Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/58/6d/69/586d6967-1f44-22c7-e69a-f33694c29d17/mza_11351649260386312473.jpg/600x600bb.jpg
Deepdive
Xatusbetazx17
12 episodes
5 days ago
Welcome to DeepDive with xatusbetazx17, the weekly podcast where network-engineer-in-training Marcelo Collado breaks down the tech world into clear, actionable insights. Whether you’re building your first home lab, hardening your network against cyber threats, or curious about the latest AI breakthroughs, this is your go-to resource. Each episode, you’ll get: Hands-on tutorials for assembling and optimizing hardware—from budget routers to high-performance servers. Cybersecurity deep dives, where Marcelo walks you through real-world security tools, best practices, and step-by-step.
Show more...
Technology
RSS
All content for Deepdive is the property of Xatusbetazx17 and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to DeepDive with xatusbetazx17, the weekly podcast where network-engineer-in-training Marcelo Collado breaks down the tech world into clear, actionable insights. Whether you’re building your first home lab, hardening your network against cyber threats, or curious about the latest AI breakthroughs, this is your go-to resource. Each episode, you’ll get: Hands-on tutorials for assembling and optimizing hardware—from budget routers to high-performance servers. Cybersecurity deep dives, where Marcelo walks you through real-world security tools, best practices, and step-by-step.
Show more...
Technology
Episodes (12/12)
Deepdive
Advanced Data Protection Strategies: Snapshots, Replication, Journaling, Encryption

Episode: Advanced Data Protection Strategies: Snapshots, Replication, Journaling, Encryption
In this episode of DeepDive, XatusBetaZx17 compares four pillars of modern data protection—point-in-time snapshots for fast rollback, replication (sync/async) for site resilience, journaling file systems for crash-consistent recovery, and encryption with sound key management. We’ll map these techniques to RPO/RTO targets and show how to combine them (e.g., snapshot schedules + off-site replication + journaled FS + encryption) to harden your environment against outages and ransomware.

Resources & Links:
• Security Guidelines for Storage Infrastructure (NIST SP 800-209) (PDF)
https://csrc.nist.gov/pubs/sp/800/209/final (NIST Computer Security Resource Center)
• Overview of File Systems (Red Hat) — metadata journaling basics
https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/html/managing_file_systems/overview-of-available-file-systems_managing-file-systems (Red Hat Docs)
• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app!


Show more...
1 month ago
13 minutes 22 seconds

Deepdive
The Internet of Things: Applications, Adoption, and Risks

Episode: The Internet of Things: Applications, Adoption, and Risks
In this episode of DeepDive, XatusBetaZx17 explores how IoT is transforming everything from smart homes and wearables to industrial operations and healthcare—and what it really takes to adopt it safely. We’ll map common applications and business drivers behind adoption, then unpack the risks that come with billions of connected devices: weak/default credentials, insecure services, spotty patching, supply-chain exposures, and data-privacy concerns. You’ll leave with a practical checklist for secure rollout: asset inventory, strong identity/auth, network segmentation, secure update pipelines, and continuous monitoring.

Resources & Links:
• What is the Internet of Things (IoT)? (overview & applications – IBM)
https://www.ibm.com/think/topics/internet-of-things (IBM)
• Considerations for Managing IoT Cybersecurity & Privacy Risks (NISTIR 8228, foundational guidance)
https://nvlpubs.nist.gov/nistpubs/ir/2019/nist.ir.8228.pdf (NIST Technical Series)
• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app!


Show more...
2 months ago
19 minutes 3 seconds

Deepdive
Cloud Architecture: Features and Considerations

Episode: Cloud Architecture: Features and Considerations
In this episode of DeepDive, XatusBetaZx17 explores the pillars and trade-offs that shape cloud architecture—from reliability & availability (multi-AZ/region, DR patterns) and scalability & performance (auto scaling, load balancing), to security & identity (segmentation, zero-trust), cost optimization (FinOps, right-sizing), operations & observability (IaC, monitoring, SLOs), and sustainability. You’ll leave with a practical checklist to design resilient, efficient, and secure workloads—whether you’re building a small lab or an enterprise platform.

Resources & Links:
• AWS Well-Architected Framework (overview of pillars and best practices)
https://docs.aws.amazon.com/wellarchitected/latest/framework/welcome.html (AWS Documentation)
• Google Cloud Architecture Framework (design guidance & reference architectures)
https://cloud.google.com/architecture/framework (Google Cloud)
• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app!


