Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.🎧 Each course is divided into a series of short, focused episodes that take you from beginner to ad... more
FAQs about CyberCode Academy:How many episodes does CyberCode Academy have?The podcast currently has 128 episodes available.
January 25, 2026Course 20 - Malware Analysis: Identifying and Defeating Code Obfuscation | Episode 1: Defeating Malware Obfuscation: Fundamentals, ImpactIn this lesson, you’ll learn about:The Purpose of Code Obfuscation:Defining obfuscation as the practice of intentionally making software difficult to read or analyze.How malware authors use obfuscation to hide strings, functions, payloads, and command-and-control communication.The concept of “raising the bar” for analysts by increasing the time and effort required to understand malicious intent.Legitimate uses of obfuscation for protecting intellectual property in commercial software.Obfuscation Across Programming Architectures:The differences between native code (C, C++, Assembly) and interpreted or managed code (Java, .NET, Python).Why native binaries are harder to analyze due to reliance on disassembly rather than source-like output.How interpreted code can often be decompiled into structures that closely resemble the original source, making it generally easier to reverse.Common Obfuscation Techniques:Using meaningless variable and function names to disrupt manual analysis and signature-based detection.Injecting junk code that adds complexity without affecting functionality.Hiding indicators through string encoding or encryption that only resolves at runtime.Manipulating control flow with misleading jumps and unreachable branches to confuse analysis tools.Skills, Environments, and Tools for Deobfuscation:The importance of understanding Assembly language, the Windows API, and the Portable Executable (PE) format.Setting up safe analysis environments using Windows and Linux virtual machines, including REMnux.Leveraging industry-standard tools such as IDA Pro, Ghidra, dnSpy, JD-GUI, and debuggers for static and dynamic analysis.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more15minPlay
January 24, 2026Course 19 - Ultimate Rust Crash Course | Episode 5: Rust Concurrency Fundamentals: Closures, Threads, and Channel CommunicationIn this lesson, you’ll learn about:Functional Programming with Closures:Defining closures as anonymous functions that capture values from their surrounding scope.Using closures with iterator methods like map, filter, and fold to transform data.The difference between borrowing closures and move closures, and why move semantics are required for safe multi-threaded execution.Multi-threaded Execution in Rust:Spawning threads with thread::spawn and running closures as thread entry points.Using join handles to wait for thread completion and handle potential panics.Understanding performance trade-offs between OS threads and asynchronous models, and when to prefer threads versus async/await.Inter-thread Communication with Channels:Coordinating work between threads using message-passing channels.Working with transmitters (TX) and receivers (RX), including cloning senders for multi-producer setups.Leveraging high-performance channel implementations to support multiple receivers.Synchronization and Program Lifecycle Management:How thread scheduling and sleep timing affect execution order.Ensuring clean shutdowns by closing channel senders and properly joining all threads.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more15minPlay
January 23, 2026Course 19 - Ultimate Rust Crash Course | Episode 4: Rust Foundations: Structs, Traits, CollectionsIn this lesson, you’ll learn about:Data Organization with Structs and Traits:Using structs to group data fields, methods, and associated functions.Defining shared behavior with traits instead of inheritance.Writing generic functions that operate on any type implementing a required trait.Using default trait implementations to share common behavior without repetitive code.Managing Data with Standard Collections:Vectors (Vec): Dynamic lists or stacks for storing items of the same type.HashMaps: Key–value storage with efficient lookup and removal.Specialized collections: VecDeque for double-ended queues, HashSet for set operations, and BTree collections for sorted data.Advanced Logic with Enums and Pattern Matching:Using enums as powerful data types that can hold different kinds of associated data.Enforcing safety through exhaustive pattern matching with match and if let.Core language enums:Option for representing optional values without nulls.Result for explicit and robust error handling.Practical Application and Exercises:Implementing state changes in structs using traits and methods.Building simulations that combine enums, collections, and pattern matching.Iterating over collections to calculate results based on enum variants.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more17minPlay
