Sep 09, 2025
Information Security: Attacks, Strategies, Tools
Aug 21, 2025
Noodlophile Stealer Evolves: Targeted Copyright Phishing Hits Enterprises
Aug 20, 2025
AI Ticking Time Bomb From Chatbot Hacks to Climate Policys
Aug 15, 2025
FortiSIEM: Unauthenticated Command Injection Vulnerabilities
Aug 15, 2025
Model Context Protocol: Security Risks and Best Practices
Aug 12, 2025
GPT-5 AMA: User Feedback and Legacy Model Demands
Aug 11, 2025
Microsoft 365 Credential Phishing via Link Wrapping Abuse
Aug 05, 2025
Executable Secrets: How DreamWalker Builds Trustworthy Call Stacks
Jul 31, 2025
Cracking CraxsRat: Malware Analysis and Protection
Jul 24, 2025
The Practitioner's Guide to AI Risk Assessment
Jul 22, 2025
ChatGPT Agent: Autonomous AI Takes the Reins
Jul 19, 2025
The Warmwind AI OS Revolution
Jul 14, 2025
Retriever AI: The Hyper-Efficient Web Automation Agent
Jul 10, 2025
Microsoft's July 2025 Patch Tuesday: Critical Vulnerabilities Addressed
Jul 09, 2025
AI Revolution: Models, Agents, and Robotics Unleashed
Jul 02, 2025
Special Episode : Trump's Big, Beautiful Bill: Impact on America
Jul 01, 2025
ZPhisher Phishing Tools and Incident Response
Jun 30, 2025
TheFatRat: Exploitation and Evasion Tool
Jun 30, 2025
Gemini CLI: AI Agent for Coding Workflows
Jun 26, 2025
Chromium Browser Screen Spying Techniques
Jun 24, 2025
Bug Bounty Programs and Vulnerability Rewards
Jun 24, 2025
Residential Proxies: Cybercrime's New Enabler
Jun 24, 2025
Remote Access Trojans: History, Dangers, and Defenses
Jun 19, 2025
Cybersecurity: Attacks, Strategies, and Tools
Jun 16, 2025
The Isolated Browser: Web Threat Protection
Jun 12, 2025
The AI Job Seeker Deluge: Risks and Solutions
Jun 12, 2025
AI Advancements: From Robotics to Longevity
Jun 06, 2025
Snowflake Cortex and AI Applications
May 27, 2025
AI and Tech Trends
May 27, 2025
Tech, AI, and Robotics Advancements
May 22, 2025
Microsoft May 2025 Patch Tuesday Update
May 13, 2025
Cyber Threat Intelligence Resources and Trends
May 13, 2025
Cybersecurity Attacks and Tactics
May 08, 2025
LLMs in Cybersecurity
May 07, 2025
InfoSec News and Vulnerability Reports
May 06, 2025
Exploring Enterprise Browser Solutions for Security
May 06, 2025
AWS Workspaces: Security, Best Practices, and Monitoring
May 06, 2025
Building LLM SQL Agents with LangChain
May 02, 2025
Tech and AI News Roundup
May 01, 2025
Urban Laureate: Decoded Culture Drop
May 01, 2025
Tech and AI Developments: Meta, Waymo, Tesla, Intel
Apr 30, 2025
Protecting SNAP Benefits from Skimming Fraud
Apr 30, 2025
Cybersecurity Auditing Guide and Common Findings
Apr 30, 2025
AWS Cloud Security Overview and Certification
Apr 29, 2025
Tech and Science News Update
Apr 29, 2025
InfoSec: Policy Puppetry, Exploits, and AI Security
Apr 28, 2025
SS7 Network Vulnerabilities and Exploits
Apr 26, 2025
Bug Bounty: Finding Flaws and Legal Considerations
Apr 24, 2025
Tech, AI, and Science Highlights (April 24)
Apr 24, 2025
Understanding User and Entity Behavior Analytics (UEBA) by Edward Henriquez
Apr 23, 2025
InfoSec: Security News and Insights
Apr 23, 2025
InfoSec: OpenAI, Browsers, and Future Tech
Apr 23, 2025
AI Models Rapidly Generate Exploit Code by Edward Henriquez
Apr 22, 2025
InfoSec: Security News and Analysis
Apr 22, 2025
Decoded: Data Leak Techniques and Defense by Edward Henriquez
Apr 22, 2025
File Upload Attacks: Techniques, Tools, and Defenses by Edward Henriquez
Apr 21, 2025
Decoding SOC as a Service & SaaS Security by Edward Henriquez
Apr 21, 2025
