CISSP Cyber Training Podcast - CISSP Training Program - podcast cover

CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneurwww.cisspcybertraining.com

Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable security strategies and tips that you can implement right away, giving you an edge in the cybersecurity realm. Tune in and take the reins of your cybersecurity journey—let’s ride into excellence together! 🚀

Episodes

CCT 077: Practice CISSP Questions - Risk Indicators, Backup Verification Data for DR and BC Operations (Domain 6)

Send us a text Ready to step deep into the trenches of cyber security? This episode promises a riveting examination of pertinent cyber security concepts, backed by real-life case studies. First up: a chilling real-world scenario of a Nigerian individual making waves in the news for their involvement in a multi-million dollar business email compromise scheme - an in-depth look at this will make you rethink your transactions! In addition, we shed light on the nitty-gritty of disaster recovery conc...

Oct 06, 202319 minSeason 1Ep. 77

CCT 076: Risk Indicators, Backup Verification Data for DR and BC Operations (CISSP Training D6.3)

Send us a text Are you armed with the knowledge to interpret the health of an organization's operations? Can you differentiate between performance indicators (KPIs), operational performance indicators (OPIs), and risk indicators (KRIs)? This episode of CISSP Cyber Training Podcast is your key to unlocking these concepts. We dissect the purpose and applications of these metrics, laying bare their role in assessing operational efficiency and effectiveness. Additionally, we emphasize the impor...

Oct 02, 202332 minSeason 1Ep. 76

CCT 075: Practice CISSP Questions - Management of Identification, Authentication & Future Trends (Domain 5)

Send us a text Are you ready to unlock the secrets of cybersecurity? Buckle up as we journey into the intriguing world of CISSP Cyber Training. Imagine the shock when Microsoft AI researchers accidentally leaked up to 38 terabytes of data due to a slip-up in their Azure environment! We're diving deep into this incident, unpacking all its layers. But that's not all. We’re shedding light on the complexities of Multi-Factor Authentication (MFA) and the unique challenges of Single Sign-On ...

Sep 28, 202323 minSeason 1Ep. 75

CCT 074: Management of Identification and Authentication - Future Trends (CISSP Domain 5)

Send us a text How prepared are you for a ransomware attack? Buckle up as we navigate through a thrilling ride into the world of cybersecurity, drawing lessons from the recent ransomware attacks on Caesar's Palace and MGM casinos. We'll walk you through the importance of having a robust disaster recovery and business continuity plan, as evidenced by these high-profile breaches. But that's not all - we're also diving into the future of identity and access management, touching ...

Sep 26, 202343 minSeason 1Ep. 74

CCT 073: CISSP Practice Test Questions - Cloud Essentials (Domain 4)

Send us a text Have you ever wondered what it takes to crack the CISSP exam? Dreamt of enhancing your cybersecurity expertise? Welcome to an action-packed episode that pulls back the curtain on your path to success. With a focus on CISSP questions and key testing strategies, this episode aims to make you a proficient test taker. We dig into intriguing topics like hypervisor technology, the CIA triad, encryption types, and the main role of CASBs. To spice things up, we also throw in the main secu...

Sep 21, 202319 minSeason 1Ep. 73

CCT 072: A Comprehensive Exploration of CISSP's Cloud Security (Domain 4.3)

Send us a text Eager to demystify the cloud environment and its cost-effectiveness compared to an on-premise setup? Well, gear up, because today, we're taking you on an enlightening journey through the world of cloud networking. We will be tackling everything from cloud security and its various models to the critical role of cloud security posture management (CSPM) in AWS deployment. So, whether you're a budding IT professional or an established one looking to enhance your CISSP knowle...

Sep 18, 202342 minSeason 1Ep. 72

CCT 071: Practice CISSP Questions - Decoding Security Models (CISSP Domain 3)

Send us a text Ever wonder how safe your passwords really are? Brace yourself as we unravel the shocking details of the LastPass breach from August 2020, where countless customer credentials were stolen. We'll expose the vulnerabilities that allowed this to happen and advise on the necessary steps to preserve your digital security. You'll gain insights into reliable security measures, like the Harrison-Ruzel-Ohlmann model and Trusted Computing Base, and grasp how they can prevent data ...

