🎙 Welcome to Episode 5 of the BCIS 4345: Network and System Security Podcast, developed by Dr. Joseph H. Schuessler from the Dr. Sam Pack College of Business at Tarleton State University.
This episode dives into endpoint vulnerabilities, common attack types, and the defenses that protect users and organizations. From ransomware and spyware to buffer overflows and injection attacks, we examine the threats that target endpoint devices—and the strategies used to harden and secure them. With real-world connections to the Dallas/Fort Worth cybersecurity job market, this discussion bridges academic knowledge with the practical skills employers demand.
Based on the text:
Ciampa, M. (2025). CompTIA Security+ Guide to Network Security Fundamentals (8th ed.). Cengage. https://www.cengage.com/c/new-edition...
📘 Created with NotebookLM, Google’s AI-powered research assistant that integrates your course content into a connected learning experience.
🔗 Explore the interactive notebook:
NotebookLM Companion https://notebooklm.google.com/noteboo...
🔗 For questions regarding this course, please reach out to Dr. Schuessler's Teaching Assistant:
https://chatgpt.com/g/g-68a8751d22788...
🔍 Key Topics Covered
💻 Malware Attacks – Ransomware, keyloggers, Trojans, viruses, worms, bots, and rootkits
🕵️ Application Exploits – Buffer overflows, injection (SQLi, XSS), CSRF/SSRF, replay attacks
🛡 Endpoint Defenses – Antivirus, HIDS/HIPS, EDR, secure browsers, patch management, OS hardening
📊 Indicators of Attack (IoA) – Signs of live attacks including account lockouts, missing logs, and resource exhaustion
🏢 DFW Job Market Relevance – How endpoint defense skills map to roles like Security Analyst, Vulnerability Management Specialist, and Network Security Engineer
🎓 CompTIA Security+ Alignment – Core endpoint security competencies for IT, MIS, and CIS majors preparing for cybersecurity careers
📺 Watch the Full BCIS 4345 Series:
BCIS 4345 Playlist • BCIS 4345 - Network and System Security Po...
🔗 Explore More BCIS Podcasts You May Like:
• • BCIS 4342 | Ethical Hacking & Network Defe...
• • BCIS 4385 | Launching Your Tech Career & B...
• • BCIS 5381-Strategic IT Leadership Unpacked...
• • BCIS 5311-Managing Information Systems Pod...
• • BCIS 5304 Podcast: Mastering ITIL 4 & ITSM...
• • BCIS 4350 | Complete Management Informatio...
• • BCIS 4320 | Complete Digital Forensics Pod...
👍 If this episode helped you understand endpoint security and modern defense strategies, like, subscribe, and share with classmates.
🛎 Turn on notifications to follow along with the full series.
🗨️ Discussion Prompt: Which do you think poses the greatest challenge for organizations—defending against malware, application exploits, or endpoint misconfigurations? Why?
Информация по комментариям в разработке