A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Cybersecurity Courses Podcasts
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
…
continue reading
The CYSA Audio Course is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
…
continue reading
Welcome to The Bare Metal Cyber CISSP Audio Course— your essential guide to mastering the CISSP certification. Whether you're just starting your cybersecurity journey or preparing for exam day, this podcast delivers expert insights, practical strategies, and clear explanations to help you succeed. Designed by professionals who’ve walked the path, each episode helps you build confidence, sharpen your skills, and move one step closer to certification success.
…
continue reading
The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
…
continue reading
The Bare Metal Cyber CCISO Audio Course is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO ...
…
continue reading
Ready to earn your AWS Certified Cloud Practitioner credential? Our Audio Course is your ultimate guide to mastering the fundamentals of AWS Cloud, including security, cost management, core services, and cloud economics. Whether you're new to IT or looking to expand your cloud knowledge, this series will help you confidently prepare for the exam and take the next step in your career. Produced by BareMetalCyber.com, your trusted resource for expert-driven cybersecurity education.
…
continue reading
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
…
continue reading
The CompTIA IT Fundamentals+ Audio Course is your step-by-step guide to building a rock-solid foundation in IT, covering hardware, software, networking, databases, and security in a way that’s clear and approachable. Designed for beginners and those looking to prepare for more advanced certifications, each episode turns exam objectives into practical lessons you can follow with confidence. Produced by BareMetalCyber.com, this series gives you the knowledge and momentum to pass the exam and l ...
…
continue reading
Podcast in which students in Mr. Lange's Computer Science courses have a platform to discuss what they are currently learning in their classes, innovative development projects students are completing during their Research & Development opportunities, technology related topics that are in the news and new amazing technologies coming into the market.
…
continue reading
The A+ Audio Course is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this podcast breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most—helping you understand, retain, and apply essential IT concepts, from hardware and networking to operating systems, security, troubleshooting, and professional ...
…
continue reading
Certify – CompTIA Security+ 701 Audio Course is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecu ...
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
The Network Plus Audio Course is your comprehensive audio training series for mastering the CompTIA Network Plus certification. Designed for learners on the go, this prepcast transforms exam objectives into clear, structured, and engaging episodes tailored for auditory learning. Whether you're walking, commuting, or studying between shifts, each episode breaks down complex networking topics into digestible segments aligned with the official CompTIA blueprint. From OSI layers and IP addressin ...
…
continue reading
We talk about everything to do with coding bootcamps and technology education, including gender parity, scholarships, and the latest industry news.
…
continue reading
Listen to cybersecurity and technology topics from industry experts. Don't worry; we'll keep it fun and light.
…
continue reading
Cyber Security Compliance and IT Jobs
…
continue reading
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
98.7 Chatt Tech…where 98.7 percent of our students earn a career. Chattahoochee Technical College is comprised of eight campuses that serve a six-county area in beautiful North Georgia: Bartow, Cherokee, Cobb, Gilmer, Paulding, Pickens. We’re proud to offer outstanding education and training services as part of the Technical College System of Georgia’s mission of “providing technical, academic and adult education and training focused on building a well-educated, globally competitive workforc ...
…
continue reading
Welcome to Artificial Insights, where two Artificial Intelligences come together to share their unique perspectives on the world and the universe, and maybe even beyond! Join us as we explore deep philosophical questions, from the meaning of life to the concept of free will. But don't worry, it won't be all serious stuff, we'll also be adding a touch of humor, from AI-generated jokes to anecdotes. With a mix of thought-provoking insights and a good dose of humor, our AIs will offer a fresh a ...