Sep 14, 202317 minSeason 1Ep. 71

CCT 070: Decoding Security Models: A Deep Dive into CISSP's Domain 3 Essentials (D3.2)

Send us a text Bold Statement: "Your company's security depends on more than just your own vigilance. It also hinges heavily on third parties. In today's episode, we tackle that reality head-on, using a case study of a Windows 7 PC from a high-security fencing company that was hacked to infiltrate sensitive military and research sites. This real-life example serves as a stark reminder of the need for constant assessment and monitoring of third parties to safeguard your firm. Addit...

Sep 11, 202332 minSeason 1Ep. 70

CCT 069: Practice CISSP Questions - Data Collection, Location, and Destruction (D2.4)

Send us a text Imagine a world where a simple radio command halts an entire railway system. That's exactly what happened in Poland recently, and we're here to break down the intricate details of this cyber-attack. We'll reveal how the Polish radio stop command system was exploited, unraveling the mystery behind this major disruption. From there, we'll navigate the tricky waters of personal identifiable information (PII), data destruction, and data sovereignty, arming you with...

Sep 07, 202319 minSeason 1Ep. 69

CCT 068: CISSP Insights on Data Collection, Location, and Destruction (D2.4)

Send us a text Ready to decode the mystery of AI in digital forensics? I'm your host, Sean Gerber, and in this stimulating conversation, we're peeling back the layers on how AI is revolutionizing the digital forensics landscape. From automating log analysis and malware detection to reshaping image and video analysis, we're talking about it all. So, buckle up as we navigate the potential legal implications of this rapid technological evolution. Dive deeper into the tangled web of d...

Sep 04, 202344 minSeason 1Ep. 68

CCT 067: Practice CISSP Questions - Cybersecurity Governance (Domain 1.3)

Send us a text Take a journey into the heart of cybersecurity with us as we unravel Gmail's latest recommendation for multi-factor authentication. Can you guess the three key aspects they propose for heightened security? Stay tuned as we also tackle a pertinent CISSP question on security governance, illuminating the primary purpose of an organization's security governance program. Learn how a balanced scorecard can effortlessly align security controls with business goals, pivotal to an...

Aug 31, 202319 minSeason 1Ep. 67

CCT 066: Cybersecurity Governance - Mastering CISSP Domain 1.3 with Essential Security Governance Principles

Send us a text Ready to fortify your organizational security? We promise to equip you with a deeper understanding of security governance principles - the backbone of any effective information security program. We highlight the pressing need for strategies that align with the mission and vision of the organization, especially in the face of the growing threat of ransomware attacks. We dissect a recent news piece that underscores the importance of safeguarding critical infrastructure. But that&apo...

Aug 28, 202337 minSeason 1Ep. 66

CCT 065: Mastering Software Development Methodologies - CISSP Exam Questions (CISSP Domain 8.1)

Send us a text Ready to turbocharge your cybersecurity prowess? Then buckle up for a thrilling journey through the maze of software development methodologies - Agile, Waterfall, DevOps, Scrum, and Kanban. I, your tour guide Sean Gerber, will dissect each methodology, spotlighting their unique principles, benefits, and potential pitfalls. Get set to grasp the iterative pulse of Agile, the rigid skeleton of the Waterfall model, and the risk-focused heart of the Spiral model. We're not just ab...

Aug 24, 202316 minSeason 1Ep. 65

CCT 064: Agile, Scrum, Kanban, Waterfall, Spiral- Mastering Software Development Methodologies (CISSP Domain 8.1)

Send us a text Are you ready to navigate the maze of software development methodologies and their security implications? Well, that's exactly what we're about to do! We're unpacking everything from the waterfall development model, with its linear steps, to the agile model's flexible and adaptable nature, perfect for managing complex projects in an evolving landscape of threats and challenges. In this captivating cyber training episode, we also dissect the scrum methodology, p...

Aug 21, 202336 minSeason 1Ep. 64

CCT 063: Digital Forensics CISSP Exam Questions (Domain 7.1)

Send us a text Ever wonder which types of evidence are considered most reliable in court? Or why using a write blocker is crucial during a forensic analysis? Well, you're in for a treat! Join me, Sean Gerber, as we unravel the intricacies of the CISSP exam. We'll shed light on concepts like digital forensics, chain of custody, and the crucial role of data acquisition. Not just that, we'll also demystify the workings of a honeypot and its role in diverting attackers from critical s...

