Everyday Cyber
Alex Reid
Everyday Cyber is your weekly guide to mastering cybersecurity — from real-world threats to real career growth. Hosted by cybersecurity analyst Alex Reid, this podcast delivers clear, actionable insights for anyone looking to stay safe online and break into the cyber industry. Whether you're a beginner exploring the field, prepping for certifications like Security+, SC-200, or aiming to land your first SOC analyst role — Everyday Cyber has your back. Each episode covers: Breaking down phishing attacks, ransomware, and real-world threats Blue team strategies and
Categories: Technology
Listen to the last episode:
Join us for Episode 9 of Everyday Cyber as we dive deep into the Blue Team Field Manual by Alan White and Ben Clark - the ultimate practical guide for cybersecurity defenders. Discover essential command-line tools and techniques for Windows and Linux environments, structured around the NIST Cybersecurity Framework. Learn hands-on approaches to system hardening, network monitoring, malware analysis, and incident response. From vulnerability scanning with NMAP and Nessus to configuring firewalls and AppLocker policies, we cover the complete defensive toolkit. Whether you're a SOC analyst, system administrator, or cybersecurity professional, this episode provides actionable commands and methodologies for protecting, detecting, responding to, and recovering from cyber threats. Master the art of defensive cybersecurity operations with real-world commands you can use immediately.
- Blue team field manual
- Cybersecurity defense commands
- Incident response toolkit
- System hardening techniques
- Network security monitoring
- Windows Linux security commands
- SOC analyst guide
- Defensive cybersecurity operations
- NIST cybersecurity framework implementation
- Practical incident response
Previous episodes
-
11 - Episode 9: Blue Team Field Manual Breakdown - Incident Response & System Hardening Toolkit | Everyday Cyber Wed, 16 Jul 2025
-
10 - Episode 9: The Complete Guide to Data Privacy Laws - From GDPR to PIPL Explained | Everyday Cyber Tue, 15 Jul 2025
-
9 - Network Security Monitoring Explained (Part 1): NSM, Security Onion & Real-World Detection | Ep. 8 Mon, 14 Jul 2025
-
8 - Digital Forensics & Anti-Forensics Explained: NTFS Artifacts, ADS, File Carving & Timestomping | Ep. 7 Sat, 12 Jul 2025
-
7 - Malware Hunting at Scale: Timelines, YARA Rules & the Tools Pros Use | Ep. 6 Fri, 11 Jul 2025
-
6 - Memory Forensics in Incident Response & Threat Hunting | Detecting Malware, Rootkits & Fileless Attacks | Ep. 6 Thu, 10 Jul 2025
-
5 - Windows Forensics & Intrusion Detection: Detecting Threats with Logs, PowerShell & Sysmon | Ep. 5 Wed, 09 Jul 2025
-
4 - Advanced Incident Response & Threat Hunting | Cyber Kill Chain, MITRE ATT&CK & Real-World Defense | Ep. 4 Tue, 08 Jul 2025
-
3 - Mastering Alert Triage, Email Threats, and Sigma Rules | Everyday Cyber Podcast Ep. 3 Mon, 07 Jul 2025
-
2 - Efficient Alert Triage & Email Threats: Mastering Cyber Defense Tactics Sun, 06 Jul 2025
-
1 - Inside the SOC: Foundations of Blue Team Operations Sun, 06 Jul 2025