CyberCode Academy
Technology
About
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity. 🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time. From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning. Study anywhere, anytime — and level up your skills with CyberCode Academy. 🚀 Learn. Code. Secure. You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy
Episodes
- Course 33 - Static Analysis for Reverse Engineering | Episode 1: Static Analysis and Graphical Visualization in x64dbg
This episode covers static vs dynamic analysis and visual debugging using x64dbg. It explains how static analysis examines code without execution, while dynamic analysis observes runtime behavior. The episode highlights x64dbg's capabiliti…
- Course 32 - Checkpoint CCSA R80 | Episode 12: Managing Processes, Web Ports, and System Backups
This episode covers core Check Point R80 processes like CPM and FWM, explaining their impact on management connectivity. It details how to manage the WebUI SSL port for better access and outlines methods for creating, scheduling, and verif…
- Course 32 - Checkpoint CCSA R80 | Episode 11: Managing and Troubleshooting Check Point Gaia via the Command Line Interface
This lesson covers Check Point Gaia CLI administration, troubleshooting, and system recovery for R80.10. It details CLI access methods, network configuration, the importance of saving configurations, configuration locking to prevent confli…
- Course 32 - Checkpoint CCSA R80 | Episode 10: VPN Implementation, Tunnel Management, and Advanced Security Monitoring
This episode details VPN implementation and management in Check Point R80, including IPsec Site-to-Site VPNs, tunnel management using CLI tools, and real-time monitoring with SmartView Monitor. It also covers suspicious activity monitoring…
- Course 32 - Checkpoint CCSA R80 | Episode 9: Advanced Threat Prevention and Secure Site-to-Site Connectivity
This lesson covers Check Point R80
- Course 32 - Checkpoint CCSA R80 | Episode 8: HTTPS Inspection, URL Filtering, and Identity Awareness
This episode covers Check Point R80 features including HTTPS inspection for visibility into encrypted traffic, advanced URL filtering based on categories, and identity awareness for user-based security. It also discusses interactive policy…
- Course 32 - Checkpoint CCSA R80 | Episode 7: NAT, Gateway Redundancy, and Software Blades
This episode covers advanced NAT implementation combining manual and automatic rules, gateway redundancy using ClusterXL in High Availability or Load Sharing modes, and modular security through Check Point Software Blades like VPN and IPS.…
- Course 32 - Checkpoint CCSA R80 | Episode 6: Mastering NAT Types, Priority Hierarchies, and Manual Rules
This episode explores advanced NAT design, rule priority, and manual translation in Check Point R80. It covers concepts such as Hide NAT, Static NAT, Auto-NAT priority hierarchies, and Port Address Translation (PAT).
- Course 32 - Checkpoint CCSA R80 | Episode 5: Policy Management, Troubleshooting, and NAT Foundations
This episode of CyberCode Academy discusses policy management, troubleshooting, and NAT foundations within Check Point R80. It covers policy packages for scalable management, using SmartConsole logs for diagnosing issues, understanding imp…
- Course 32 - Checkpoint CCSA R80 | Episode 4: Layers, Timing, and Collaborative Firewall Management
This episode covers advanced policy optimization, rule structuring, and collaborative management in Check Point R80. It explains time-based security policies, organizing policies with section titles, inline layers, multi-admin collaboratio…
- Course 32 - Checkpoint CCSA R80 | Episode 3: From System Safeguards to Advanced Security Orchestration
This episode of CyberCode Academy focuses on Checkpoint CCSA R80. It covers topics such as policy management, licensing, snapshots, and advanced security design in Check Point R80. The content includes details on system safeguards and secu…
- Course 32 - Checkpoint CCSA R80 | Episode 2: SmartConsole Deployment, Gateway Integration, and Connectivity Management
This episode focuses on Check Point R80, detailing SmartConsole deployment, gateway integration, routing configurations, and connectivity management. It also addresses version compatibility and troubleshooting steps for Secure Internal Com…
- Course 32 - Checkpoint CCSA R80 | Episode 1: Initial Deployment of Security Managers and Gateways
This episode of CyberCode Academy covers the initial deployment of Security Managers and Gateways for Check Point CCSA R80. It details Check Point R80 architecture, Gaia OS installation, and distributed deployment strategies.
