Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
Episode 134: Understanding "Best", "First", and "Most Likely" Wording
|
Jan 17, 2026 |
|
Episode 133: How to Deconstruct CISSP Questions
|
Jan 17, 2026 |
|
Episode 132: Memory Tricks and Mnemonics for the CISSP
|
Jan 17, 2026 |
|
Welcome to the ISC2 CISSP Audio Course
|
Oct 14, 2025 |
|
Episode 140: What to Do If You Fail the CISSP
|
Jun 23, 2025 |
|
Episode 139: What Comes After the CISSP: Career and Certification Roadmap
|
Jun 23, 2025 |
|
Episode 138: Adaptive Testing Tips and Time Management
|
Jun 23, 2025 |
|
Episode 137: Understanding "Best", "First", and "Most Likely" Wording
|
Jun 23, 2025 |
|
Episode 136: How to Deconstruct CISSP Questions
|
Jun 23, 2025 |
|
Episode 135: Memory Tricks and Mnemonics for the CISSP
|
Jun 23, 2025 |
|
Episode 131: Top 10 Hardest CISSP Concepts Demystified
|
Jun 23, 2025 |
|
Episode 130: DevSecOps Culture and Continuous Assurance
|
Jun 23, 2025 |
|
Episode 129: Secure APIs and Service Integration
|
Jun 23, 2025 |
|
Episode 128: Mobile Application Security and Reverse Engineering
|
Jun 23, 2025 |
|
Episode 127: Application Whitelisting and Sandboxing
|
Jun 23, 2025 |
|
Episode 126: Version Control and Code Integrity
|
Jun 23, 2025 |
|
Episode 125: Configuration Management and CI/CD Pipelines
|
Jun 23, 2025 |
|
Episode 124: Code Repositories and Access Controls
|
Jun 23, 2025 |
|
Episode 123: Security Testing: SAST, DAST, IAST
|
Jun 23, 2025 |
|
Episode 122: Buffer Overflows, SQL Injection, and Common Flaws
|
Jun 23, 2025 |
|
Episode 121: OWASP Top 10 Threats and Controls
|
Jun 23, 2025 |
|
Episode 120: Input Validation and Output Encoding
|
Jun 23, 2025 |
|
Episode 119: Secure Design and Secure Coding Guidelines
|
Jun 23, 2025 |
|
Episode 118: Waterfall vs. Agile vs. DevOps Approaches
|
Jun 23, 2025 |
|
Episode 117: Software Development Lifecycle (SDLC) Models
|
Jun 23, 2025 |
|
Episode 116: Security Operations Center (SOC) Best Practices
|
Jun 23, 2025 |
|
Episode 115: Personnel Security Controls and Separation of Duties
|
Jun 23, 2025 |
|
Episode 114: Physical Security Operations: Locks, Guards, Cameras
|
Jun 23, 2025 |
|
Episode 113: Malware Analysis and Containment
|
Jun 23, 2025 |
|
Episode 112: Insider Threat Identification and Mitigation
|
Jun 23, 2025 |
|
Episode 111: Endpoint Detection and Response (EDR)
|
Jun 23, 2025 |
|
Episode 110: Secure Disposal and Media Sanitization
|
Jun 23, 2025 |
|
Episode 109: Change Control and Approval Processes
|
Jun 23, 2025 |
|
Episode 108: Patch Management and Configuration Control
|
Jun 23, 2025 |
|
Episode 107: Business Continuity Testing and Tabletop Exercises
|
Jun 23, 2025 |
|
Episode 106: Disaster Recovery Planning: RTO, RPO
|
Jun 23, 2025 |
|
Episode 105: Evidence Acquisition and Preservation
|
Jun 23, 2025 |
|
Episode 104: Digital Forensics and Chain of Custody
|
Jun 23, 2025 |
|
Episode 103: Incident Management: Preparation and Response
|
Jun 23, 2025 |
|
Episode 102: Logging, Event Correlation, and SIEM
|
Jun 23, 2025 |
|
Episode 101: Daily Operations: Procedures, Monitoring, Checklists
|
Jun 23, 2025 |
|
Episode 100: Assessing Third-Party and Vendor Risk
|
Jun 23, 2025 |
|
Episode 99: Continuous Monitoring and Feedback Loops
|
Jun 23, 2025 |
|
Episode 98: Metrics and KPIs for Security Performance
|
Jun 23, 2025 |
|
Episode 97: Reporting Assessment Results Effectively
|
Jun 23, 2025 |
|
Episode 96: Threat Hunting and Red Team Exercises
|
Jun 23, 2025 |
|
Episode 95: Log Analysis for Forensics and Compliance
|
Jun 23, 2025 |
|
