CISSP Cyber Training Podcast - CISSP Training Program - podcast cover

CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneurwww.cisspcybertraining.com

Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable security strategies and tips that you can implement right away, giving you an edge in the cybersecurity realm. Tune in and take the reins of your cybersecurity journey—let’s ride into excellence together! 🚀

Episodes

CCT Vendor 01: The Blurry Line: Where Physical Security Meets Cybersecurity - SecurePassage.com

Send us a text The traditional boundaries between physical and cyber security are rapidly disappearing, creating both risks and opportunities for organizations of all sizes. This eye-opening conversation with Casey Rash from Secure Passage explores the critical intersection where these two domains meet and the innovative solutions emerging to bridge this gap. Casey brings his fascinating journey from Marine Corps signals intelligence to fintech security to the partner side of cybersecurity, shar...

Mar 11, 202538 min

CCT 226: Data and Asset Classification for the CISSP (D1.4)

Send us a text The $150 million cryptocurrency heist linked to the 2022 LastPass breach serves as a powerful wake-up call for cybersecurity professionals. As Sean Gerber explains in this comprehensive breakdown of CISSP Domain 2.1, even security-focused tools can become vulnerability points when housing your most sensitive information. Dive deep into the pyramid structure of data classification, where government frameworks (Unclassified, Confidential, Secret, Top Secret) and non-government equiv...

Mar 10, 202526 minSeason 3Ep. 226

CCT 225: Practice CISSP Questions – Business Impact Analysis (D1.4)

Send us a text Ransomware attacks are a growing concern for both businesses and individuals, as the frequency and sophistication of these threats continue to escalate. In this episode, we take a closer look at this alarming trend and introduce six effective methods for recovering critical data that's been locked away due to ransomware encryption, specifically focusing on encrypted virtual machines. We begin by dissecting the mechanisms behind ransomware and discussing its increasing prevale...

Mar 06, 202523 minSeason 3Ep. 225

CCT 224: Business Impact Assessments (BIA) and the CISSP (D1.4)

Send us a text Welcome to a compelling exploration of the crucial importance of Business Impact Analysis (BIA) in ensuring cybersecurity resilience, especially for those preparing for the CISSP exam. In this episode, we dive deep into the essentials of BIA, breaking down both qualitative and quantitative impact assessments that help organizations evaluate the potential repercussions of cybersecurity incidents. With recent ransomware attacks making headlines, organizations face unprecedented chal...

Mar 03, 202537 minSeason 3Ep. 224

CCT 223: Practice CISSP Questions - Software Development Security for CISSP (D8.2)

Send us a text Get ready for an eye-opening deep dive into the world of cybersecurity! This episode reveals the alarming speed at which hackers adapt and exploit vulnerabilities, with over 61% of them leveraging new exploits within 48 hours of discovery. We discuss enlightening insights from InfoSecurity Magazine and showcase the new Netflix documentary "Zero Day," which delves into the insidious realm of malware and cyberattacks. Things take a darker turn as we recount a chilling stor...

Feb 27, 202525 minSeason 3Ep. 223

CCT 222: TP-Link Router Risks and Software Development Security for CISSP (D8.2)

This episode explores software development security, starting with TP-Link router risks and moving into programming languages, IDEs, runtime environments, and libraries. It covers securing development and runtime environments, including best practices for CI/CD pipelines and the importance of dynamic application security testing (DAST). The podcast equips listeners with actionable advice to enhance cybersecurity strategies and development protocols.

Feb 24, 202541 minSeason 2Ep. 222

CCT 221: Malicious QR Codes and Advanced Digital Forensics Techniques for CISSP (D7.1)

Send us a text Curious about the latest tactics cybercriminals are using to exploit vulnerabilities in messaging apps? Join me, Shon Gerber, on the CISSP Cyber Training Podcast as we unravel how Russian hackers are leveraging malicious QR codes to breach platforms like Signal, Telegram, and WhatsApp. We'll dissect this alarming trend that targets high-profile individuals including politicians and journalists, and underscore the importance of staying vigilant when interacting with QR codes. ...

