CISSP Cyber Training Podcast - CISSP Training Program – Details, episodes & analysis

Podcast details

Technical and general information from the podcast's RSS feed.

CISSP Cyber Training Podcast - CISSP Training Program

CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Education

Frequency: 1 episode/3d. Total Eps: 272

Buzzsprout

Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable security strategies and tips that you can implement right away, giving you an edge in the cybersecurity realm. Tune in and take the reins of your cybersecurity journey—let’s ride into excellence together! 🚀

Site
RSS
Apple

Recent rankings

Latest chart positions across Apple Podcasts and Spotify rankings.

Apple Podcasts

  • 🇬🇧 Great Britain - courses

    10/08/2025
    #30
  • 🇺🇸 USA - courses

    10/08/2025
    #32
  • 🇨🇦 Canada - courses

    09/08/2025
    #91
  • 🇺🇸 USA - courses

    09/08/2025
    #32
  • 🇫🇷 France - courses

    09/08/2025
    #99
  • 🇨🇦 Canada - courses

    08/08/2025
    #68
  • 🇺🇸 USA - courses

    08/08/2025
    #35
  • 🇫🇷 France - courses

    08/08/2025
    #92
  • 🇨🇦 Canada - courses

    07/08/2025
    #37
  • 🇺🇸 USA - courses

    07/08/2025
    #42

Spotify

    No recent rankings available



RSS feed quality and score

Technical evaluation of the podcast's RSS feed quality and structure.

See all
RSS feed quality
To improve

Score global : 42%


Publication history

Monthly episode publishing history over the past years.

Episodes published by month in

Latest published episodes

Recent episodes with titles, durations, and descriptions.

See all

CCT 173: Practice CISSP Questions - Media Protection, Encryption, and Mobile Security for the CISSP (Domain 7.5)

Season 2 · Episode 173

jeudi 5 septembre 2024Duration 18:09

Send us a text

Unlock the secrets to safeguarding your organization's most sensitive data and enhance your cybersecurity acumen. Join us on the CISSP Cyber Training Podcast as I, Sean Gerber, break down the critical importance of managing secrets within popular collaboration tools like Slack, Jira, and Confluence. Discover practical methods such as real-time monitoring and swift remediation to secure API keys and encryption tokens. Learn how fostering a culture of security awareness through educational initiatives can significantly mitigate risks and enhance overall security posture.

Next, we turn our attention to data sanitization and media destruction—essential processes for maintaining confidentiality and regulatory compliance. I’ll guide you through various methods of data sanitization and media destruction, from degaussing to shredding and pulping, while also demystifying the concepts of MTBF and MTTF. We'll delve into the challenges of data classification and the importance of proper data labeling. Whether you’re prepping for the CISSP exam or simply looking to deepen your cybersecurity knowledge, this episode is rich with actionable insights and expert guidance. Tune in and elevate your cybersecurity skills to the next level!

Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

CCT 172: Exploring Media Protection, Encryption, and Mobile Security for the CISSP (Domain 7.5)

Season 2 · Episode 172

lundi 2 septembre 2024Duration 29:47

Send us a text

What if AI could be your company's best asset—and its biggest risk? Join me, Sean Gerber, on this enlightening episode of the CISSP Cyber Training Podcast, where we journey through the essentials of cybersecurity with a particular focus on media protection techniques from Domain 7.5 of the CISSP ISC² training manual. We’ll also navigate the secure-by-design principles crucial in the age of artificial intelligence. With AI transforming large enterprises, I’ll share eye-opening statistics on its adoption and delve into the risks it brings, such as cloud misconfigurations leading to severe breaches. Plus, we’ll discuss the alarming rise of deepfake scams with a real-world example that shook a UK energy firm to its core.

Ever wondered how to choose the best data encryption method for your needs? This episode has got you covered! We’ll discuss various encryption techniques like AES, RSA, and ECC, and why it's essential to select the right one based on media type. Trust me, understanding key management and rotation is vital for maintaining data integrity, especially when dealing with cloud storage and third-party providers. I’ll also walk you through secure erasure methods, from the DOD 5220.22-M standard to physical destruction techniques like shredding and degaussing, ensuring your data truly becomes irretrievable.

Lastly, don’t miss our deep dive into mobile device protection. I’ll highlight the critical software and physical security measures necessary to defend your devices against threats, emphasizing the importance of regular updates and robust antivirus solutions. We’ll explore strategies for data encryption, backup, and recovery, and clarify the differences between MTBF and MTTF and their relevance to your systems. Wrapping up with the environmental factors affecting device usage and data management, this episode is packed with actionable insights to elevate your cybersecurity game. Tune in now to arm yourself with the knowledge necessary to protect your digital world!

Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

CCT 163: Practice CISSP Questions - Data Roles and Regulations, Security Responsibilities (Domain 2)

jeudi 1 août 2024Duration 16:17

Send us a text

Are you ready to ace your CISSP exam and propel your cybersecurity career to new heights? This episode of the CISSP Cyber Training Podcast promises to equip you with critical insights on data roles and regulations. From demystifying the responsibilities of data processors under GDPR to unpacking the PCI DSS framework essential for the financial sector, we leave no stone unturned. We'll also clarify the distinctions between asset owners and data owners, and explain who holds accountability for data classification under HIPAA. Plus, you'll get the lowdown on COPPA guidelines for protecting children's data and the intricacies of Singapore's PDPA regulation.