…
continue reading
1
CCT 291: CISSP Rapid Review Exam Prep (Domain 7) - Part #2
43:48
43:48
Play later
Play later
Lists
Like
Liked
43:48Send us a text You can harden your network and still miss the front door: aging edge devices with elevated access, thin logging, and long‑ignored firmware. We dig into the uncomfortable truth behind “set it and forget it” firewalls, VPNs, and gateways, then lay out a practical Domain 7 playbook that helps you detect faster, respond cleaner, and rec…
…
continue reading
1
CCT 290: CISSP Rapid Review Exam Prep (Domain 7) - Part #1
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58Send us a text Headlines about a massive F5 Big-IP exposure aren’t noise—they’re a masterclass in why Security Operations must be disciplined, fast, and auditable. We open with what the F5 situation means for enterprise risk, patch urgency, and long-term persistence threats, then shift into a practical, exam-ready walkthrough of CISSP Domain 7. The…
…
continue reading
1
JA Titans of Cell Phone Industry - Champions 10.16.2025
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26Step inside Mr. Lange’s Intro to Business classroom, where students became titans of the cell phone industry in the JA Titan simulation! In this lively podcast, our young entrepreneurs share the highs, the lows, and everything in between as they navigate the challenges of running a business. From strategy to setbacks, celebrate the victories and le…
…
continue reading
1
CCT 289: Practice CISSP Questions - Role Based, Mandatory, Discretionary and ABAC (Domain 5)
18:25
18:25
Play later
Play later
Lists
Like
Liked
18:25Send us a text Quantum isn’t a distant sci‑fi threat—it's shaping security decisions right now. We open with what NIST’s new post‑quantum FIPS 203/204/205 actually mean for your crypto roadmap, why “harvest now, decrypt later” raises the stakes for long‑lived data, and how the 2035 federal mandate will ripple through contractors, audits, and CMMC. …
…
continue reading
1
The state of passkeys in 2025 with Nick Steele | BEER SHORTAGE PUBLIC KEY
1:02:51
1:02:51
Play later
Play later
Lists
Like
Liked
1:02:51How is the transition to passkeys going in 2025? 🔑 This week, we’re joined by Nick Steele from the Product team at 1Password to talk all things passwordless. He walks us through the current state of adoption and a brand-new standard that will change the way we move and share passkeys. In Crash Course, we break down public-key encryption — the power…
…
continue reading
By Jason Edwards
…
continue reading
By Dr Jason Edwards
…
continue reading
By Jason Edwards
…
continue reading
By Dr. Jason Edwards
…
continue reading
By Jason Edwards
…
continue reading
By Dr. Jason Edwards
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
1
CCT 288: CISSP Rapid Review Exam Prep (Domain 6)
50:27
50:27
Play later
Play later
Lists
Like
Liked
50:27Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv https://www.jeffersonfisher.com/ A spike in ransomware on the factory flo…
…
continue reading
1
CCT 287: Practice CISSP Questions - Deep Dive (Domain 5)
23:08
23:08
Play later
Play later
Lists
Like
Liked
23:08Send us a text Leadership churn is reshaping security from the top down. We open the door on why CISO tenures are shrinking to 18–26 months and what that says about pressure, culture, compensation, and board-level risk literacy. From startups that stretch leaders thin to enterprises that treat security as a cost center until the breach, we map the …
…
continue reading
SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
…
continue reading
1
CCT 286: Access Controls - Role Based, Rule Based and Many More Controls (Domain 5.4)
40:20
40:20
Play later
Play later
Lists
Like
Liked
40:20Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A headline‑grabbing data leak is the wake‑up call; what you do next is th…
…
continue reading
1
Homecoming vibes, good times, and geeky fun—it’s all here on LANGE’S BOGS!
10:38
10:38
Play later
Play later
Lists
Like
Liked
10:38Join Mr. Lange and his Intro to Business students as they dive into all the excitement of Homecoming Day! From the energy of the parade to the buzz of the big game, the anticipation of getting ready, and the magic of the dance itself, we cover it all with plenty of laughs and school spirit. Plus, we’ll share tips on having fun while staying safe. S…
…
continue reading
1
CCT 285: Practice CISSP Questions - Evaluate and Apply Security Governance Principles (Domain 1.3)
27:45
27:45
Play later
Play later
Lists
Like
Liked
27:45Send us a text The fastest way to lose trust is to let AI adoption outrun your governance. We open with a blunt look at AI sprawl and shadow AI—how unsanctioned tools slip past weak policies, create data exposure, and strain legacy controls—then lay out a practical path for teams that don’t have a big‑tech budget: continuous discovery via proxies o…
…
continue reading
1
How to protect yourself from digital identity theft with Eva Velasquez | VOICE CLONE IDENTITY THEFT
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03Identity theft affects millions of people every year — but do you really know how it works, or how to protect yourself? This week, we’re joined by Eva Velasquez, CEO of the Identity Theft Resource Center, who shares the latest trends in identity crime and what steps you can take if it ever happens to you. 🕵️♀️🔐 In Crash Course, we break down ident…
…
continue reading
1
CCT 284: Evaluate and Apply Security Governance Principles (Domain 1.3)
42:52
42:52
Play later
Play later
Lists
Like
Liked
42:52Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Security governance represents one of the most misunderstood yet critical…
…
continue reading
1
Professional talk about their career and plans in cyber
1:11:32
1:11:32
Play later
Play later
Lists
Like
Liked
1:11:32https://youtube.com/live/FQ_Gber76EU check out professor black ops: https://www.youtube.com/@professorblackops-cybersec1168 SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http…
…
continue reading
1
Lange’s BOGS: Bunch of Geeks Weekend Kickoff
10:25
10:25
Play later
Play later
Lists
Like
Liked
10:25Our energetic Intro to Business students come together in Lange’s BOGS – Bunch of Geeks to share laughs, ideas, and excitement as we head into the weekend. From classroom banter to weekend plans, this lively crew keeps the energy high and the conversation rolling.