Episode 94: Compliance Auditing and Evidence Collection
|
Jun 23, 2025 |
|
Episode 93: Risk Assessment and Gap Analysis
|
Jun 23, 2025 |
|
Episode 92: Test Coverage and Measurement
|
Jun 23, 2025 |
|
Episode 91: Security Test Data and Environment Management
|
Jun 23, 2025 |
|
Episode 90: Code Review and Static/Dynamic Testing
|
Jun 23, 2025 |
|
Episode 89: Security Control Testing: Manual vs. Automated
|
Jun 23, 2025 |
|
Episode 88: Planning a Security Assessment
|
Jun 23, 2025 |
|
Episode 87: Assessment Types: Vulnerability Scans, Pen Testing, Audits
|
Jun 23, 2025 |
|
Episode 86: Threats to IAM: Replay, Pass-the-Hash, Credential Stuffing
|
Jun 23, 2025 |
|
Episode 85: Session Management and Timeout Policies
|
Jun 23, 2025 |
|
Episode 84: Access Recertification and Review
|
Jun 23, 2025 |
|
Episode 83: Access Control Lists and Capability Tables
|
Jun 23, 2025 |
|
Episode 82: Credential Management and Recovery
|
Jun 23, 2025 |
|
Episode 81: Identity-as-a-Service (IDaaS) and Cloud IAM
|
Jun 23, 2025 |
|
Episode 80: Multi-Factor Authentication and Implementation
|
Jun 23, 2025 |
|
Episode 79: Directory Services: LDAP, Active Directory
|
Jun 23, 2025 |
|
Episode 78: Privileged Access Management (PAM)
|
Jun 23, 2025 |
|
Episode 77: Federation and SSO: SAML, OAuth, OpenID
|
Jun 23, 2025 |
|
Episode 76: Biometric Authentication Strengths and Weaknesses
|
Jun 23, 2025 |
|
Episode 75: Password Policy Design and Management
|
Jun 23, 2025 |
|
Episode 74: IAM Lifecycle and Governance
|
Jun 23, 2025 |
|
Episode 73: Authorization Techniques: RBAC, ABAC, MAC, DAC
|
Jun 23, 2025 |
|
Episode 72: Identity Proofing and Registration Processes
|
Jun 23, 2025 |
|
Episode 71: Authentication Factors and Methods
|
Jun 23, 2025 |
|
Episode 70: DDoS Protection and High Availability Networks
|
Jun 23, 2025 |
|
Episode 69: Cloud Network Security (CASB, SASE, Virtual Firewalls)
|
Jun 23, 2025 |
|
Episode 68: Content Delivery Networks and Edge Security
|
Jun 23, 2025 |
|
Episode 67: Zero Trust and Software-Defined Networking (SDN)
|
Jun 23, 2025 |
|
Episode 66: Network Monitoring and Traffic Analysis
|
Jun 23, 2025 |
|
Episode 65: Network Address Translation and Proxy Usage
|
Jun 23, 2025 |
|
Episode 64: VOIP and Secure Communication Channels
|
Jun 23, 2025 |
|
Episode 63: Wireless Network Security (WEP, WPA2/3, 802.1X)
|
Jun 23, 2025 |
|
Episode 62: VPNs, Remote Access, and Tunneling Protocols
|
Jun 23, 2025 |
|
Episode 61: Secure Routing and Switching
|
Jun 23, 2025 |
|
Episode 60: Intrusion Detection and Prevention Systems
|
Jun 23, 2025 |
|
Episode 59: Defense in Depth with Firewalls and DMZs
|
Jun 23, 2025 |
|
Episode 58: Network Segmentation and Microsegmentation
|
Jun 23, 2025 |
|
Episode 57: Secure Protocols: HTTPS, SSH, SFTP, SNMPv3
|
Jun 23, 2025 |
|
Episode 56: OSI and TCP/IP Models Refresher
|
Jun 23, 2025 |
|
Episode 55: Network Architecture: LAN, WAN, Internet
|
Jun 23, 2025 |
|
Episode 54: Fault Tolerance, Redundancy, and High Availability
|
Jun 23, 2025 |
|
Episode 53: SCADA and Embedded System Security
|
Jun 23, 2025 |
|
Episode 52: Emerging Technologies and Security Architecture (e.g., IoT, AI)
|
Jun 23, 2025 |
|
Episode 51: Security Boundaries and Isolation Techniques
|
Jun 23, 2025 |
|
Episode 50: Security Evaluations: Common Criteria, RMF, ISO/IEC
|
Jun 23, 2025 |
|
Episode 49: Cryptanalysis and Attacks Against Crypto
|
Jun 23, 2025 |
|
Episode 48: PKI, Digital Certificates, and Trust Models
|
Jun 23, 2025 |
|
Episode 47: Key Management and Key Escrow
|
Jun 23, 2025 |
|
