Certified: The ISC(2) CC Audio Course

By Jason Edwards

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Jason Edwards

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 0
Reviews: 0
Episodes: 64

Description

Certified: The ISC(2) CC Certification Audio Course is an audio-first study program built for people who want a clean, practical path into cybersecurity without getting buried in jargon. It’s designed for beginners and career changers, as well as IT and business professionals who need a solid security foundation. If you’re aiming for the ISC(2) Certified in Cybersecurity (CC) credential, this course gives you a structured way to learn the concepts the exam expects, using plain language and real-world framing. You do not need a deep technical background to start. You need consistency, curiosity, and a willingness to practice thinking like a security professional. Across Certified: The ISC(2) CC Certification Audio Course, you’ll learn core security principles, basic risk thinking, security operations fundamentals, access and identity concepts, network and endpoint basics, and the purpose behind common controls. The teaching style is built for audio: short, focused explanations, repeatable definitions, and quick mental checkpoints that help you remember what matters. You can learn during commutes, workouts, chores, or quiet time—anywhere you can listen. Because the format is voice-driven, it also helps you get comfortable with security vocabulary, which makes exam questions feel less like a foreign language. What makes Certified: The ISC(2) CC Certification Audio Course different is the editorial approach: it respects your time, stays focused, and keeps every episode tied to outcomes you can use. Instead of treating security as a pile of terms, it connects ideas to decisions you’ll actually make—what to protect, why it matters, and how to reduce risk without breaking the business. Success looks like this: you can explain key concepts in your own words, recognize what a question is really asking, and choose the best answer with confidence. By the end, you should feel ready to sit the CC exam—and ready to have smarter security conversations at work.