Feb 20, 202526 minSeason 3Ep. 221

CCT 220: Firewall and Advanced Cybersecurity Techniques for CISSP (Domain 7.1)

Send us a text Uncover the secrets to mastering firewalls and advancing your cybersecurity career with insights from the CISSP Cyber Training Podcast. Ever wondered how a simple firewall can be your strongest ally against a $12 billion threat that financial firms have faced over the past two decades? Join me, Sean Gerber, as we navigate the indispensable role of firewalls within cybersecurity, especially for those gearing up for the CISSP exam. This episode promises an enriched understanding of ...

Feb 17, 202543 minSeason 3Ep. 220

CCT 219: Practice CISSP Questions - Mastering Vulnerability Assessments and Network Scanning for the CISSP (D6.2.1)

Send us a text Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!...

Feb 13, 202520 minSeason 3Ep. 219

CCT 218: Design and validate assessment, test, and audit strategies for the CISSP (Domain 6.1)

Send us a text Unlock the secrets to safeguarding your cloud storage from becoming a cyber attack vector in our latest episode of the CISSP Cyber Training Podcast with Shon Gerber. Discover how neglected AWS S3 buckets can pose significant threats akin to the notorious SolarWinds attack. Shon breaks down the importance of auditing and access controls while providing strategic guidance aligned with domain 6.1 of the CISSP to fortify your knowledge for the exam. This episode promises to equip you ...

Feb 10, 202535 minSeason 3Ep. 218

CCT 217: Practice CISSP Questions - Deprovisioning and Role Definitions (D5.5.2-3)

Send us a text Unlock the secrets to cybersecurity success with Sean Gerber as your guide, promising not just knowledge but mastery of domain five for your CISSP exam. Will you be the one who finally understands the intricacies of identity and access management, or the latest defense tactics against the alarming rise of ransomware attacks? These are just a few of the critical insights we explore, providing you with the practical tools needed to safeguard organizations and ensure business resilie...

Feb 06, 202519 minSeason 3Ep. 218

CCT 216: Enhancing Board Expertise and Role-Based Access Control (Domain 5.5)

Send us a text Discover the game-changing strategies to strengthen your company's cybersecurity posture with our latest episode on CISSP Cybersecurity Training and Board Expertise. We reveal shocking insights: only 5% of company boards have cybersecurity expertise, a glaring gap that can jeopardize risk management and financial stability. Listen as we advocate for the integration of cybersecurity professionals into risk committees, a move proven to enhance security measures and boost shareh...

Feb 03, 202540 minSeason 3Ep. 216

CCT 215: Practice CISSP Questions - JMAGIC Malware and Implementing Secure Design - Voice (Domain 4.3)

Send us a text Ready to unlock the secrets of cybersecurity and ace your CISSP exam? Tune in to the latest episode of the CISSP Cyber Training Podcast, where I, Shon Gerber, guide you through the complexities of a groundbreaking malware discovery by Black Lotus Labs. Unearthed in Juniper routers within critical sectors, JMAGIC poses a stealthy threat by lingering in memory and potentially exfiltrating data. As we dissect this sophisticated malware, we'll also address pivotal CISSP exam ques...

Jan 30, 202522 minSeason 3Ep. 215

CCT 214: IoT Security Vulnerabilities and Implementing Secure Design - Voice (Domain 4.3)

Send us a text Unlock the secrets of voice security and communication evolution with Shon Gerber on the CISSP Cyber Training Podcast. We tackle the intriguing issue of Subaru's Starlink vulnerability, which Wired Magazine recently spotlighted. This flaw, affecting about a million vehicles, highlights the growing security challenges of IoT and connected vehicles, echoing similar vulnerabilities in other brands like Acura and Toyota. Tune in to discover how these incidents shape the landscape...

Jan 27, 202538 minSeason 3Ep. 214

CCT 213: Practice CISSP Questions - DORA, Memory Protection and Virtualization Security for CISSP Success (Domain 3.4)

Send us a text Unlock the secrets to robust cybersecurity with our latest episode, where we explore the critical importance of organizational resilience in the face of inevitable cyber threats. We promise you'll gain a comprehensive understanding of the Digital Operational Resiliency Act (DORA) and its profound implications for financial institutions across the UK and EU. Discover why ICT risk management, incident reporting, and information sharing are not just regulatory obligations but vi...

