ConvoCourses - podcast cover

ConvoCourses

Cyber Security Compliance and IT Jobs

Episodes

GRC RoadMap - NIST CSF (Volume 1)

In this one, we talk about how the NIST Cybersecurity Framework 2.0 can be used as a way to learn governance, risk management, and compliance.

Mar 01, 20251 hr 21 minEp. 161

Convocoures Podcast: T-Mobile, CISA Abolished?

https://convocourses.net articles: https://www.reuters.com/technology/cybersecurity/t-mobile-hacked-massive-chinese-breach-telecom-networks-wsj-reports-2024-11-16/ https://www.politico.com/news/2024/11/14/rand-paul-kneecap-cisa-00189698 https://www.darkreading.com/threat-intelligence/mastercard-bet-recorded-future-win-cti Sign up for free courses! http://convocourses.com http://convocourses.net - (Discounts and free stuff) Join advanced readers group: https://booksprout.co/reviewer/team/35902/co...

Nov 20, 20241 hr 11 minEp. 154

ConvoCourses Podcast: Open Topics

https://convocourses.net Introduction and Community Focus Host Introduction: Bruce kicks off the session, welcoming viewers to his live podcast on CovoCourses. Format: Bruce explains that he's going off-script to directly address viewer questions from YouTube and TikTok. Career Path and Job Market Advice Career Advice for Cybersecurity Beginners Assessment of Background: Bruce advises viewers to consider their current field and experience. Local Job Opportunities: Suggests exploring entry-level ...

Nov 12, 20242 hr 48 minEp. 153

Convocourses Podcast: President Trump's Policies that May affect GRC

https://convocourses.net This is not political, I am not choosing sides, but we are taking a look at some of the policies he proposed. Trump's Proposals IT - Domestic Manufacturing (Tariffs) Cybersecurity - Enhanced Cyber Defense Capabilities AI - Remove bidens government oversight

Nov 11, 20242 hr 59 minEp. 152

Convocoures Podcast: Zero Trust Explained

https://youtube.com/live/l_jx9KjeJkI http://convocourses.net The Zero Trust security model is a cybersecurity framework that operates on the principle of "never trust, always verify." Unlike traditional security models that rely on a strong perimeter defense, Zero Trust assumes that threats can come from both outside and inside the network. Therefore, no user or system should be trusted by default, regardless of whether they are inside or outside the network perimeter. Here are the key principle...

Jun 27, 20241 hr 12 minEp. 134