Episode Date
Welcome to the ISC2 Certified in Cybersecurity Audio Course!
Mar 11, 2026
Episode 64 — Security Awareness Training Importance: Building Habits That Resist Attacks
Feb 22, 2026
Episode 63 — Security Awareness Training Concepts: Social Engineering and Human Exploits
Feb 22, 2026
Episode 62 — Privacy Policy Essentials: Expectations, Handling Rules, and Accountability
Feb 22, 2026
Episode 61 — Change Management Policy: Documentation, Approval, and Rollback That Works
Feb 22, 2026
Episode 60 — BYOD Policy Basics: Balancing User Convenience and Organizational Security
Feb 22, 2026
Episode 59 — Acceptable Use Policy: Setting Boundaries Without Creating Shadow IT
Feb 22, 2026
Episode 58 — Password Policy Essentials: Strength, Rotation Myths, and Practical Enforcement
Feb 22, 2026
Episode 57 — Data Handling Policy Essentials: Rules That Prevent the Most Common Mistakes
Feb 22, 2026
Episode 56 — System Hardening Through Configuration Management: Baselines, Updates, Patches
Feb 22, 2026
Episode 55 — Logging and Monitoring Security Events: What to Capture for Real Value
Feb 22, 2026
Episode 54 — Data Handling Discipline: Classification, Labeling, Retention, and Destruction
Feb 22, 2026
Episode 53 — Encryption Essentials: Symmetric, Asymmetric, and Hashing Without Confusion
Feb 22, 2026
Episode 52 — Cloud Network Concepts: SLA, MSP, SaaS, PaaS, IaaS, Hybrid Explained
Feb 22, 2026
Episode 51 — Defense in Depth and NAC: Segmentation for Embedded Systems and IoT
Feb 22, 2026
Episode 50 — Network Design Security: DMZ, VLAN, VPN, and Micro-Segmentation Done Right
Feb 22, 2026
Episode 49 — MOUs and MOAs in Infrastructure Planning: Shared Responsibilities and Risk
Feb 22, 2026
Episode 48 — On-Prem Network Infrastructure: Power, HVAC, Fire Suppression, Redundancy
Feb 22, 2026
Episode 47 — Firewalls and IPS Fundamentals: Blocking, Allowing, and Stopping What Matters
Feb 22, 2026
Episode 46 — Prevent Attacks with Antivirus and Scanning: Strengths, Limits, and Good Use
Feb 22, 2026
Episode 45 — HIDS and NIDS Explained: Host Versus Network Detection Tradeoffs
Feb 22, 2026
Episode 44 — Identify Attacks Using IDS Concepts: What Detection Can and Cannot Prove
Feb 22, 2026
Episode 43 — Network Threat Types: DDoS, Viruses, Worms, Trojans, MITM, Side-Channels
Feb 22, 2026
Episode 42 — Ports and Applications: Mapping Network Conversations to Real Risk
Feb 22, 2026
Episode 41 — WiFi Fundamentals for Security: How Wireless Works and Where Attacks Hide
Feb 22, 2026
Episode 40 — IPv4 and IPv6 Basics: Addressing, Notation, and Security-Relevant Differences
Feb 22, 2026
Episode 39 — Computer Networking Foundations: OSI and TCP/IP Models for Security Thinking
Feb 22, 2026
Episode 38 — Role-Based Access Control: Designing Roles That Actually Reflect Job Duties
Feb 22, 2026
Episode 37 — Mandatory Access Control: Labels, Rules, and High-Control Environments
Feb 22, 2026
Episode 36 — Discretionary Access Control: Ownership, Permissions, and Where It Breaks Down
Feb 22, 2026
Episode 35 — Segregation of Duties Made Simple: Preventing Abuse and Catching Mistakes Early
Feb 22, 2026
Episode 34 — Least Privilege in Practice: Reducing Risk Without Slowing Work to a Crawl
Feb 22, 2026
Episode 33 — Authorized Versus Unauthorized Personnel: Verification, Escorts, and Real Control
Feb 22, 2026
Episode 32 — Monitoring Physical Security: Guards, CCTV, Alarms, and Logs That Matter
Feb 22, 2026
Episode 31 — Physical Access Controls: Badges, Gate Entry, and Environmental Design Basics
Feb 22, 2026
Episode 30 — Incident Response Components: Prepare, Detect, Contain, Eradicate, Recover
Feb 22, 2026
Episode 29 — Incident Response Importance: Speed, Evidence, and Communication Under Stress
Feb 22, 2026
Episode 28 — Incident Response Purpose: Contain Damage and Restore Normal Operations
Feb 22, 2026
Episode 27 — Disaster Recovery Components: Backups, Failover, Runbooks, and Recovery Checks
Feb 22, 2026
Episode 26 — Disaster Recovery Importance: RTO, RPO, and Tradeoffs You Must Understand
Feb 22, 2026
Episode 25 — Disaster Recovery Purpose: Restore IT Services Fast and Validate the Return
Feb 22, 2026
Episode 24 — Business Continuity Components: Roles, Dependencies, Plans, and Testing Cadence
Feb 22, 2026
Episode 23 — Business Continuity Importance: Downtime Costs, Priorities, and Stakeholder Trust
Feb 22, 2026
Episode 22 — Business Continuity Purpose: Keep Critical Work Going During Disruption
Feb 22, 2026
Episode 21 — Navigate Regulations and Laws: What Compliance Demands From Security Work
Feb 22, 2026
Episode 20 — Turn Governance Into Action: Policies, Procedures, and Standards That Stick
Feb 22, 2026
Episode 19 — Operationalize the ISC2 Code of Ethics Under Real Workplace Pressure
Feb 22, 2026
Episode 18 — Strengthen Physical Controls: Layers, Barriers, and Practical Deterrence Strategies
Feb 22, 2026
Episode 17 — Use Administrative Controls Well: Policies, Process Discipline, and Human Factors
Feb 22, 2026
Episode 16 — Apply Technical Controls That Reduce Risk Without Breaking Operations
Feb 22, 2026
Episode 15 — Treat Risk Confidently: Avoid, Mitigate, Transfer, or Accept With Rationale
Feb 22, 2026
Episode 14 — Assess Risk Properly: Likelihood, Impact, and Meaningful Risk Statements
Feb 22, 2026
Episode 13 — Identify Risk Inputs: Assets, Threats, Vulnerabilities, and Exposure Pathways
Feb 22, 2026
Episode 12 — Define Risk Tolerance Clearly: What the Organization Will Live With
Feb 22, 2026
Episode 11 — Set Risk Priorities That Match the Business Mission and Real Constraints
Feb 22, 2026
Episode 10 — Understand Privacy as a Security Concept: Data Use, Consent, and Minimization
Feb 22, 2026
Episode 9 — Non-Repudiation Explained Clearly: Proof, Accountability, and Digital Assurance
Feb 22, 2026
Episode 8 — Make MFA Make Sense: When to Require It and How It Fails
Feb 22, 2026
Episode 7 — Choose Authentication Methods Wisely: Factors, Strengths, and Common Mistakes
Feb 22, 2026
Episode 6 — Safeguard Availability: Keep Systems Reliable Through Disruptions and Failures
Feb 22, 2026
Episode 4 — Master Confidentiality: Prevent Data Exposure Through Practical Security Thinking
Feb 22, 2026
Episode 3 — Exam-Day Execution Without Panic: Time, Guessing, and CAT Decision Rules
Feb 22, 2026
Episode 2 — Build a Spoken Study Plan That Matches the Official CC Objectives
Feb 22, 2026
Episode 1 — Decode the ISC2 CC CAT Exam: Structure, Scoring, Policies, Tactics
Feb 22, 2026