Tech, Science, and Development Highlights - 2025-04-21
Apr 21, 2025
Cybersecurity AI Bot Army Attacks: The New Frontier by Edward Henriquez
Apr 17, 2025
Agentless Visibility and Control for Network Security by Edward Henriquez
Apr 17, 2025
OpenAI Models, Tech, Science, and AI Business
Apr 17, 2025
InfoSec: 4chan Hack, Data Breaches, and Threat Tactics
Apr 16, 2025
Unmasking Tool Poisoning Attacks: A Cybersecurity by Edward Henriquez
Apr 16, 2025
OpenAI Social Network, Tech Hiring, and More
Apr 16, 2025
AI Escape Attacks: Cybersecurity Implications by Edward Henriquez
Apr 15, 2025
Gridlocked: Cybersecurity Threats in the Power Grid by Edward Henriquez
Apr 15, 2025
Hacking the Telecom Stack: A Cybersecurity Threat Analysis by Edward Henriquez
Apr 15, 2025
Daily Security News Briefing - April 15, 2025
Apr 15, 2025
CISSP Domain 8 Software Security: Practice Questions and Answers by Edward Henriquez
Apr 14, 2025
April 14, 2025 Cyber Threat Landscape Report by Edward Henriquez
Apr 14, 2025
Decoded: QRL Jacking - The Hacker's QR Code Backdoor by Edward Henriquez
Apr 14, 2025
CISSP Domain 7: Security Operations Practice Questions and Answers by Edward Henriquez
Apr 13, 2025
CISSP Domain 6 Security Assessment and Testing Practice Questions and Answers by Edward Henriquez
Apr 13, 2025
CISSP Domain 5: IAM Practice Questions and Answers by Edward Henriquez
Apr 13, 2025
CISSP Domain 4: Network Security Practice Questions and Answers by Edward Henriquez
Apr 13, 2025
API Under Siege by Edward Henriquez
Apr 12, 2025
Decoded: Inside SQL Injection Vulnerabilities and Defenses by Edward Henriquez
Apr 12, 2025
Secrets Sprawl and Automated Identity Attacks by Edward Henriquez
Apr 12, 2025
CISSP Domain 3: Security Architecture and Engineering Practice Questions and Answers by Edward Henriquez
Apr 11, 2025
CISSP Domain 2: Asset Security Practice Questions and Answers by Edward Henriquez
Apr 11, 2025
CISSP Domain 1: Security and Risk Management Practice Questions and Answers by Edward Henriquez
Apr 11, 2025
Cybersecurity Advisory and Vulnerability News: April 10, 2025 by Edward Henriquez
Apr 10, 2025
Lateral Movement: Techniques, Detection, and Prevention Strategies by Edward Henriquez
Apr 10, 2025
Smart Car Cybersecurity: The Hackable Highway by Edward Henriquez
Apr 10, 2025
Decoded: Path Traversal - A Hacker's Perspective by Edward Henriquez
Apr 10, 2025
Cybersecurity News and Trends: April 9, 2025 by Edward Henriquez
Apr 10, 2025
Podcast Listener Engagement: Reviews, Comments, and Support - Thank You
Apr 09, 2025
Cybersecurity Insights and Threat Analysis: April 8, 2025 by Edward Henriquez
Apr 09, 2025
Decoding Non-Human Digital Identities: A Hacker's Deep Dive
Apr 08, 2025
CISSP Study Guide Overview by Edward Henriquez
Apr 08, 2025
Patch Tuesday Overview - April 8, 2025 by Edward Henriquez
Apr 08, 2025
Decoded: Cipher's GIAC Security Essentials by Edward Henriquez
Apr 08, 2025
GSEC Certification: 25 Essential Cybersecurity Questions by Edward Henriquez
Apr 08, 2025
NIST & GIAC: Information Security and Certification Overview by Edward Henriquez
Apr 08, 2025
Fast Flux Networks: Evasion Techniques and Detection by Edward Henriquez
Apr 07, 2025
Decoding Cloud Security Posture Management (CSPM) by Edward Henriquez
Apr 07, 2025
Understanding SASE: Security and Network Evolution by Edward Henriquez
Apr 07, 2025
Decoded: Data Loss Prevention (DLP) Explained by Edward Henriquez
Apr 07, 2025
Decoded: Daily Cybersecurity Insights and Threat Analysis: April 7, 2025 by Edward Henriquez
Apr 07, 2025