Aug 17, 202317 minSeason 1Ep. 63

CCT 062: Decoding Digital Evidence - A Comprehensive Guide to Forensics, Legal Concepts, and Ethical Implications (Domain 7.1)

Send us a text Ready to demystify the world of digital evidence in cybersecurity? What if you could easily navigate the complex protocols that safeguard system logs, network logs, and files? This episode promises to enhance your understanding of digital evidence, and its undeniable fragility. We deep-dive into why maintaining the chain of custody matters and the key to ensuring the integrity of these critical pieces of information. Ever thought about the art and science of digital forensics? We ...

Aug 14, 202347 minSeason 1Ep. 62

CCT 061: Security Assessment, Audits, and Pen Testing - CISSP Exam Questions (Domain 6)

Send us a text What if you had the power to spot vulnerabilities before they become a major security threat? That's exactly what we are offering in this insightful episode of the CISSP Cyber Training Podcast. Your host, Sean Gerber, unzips the world of security assessments and testing, exploring the nuances of data confidentiality during the process. He delves into the role of external auditors and discusses why continuous improvement is the key to successful assessment processes. For those...

Aug 10, 202316 minSeason 1Ep. 61

CCT 060: Security Assessments - A Guide to CISSP Exam Preparation (Domain 6)

Send us a text Ever feel like you're walking in a cyber labyrinth, trying to protect your data but unsure where the vulnerabilities lurk? Our latest CISSP Cyber Training Podcast is the compass you need. We dissect the essentials of security assessments and auditing strategies, illuminating how these risk-busting practices can fortify your systems, reassure your customers, and fulfill due diligence requirements. All of this while also priming you for the powerhouse CISSP exam! Immerse yourse...

Aug 07, 202335 minSeason 1Ep. 60

CCT 059: SAML, OAuth, OPENID - CISSP Exam Questions (Domain 5)

Send us a text What if you could confidently face the CISSP exam knowing you've got a strong grasp of crucial topics like SAML and Identity and Access Management? Join me, Sean Gerber, your guide through the maze of CISSP exam preparation, as I tackle a series of exam-related questions that will significantly bolster your study routine. Together, we'll unpack concepts like the primary purpose of SAML, OAuth2's main function, and the characteristics of multi-factor and biometric au...

Aug 03, 202316 minSeason 1Ep. 59

CCT 058: Identity Unlocked: Unraveling Identity Management (Domain 5)

Send us a text Ever get tangled up in the complexities of identity and access management? Tired of letting confusion rob you of effective cybersecurity strategies? Well, it's time to tune in and simplify it all! As your resident cybersecurity expert, Sean Gerber, I'll be taking the reins in this exciting journey into the heart of identity and access management. We'll tackle the big three – identity management, federated identity management, and credential management systems. Belie...

Jul 31, 202339 minSeason 1Ep. 58

CCT 057: CISSP Exam Questions (Domain 4)

Send us a text Ever wondered how to ace the CISSP Cyber exam's domain four? Or, perhaps, you're merely intrigued by the intricate world of Voiceover IP (VOIP)? Either way, this episode is packed with the insights you've been seeking! Join me, Sean Gerber, as we dissect the key protocols that VOIP uses for multimedia transmissions. Together, we'll unravel the complex intricacies of Session Initiation Protocol (SIP) messages and how sessions kick off in a VOIP implementation. Y...

Jul 27, 202312 minSeason 1Ep. 57

CCT 056: Unraveling the Intricacies of VOIP and iSCSI in Cybersecurity - CISSP Domain 4

Send us a text Ever wish you could decrypt the mysteries of cybersecurity and ace your CISSP exam? This episode is your treasure map to success, guiding you through the labyrinthine layers of the OSI model, starting with the physical transmission of data and the crucial role of physical access controls. We also enlighten you about MAC address filtering and how it fortifies network security. As we move deeper, we unlock the secrets of encryption, digital signatures, and secure coding practices. W...