- Course 31 - Dive Into Docker | Episode 11: Framework Starters and Design Best Practices
This episode focuses on applying Docker to real-world applications and scalable architecture principles. It covers framework-based starter projects, logging to standard output, environment-based configuration, and stateless application des…
- Course 31 - Dive Into Docker | Episode 10: Management, Versions, and Complex Microservices
This episode of CyberCode Academy focuses on Docker, covering management, versions, and complex microservices. It discusses Docker Compose workflows, API versions, and real-world microservices orchestration, including essential commands, s…
- Course 31 - Dive Into Docker | Episode 9: Orchestrating Multi-Container Web Applications with Docker Compose
This episode of CyberCode Academy explains Docker Compose, a tool for defining, running, and managing multi-container applications. It covers topics such as the docker-compose.yml file, defining services, port mapping, volumes, managing se…
- Course 31 - Dive Into Docker | Episode 8: Networking, Persistence, and System Optimization
This lesson focuses on advanced Docker architecture. It covers container networking, data persistence using named volumes, and various image optimization techniques. It also discusses advanced startup logic and system maintenance practices…
- Course 31 - Dive Into Docker | Episode 7: Building, Running, and Syncing Flask Applications
This episode of CyberCode Academy covers Docker CLI workflows, container management, live development, and debugging techniques for Flask applications. Topics include image management, running and managing containers, live development with…
- Course 31 - Dive Into Docker | Episode 6: A Hands-On Guide to Dockerizing Web Applications
This episode covers dockerizing web applications, writing Dockerfiles, and optimizing builds. It demonstrates a Flask web application and Redis in a microservices setup.
- Course 31 - Dive Into Docker | Episode 5: From First Run to Building Images
This episode of CyberCode Academy introduces Docker basics, differentiating between Docker images and containers. It covers immutable images, the Docker ecosystem including Docker Hub and registries, and how to build images using Dockerfil…
- Course 31 - Dive Into Docker | Episode 4: Editions, Versioning, and Installation Guide
This episode of CyberCode Academy discusses Docker editions, versioning, release channels, and installation options. It covers Docker Community Edition (CE) and Enterprise Edition (EE), date-based versioning, and the differences between Ed…
- Course 31 - Dive Into Docker | Episode 3: From Virtual Machines to Core Architecture
This episode explains the differences between virtual machines and Docker containers. It covers the architecture of both, when to use each, and the core components of Docker.
- Course 31 - Dive Into Docker | Episode 2: Setup, Resources, and the Troubleshooting Mindset
This episode of CyberCode Academy discusses the setup, learning resources, and troubleshooting mindset for Course 31, "Dive Into Docker." It emphasizes hands-on learning, independent debugging, and effective technical questioning to build…
- Course 31 - Dive Into Docker | Episode 1: Efficiency, Portability, and Your Path to Modern Development
This episode introduces Docker fundamentals, explaining how it addresses common development issues like environment inconsistencies and the limitations of virtual machines. It highlights Docker's advantages in terms of efficiency, portabil…
- Course 30 - Practical Malware Development - Beginner Level | Episode 6: Developing a Command and Control (C2) System with PHP and MySQL
This episode of CyberCode Academy focuses on developing a command and control (C2) system. It details designing a secure tasking and telemetry system, including endpoint registration, task retrieval, and results ingestion. The episode also…
- Course 30 - Practical Malware Development - Beginner Level | Episode 5: Building and Securing the Control Panel Dashboard
This episode focuses on building and securing a control panel dashboard. It covers administrative authentication, secure session management, protecting routes, and secure data handling for dashboard development.
- Course 30 - Practical Malware Development - Beginner Level | Episode 4: Building a Secure Web Control Panel: Database Infrastructure
This episode of CyberCode Academy focuses on building a secure web-based admin panel. It covers secure database design, backend connectivity with PHP and MySQL, modern authentication systems, SQL injection prevention, and session managemen…
- Course 30 - Practical Malware Development - Beginner Level | Episode 3: Enhancing Agent Resilience and Establishing Remote Server
This episode focuses on enhancing agent resilience in malware development. It covers error handling abuse, command parsing patterns, and persistent beaconing for command and control (C2) communication. The discussion also includes connecti…
- Course 30 - Practical Malware Development - Beginner Level | Episode 2: Mastering C# System Control: Navigating, Enumerating, and Executing
This episode of CyberCode Academy discusses practical malware development at a beginner level, focusing on mastering C# system control. It covers detecting and defending against system control techniques such as directory navigation, syste…
- Course 30 - Practical Malware Development - Beginner Level | Episode 1: C# Offensive Operations: Recon, Persistence, and File Acquisition
This episode of CyberCode Academy covers practical malware development at a beginner level. It focuses on C# offensive operations for recon, persistence, and file acquisition, discussing defensive perspectives on common red-team techniques.
- Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 14: Securing Data and Applications in Microsoft Azure
This episode covers securing data and applications in Microsoft Azure. Topics include Azure Cosmos DB defense-in-depth, Azure Data Lake hierarchical namespace, application security practices, and practical labs for exam preparation.
- Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 13: Storage, SQL Databases, and HDInsight
This episode focuses on implementing defense-in-depth for data protection across Azure Storage, Azure SQL, and HDInsight. It covers network security, access control, encryption, monitoring, and advanced data security practices.
- Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 12: Mastering Data Protection and SQL Security
This episode covers data protection and SQL security for the AZ-500 Microsoft Azure Security Technologies exam. Key topics include Azure Information Protection (AIP), Azure SQL security, network security, access control, and data encryptio…
- Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 11: Security, Encryption, and Compliance
This episode of CyberCode Academy discusses Azure Key Vault, covering its features for secure key and secret management, access control, network security, monitoring, and certificate management. It also explains how Key Vault integrates wi…
- Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 10: Azure Security Monitoring and Threat Response
This episode focuses on managing security operations and advanced threat protection in Microsoft Azure. Topics include vulnerability management, access control, threat detection, and advanced security operations with Microsoft Sentinel.
- Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 9: Mastering Azure Security Operations
This episode focuses on managing security operations and monitoring in Microsoft Azure, covering Azure Monitor fundamentals, logging, data analysis, proactive alerting, and infrastructure security management using Azure Security Center. It…
- Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 8: Governance and Container Security
This episode of CyberCode Academy delves into Azure platform protection and governance strategies. It covers Azure Resource Manager, access control with custom roles, resource protection mechanisms, and policy enforcement with Azure Policy…
- Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 7: A Comprehensive Guide to Virtual Machine and Container Security
This episode focuses on securing infrastructure and application workloads in Microsoft Azure. It covers Virtual Machine (VM) security, including shared responsibility, endpoint protection, and OS hardening. The episode also discusses conta…
- Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 6: Azure Network Security
This episode discusses monitoring and securing Azure networks. It covers diagnostic tools, traffic logging, analytics, and AZ-500 exam preparation strategies related to Azure Network Security.
- Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 5: Azure Network Infrastructure and Security
This episode discusses securing Azure network infrastructure, managing hybrid connectivity, and implementing Azure Firewall. It also covers global application delivery and protection using Azure Front Door and Web Application Firewall.
- Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 4: Protecting Azure Virtual Networks
This episode focuses on implementing and securing Azure Virtual Networks (VNETs). It covers VNET architecture, subnets, service endpoints, VNET peering, Network Security Groups (NSGs), and Application Security Groups (ASGs) for robust clou…
- Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 3: Mastering Azure Identity and Access Management
This episode, part of Course 29 on AZ-500 Microsoft Azure Security Technologies, focuses on mastering Azure Identity and Access Management. Key topics include Azure Active Directory Identity Protection, understanding tenants, subscriptions…
- Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 2: Managing Security and Hybrid Identity Integration
This episode of CyberCode Academy covers securing and managing hybrid identities with Azure Active Directory. It discusses Conditional Access, MFA, and Azure AD Password Protection, as well as integrating on-premises infrastructure with cl…
- Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 1: Essential Identity Management and Security Protection
This episode from CyberCode Academy focuses on Azure AD fundamentals, including identity and access management, architecture, licensing tiers, and managing users, groups, and applications. It also covers advanced security features like Con…
- Course 28 - Denial of Service and Elevation of Privilege | Episode 6: Multi-Layered Defenses Against Elevation of Privilege
This episode discusses multi-layered defenses against Elevation of Privilege (EoP) attacks. It covers strategies such as paranoid data handling, attenuation of privilege, low-level technical defenses, and environmental isolation.
- Course 28 - Denial of Service and Elevation of Privilege | Episode 5: Input Manipulation and the Path to Elevation of Privilege
This episode of CyberCode Academy discusses Elevation of Privilege (EoP), untrusted input, and input validation failures. It covers how attackers manipulate input to gain unauthorized access and common attack vectors, including path traver…
- Course 28 - Denial of Service and Elevation of Privilege | Episode 4: Designing for System Resilience and Capacity Defense
This episode of CyberCode Academy discusses designing for system resilience and capacity defense. It covers building resilient systems, load and stress testing, intentional failure testing, and capacity as a defense strategy.
- Course 28 - Denial of Service and Elevation of Privilege | Episode 3: From Mobile Networks to the Cloud
This episode discusses modern Denial of Service (DoS) challenges in mobile networks, IoT devices, and cloud infrastructure. It covers accidental outages, physical limitations, and cloud-based DoS attacks, including the "Christmas effect" a…
- Course 28 - Denial of Service and Elevation of Privilege | Episode 2: Persistence, Cleverness, and Amplification
This episode discusses different types of Denial of Service (DoS) attacks, examining their duration, sophistication, and resource usage. It covers persistent, transient, naive, clever, native, and amplified attack strategies, and the evolu…
- Course 28 - Denial of Service and Elevation of Privilege | Episode 1: The Evolution of Denial of Service Attacks
This episode discusses the evolution of Denial of Service (DoS) attacks. It covers various types of DoS attacks, such as network bandwidth exhaustion, CPU and memory exhaustion, storage-based attacks, and cloud resource and financial exhau…