For sysadmins seeking continuous learning, these podcasts deliver deep technical insights:
- RunAs Radio: Microsoft-focused enterprise IT discussions with expert guests. Example episode covers PowerShell automation for AD management.
- Packet Pushers: Networking deep dives with protocol analysis. Recent episode explained BGP troubleshooting using Wireshark filter examples:
# Sample Wireshark filter for BGP analysis bgp.type == 2 || bgp.type == 3 || tcp.port == 179
Critical listening for hardening systems:
- Security Now! Weekly vulnerability breakdowns. Their Log4j episode included mitigation scripts:
#!/bin/bash # Quick patch check for Log4j find / -name "log4j-core-*.jar" -exec sh -c 'unzip -p {} META-INF/MANIFEST.MF | grep "Implementation-Version"' \;
Stay current with infrastructure evolution:
- VMware VMTN: vSphere automation examples using PowerCLI. One episode demonstrated VM snapshot automation:
Connect-VIServer -Server vcenter.example.com Get-VM -Name "Prod*" | New-Snapshot -Name "PrePatch_$(Get-Date -Format yyyyMMdd)"
These help anticipate infrastructure shifts:
- FLOSS Weekly: Open-source tool evaluations with installation benchmarks.
- TechNet Edge: Azure/Microsoft 365 administration patterns including ARM template examples.
For packet-level understanding:
- Network Security Podcast: Packet analysis workshops showing tcpdump filters for intrusion detection:
# Capture suspicious DNS traffic tcpdump -ni eth0 'udp port 53 and (udp[10] & 0x80 != 0)'
Pro tip: Subscribe to podcast RSS feeds in your automation dashboard using Python:
import feedparser sysadmin_feeds = ['http://packetpushers.net/feed/', 'https://feeds.twit.tv/floss.xml'] for feed in sysadmin_feeds: d = feedparser.parse(feed) print(f"Latest {d.feed.title}: {d.entries[0].title}")
For system administrators and network engineers looking to stay ahead, podcasts offer a goldmine of technical insights. Here are the most valuable shows covering infrastructure automation, cloud security, and enterprise networking:
Security Now! (grc.com) remains the definitive resource for deep technical analysis of vulnerabilities. Recent episodes have covered:
// Example of discussed vulnerability
CVE-2023-32456:
Impact: Remote Code Execution in Windows RPC
CVSS Score: 9.8
Mitigation: Apply MS Patch KB5028244
Workaround: Disable TCP port 135
PaulDotCom Security provides weekly penetration testing case studies, often featuring Python scripts like:
import nmap
scanner = nmap.PortScanner()
scanner.scan('192.168.1.0/24', arguments='-sS -p 22,80,443')
for host in scanner.all_hosts():
if scanner[host].state() == "up":
print(f"Live host: {host}")
The VMware VMTN Podcast delivers advanced vSphere automation techniques. A recent episode demonstrated PowerCLI for mass VM configuration:
Get-VM | Where-Object {$_.PowerState -eq "PoweredOn"} |
ForEach-Object {
Set-VM -VM $_ -MemoryGB 8 -Confirm:$false
Write-Host "Configured $($_.Name)"
}
Packet Pushers offers vendor-neutral discussions on SD-WAN, BGP best practices, and network automation. Their Ansible for Network Engineers series includes examples like:
---
- name: Configure VLANs on Cisco switches
hosts: switches
tasks:
- name: Add VLANs
cisco.ios.ios_vlans:
config:
- vlan_id: 100
name: Servers
- vlan_id: 200
name: VoIP
register: result
RunAs Radio focuses on PowerShell automation for Active Directory. Their latest episode included this user provisioning script:
Import-Csv new_users.csv | ForEach-Object {
New-ADUser -Name $_.Name
-SamAccountName $_.Username
-Department $_.Dept
-Enabled $true
Add-ADGroupMember "Department_$($_.Dept)" $_.Username
}
Hak5 covers IoT security and hardware hacking, often featuring Raspberry Pi projects with code snippets like:
#!/bin/bash
while true; do
tshark -i wlan0 -f "port 53" -T fields -e ip.src -e dns.qry.name
sleep 5
done