CCT 148: Understanding and Implementing Threat Modeling for the CISSP Exam (Domain 3.1)

CCT 148: Understanding and Implementing Threat Modeling for the CISSP Exam (Domain 3.1)

Send us Fan Mail What if you could transform your cybersecurity skills and become an expert in threat modeling? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as I guide you through the critical elements of threat modeling, a key topic for any cybersecurity professional gearing up for the CISSP exam. We'll discuss why grasping the nuances of threats is essential to safeguarding your organization's data and systems. From system and threat identification to vulnerability assessments ...

Jaksot(341)

CCT 338: LinkedIn Monitoring - Support for Patch and Vulnerability Management (Domain 7)

CCT 338: LinkedIn Monitoring - Support for Patch and Vulnerability Management (Domain 7)

Send us Fan Mail LinkedIn might be doing more in your browser than you think. We start with a report dubbing it “BrowserGate” a claim that LinkedIn quietly checks for installed Chrome extensions using...

6 Huhti 23min

CCT 337: UK Manufacture Attacks - CISSP Deep Dive (Domain 4)

CCT 337: UK Manufacture Attacks - CISSP Deep Dive (Domain 4)

Send us Fan Mail A ransomware headline is easy to ignore until you realize it can shut down a factory line, break supplier networks, and trigger contract penalties that dwarf the original IT cleanup. ...

2 Huhti 32min

CCT 336 - Cyber Niche's and Submitting CPEs

CCT 336 - Cyber Niche's and Submitting CPEs

Send us Fan Mail Passing the CISSP is a huge win, but the part that quietly ends careers is what comes after: keeping the certification active. I walk you through how to submit ISC2 CPEs in a way that...

30 Maalis 25min

CCT 335: Indian CCTV and CISSP Question Deep Dive (Domain 3)

CCT 335: Indian CCTV and CISSP Question Deep Dive (Domain 3)

Send us Fan Mail A cheap camera on a pole can become a surveillance pipeline, and that’s not a movie plot, it’s a real security problem. I start with a news-driven look at alleged CCTV espionage tied ...

26 Maalis 21min

CCT 334: CISA and Stryker Attack and AI GRC Foundational Concepts

CCT 334: CISA and Stryker Attack and AI GRC Foundational Concepts

Send us Fan Mail The fastest way to lose control of your security program is to ignore the systems that control everything else. I start with a timely CISA warning: attackers went after an endpoint ma...

23 Maalis 29min

CCT 333: Patch Or Get Hacked (iPhones) - CISSP Questions Deep Dive (Domain 2)

CCT 333: Patch Or Get Hacked (iPhones) - CISSP Questions Deep Dive (Domain 2)

Send us Fan Mail A “just visiting a website” iPhone hack is the kind of story that snaps you out of autopilot, and that’s where we start. Dark Sword shows how sophisticated mobile malware can ride on ...

19 Maalis 30min

CCT 332: A Winning CISO/CSO and AI Changing Cyber Forever (Career Planning)

CCT 332: A Winning CISO/CSO and AI Changing Cyber Forever (Career Planning)

Send us Fan Mail AI is not a future cybersecurity problem. It is a right now career problem, and it is also a massive opportunity if you prepare the right way. I walk through how AI is changing cybers...

16 Maalis 34min

CCT 331: AI And Cyber Insurance Risk & CISSP Deep Dive Questions (Domain 1)

CCT 331: AI And Cyber Insurance Risk & CISSP Deep Dive Questions (Domain 1)

Send us Fan Mail AI is starting to change cybersecurity budgets in a surprising place: cyber insurance premiums. We dig into why insurers now care about how you use AI, how “more automation” can still...

12 Maalis 27min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
psykopodiaa-podcast
voi-hyvin-meditaatiot-2
adhd-podi
rss-narsisti
aamukahvilla
rss-rahamania
rss-liian-kuuma-peruna
rahapuhetta
rss-vapaudu-voimaasi
psykologia
rss-koira-haudattuna
rss-eron-alkemiaa
rss-the-leafy-lounge
rss-duodecim-lehti
rss-valo-minussa-2
leikitaanko-laakaria
jari-sarasvuo-podcast
mielipaivakirja
rss-turun-yliopisto