Certified: The CISSP Audio Course

By Dr. Jason Edwards

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 4
Reviews: 0
Episodes: 141

Description

Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations to help you understand not just what to study, but how to think like a security professional. Whether you’re commuting, exercising, or studying after work, this series provides the clarity and direction you need to stay motivated and on track. The CISSP certification, governed by ISC², is one of the most respected and globally recognized credentials in information security. It validates deep technical and managerial expertise across areas such as security architecture, risk management, asset protection, identity and access control, network and software security, and incident response. CISSP holders are trusted to design, implement, and manage comprehensive cybersecurity programs that protect critical systems and data. Earning this certification demonstrates both strategic understanding and hands-on mastery—an achievement that opens doors to leadership roles across government, corporate, and consulting environments. Developed by BareMetalCyber.com, the CISSP Audio Course delivers structured, professional instruction that aligns with the latest exam outline and real-world best practices. It’s more than preparation—it’s a roadmap for advancing your cybersecurity career with confidence, clarity, and purpose.

Episode Date
Episode 134: Understanding "Best", "First", and "Most Likely" Wording
Jan 17, 2026
Episode 133: How to Deconstruct CISSP Questions
Jan 17, 2026
Episode 132: Memory Tricks and Mnemonics for the CISSP
Jan 17, 2026
Welcome to the ISC2 CISSP Audio Course
Oct 14, 2025
Episode 140: What to Do If You Fail the CISSP
Jun 23, 2025
Episode 139: What Comes After the CISSP: Career and Certification Roadmap
Jun 23, 2025
Episode 138: Adaptive Testing Tips and Time Management
Jun 23, 2025
Episode 137: Understanding "Best", "First", and "Most Likely" Wording
Jun 23, 2025
Episode 136: How to Deconstruct CISSP Questions
Jun 23, 2025
Episode 135: Memory Tricks and Mnemonics for the CISSP
Jun 23, 2025
Episode 131: Top 10 Hardest CISSP Concepts Demystified
Jun 23, 2025
Episode 130: DevSecOps Culture and Continuous Assurance
Jun 23, 2025
Episode 129: Secure APIs and Service Integration
Jun 23, 2025
Episode 128: Mobile Application Security and Reverse Engineering
Jun 23, 2025
Episode 127: Application Whitelisting and Sandboxing
Jun 23, 2025
Episode 126: Version Control and Code Integrity
Jun 23, 2025
Episode 125: Configuration Management and CI/CD Pipelines
Jun 23, 2025
Episode 124: Code Repositories and Access Controls
Jun 23, 2025
Episode 123: Security Testing: SAST, DAST, IAST
Jun 23, 2025
Episode 122: Buffer Overflows, SQL Injection, and Common Flaws
Jun 23, 2025
Episode 121: OWASP Top 10 Threats and Controls
Jun 23, 2025
Episode 120: Input Validation and Output Encoding
Jun 23, 2025
Episode 119: Secure Design and Secure Coding Guidelines
Jun 23, 2025
Episode 118: Waterfall vs. Agile vs. DevOps Approaches
Jun 23, 2025
Episode 117: Software Development Lifecycle (SDLC) Models
Jun 23, 2025
Episode 116: Security Operations Center (SOC) Best Practices
Jun 23, 2025
Episode 115: Personnel Security Controls and Separation of Duties
Jun 23, 2025
Episode 114: Physical Security Operations: Locks, Guards, Cameras
Jun 23, 2025
Episode 113: Malware Analysis and Containment
Jun 23, 2025
Episode 112: Insider Threat Identification and Mitigation
Jun 23, 2025
Episode 111: Endpoint Detection and Response (EDR)
Jun 23, 2025
Episode 110: Secure Disposal and Media Sanitization
Jun 23, 2025
Episode 109: Change Control and Approval Processes
Jun 23, 2025