But that's not all! Our deep dive into Security Roles and Responsibilities will provide clarity on the essential positions within the cybersecurity realm. Learn how administrators tackle system hardware and software, why data owners hold paramount accountability, and the specialized skills data custodians bring to the table. We also emphasize the significance of business and mission owners understanding SOX compliance, and the pivotal role of administrators in controlling access rights to data. To top it off, we offer career-boosting strategies—from enhancing resumes to negotiating contracts—designed to elevate your cybersecurity career to unparalleled heights. Don't miss this chance to gain knowledge and skills that will set you apart in this dynamic industry!

Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

CCT 073: CISSP Practice Test Questions - Cloud Essentials (Domain 4)

Season 1 · Episode 73

jeudi 21 septembre 2023Duration 18:24

Send us a text

Have you ever wondered what it takes to crack the CISSP exam? Dreamt of enhancing your cybersecurity expertise? Welcome to an action-packed episode that pulls back the curtain on your path to success. With a focus on CISSP questions and key testing strategies, this episode aims to make you a proficient test taker. We dig into intriguing topics like hypervisor technology, the CIA triad, encryption types, and the main role of CASBs. To spice things up, we also throw in the main security concern that plagues the utilization of cloud technology.

Now, let's journey through the vast realm of Cloud Computing. Understanding this is paramount for acing the CISSP exam, and we're here to guide you every step of the way. To make this journey exciting, we've lined up an array of CISSP questions that will help you grasp concepts like container orchestration platforms, the essence of elasticity and resource pooling, and the IAA model's intricacies. We also delve into data integrity within a SAS model, the phenomenon of cloud bursting, and the trials of managing cloud environments. So, buckle up as we navigate through this maze of knowledge, ensuring you're well-equipped to not just pass the CISSP exam but truly master it.

Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

CCT 072: A Comprehensive Exploration of CISSP's Cloud Security (Domain 4.3)

Season 1 · Episode 72

lundi 18 septembre 2023Duration 40:52

Send us a text

Eager to demystify the cloud environment and its cost-effectiveness compared to an on-premise setup? Well, gear up, because today, we're taking you on an enlightening journey through the world of cloud networking. We will be tackling everything from cloud security and its various models to the critical role of cloud security posture management (CSPM) in AWS deployment. So, whether you're a budding IT professional or an established one looking to enhance your CISSP knowledge and expertise, this episode has something for you.

Ever wondered how security groups, network ACLs, platform as a service, and software as a service work in tandem to uphold cloud security? Or perhaps, you've been intrigued by the utilization of VLANs and traffic shaping for prioritization and quality of service. Well, curiosity ends here as we uncover these topics and more. And we'll also be spilling the beans on cloud access security brokers (CASBs), the pros of data loss prevention, tokenization, and the different types of cloud storage. Rest assured, by the end of the conversation, your understanding of cloud storage technologies and security will be second to none. 

In the grand finale of the episode, we unravel the secrets of cloud connectivity and the costs associated with it. We'll enlighten you on the importance of service endpoints, routing tables, and DNS resolution. Plus, we'll share a real-world use case of a public service endpoint. And of course, we touch upon the role of CSPM in maintaining a secure AWS deployment. So, buckle up and get ready to be armed with the knowledge and expertise that can take your CISSP skills to the next level.

Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

CCT 071: Practice CISSP Questions - Decoding Security Models (CISSP Domain 3)

Season 1 · Episode 71

jeudi 14 septembre 2023Duration 15:57

Send us a text

Ever wonder how safe your passwords really are? Brace yourself as we unravel the shocking details of the LastPass breach from August 2020, where countless customer credentials were stolen. We'll expose the vulnerabilities that allowed this to happen and advise on the necessary steps to preserve your digital security. You'll gain insights into reliable security measures, like the Harrison-Ruzel-Ohlmann model and Trusted Computing Base, and grasp how they can prevent data degradation. 

Prepare to step into the intriguing world of unauthorized information flows. Our discussion aims to spotlight these silent threats and arm you with the knowledge to prevent them. We'll navigate through the complex maze of the Bell Laploula, BIBA, HRU, and Noninterference models, helping you understand their role in securing information. And if you're studying for the CISSP exam, you'll find our coverage of 20 questions on these topics an invaluable resource. Don't forget to check out CISSPcybertraining.com for more free CISSP questions, videos, and audio files. Join us for an episode that is more than just a conversation - it's a comprehensive guide to cybersecurity.

Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

CCT 070: Decoding Security Models: A Deep Dive into CISSP's Domain 3 Essentials (D3.2)

Season 1 · Episode 70

lundi 11 septembre 2023Duration 31:08

Send us a text

Bold Statement: "Your company's security depends on more than just your own vigilance. It also hinges heavily on third parties. In today's episode, we tackle that reality head-on, using a case study of a Windows 7 PC from a high-security fencing company that was hacked to infiltrate sensitive military and research sites. This real-life example serves as a stark reminder of the need for constant assessment and monitoring of third parties to safeguard your firm. Additionally, we shed light on the trusted computing base and its key components like the system kernel and hardware, the security kernel, and mandatory access controls, which are all essential in fortifying your environment against threats.