Credential Stuffing: The Silent Cybersecurity Threat by Edward Henriquez
Apr 06, 2025
Crypto Hijacking: Detection and Prevention by Edward Henriquez
Apr 06, 2025
Decoded: The Cybersecurity Podcast - Shadow IT by Edward Henriquez
Apr 05, 2025
Stack Spoofing: Evasion and Exploitation Techniques by Edward Henriquez
Apr 05, 2025
Daily Cybersecurity News and Insights - April 05, 2025 by Edward Henriquez
Apr 04, 2025
AI Agents in Cybersecurity: Capabilities and Implications by Edward Henriquez
Apr 04, 2025
Command and Control Servers: Cyber Attack Remote Access by Edward Henriquez
Apr 04, 2025
Reverse Shells: Anatomy, Execution, Detection, and Defense by Edward Henriquez
Apr 04, 2025
Network Ghost: IP and MAC Address Spoofing by Edward Henriquez
Apr 04, 2025
DLL Hijacking: Windows Dynamic Link Library Exploits by Edward Henriquez
Apr 04, 2025
Cybersecurity Pro's Essential Unix Commands by Edward Henriquez
Apr 03, 2025
Kerberos and Active Directory Authentication Explained by Edward Henriquez
Apr 03, 2025
Cybersecurity Threats and Vulnerabilities: April 2025 Insights by Edward Henriquez
Apr 03, 2025
AI and Machine Learning in Cybersecurity by Edward Henriquez
Apr 03, 2025
Dark Web & Cybercrime Economy: The Digital Underworld by Edward Henriquez
Apr 03, 2025
PCAP Analysis for Cybersecurity: Setup and Interpretation by Edward Henriquez
Apr 02, 2025
Network Exfiltration: Tactics and Prevention by Edward Henriquez
Apr 02, 2025
Exploit Kits: Automated Cybercrime Weapons and Defenses by Edward Henriquez
Apr 01, 2025
The Matrix: A Cybersecurity Allegory by Edward Henriquez
Apr 01, 2025
Red Team vs. Blue Team: Offensive and Defensive Cybersecurity by Edward Henriquez
Apr 01, 2025
Malware Payload Extraction: Methods and Analysis by Edward Henriquez
Mar 31, 2025
Trojans: Decoding the Hidden Cyber Threat by Edward Henriquez and
Mar 30, 2025
Spyware: The Silent Cyber Threat by Edward Henriquez
Mar 30, 2025
Ransomware: The Digital Extortion Epidemic by Edward Henriquez
Mar 30, 2025
Inside Malware: Coding, Function, and Defense by Edward Henriquez
Mar 29, 2025
Decoded: Anatomy of a Rootkit by Edward Henriquez
Mar 29, 2025
Inside the Mind of a World-Class Hacker by Edward Henriquez
Mar 29, 2025
Network Security Audit Checklist by Edward Henriquez
Mar 28, 2025
Securing Router Protocols: A Cybersecurity Deep Dive by Edward Henriquez
Mar 27, 2025
OSI Model: A Cybersecurity Perspective by Edward Henriquez
Mar 26, 2025
US Data Breaches: Attacks, Methods, and Prevention by Edward Henriquez
Mar 25, 2025
Decoding Cyber Attacks: The MITRE ATT&CK Framework by Edward Henriquez
Mar 25, 2025
The Pyramid of Pain: Disrupting Cyber Adversaries Strategically by Edward Henriquez
Mar 24, 2025
NIST Incident Response Lifecycle: Preparation to Post-Incident by Edward Henriquez
Mar 24, 2025
Incident Response and Lockheed Martin's Cyber Kill Chain by Edward Henriquez
Mar 24, 2025
Decoded: Episode 2 - Splunk Security Monitoring: Setup and Interface by Edward Henriquez
Mar 23, 2025
Decoded: Episode 1 - Introduction to Splunk by Edward Henriquez
Mar 23, 2025
Breaking into Cybersecurity: Skills and Responsibilities by Edward Henriquez
Mar 23, 2025
Part 13 - CEH v12 Practice Questions: IoT and OT Security: 15 Questions
Mar 22, 2025
Part 12 - CEH v12 Practice Questions: Incident Response and Digital Forensics: Core Concepts
Mar 22, 2025
Part 11 - CEH v12 Practice Questions: Cloud Security and Virtualization Essentials
Mar 21, 2025
Part 10 - CEH v12 Practice Questions: Cryptography and PKI Security Essentials