Episode 108: Patch Management and Configuration Control
Jun 23, 2025
Episode 107: Business Continuity Testing and Tabletop Exercises
Jun 23, 2025
Episode 106: Disaster Recovery Planning: RTO, RPO
Jun 23, 2025
Episode 105: Evidence Acquisition and Preservation
Jun 23, 2025
Episode 104: Digital Forensics and Chain of Custody
Jun 23, 2025
Episode 103: Incident Management: Preparation and Response
Jun 23, 2025
Episode 102: Logging, Event Correlation, and SIEM
Jun 23, 2025
Episode 101: Daily Operations: Procedures, Monitoring, Checklists
Jun 23, 2025
Episode 100: Assessing Third-Party and Vendor Risk
Jun 23, 2025
Episode 99: Continuous Monitoring and Feedback Loops
Jun 23, 2025
Episode 98: Metrics and KPIs for Security Performance
Jun 23, 2025
Episode 97: Reporting Assessment Results Effectively
Jun 23, 2025
Episode 96: Threat Hunting and Red Team Exercises
Jun 23, 2025
Episode 95: Log Analysis for Forensics and Compliance
Jun 23, 2025
Episode 94: Compliance Auditing and Evidence Collection
Jun 23, 2025
Episode 93: Risk Assessment and Gap Analysis
Jun 23, 2025
Episode 92: Test Coverage and Measurement
Jun 23, 2025
Episode 91: Security Test Data and Environment Management
Jun 23, 2025
Episode 90: Code Review and Static/Dynamic Testing
Jun 23, 2025
Episode 89: Security Control Testing: Manual vs. Automated
Jun 23, 2025
Episode 88: Planning a Security Assessment
Jun 23, 2025
Episode 87: Assessment Types: Vulnerability Scans, Pen Testing, Audits
Jun 23, 2025
Episode 86: Threats to IAM: Replay, Pass-the-Hash, Credential Stuffing
Jun 23, 2025
Episode 85: Session Management and Timeout Policies
Jun 23, 2025
Episode 84: Access Recertification and Review
Jun 23, 2025
Episode 83: Access Control Lists and Capability Tables
Jun 23, 2025
Episode 82: Credential Management and Recovery
Jun 23, 2025
Episode 81: Identity-as-a-Service (IDaaS) and Cloud IAM
Jun 23, 2025
Episode 80: Multi-Factor Authentication and Implementation
Jun 23, 2025
Episode 79: Directory Services: LDAP, Active Directory
Jun 23, 2025
Episode 78: Privileged Access Management (PAM)
Jun 23, 2025
Episode 77: Federation and SSO: SAML, OAuth, OpenID
Jun 23, 2025
Episode 76: Biometric Authentication Strengths and Weaknesses
Jun 23, 2025
Episode 75: Password Policy Design and Management
Jun 23, 2025
Episode 74: IAM Lifecycle and Governance
Jun 23, 2025
Episode 73: Authorization Techniques: RBAC, ABAC, MAC, DAC
Jun 23, 2025
Episode 72: Identity Proofing and Registration Processes
Jun 23, 2025
Episode 71: Authentication Factors and Methods
Jun 23, 2025
Episode 70: DDoS Protection and High Availability Networks
Jun 23, 2025
Episode 69: Cloud Network Security (CASB, SASE, Virtual Firewalls)
Jun 23, 2025
Episode 68: Content Delivery Networks and Edge Security
Jun 23, 2025
Episode 67: Zero Trust and Software-Defined Networking (SDN)
Jun 23, 2025
Episode 66: Network Monitoring and Traffic Analysis
Jun 23, 2025
Episode 65: Network Address Translation and Proxy Usage
Jun 23, 2025
Episode 64: VOIP and Secure Communication Channels
Jun 23, 2025
Episode 63: Wireless Network Security (WEP, WPA2/3, 802.1X)
Jun 23, 2025
Episode 62: VPNs, Remote Access, and Tunneling Protocols
Jun 23, 2025
Episode 61: Secure Routing and Switching
Jun 23, 2025
Episode 60: Intrusion Detection and Prevention Systems
Jun 23, 2025
Episode 59: Defense in Depth with Firewalls and DMZs
Jun 23, 2025
Episode 58: Network Segmentation and Microsegmentation
Jun 23, 2025
Episode 57: Secure Protocols: HTTPS, SSH, SFTP, SNMPv3
Jun 23, 2025
Episode 56: OSI and TCP/IP Models Refresher
Jun 23, 2025
Episode 55: Network Architecture: LAN, WAN, Internet
Jun 23, 2025
Episode 54: Fault Tolerance, Redundancy, and High Availability
Jun 23, 2025
Episode 53: SCADA and Embedded System Security