Tantalizing Teaser: "Trust us, you won't want to miss our deep-dive into trusted computing for data integrity and security. We lay bare the distinctions between TPM and HSM and illustrate how the trusted computing base (TCB) can be harnessed to craft a robust multi-level security system. We also illuminate the TCB's applications for financial systems, device identification and verification, and the Internet of Things. Towards the end, we unravel the HRU Model for Access Control, breaking down its components, outlining its practical applications, and discussing its limitations. This episode is designed to demystify complex cybersecurity concepts, so tune in and prepare to ace the CISSP exam.

Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

CCT 069: Practice CISSP Questions - Data Collection, Location, and Destruction (D2.4)

Season 1 · Episode 69

jeudi 7 septembre 2023Duration 18:18

Send us a text

Imagine a world where a simple radio command halts an entire railway system. That's exactly what happened in Poland recently, and we're here to break down the intricate details of this cyber-attack. We'll reveal how the Polish radio stop command system was exploited, unraveling the mystery behind this major disruption. From there, we'll navigate the tricky waters of personal identifiable information (PII), data destruction, and data sovereignty, arming you with insights and strategies to protect your data. Ready to ace your CISSP exam? We've got your back with a series of exam-style questions and discussions around critical topics like data encryption and degausing a tape.

Switching gears, we'll venture into the realm of CCPA Compliance and data security. If you've been wondering how to determine the scope of consumer data, or puzzled over the features of GDPR, fret no more as we demystify these concepts. And let's not forget about the importance of secure data transmission, especially when dealing with financial data. We dive into the best practices for transmitting sensitive data, address API security, and explore secure data destruction methods. To cap off the episode, we'll tackle data scraping and the perils of unauthorized data collection. So, buckle up for an exhilarating ride through the landscape of cybersecurity!

Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

CCT 068: CISSP Insights on Data Collection, Location, and Destruction (D2.4)

Season 1 · Episode 68

lundi 4 septembre 2023Duration 43:10

Send us a text

Ready to decode the mystery of AI in digital forensics? I'm your host, Sean Gerber, and in this stimulating conversation, we're peeling back the layers on how AI is revolutionizing the digital forensics landscape. From automating log analysis and malware detection to reshaping image and video analysis, we're talking about it all. So, buckle up as we navigate the potential legal implications of this rapid technological evolution.

Dive deeper into the tangled web of data protection and classification in the second part of this riveting episode. We'll guide you through the labyrinth of laws, such as Sarbanes Oxley and PCI DSS, that govern personal identifiable information (PII), intellectual property (IP), financial data, and health records. Learn the ropes of securing your data via encryption, access controls, and periodic audits. Let's get ready to demystify the laws and methods that protect your digital footprint.

Finally, prepare to be fascinated as we explore the complexities of health data storage, compliance requirements, data mapping, and destruction methods. We'll shine a light on regulations like SEC, FFIEC, NERC and how they relate to the CISP exam. We'll also discuss data sovereignty, jurisdictional risks and the pros and cons of physical data centers versus cloud storage. We're arming you with knowledge to navigate the increasingly complex world of data destruction, from physical methods to electronic ones like secure race and cryptographic shredding. Now, let's set sail on this voyage of cyber discovery!

Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

CCT 067: Practice CISSP Questions - Cybersecurity Governance (Domain 1.3)

Season 1 · Episode 67

jeudi 31 août 2023Duration 18:30

Send us a text

Take a journey into the heart of cybersecurity with us as we unravel Gmail's latest recommendation for multi-factor authentication. Can you guess the three key aspects they propose for heightened security? Stay tuned as we also tackle a pertinent CISSP question on security governance, illuminating the primary purpose of an organization's security governance program. Learn how a balanced scorecard can effortlessly align security controls with business goals, pivotal to any security governance strategy.

Ever wondered about the fundamental principles of security frameworks like SABSA and COVID? We've got you covered. Hear interesting insights about the COSO framework and its prime focus, along with a deep dive into the Risk Matrix Framework (RMF). We also present an intriguing scenario where a financial giant's CEO pushes for rapid technology adoption. Plus, get a dose of reality about the critical importance of investing in cybersecurity training and the potential costs involved. Before we wrap up, we emphasize the value of a robust cybersecurity plan. So, are you ready to fortify your cybersecurity knowledge?

Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!


Related Shows Based on Content Similarities

Discover shows related to CISSP Cyber Training Podcast - CISSP Training Program, based on actual content similarities. Explore podcasts with similar topics, themes, and formats, backed by real data.
UI Breakfast: UI/UX Design and Product Strategy
Les Cast Codeurs Podcast
Accidental Tech Podcast
Data Engineering Podcast
The Backend Engineering Show with Hussein Nasser
Accidental Tech Podcast
© My Podcast Data