Artwork

Content provided by Jason Edwards and Dr Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards and Dr Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Secure Systems & Network Architecture

22:32
 
Share
 

Manage episode 507410962 series 3641336
Content provided by Jason Edwards and Dr Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards and Dr Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

This week highlights the role of architecture as the skeleton of security. Students learn how flat networks and perimeter-based models have failed under modern conditions, with the Target breach serving as a cautionary case. Defense in depth, segmentation, and microsegmentation are introduced as structural strategies for containing adversaries. The rise of zero trust architecture reframes trust as something to be earned continuously rather than assumed, while the lifecycle of SSL and TLS illustrates how protocols evolve to meet new demands.

Learners explore architectural trade-offs, where gains in performance or convenience often come at the expense of visibility and control. Case studies of Heartbleed and DigiNotar demonstrate how shared components and certificate authorities create systemic risks. By the end of the week, students will understand that secure design is about resilience and adaptability, balancing usability, cost, and complexity while embedding monitoring, redundancy, and recovery at the core.
Produced by BareMetalCyber.com

  continue reading

60 episodes

Artwork
iconShare
 
Manage episode 507410962 series 3641336
Content provided by Jason Edwards and Dr Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards and Dr Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

This week highlights the role of architecture as the skeleton of security. Students learn how flat networks and perimeter-based models have failed under modern conditions, with the Target breach serving as a cautionary case. Defense in depth, segmentation, and microsegmentation are introduced as structural strategies for containing adversaries. The rise of zero trust architecture reframes trust as something to be earned continuously rather than assumed, while the lifecycle of SSL and TLS illustrates how protocols evolve to meet new demands.

Learners explore architectural trade-offs, where gains in performance or convenience often come at the expense of visibility and control. Case studies of Heartbleed and DigiNotar demonstrate how shared components and certificate authorities create systemic risks. By the end of the week, students will understand that secure design is about resilience and adaptability, balancing usability, cost, and complexity while embedding monitoring, redundancy, and recovery at the core.
Produced by BareMetalCyber.com

  continue reading

60 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play