Show more...
2 months ago
19 minutes 29 seconds

Deepdive
Software-Defined Networking: An Architectural Overview

Software-Defined Networking: An Architectural Overview
In this episode of DeepDive, XatusBetaZx17 demystifies SDN—how decoupling the control plane from the data plane enables centralized controllers, policy-driven automation, and programmable networks. We’ll outline core components (controllers, southbound protocols like OpenFlow, northbound APIs), compare SDN designs (centralized vs. distributed controllers; overlays vs. underlay integration), and highlight real-world use cases (segmentation, traffic engineering, multi-cloud fabrics). You’ll leave with a clear mental model of SDN architecture and when to use it.

Resources & Links:
• Software-Defined Networking (SDN): Layers and Architecture Terminology (IETF RFC 7426)
https://www.rfc-editor.org/info/rfc7426 (RFC Editor)
• Software-Defined Networking (SDN) – Definition & Overview (Open Networking Foundation)
https://opennetworking.org/sdn-definition/ (Open Networking Foundation)
• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app!

Show more...
2 months ago
15 minutes 33 seconds

Deepdive
Cloud Service Models and Vendor Management

Episode: Cloud Service Models and Vendor Management
In this episode of DeepDive, XatusBetaZx17 breaks down cloud service models—IaaS, PaaS, and SaaS—and how to choose between them. Then we get practical about vendor management: the shared responsibility model, evaluating SLAs/SLOs, security & compliance requirements, data residency, cost control, lock-in vs. portability, and building an exit strategy. Whether you’re spinning up a small lab or negotiating enterprise contracts, you’ll leave with a checklist to select the right provider and manage them over time.

Resources & Links:
• The NIST Definition of Cloud Computing (SP 800-145) (PDF) (https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-145.pdf). (NIST Publications)
• Cybersecurity Supply Chain Risk Management Practices (SP 800-161 Rev. 1) (PDF) (https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-161r1.pdf). (NIST Publications)
• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app!


Show more...
2 months ago
14 minutes 4 seconds

Deepdive
Cloud Deployment Models and Architectures

Episode: Cloud Deployment Models and Architectures
In this episode of DeepDive, XatusBetaZx17 breaks down the cloud service models (IaaS, PaaS, SaaS) and deployment models (public, private, community, hybrid, and multi-cloud), then maps them to real-world architecture choices. We’ll compare trade-offs around security, cost, performance, and scalability; discuss shared responsibility, landing zones, and reference architectures; and give you a practical checklist for choosing the right model and designing a resilient, well-architected environment.

Resources & Links:
• The NIST Definition of Cloud Computing (SP 800-145) (PDF)
https://csrc.nist.gov/pubs/sp/800/145/final (NIST Computer Security Resource Center)
• AWS Well-Architected Framework (living docs)
https://docs.aws.amazon.com/wellarchitected/latest/framework/welcome.html (AWS Docs)
• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app!


Show more...
2 months ago
15 minutes 35 seconds

Deepdive
Network Security Appliance Attributes and Behaviors

Episode: Network Security Appliance Attributes and Behaviors
In this episode of DeepDive, XatusBetaZx17 explores how core security appliances actually work and where they shine—covering firewalls (packet-filtering, stateful inspection, and application-proxy behaviors), next-gen capabilities (app/user-aware policies, threat prevention), and IDS/IPS engines (signature vs. anomaly detection, inline vs. passive). We’ll also touch on logging/telemetry, high availability, and how these attributes fit into a layered, real-world security architecture—so you can choose the right device for the job and deploy it with confidence.

Resources & Links:
• Guidelines on Firewalls and Firewall Policy (NIST SP 800-41 Rev.1)
https://csrc.nist.gov/pubs/sp/800/41/r1/final (NIST Computer Security Resource Center)
• Guide to Intrusion Detection and Prevention Systems (IDPS) (NIST SP 800-94)
https://csrc.nist.gov/pubs/sp/800/94/final (NIST Computer Security Resource Center)
• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app!


Show more...
2 months ago
15 minutes 29 seconds

Deepdive
Network Security: Strategic Device Placement

Episode: Network Security: Strategic Device Placement
In this episode of DeepDive, XatusBetaZx17 dives into strategic device placement—showing you exactly where to position firewalls, intrusion detection/prevention systems (IDS/IPS), and other security appliances to maximize protection and minimize blind spots. We’ll cover best practices for placing firewalls at network junctions, deploying IDS/IPS at key choke points, leveraging DMZs and segmentation, and ensuring secure management paths. Whether you’re securing a small office or a large enterprise, you’ll come away with clear guidelines to harden your network architecture.