January 22, 2026Course 19 - Ultimate Rust Crash Course | Episode 3: Rust Fundamentals: Mastering Ownership, References, and BorrowingIn this lesson, you’ll learn about:Ownership and Memory Management in Rust:How Rust guarantees memory safety without a garbage collector.The difference between stack and heap memory and how data lifecycles are managed.The Mechanics of Ownership:Rust’s three core ownership rules:Every value has a single owner.Only one owner exists at a time.Values are dropped immediately when the owner goes out of scope.The distinction between moving values (invalidating the original variable) and cloning values (performing a deep copy).References and Borrowing:Using references to access data without transferring ownership.The role of lifetimes in ensuring references always point to valid data.The borrowing rules: either one mutable reference or multiple immutable references, but never both at the same time.How the dot operator automatically dereferences values for method access.Practical Application (Exercise E):Inspecting: Reading data using an immutable reference (&String).Changing: Modifying data through a mutable reference (&mut String).Eating: Passing ownership to a function, consuming the value and making it unavailable afterward.Why These Rules Matter:Preventing segmentation faults, data races, and dangling pointers.Writing safer, more reliable code despite initial compiler challenges.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more11minPlay
January 21, 2026Course 19 - Ultimate Rust Crash Course | Episode 2: Rust Core Foundations: Data Types, Control Flow, and String HandlingIn this lesson, you’ll learn about:Core Data Representations in Rust:Scalar types: integers (signed i and unsigned u), floating-point types (f32, f64), booleans, and Unicode char values.Compound types: tuples (accessed via indexing or destructuring) and fixed-size arrays stored on the stack, along with their practical limits.Project Organization and Reusability:Moving logic into a library file (lib.rs).Exposing functions with the pub keyword and importing them using use statements.Control Flow and Program Logic:Using if as an expression that returns a value, replacing traditional ternary operators.Working with loops: loop (including labeled breaks), while, and for.Iterating with ranges, both exclusive (0..50) and inclusive (0..=50).Understanding Rust Strings:Differences between borrowed string slices (&str) and owned, heap-allocated String types.Why UTF-8 encoding prevents direct character indexing.Safely accessing string data using iterators like .bytes(), .chars(), and .nth().Practical Application:Processing command-line arguments as vectors of strings.Applying loops and conditional logic to perform numeric operations such as summing ranges or repeatedly modifying values until a condition is met.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more13minPlay
January 20, 2026Course 19 - Ultimate Rust Crash Course | Episode 1: Rust Programming Foundations: From Cargo Tooling to Core Syntax and ModulesIn this lesson, you’ll learn about:The Rust Ecosystem and Tooling:Using Cargo as Rust’s package manager, build system, and documentation tool.Creating projects with cargo new, managing dependencies in Cargo.toml, and running code with cargo run.Understanding the difference between debug builds and optimized release builds.Variables and Constants:Declaring variables with let in a strongly typed language with type inference.Rust’s default immutability model and using mut for mutable values.Defining constants (const) with explicit types and compile-time evaluation.Scope and Shadowing:How variables are scoped to blocks and automatically dropped when out of scope.Using shadowing to redefine variables, including changing their type or mutability.Memory Safety Guarantees:Rust’s compile-time enforcement of memory safety.Prevention of uninitialized variable usage and undefined behavior without relying on a garbage collector.Functions and Macros:Defining functions with fn and snake_case naming conventions.Returning values using tail expressions without a semicolon.Distinguishing between functions and macros (e.g., println!).The Module System and Code Organization:Structuring projects with main.rs for binaries and lib.rs for libraries.Managing visibility with private-by-default items and the pub keyword.Bringing items into scope with use and integrating external crates.Hands-On Practice:Reinforcing concepts through guided exercises, including building a command-line program and writing functions to calculate geometric areas and volumes.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more14minPlay
January 19, 2026Course 18 - Evading IDS Firewalls and Honeypots | Episode 6: Mastering Malware Evasion: Stealth, Obfuscation, and Anti-AnalysisIn this lesson, you’ll learn about:Evading Initial Detection:Payload Obfuscation: Encoding payloads multiple times to cloak them from IDS detection.Benign Carrier Injection: Hiding malicious code inside legitimate scripts (e.g., Python Base64 payloads).Custom Packaging: Using packers to compress or encrypt malware, creating unique fingerprints that bypass signature-based detection.Post-Penetration Stealth:Fileless Attacks: Running scripts directly in memory via tools like PowerShell, avoiding disk storage.Folder Cloaking: Hiding directories using CLSID entries and desktop.ini files.Alternate Data Streams (ADS): Embedding executable code in hidden NTFS streams, keeping file sizes unchanged and avoiding standard file scans.Anti-Analysis and Oversight Detection:Environmental Checks: Detecting virtual machines or sandbox environments via CPU, registry, and network adapter inspection.Evasive Countermeasures: Terminating, altering behavior, or sleeping to avoid detection during analysis.Analogy for Understanding:Think of a spy infiltrating a high-security facility:Obfuscation: Wearing a disguise to bypass guards.Fileless attacks: Building tools inside the facility without carrying weapons.ADS and cloaking: Hiding secret documents in a hidden compartment of a normal briefcase.Anti-analysis: Acting like a janitor when noticing surveillance to avoid suspicion.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more13minPlay