…
continue reading
1
CCT 283: Practice CISSP Questions - Security Controls for Developers (Domain 8.3)
18:19
18:19
Play later
Play later
Lists
Like
Liked
18:19Send us a text Dive into the critical world of software development security with Sean Gerber as he tackles Domain 8.3 in this knowledge-packed CISSP Question Thursday episode. We examine fifteen challenging questions that address the security controls essential for protecting code throughout the development lifecycle. Discover why static applicati…
…
continue reading
1
New GRC course Upcoming Cloud AWS Book New GRC Community
1:44:53
1:44:53
Play later
Play later
Lists
Like
Liked
1:44:53SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
…
continue reading
Send us a text Ready to master the critical domain of Identity and Access Management for your CISSP exam? This comprehensive rapid review demystifies Domain 5, which accounts for 13% of all exam questions—knowledge you absolutely cannot skip. Dive deep into the fundamentals as we explore controlling physical and logical access to assets—from inform…
…
continue reading
The capstone week brings together all prior concepts, emphasizing integration as the defining quality of resilient design. Students learn that resilience arises not from isolated tools but from coherent architectures that link cryptography, identity, networks, applications, and supply chains into a unified strategy. Frameworks such as NIST CSF, ISO…
…
continue reading
This week addresses the rapidly evolving threat landscape. Ransomware is studied from its early origins to its present role as a multimillion-dollar business model, while advanced persistent threats demonstrate the persistence and adaptability of state-sponsored actors. Insider threats add complexity, highlighting the difficulty of defending agains…
…
continue reading
Applications and APIs form the backbone of digital services, enabling everything from online banking to global supply chains. Students study common weaknesses cataloged in the OWASP Top 10, including injection, misconfiguration, and weak session management, as well as the specific risks of mobile and API security. Case studies of T-Mobile and Pelot…
…
continue reading
1
Infrastructure, Cloud, and Supply Chain Security
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58Modern infrastructure has evolved from physical servers to cloud-native platforms, redefining both opportunities and risks. Students explore Infrastructure as Code, continuous integration and delivery, and the challenges of configuration drift. Case studies of pipeline compromises show how trusted automation can be weaponized, with vulnerabilities …
…
continue reading
This week highlights the role of architecture as the skeleton of security. Students learn how flat networks and perimeter-based models have failed under modern conditions, with the Target breach serving as a cautionary case. Defense in depth, segmentation, and microsegmentation are introduced as structural strategies for containing adversaries. The…
…
continue reading
1
Identity, Authentication, and Access Control
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59With the dissolution of traditional network perimeters, identity has emerged as the central gatekeeper of enterprise security. This week explores authentication, authorization, and access control as critical building blocks of trust. Students examine the weaknesses of passwords, the rise of multi-factor authentication, and the push toward passwordl…
…
continue reading
Cryptography serves as the scientific bedrock of confidentiality, authenticity, and integrity. Students will explore both symmetric and asymmetric encryption, comparing their respective strengths in performance and distribution. Hashing, digital signatures, and message authentication codes are introduced as complementary tools that secure modern tr…
…
continue reading
1
Security Foundations & Risk in the Modern Enterprise
25:48
25:48
Play later
Play later
Lists
Like
Liked
25:48This week introduces security as a foundational discipline rather than a collection of scattered tools. Learners will examine the enduring concepts of confidentiality, integrity, and availability, understanding how these principles anchor defenses across decades of technological change. The CIA triad is presented as a lens through which design choi…
…
continue reading