Episode 46: Hashing and Message Integrity
|
Jun 23, 2025 |
|
Episode 45: Cryptographic Lifecycle: Algorithms, Strength, Obsolescence
|
Jun 23, 2025 |
|
Episode 44: Cryptographic Concepts: Symmetric and Asymmetric
|
Jun 23, 2025 |
|
Episode 43: Common Security Flaws in Architecture
|
Jun 23, 2025 |
|
Episode 42: Secure Baseline and Configuration Management
|
Jun 23, 2025 |
|
Episode 41: Virtualization and Cloud Infrastructure Considerations
|
Jun 23, 2025 |
|
Episode 40: Secure Hardware Architecture and TPM
|
Jun 23, 2025 |
|
Episode 39: Architecture Layers: OSI, System, Application
|
Jun 23, 2025 |
|
Episode 38: Security Models: Bell-LaPadula, Biba, Clark-Wilson
|
Jun 23, 2025 |
|
Episode 37: Secure Design Principles: Defense in Depth, Least Privilege
|
Jun 23, 2025 |
|
Episode 36: Logging, Monitoring, and Metadata Retention for Assets
|
Jun 22, 2025 |
|
Episode 35: Handling of Sensitive Systems and High-Value Assets
|
Jun 22, 2025 |
|
Episode 34: Backup Controls and Data Recovery
|
Jun 22, 2025 |
|
Episode 33: Secure Use of Cloud Storage and Shared Resources
|
Jun 22, 2025 |
|
Episode 32: Data Sovereignty and Jurisdictional Control
|
Jun 22, 2025 |
|
Episode 31: Asset Inventory Management
|
Jun 22, 2025 |
|
Episode 30: Media Storage and Sanitization Methods
|
Jun 22, 2025 |
|
Episode 29: Secure Data Handling in Transit and at Rest
|
Jun 22, 2025 |
|
Episode 28: Data Remanence and Secure Disposal Techniques
|
Jun 22, 2025 |
|
Episode 27: Privacy Protection and PII Handling
|
Jun 22, 2025 |
|
Episode 26: Data Retention and Archival Strategies
|
Jun 22, 2025 |
|
Episode 25: Ownership and Stewardship Responsibilities
|
Jun 22, 2025 |
|
Episode 24: Data Sensitivity and Labeling Requirements
|
Jun 22, 2025 |
|
Episode 23: Information Lifecycle and Data Classification
|
Jun 22, 2025 |
|
Episode 22: Security Documentation and Governance Metrics
|
Jun 22, 2025 |
|
Episode 21: Legal Systems and Cybercrime Laws Globally
|
Jun 22, 2025 |
|
Episode 20: Intellectual Property and Licensing Laws
|
Jun 22, 2025 |
|
Episode 19: Privacy Principles and Data Protection (GDPR, CCPA)
|
Jun 22, 2025 |
|
Episode 18: Supply Chain Risk and Due Diligence
|
Jun 22, 2025 |
|
Episode 17: Third-Party Risk Management
|
Jun 22, 2025 |
|
Episode 16: Security Awareness and Training Programs
|
Jun 22, 2025 |
|
Episode 15: Personnel Security: Background Checks, Policies, Termination
|
Jun 22, 2025 |
|
Episode 14: Security Policies, Standards, Procedures, and Guidelines
|
Jun 22, 2025 |
|
Episode 13: Disaster Recovery Planning (DRP) and Continuity of Operations
|
Jun 22, 2025 |
|
Episode 12: Business Continuity Planning (BCP) Fundamentals
|
Jun 22, 2025 |
|
Episode 11: Risk Response and Risk Appetite
|
Jun 22, 2025 |
|
Episode 10: Risk Management Concepts: Threats, Vulnerabilities, Risk
|
Jun 22, 2025 |
|
Episode 9: Professional Ethics and (ISC)² Code of Ethics
|
Jun 22, 2025 |
|
Episode 8: Organizational Roles and Responsibilities
|
Jun 22, 2025 |
|
Episode 7: Compliance Requirements: Legal, Regulatory, Contractual
|
Jun 22, 2025 |
|
Episode 6: Security Governance Principles: Frameworks and Strategy
|
Jun 22, 2025 |
|
Episode 5: The CIA Triad: Confidentiality, Integrity, Availability
|
Jun 22, 2025 |
|
Episode 4: How to Study and Pass the CISSP Exam: Resources and Mindset
|
Jun 22, 2025 |
|
Episode 3: Career Impact of the CISSP: Roles, Salaries, Growth
|
Jun 22, 2025 |
|
Episode 2: CISSP vs. Other Certifications: Which One’s Right for You?
|
Jun 22, 2025 |
|
Episode 1: What Is the CISSP and Why It Matters
|
Jun 22, 2025 |