Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
Welcome to the ISC2 Certified in Cybersecurity Audio Course!
|
Mar 11, 2026 |
|
Episode 64 — Security Awareness Training Importance: Building Habits That Resist Attacks
|
Feb 22, 2026 |
|
Episode 63 — Security Awareness Training Concepts: Social Engineering and Human Exploits
|
Feb 22, 2026 |
|
Episode 62 — Privacy Policy Essentials: Expectations, Handling Rules, and Accountability
|
Feb 22, 2026 |
|
Episode 61 — Change Management Policy: Documentation, Approval, and Rollback That Works
|
Feb 22, 2026 |
|
Episode 60 — BYOD Policy Basics: Balancing User Convenience and Organizational Security
|
Feb 22, 2026 |
|
Episode 59 — Acceptable Use Policy: Setting Boundaries Without Creating Shadow IT
|
Feb 22, 2026 |
|
Episode 58 — Password Policy Essentials: Strength, Rotation Myths, and Practical Enforcement
|
Feb 22, 2026 |
|
Episode 57 — Data Handling Policy Essentials: Rules That Prevent the Most Common Mistakes
|
Feb 22, 2026 |
|
Episode 56 — System Hardening Through Configuration Management: Baselines, Updates, Patches
|
Feb 22, 2026 |
|
Episode 55 — Logging and Monitoring Security Events: What to Capture for Real Value
|
Feb 22, 2026 |
|
Episode 54 — Data Handling Discipline: Classification, Labeling, Retention, and Destruction
|
Feb 22, 2026 |
|
Episode 53 — Encryption Essentials: Symmetric, Asymmetric, and Hashing Without Confusion
|
Feb 22, 2026 |
|
Episode 52 — Cloud Network Concepts: SLA, MSP, SaaS, PaaS, IaaS, Hybrid Explained
|
Feb 22, 2026 |
|
Episode 51 — Defense in Depth and NAC: Segmentation for Embedded Systems and IoT
|
Feb 22, 2026 |
|
Episode 50 — Network Design Security: DMZ, VLAN, VPN, and Micro-Segmentation Done Right
|
Feb 22, 2026 |
|
Episode 49 — MOUs and MOAs in Infrastructure Planning: Shared Responsibilities and Risk
|
Feb 22, 2026 |
|
Episode 48 — On-Prem Network Infrastructure: Power, HVAC, Fire Suppression, Redundancy
|
Feb 22, 2026 |
|
Episode 47 — Firewalls and IPS Fundamentals: Blocking, Allowing, and Stopping What Matters
|
Feb 22, 2026 |
|
Episode 46 — Prevent Attacks with Antivirus and Scanning: Strengths, Limits, and Good Use
|
Feb 22, 2026 |
|
Episode 45 — HIDS and NIDS Explained: Host Versus Network Detection Tradeoffs
|
Feb 22, 2026 |
|
Episode 44 — Identify Attacks Using IDS Concepts: What Detection Can and Cannot Prove
|
Feb 22, 2026 |
|
Episode 43 — Network Threat Types: DDoS, Viruses, Worms, Trojans, MITM, Side-Channels
|
Feb 22, 2026 |
|
Episode 42 — Ports and Applications: Mapping Network Conversations to Real Risk
|
Feb 22, 2026 |
|
Episode 41 — WiFi Fundamentals for Security: How Wireless Works and Where Attacks Hide
|
Feb 22, 2026 |
|
Episode 40 — IPv4 and IPv6 Basics: Addressing, Notation, and Security-Relevant Differences
|
Feb 22, 2026 |
|
Episode 39 — Computer Networking Foundations: OSI and TCP/IP Models for Security Thinking
|
Feb 22, 2026 |
|
Episode 38 — Role-Based Access Control: Designing Roles That Actually Reflect Job Duties
|
Feb 22, 2026 |
|
Episode 37 — Mandatory Access Control: Labels, Rules, and High-Control Environments
|
Feb 22, 2026 |
|
Episode 36 — Discretionary Access Control: Ownership, Permissions, and Where It Breaks Down
|
Feb 22, 2026 |
|
Episode 35 — Segregation of Duties Made Simple: Preventing Abuse and Catching Mistakes Early
|
Feb 22, 2026 |
|
Episode 34 — Least Privilege in Practice: Reducing Risk Without Slowing Work to a Crawl
|