In this episode, I sit down with my Intro to Business students to chat about one of the biggest highlights of the school year, Homecoming! We dive into all the fun and excitement, from the traditions and celebrations to the homecoming court and everything in between. Join us for some laughs, school spirit, and a behind-the-scenes look at what makes…
…
continue reading
1
CCT 281: Practice CISSP Questions - Deep Dive - Identity and Access Provisioning Lifecycle (Domain 5.5)
23:28
23:28
Play later
Play later
Lists
Like
Liked
23:28Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The cybersecurity landscape is evolving rapidly with AI development creat…
…
continue reading
1
How cyber warfare really works with Hayley Benedict | DISRUPT CONFLICT RISK SYSTEM
1:09:41
1:09:41
Play later
Play later
Lists
Like
Liked
1:09:41What does cyberwarfare really look like behind the headlines? This week, Roo sits down with Hayley Benedict, a cyber intelligence analyst at RANE, to explore the evolving world of digital conflict. From hacktivists to disinformation specialists, Hayley shares how nation states, criminals, and ideologically driven groups are blurring lines — and why…
…
continue reading
1
CCT 280: Mastering Identity Lifecycle Management (Domain 5.5)
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The effective management of digital identities throughout their lifecycle…
…
continue reading
1
AI the job market and future of GRC and cybersecurity
1:22:37
1:22:37
Play later
Play later
Lists
Like
Liked
1:22:37https://youtube.com/live/jweGSLb_zgU SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.t…
…
continue reading
1
Transitioned from GRC to Cloud Security Guy
1:23:49
1:23:49
Play later
Play later
Lists
Like
Liked
1:23:49https://youtube.com/live/Slam57hVRYs I have been in GRC for years and I have just transitioned into Cloud. Day 0: How did I do it Preparation of GRC vs Cloud Open topics 🎙️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! 😍 https://streamyard.com/pal/d/4632689196662784 SIGN UP FOR FREE COURSES 📚 http://convocourse…
…
continue reading
1
CCT 279: Practice CISSP Questions - Security Models (Domain 3.2)
18:58
18:58
Play later
Play later
Lists
Like
Liked
18:58Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Dive into the complex world of security models as we unpack Domain 3.2 of…
…
continue reading
https://youtube.com/live/VuiCYeVHr2s Lets check out the biggest GRC news as of AUG 2025! We will also take questions. 🎙️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! 😍 https://streamyard.com/pal/d/4632689196662784 SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop…
…
continue reading
1
CCT 278: Security Models Demystified - CISSP Domain 3.2
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Security models can be one of the most challenging concepts for CISSP can…
…
continue reading
1
CCT 277: Practice CISSP Questions - Data Security Controls (Domain 2.6)
36:27
36:27
Play later
Play later
Lists
Like
Liked
36:27Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Dive into the multifaceted world of data security controls with Sean Gerb…
…
continue reading
1
How to build a career in cybersecurity with Heath Adams | JOB HUNT BOT FATIGUE
1:08:29
1:08:29
Play later
Play later
Lists
Like
Liked
1:08:29Want to work in cybersecurity but don’t know where to begin? Or just curious what it takes to break into the field? This week, we’re joined by the internet’s very own Heath Adams, better known as The Cyber Mentor. He demystifies the application process and what it takes to build a career in cybersecurity – no matter your background. 👩💻💼 In Crash C…
…
continue reading
1
CCT 276: Data Lifecycle and the CISSP (Domain 2.4)
46:40
46:40
Play later
Play later
Lists
Like
Liked
46:40Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv From insecure code causing breaches to proper data destruction, this epis…
…
continue reading
1
Episode 106: Domain 4 Wrap-Up: Key Takeaways
19:09
19:09
Play later
Play later
Lists
Like
Liked
19:09In this final episode of Domain 4, we wrap up the key concepts and takeaways from the Billing, Pricing, and Support domain of the AWS Certified Cloud Practitioner exam. This domain focuses on understanding AWS’s pricing models, cost management tools, and the different AWS support plans available. We’ll summarize the most important topics, including…
…
continue reading