Jun 23, 2025
Episode 52: Emerging Technologies and Security Architecture (e.g., IoT, AI)
Jun 23, 2025
Episode 51: Security Boundaries and Isolation Techniques
Jun 23, 2025
Episode 50: Security Evaluations: Common Criteria, RMF, ISO/IEC
Jun 23, 2025
Episode 49: Cryptanalysis and Attacks Against Crypto
Jun 23, 2025
Episode 48: PKI, Digital Certificates, and Trust Models
Jun 23, 2025
Episode 47: Key Management and Key Escrow
Jun 23, 2025
Episode 46: Hashing and Message Integrity
Jun 23, 2025
Episode 45: Cryptographic Lifecycle: Algorithms, Strength, Obsolescence
Jun 23, 2025
Episode 44: Cryptographic Concepts: Symmetric and Asymmetric
Jun 23, 2025
Episode 43: Common Security Flaws in Architecture
Jun 23, 2025
Episode 42: Secure Baseline and Configuration Management
Jun 23, 2025
Episode 41: Virtualization and Cloud Infrastructure Considerations
Jun 23, 2025
Episode 40: Secure Hardware Architecture and TPM
Jun 23, 2025
Episode 39: Architecture Layers: OSI, System, Application
Jun 23, 2025
Episode 38: Security Models: Bell-LaPadula, Biba, Clark-Wilson
Jun 23, 2025
Episode 37: Secure Design Principles: Defense in Depth, Least Privilege
Jun 23, 2025
Episode 36: Logging, Monitoring, and Metadata Retention for Assets
Jun 22, 2025
Episode 35: Handling of Sensitive Systems and High-Value Assets
Jun 22, 2025
Episode 34: Backup Controls and Data Recovery
Jun 22, 2025
Episode 33: Secure Use of Cloud Storage and Shared Resources
Jun 22, 2025
Episode 32: Data Sovereignty and Jurisdictional Control
Jun 22, 2025
Episode 31: Asset Inventory Management
Jun 22, 2025
Episode 30: Media Storage and Sanitization Methods
Jun 22, 2025
Episode 29: Secure Data Handling in Transit and at Rest
Jun 22, 2025
Episode 28: Data Remanence and Secure Disposal Techniques
Jun 22, 2025
Episode 27: Privacy Protection and PII Handling
Jun 22, 2025
Episode 26: Data Retention and Archival Strategies
Jun 22, 2025
Episode 25: Ownership and Stewardship Responsibilities
Jun 22, 2025
Episode 24: Data Sensitivity and Labeling Requirements
Jun 22, 2025
Episode 23: Information Lifecycle and Data Classification
Jun 22, 2025
Episode 22: Security Documentation and Governance Metrics
Jun 22, 2025
Episode 21: Legal Systems and Cybercrime Laws Globally
Jun 22, 2025
Episode 20: Intellectual Property and Licensing Laws
Jun 22, 2025
Episode 19: Privacy Principles and Data Protection (GDPR, CCPA)
Jun 22, 2025
Episode 18: Supply Chain Risk and Due Diligence
Jun 22, 2025
Episode 17: Third-Party Risk Management
Jun 22, 2025
Episode 16: Security Awareness and Training Programs
Jun 22, 2025
Episode 15: Personnel Security: Background Checks, Policies, Termination
Jun 22, 2025
Episode 14: Security Policies, Standards, Procedures, and Guidelines
Jun 22, 2025
Episode 13: Disaster Recovery Planning (DRP) and Continuity of Operations
Jun 22, 2025
Episode 12: Business Continuity Planning (BCP) Fundamentals
Jun 22, 2025
Episode 11: Risk Response and Risk Appetite
Jun 22, 2025
Episode 10: Risk Management Concepts: Threats, Vulnerabilities, Risk
Jun 22, 2025
Episode 9: Professional Ethics and (ISC)² Code of Ethics
Jun 22, 2025
Episode 8: Organizational Roles and Responsibilities
Jun 22, 2025
Episode 7: Compliance Requirements: Legal, Regulatory, Contractual
Jun 22, 2025
Episode 6: Security Governance Principles: Frameworks and Strategy
Jun 22, 2025
Episode 5: The CIA Triad: Confidentiality, Integrity, Availability
Jun 22, 2025
Episode 4: How to Study and Pass the CISSP Exam: Resources and Mindset
Jun 22, 2025
Episode 3: Career Impact of the CISSP: Roles, Salaries, Growth
Jun 22, 2025
Episode 2: CISSP vs. Other Certifications: Which One’s Right for You?
Jun 22, 2025
Episode 1: What Is the CISSP and Why It Matters
Jun 22, 2025