Jan 23, 202522 minSeason 3Ep. 212

CCT 212: Memory Protection and Virtualization Security for CISSP Success (Domain 3.4)

Send us a text Unlock the secrets to fortified cybersecurity with our latest episode, promising to equip you with the knowledge to safeguard your digital infrastructure. We explore the vital role memory protection plays in maintaining system stability and integrity, emphasizing the need to shield it from unauthorized access. Discover the strategies for defending against notorious vulnerabilities like Meltdown and Spectre and learn why it's crucial to address zero-day threats, such as those ...

Jan 20, 202538 minSeason 3Ep. 212

CCT 211: Practice CISSP Questions - Data Security Controls and Compliance Requirements (Domain 2.3)

Send us a text Unlock the secrets to acing your CISSP exam with insights that blend real-world cybersecurity wisdom and innovative study strategies. Ever wondered how a data breach, like the one at SuperDraft, can teach you crucial lessons about protecting your information? We'll explore how securing your data and freezing your credit are essential steps in the fight against password reuse risks. Join Sean Gerber as we unpack the vital role of asset owners in defining access control policie...

Jan 16, 202518 min

CCT 210: Data Security Controls and Compliance Requirements for the CISSP (Domain 2.3)

Send us a text Unlock the secrets of data security and asset management with Shon Gerber as your guide. Ever wondered how to navigate the intricate world of CISSP cyber training and protect your organization from data breaches? This episode promises to equip you with essential strategies to conduct security assessments, especially when third-party vendors like Gravy Analytics come into play. Learn why educating your employees on location tracking dangers is crucial and how mobile device control ...

Jan 13, 202541 minSeason 3Ep. 210

CCT 209: Practice CISSP Questions - Digital Evidence, Forensics, and Investigation (Domain 1.6)

Send us a text Unlock the secrets to mastering cybersecurity and prepare yourself for the CISSP exam with our latest episode of the CISSP Cyber Training Podcast. Ever wondered how a simple API misstep could lead to a major breach? We dive into a recent incident involving the Department of Treasury and Beyond Trust, showcasing the critical importance of API security. As we navigate through domain 1.6, we promise to enhance your understanding of key concepts like the preponderance of evidence in c...

Jan 09, 202522 min

CCT 208: Navigating Digital Evidence, Forensics, and Investigation Types for CISSP Success (Domain 1.6)

Send us a text Unlock the secrets to mastering the CISSP exam with insights that could transform your cybersecurity career. Have you ever considered how failing to change a default router password could be your greatest vulnerability? Join me, Sean Gerber, as I guide you through the essential topics that every aspiring security professional needs to understand as we step into 2025. From administrative to regulatory investigations, this episode covers the diverse landscape of investigation types ...

Jan 06, 202546 minSeason 3Ep. 208

CCT 207: Practice CISSP Questions - Assess Security Impact of Acquired Software (Domain 8.4)

Send us a text This episode underscores the rising threat of cross-domain attacks and the critical importance of identity management in cybersecurity. We discuss evaluating software risks, the nuances of open-source versus COTS solutions, and the necessity of robust SLAs in managed services. • Importance of understanding cross-domain attacks and their implications • Role of identity and access management in mitigating vulnerabilities • Evaluating open-source software based on community engagemen...

Jan 02, 202524 minSeason 2Ep. 207

CCT 206: Assess Security Impact of Acquired Software (Domain 8.4)

Send us a text Could you navigate the complexities of cybersecurity like a pro and walk confidently into the CISSP exam? Join us as Sean Gerber shares his expert insights on conquering common test pitfalls and emphasizes the crucial strategy of thinking like a manager. From mastering the art of pacing to trusting your instincts, you'll gain valuable knowledge on how to read questions methodically and manage your time effectively. Plus, we're not just examining theoretical knowledge—Sea...

Dec 30, 202436 minSeason 2Ep. 206

CCT 205: Practice CISSP Questions - Apply Foundational Security Operations Concepts (Domain 7.4)

Send us a text Unlock the secrets of cybersecurity mastery with me, Sean Gerber, on this week's episode of the CISSP Cyber Training Podcast. Discover why the U.S. government is investing a staggering $3 billion to replace TP-Link routers and the strategic implications for telecom companies nationwide. We'll also dissect the National Defense Authorization Act, which aims to fortify AI adoption and tackle emerging threats through an AI Security Center. This isn't just a glimpse into...

