CISSP Central

CISSP Central

Welcome to CISSP Central, the ultimate podcast for aspiring and certified CISSP professionals! Whether you’re studying for the CISSP 2024 syllabus exam or looking to sharpen your cybersecurity skills, this podcast is your go-to resource. Each episode dives deep into the critical domains of cybersecurity, offering insights, tips, and real-world experiences from industry experts.

Join us as we explore the latest trends, challenges, and solutions in information security, helping you stay ahead in a rapidly evolving digital world. From encryption to risk management, compliance to cloud security, CISSP Central covers it all!

Perfect for CISSP candidates, InfoSec pros, and anyone passionate about safeguarding information in the modern age. Tune in, learn, and become the cybersecurity expert you were meant to be!

Note: This entire podcast has been prepared based on a published book on Amazon named C(R)ISSP: The Most Concise Handbook for CISSP 2024, written by myself, which can be purchased directly from Amazon by clicking this link.

Jaksot(50)

CISSP Domain6 Section 2

CISSP Domain6 Section 2

6.2 Conduct Security Control Testing6.2.1 Vulnerability Assessment6.2.2 Penetration Testing6.2.3 Log Reviews6.2.4 Synthetic Transaction6.2.5 Code review and testing6.2.6 Misuse case testing6.2.7 Cover...

16 Loka 202411min

CISSP Domain6 Intro and Section 1

CISSP Domain6 Intro and Section 1

6.0 DOMAIN 6: SECURITY ASSESSMENT AND TESTING6.1 Design and Validate assessment, test, and audit strategies6.1.1 Internal6.1.2 External6.1.3 Third-party6.1.4 Location (e.g. on-premises, cloud, hybrid)

16 Loka 202411min

CISSP Domain5 Intro and Section 5

CISSP Domain5 Intro and Section 5

5.5 Manage the identity and access provisioning lifecycle5.5.1 Account access review (e.g., user, system, service)5.5.2 Provisioning and deprovisioning (e.g., on/off boarding & transfers)5.5.3 Role de...

16 Loka 202414min

CISSP Domain5 Intro and Section 4

CISSP Domain5 Intro and Section 4

5.4 Implement and manage authorization mechanisms

16 Loka 202410min

CISSP Domain5 Intro and Section 3

CISSP Domain5 Intro and Section 3

5.3 Federated identity with a third-party service5.3.1 On-Premises5.3.2 Cloud5.3.3 Hybrid

16 Loka 202412min

CISSP Domain5 Section 2

CISSP Domain5 Section 2

5.2 Design identification and authentication Strategy (e.g., people, devices, and services)5.2.1 Groups and Roles5.2.2 Authentication, Authorization and Accounting (AAA) (e.g., MFA, password-less auth...

16 Loka 202418min

CISSP Domain5 Intro and Section 1

CISSP Domain5 Intro and Section 1

5.0 DOMAIN 5: IDENTITY & ACCESS MANAGEMENT (IAM)5.1 Control physical and logical access to assets5.1.1 Information5.1.2 Systems5.1.3 Devices5.1.4 Facilities5.1.5 Applications5.1.6 Services

16 Loka 202416min

CISSP Domain4 Section 3

CISSP Domain4 Section 3

4.3 Implement secure communication channels according to design4.3.1 Voice, video, and collaboration (e.g., conferencing, Zoom rooms)4.3.2 Remote access (e.g., network administrative functions)4.3.3 D...

16 Loka 202411min