Mar 21, 2025
Part 9 - CEH v12 Practice Questions: Malware Threats and Analysis: 15 Questions
Mar 18, 2025
Part 8 - CEH v12 Practice Questions: Web Application Attack Fundamentals: 15 Questions
Mar 18, 2025
Part 7 - CEH v12 Practice Questions: Wireless Attack Methods and Security Protocols
Mar 16, 2025
Part 6 - CEH v12 Practice Questions: Web Attack Vulnerabilities and Exploits
Mar 16, 2025
Part 5 - CEH v12 Practice Questions: Social Engineering Techniques and Tactics
Mar 15, 2025
Part 4 - CEH v12 Practice Questions: Windows System Hacking Techniques and Tools
Mar 15, 2025
Part 3 - CEH v12 Practice Questions: Network Scanning and Enumeration Techniques
Mar 15, 2025
Part 2 - CEH v12 Practice Questions: Reconnaissance & Footprinting Fundamentals
Mar 14, 2025
Part 1 - CEH Exam v12 Practice Questions: Ethical Hacking Fundamentals
Mar 13, 2025
Web Application Hacking: Understanding Common Attacks by Edward Henriquez
Mar 13, 2025
Decoded: Hacker's Playbook - Real-World Tactics by Edward Henriquez
Mar 12, 2025
Certified Ethical Hacker (CEH) by Edward Henriquez
Mar 07, 2025
Open-Source DFIR Tools Deep Dive by Edward Henriquez
Mar 07, 2025
Unix & Cybersecurity: Mastering the Command Line for Security by Edward Henriquez
Mar 03, 2025
Cybersecurity Career: A 6-Month Plan for Job Seekers by Edward Henriquez
Mar 03, 2025
PurpleLab: Cybersecurity Lab for Threat Detection, Analysis, and Simulation by Edward Henriquez
Feb 27, 2025
Cracking Passwords: Techniques and Defenses by Edward Henriquez
Feb 27, 2025
Top OSINT Books: Mastering Open Source Intelligence by Edward Henriquez
Feb 18, 2025
CrowdStrike 2024 Threat Hunting Report: Interactive Intrusion Trends
Feb 14, 2025
AI-Powered Cybersecurity Automation by Edward Henriquez
Feb 02, 2025
Hacking and Cybersecurity: Protecting Yourself in the Digital Age
Feb 02, 2025
Deepfakes & AI-Powered Social Engineering by Edward Henriquez
Feb 01, 2025
Patch or Perish: Maximizing ROI with Intune & Automox by Edward Henriquez
Feb 01, 2025
Ghost GPT: Unveiling an AI Cybersecurity Revolution by Edward Henriquez
Jan 27, 2025
Open Source Intelligence (OSINT): Tools and Techniques by Edward Henriquez
Jan 23, 2025
Cyber Threat Intelligence: A Comprehensive Guide by Edward Henriquez
Jan 22, 2025
ISC2 CC Domain 5: Security Operations Exam Study Questions by Edward Henriquez
Jan 22, 2025
ISC2 CC Domain 4: Network Security Exam Study by Edward Henriquez
Jan 21, 2025
ISC2 CC Domain 3: Access Control Study Exam Questions by Edward Henriquez
Jan 21, 2025
ISC2 CC Domain 2: Business Continuity Study Exam Questions by Edward Henriquez
Jan 21, 2025
ISC2 CC Domain 1: Security Principles Study Exam Questions by Edward Henriquez
Jan 21, 2025
Cybersecurity Risk Management by Edward Henriquez
Jan 18, 2025
Penetration Testing and Ethical Hacking by Edward Henriquez
Jan 18, 2025
Incident Response Planning and Technologies by Edward Henriquez
Jan 17, 2025
Zero Trust Security Explained by Edward Henriquez
Jan 16, 2025
OWASP Application Threat Modeling by Edward Henriquez
Jan 16, 2025
Cloud Security Study by Edward Henriquez
Jan 16, 2025
A Day in the Life of a Cybersecurity Analyst by Edward Henriquez
Jan 14, 2025
Common Cyber Attacks: Reducing the Impact by Edward Henriquez
Jan 14, 2025
Essential Cybersecurity Tools by Edward Henriquez
Jan 13, 2025
Enterprise SIEM Solutions by Edward Henriquez
Jan 13, 2025
Enterprise Vulnerability Management by Edward Henriquez
Jan 12, 2025
ISC2 CC Exam Preparation by Edward Henriquez
Jan 12, 2025