Dec 26, 202423 min

CCT 204: Need to Know, Least Privilege, Job Rotation and Other Options in Security Operations (Domain 7.4)

Send us a text Unlock the secrets to a more secure digital environment as we dissect the potential impact of a TP-Link router ban in the U.S., spurred by security vulnerabilities and foreign influence concerns. How will this affect consumers, businesses, and ISPs reliant on these budget-friendly devices? Tune in to discover the broader implications of a shift towards U.S.-manufactured electronics and what it means for cybersecurity practices nationwide. Explore the intricate balance of power and...

Dec 23, 202437 minSeason 2Ep. 204

CCT 203: Practice CISSP Questions - Understanding Vulnerability Scans, Risk Management, and Cyber Threat Mitigation Strategies (Domain 6.4)

Send us a text Can AI-driven technologies reshape the way we secure our digital world? Join me, Sean Gerber, as we navigate the fascinating landscape of cybersecurity challenges anticipated by 2025. Our latest podcast episode promises to shed light on the emerging threats posed by AI, particularly within the finance and e-commerce sectors. We explore the necessity of incorporating AI into security frameworks and examine the shifting dynamics of cybersecurity insurance powered by AI-driven risk a...

Dec 19, 202428 minSeason 2Ep. 203

CCT 202: Understanding Vulnerability Scans, Risk Management, and Cyber Threat Mitigation Strategies (Domain 6.4)

Send us a text Unlock the secrets to safeguarding your organization against cyber threats as we explore critical components of cybersecurity. Join me, Sean Gerber, on this enlightening episode of the CISSP Cyber Training Podcast, where we dissect domain 6.4 of the CISSP exam. Discover the latest insights into cyber threats that target U.S. critical infrastructure, with a particular focus on an Iranian-linked group's custom cyber weapon. Learn how understanding your organization's techn...

Dec 16, 202442 minSeason 2Ep. 202

CCT 201: Practice CISSP Questions - Hardware and Firmware Knowledge Gap and Access Controls (Domain 5)

Send us a text Could the lack of hardware and firmware knowledge be the Achilles' heel of today's cybersecurity efforts? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as we unpack the critical challenges faced by IT and security leaders, particularly in hardware-intensive sectors like manufacturing. We expose the concerning gaps in understanding that are leaving organizations vulnerable, and propose actionable solutions like fostering stronger collaboration between IT teams...

Dec 12, 202423 minSeason 2Ep. 201

CCT 200: Understanding Account Provisioning (CISSP Domain 5)

Send us a text Unlock the secrets of safeguarding your digital empire with an urgent cybersecurity update from Sean Gerber on the CISSP Cyber Training Podcast. Imagine a vulnerability so severe it's rated at a critical level of 10—this is the reality for Atlassian Confluence users, and immediate action is non-negotiable. Arm yourself with strategies from CISSP domain 5.5.1 that shape the provisioning, onboarding, and maintenance of systems. Learn how to craft robust account management plans...

Dec 09, 202440 minSeason 2Ep. 200

CCT 199: Practice CISSP Questions - DNSSEC, IPSec, DoH, DoT and other Networking Security (Domain 4)

Send us a text Discover how a ransomware attack nearly brought vodka titan Stoli to its knees, pushing the company to the brink of bankruptcy with a staggering $78 million debt. This episode promises a compelling exploration of the catastrophic impact on their ERP systems and the urgent need for a solid business resiliency plan. Join me, Sean Gerber, as we unravel the complexities of managing IT risks, the geopolitical challenges faced by companies like Stoli, and the critical importance of conv...

Dec 05, 202423 minSeason 2Ep. 199

CCT 198: IPv4, IPv6, and Key Protocols for CISSP Success (Domain 4)

Send us a text Unlock the secrets to mastering core networking concepts crucial for your CISSP exam and cybersecurity career with Sean Gerber on the CISSP Cyber Training Podcast. Ever wondered how the intricate dance between IPv4 and IPv6 affects your daily online interactions? Get ready to explore these foundational Internet protocols, their histories, and the innovative transition mechanisms bridging them. We kick off with a discussion on the eye-opening Mega Breach Database, spotlighting the ...

Dec 02, 202429 minSeason 2Ep. 198