Feb 22, 2026 |
|
Episode 33 — Authorized Versus Unauthorized Personnel: Verification, Escorts, and Real Control
|
Feb 22, 2026 |
|
Episode 32 — Monitoring Physical Security: Guards, CCTV, Alarms, and Logs That Matter
|
Feb 22, 2026 |
|
Episode 31 — Physical Access Controls: Badges, Gate Entry, and Environmental Design Basics
|
Feb 22, 2026 |
|
Episode 30 — Incident Response Components: Prepare, Detect, Contain, Eradicate, Recover
|
Feb 22, 2026 |
|
Episode 29 — Incident Response Importance: Speed, Evidence, and Communication Under Stress
|
Feb 22, 2026 |
|
Episode 28 — Incident Response Purpose: Contain Damage and Restore Normal Operations
|
Feb 22, 2026 |
|
Episode 27 — Disaster Recovery Components: Backups, Failover, Runbooks, and Recovery Checks
|
Feb 22, 2026 |
|
Episode 26 — Disaster Recovery Importance: RTO, RPO, and Tradeoffs You Must Understand
|
Feb 22, 2026 |
|
Episode 25 — Disaster Recovery Purpose: Restore IT Services Fast and Validate the Return
|
Feb 22, 2026 |
|
Episode 24 — Business Continuity Components: Roles, Dependencies, Plans, and Testing Cadence
|
Feb 22, 2026 |
|
Episode 23 — Business Continuity Importance: Downtime Costs, Priorities, and Stakeholder Trust
|
Feb 22, 2026 |
|
Episode 22 — Business Continuity Purpose: Keep Critical Work Going During Disruption
|
Feb 22, 2026 |
|
Episode 21 — Navigate Regulations and Laws: What Compliance Demands From Security Work
|
Feb 22, 2026 |
|
Episode 20 — Turn Governance Into Action: Policies, Procedures, and Standards That Stick
|
Feb 22, 2026 |
|
Episode 19 — Operationalize the ISC2 Code of Ethics Under Real Workplace Pressure
|
Feb 22, 2026 |
|
Episode 18 — Strengthen Physical Controls: Layers, Barriers, and Practical Deterrence Strategies
|
Feb 22, 2026 |
|
Episode 17 — Use Administrative Controls Well: Policies, Process Discipline, and Human Factors
|
Feb 22, 2026 |
|
Episode 16 — Apply Technical Controls That Reduce Risk Without Breaking Operations
|
Feb 22, 2026 |
|
Episode 15 — Treat Risk Confidently: Avoid, Mitigate, Transfer, or Accept With Rationale
|
Feb 22, 2026 |
|
Episode 14 — Assess Risk Properly: Likelihood, Impact, and Meaningful Risk Statements
|
Feb 22, 2026 |
|
Episode 13 — Identify Risk Inputs: Assets, Threats, Vulnerabilities, and Exposure Pathways
|
Feb 22, 2026 |
|
Episode 12 — Define Risk Tolerance Clearly: What the Organization Will Live With
|
Feb 22, 2026 |
|
Episode 11 — Set Risk Priorities That Match the Business Mission and Real Constraints
|
Feb 22, 2026 |
|
Episode 10 — Understand Privacy as a Security Concept: Data Use, Consent, and Minimization
|
Feb 22, 2026 |
|
Episode 9 — Non-Repudiation Explained Clearly: Proof, Accountability, and Digital Assurance
|
Feb 22, 2026 |
|
Episode 8 — Make MFA Make Sense: When to Require It and How It Fails
|
Feb 22, 2026 |
|
Episode 7 — Choose Authentication Methods Wisely: Factors, Strengths, and Common Mistakes
|
Feb 22, 2026 |
|
Episode 6 — Safeguard Availability: Keep Systems Reliable Through Disruptions and Failures
|
Feb 22, 2026 |
|
Episode 4 — Master Confidentiality: Prevent Data Exposure Through Practical Security Thinking
|
Feb 22, 2026 |
|
Episode 3 — Exam-Day Execution Without Panic: Time, Guessing, and CAT Decision Rules
|
Feb 22, 2026 |
|
Episode 2 — Build a Spoken Study Plan That Matches the Official CC Objectives
|
Feb 22, 2026 |
|
Episode 1 — Decode the ISC2 CC CAT Exam: Structure, Scoring, Policies, Tactics
|
Feb 22, 2026 |