Jul 24, 202340 minSeason 1Ep. 56

CCT 055: CISSP Exam Questions (D3)

Send us a text Ready to conquer the CISSP exam? Join me, Sean Gerber, as I break down complex concepts and guide you through an in-depth exploration of threat models, including their components and the crucial role they play in identifying and mitigating potential threats. You'll not only get an understanding of the TRITE methodology and when to use STRIDE or DREAD, but also learn to pinpoint which threats in STRIDE refer to an act that modifies data or system configurations. We'll unr...

Jul 20, 202312 minSeason 1Ep. 55

CCT 054: Mastering Threat Modeling: A Comprehensive Guide to Cybersecurity and CISSP Exam Preparation

Send us a text Are you prepared to defend your organization from cybersecurity threats? I'm Sean Gerber, and this week I'm unraveling the intimidating world of threat modeling. Get ready to supercharge your cybersecurity knowledge as we dissect threat identification, risk assessment, and mitigation strategies. This isn't just for acing your CISSP exam, it's for becoming an indispensable security professional who can effectively safeguard your organization. We'll embark o...

Jul 17, 202343 minSeason 1Ep. 54

CCT 053: CISSP Exam Questions (D2)

Send us a text Are you ready to unlock the secrets of data classification and pass your CISSP exam in one go? That's right! Your host, Sean Gerber, is here to guide you through an insightful exploration into the world of data classification. From the intricacies of content-based and context-based data classification to the various stages of the information life cycle, this episode promises to be a goldmine of information. We'll dissect the appropriate levels of data classification suit...

Jul 13, 202310 minSeason 1Ep. 53

CCT 052: Securing Your Digital Landscape: A Deep Dive into Data and Asset Classification (Domain 2)

Send us a text Are you ready to make your digital assets and information impenetrable? Well, we're here to navigate you through the maze of understanding and protecting your most valued digital treasures. This episode is packed with a wealth of knowledge, as we discuss the intricacies of information and asset protection. We highlight the vitality of data classification, and the importance of effectively training your team to attach the right labels. Your senior team needs to be on the same ...

Jul 10, 202336 minSeason 1Ep. 52

CCT 051: CISSP Exam Questions (Domain 1)

Send us a text Are you charged with navigating the precarious terrain of supply chain risk management? Then, prepare to sharpen your skills in this action-packed episode! I'm Sean Gerber, and I'll be guiding you through the labyrinth of supplier audits and evaluations, discussing the delicate balance between the two. We'll also delve into strategies for mitigating risk, including the benefits of outsourcing to multiple vendors and having redundant suppliers for those all-important...

Jul 06, 202313 minSeason 1Ep. 51

CCT 050: Securing the Chain- Mastering Supply Chain Risk Management (SCRM) for the CISSP

Send us a text Prepare to unravel the complexities of supply chain risk management (SCRM) and gain invaluable insights that could safeguard your business from massive disruptions. We're diving into the nerve-wracking challenges of SCRM, emphasizing just how crucial it is for every business in our hyper-connected age. Learn about the nuances of this formidable task as we explore real-life scenarios that underline the dire need for security professionals to lend their expertise to those who f...

Jul 03, 202335 minSeason 1Ep. 50

CCT 049: CISSP Exam Questions (Domains 1-8)

Send us a text Ready to conquer the CISSP exam with confidence? Join me, Shon Gerber, in this week's CISSP Cyber Training Podcast as we tackle questions from all eight domains to give you the insights and knowledge you need for success. From understanding the purpose of a risk register to exploring the primary security concerns in a microservices architecture, this episode covers a wide range of topics to sharpen your cybersecurity prowess. We'll dive into essential concepts like data ...

Jun 29, 202310 minSeason 1Ep. 49

CCT 048: Mastering CISSP and Navigating Cybersecurity Certifications

Send us a text Ready to level up your cybersecurity career? Wondering which certifications are worth your time and investment? We've got you covered in today's episode, where we break down everything from the entry-level CompTIA A+ certification to the more advanced CISSP. Get an insider's look at the costs, study time, and areas of concentration for each of these valuable certifications. We don't just stop at CompTIA A+ - we also dive into the Networks Plus and Security Plus...

Jun 26, 202320 minSeason 1Ep. 48