January 18, 2026Course 18 - Evading IDS Firewalls and Honeypots | Episode 5: Intrusion Detection and Prevention: Strategies, Tools, and IntelligenceIn this lesson, you’ll learn about:Foundations of Intrusion Defense:Multi-layered defense-in-depth strategies using models like SAPSA.Difference between Intrusion Detection Systems (IDS), which alert operators, and Intrusion Prevention Systems (IPS), which can actively block threats.The challenge of balancing false positives vs. false negatives in threat detection.Detection Methodologies:Signature-based detection: Matches traffic against known attack patterns with regularly updated signatures.Anomaly detection: Builds models of normal traffic to detect deviations, including protocol and statistical anomalies.Perimeter and Access Control:Techniques like blacklisting (blocking known bad sites) and whitelisting (allowing only approved sites) to secure network entry points.Technical Tools: Snort and Security Onion:Snort: Open-source, rule-based NIDS; creating rules for logging, alerting, and traffic filtering.Security Onion: Ubuntu-based distribution integrating Snort, Suricata, and log management tools for real-time network monitoring.Intelligence-Led Security:Using reputation-based threat intelligence from providers to block risky IPs and URLs.Extending IDS/IPS beyond signature detection for proactive security.Case Study: EINSTEIN Program:Analysis of the 2015 OPM breach and how relying solely on outdated signature-based methods caused a 94% false negative rate.Highlights the importance of anomaly detection and modern threat intelligence integration.Analogy for Understanding:IDS/IPS systems are like airport security:Signature-based IDS: “No Fly List” stopping known bad actors.Anomaly detection: Behavior detection officer spotting unusual activity.Reputation feeds: International intelligence sharing, warning about suspicious travelers before they arrive.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more19minPlay
January 17, 2026Course 18 - Evading IDS Firewalls and Honeypots | Episode 4: Advanced Application Security: WAFs, API Gateways, and Honeypot TrapsIn this lesson, you’ll learn about:Web Application Firewalls (WAFs):Protecting the application layer by inspecting HTTP/HTTPS and WebSocket traffic.Breaking SSL encryption to detect threats using malware signatures and logic-based anomaly detection.Deployment options: hardware, software, or cloud services; open-source examples like ModSecurity.API Gateways and Microservices Security:Acting as proxies between subscribers and backend services to prevent attacks such as cross-site scripting (XSS).Managing API keys, documentation, and subscriber catalogs.Practical configuration: using management consoles to create users and publish APIs; pentesters can fingerprint gateways to ensure security features are active.Honeypots and Deception Systems:Luring, trapping, and monitoring attackers using decoy systems.Types: low-interaction (basic interfaces), medium/high-interaction (realistic environments).Example: Cowrie SSH/Telnet honeypot for logging brute-force attempts and shell activity.Detection notes: attackers may recognize honeypots via behavioral anomalies or packet handling differences.Analogy for Understanding:Securing a digital environment is like a high-stakes gala:WAF: Security guard at the entrance checking every guest.API Gateway: Concierge controlling which rooms guests can enter.Honeypot: Decoy vault to safely observe thieves without risking real assets.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more11minPlay
January 16, 2026Course 18 - Evading IDS Firewalls and Honeypots | Episode 3: Network Emulation and Security Defense: Deploying Cisco ASA and Kali LinuxIn this lesson, you’ll learn about:GNS3 Platform Foundation and Image Integration:Installing GNS3 Windows All-in-One and preparing the environment for professional network emulation.Importing manufacturer-specific device images (e.g., Cisco 3745 router, ASA firewall) to run actual device code instead of generic simulators.Building a Routed Network:Configuring IP addresses and routing paths on Cisco routers.Calculating idle time to optimize host CPU usage during emulation.Establishing a functional network backbone before adding security layers.Deploying the Cisco ASA Firewall:Creating a secure network enclave with multiple security zones.Assigning security levels (Inside = 100, DMZ = 50) and managing traffic flow.Configuring explicit rules and ICMP permissions to control responses from lower- to higher-security zones.Security Testing with Kali Linux:Integrating a Kali Linux VM into the GNS3 topology for vulnerability probing.Using professional tools like Nmap and Armitage to verify firewall effectiveness.Running simulated attacks to confirm that the ASA firewall filters ports and protects internal resources.Analogy for Understanding GNS3 Emulation:Using GNS3 is like a pilot training on a full-motion flight simulator: you interact with the actual software and controls, safely practicing defensive maneuvers against cyber threats without risking a real network.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more11minPlay
FAQs about CyberCode Academy:How many episodes does CyberCode Academy have?The podcast currently has 128 episodes available.