Resources & Links:
• Positioning Security Devices (Network Security Best Practices: Top 10 Proven Strategies)
https://kraftbusiness.com/blog/network-security-best-practices/ (Kraft Business Systems)
• Correct Placement of IDS/IPS in Network Architecture (Cisco Community)
https://community.cisco.com/t5/network-security/correct-placement-of-ids-ips-in-network-architecture/td-p/2632437 (Cisco Community)
• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app!


Show more...
3 months ago
18 minutes 4 seconds

Deepdive
Network Architecture Design: Key Considerations

Episode: Network Architecture Design: Key Considerations
In this episode of DeepDive, XatusBetaZx17 breaks down the fundamental choices you must make when architecting any network—from small lab setups to large-scale enterprise deployments. We’ll cover key considerations such as topology selection (spine‑leaf, three‑tier, flat), capacity planning (bandwidth, device limits), scalability strategies, reliability and high availability, performance tuning (QoS, link aggregation), security integration (segmentation, access controls), and cost vs. complexity trade‑offs. By the end, you’ll have a clear framework to guide your next network design project and avoid common pitfalls.

Resources & Links:
• Network Design and Best Practices – A Guide (Auvik Blog)
https://www.auvik.com/franklyit/blog/network-design-best-practices/ (Auvik)
• An Introductory Guide to Enterprise Network Design (NetBox Labs)
https://netboxlabs.com/blog/enterprise-network-design-guide/ (netboxlabs.com)
• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app!


Show more...
3 months ago
43 minutes 6 seconds

Deepdive
Air-Gapped Systems_ Security and Management

Episode: Air‑Gapped Systems: Security and Management
In this episode of DeepDive, XatusBetaZx17 explores Air‑Gapped Systems: Security and Management—defining what air‑gaps are, the security benefits of physically isolating networks, best practices for implementing and maintaining air‑gapped environments, and key management considerations like secure data transfer procedures, patching workflows, and mitigating covert‑channel risks. Whether you’re safeguarding classified data or critical infrastructure, you’ll walk away with concrete strategies for deploying and managing air‑gapped systems effectively.

Resources & Links:
• What Is Air Gapping? Types, Benefits & Security Tips (Imperva)
https://www.imperva.com/learn/data-security/air-gapping/ (Imperva)
• What Is an Air Gap? (IBM)
https://www.ibm.com/think/topics/air-gap (IBM)
• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app!


Show more...
3 months ago
18 minutes 33 seconds

Deepdive
Network Port Security and Authentication Protocols

In this episode of DeepDive, XatusBetaZx17 breaks down how to lock down your network at the edge—covering port security on switches and 802.1X authentication for wired and wireless access. You’ll learn best practices for configuring port limits and MAC-based restrictions, see how authentication protocols grant or deny network access, and discover how these controls fit into a larger defense-in-depth strategy.Resources & Links:

• Security Best Practices in Catalyst Campus Switches (Cisco PDF)
https://www.cisco.com/c/dam/global/fr_ca/assets/presentations/Security/Security_pratices_in_ethernet_Switched_networks.pdf Cisco
• What Is 802.1X? How Does It Work? (SecureW2)
https://www.securew2.com/solutions/802-1x SecureW2
• Choosing the Right Flavor of 802.1X (TechTarget)
https://www.techtarget.com/searchnetworking/feature/Choosing-the-right-flavor-of-8021X

• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app! find me real sources for this please this is today episode


Show more...
3 months ago
20 minutes 21 seconds

Deepdive
Network Attack Surface_ Definition and Defense

In this premiere of DeepDive, XatusBetaZx17 explores the network attack surface—all the places an adversary might exploit to breach your systems. We’ll define the attack surface, walk through vulnerabilities at each of the OSI layers, compare external vs. internal risks, and lay out a defense-in-depth blueprint for protecting your network. Whether you’re building your first home lab or architecting enterprise security, you’ll come away with concrete steps to shrink your attack surface.


Resources & Links:

• Understanding Attack Surfaces (Blog

https://www.cloudflare.com/learning/security/what-is-an-attack-surface/

• Defense-in-Depth Strategies (Whitepaper

https://www.paloaltonetworks.com/cyberpedia/what-is-attack-surface-management

• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app!

Show more...
3 months ago
13 minutes 27 seconds

Deepdive
Welcome to DeepDive with xatusbetazx17, the weekly podcast where network-engineer-in-training Marcelo Collado breaks down the tech world into clear, actionable insights. Whether you’re building your first home lab, hardening your network against cyber threats, or curious about the latest AI breakthroughs, this is your go-to resource. Each episode, you’ll get: Hands-on tutorials for assembling and optimizing hardware—from budget routers to high-performance servers. Cybersecurity deep dives, where Marcelo walks you through real-world security tools, best practices, and step-by-step.