All Episodes

Displaying 41 - 60 of 71 in total

Episode 31 — Reduce Data Risk: Classification, Encryption, Retention, and Exfiltration Signals (Task 4)

This episode explains how to reduce data risk by combining governance decisions with practical controls that influence exposure and detection. You will learn how class...

Episode 30 — Control Cloud Technology Risk: Identity Mistakes, Misconfigurations, and Shared Duties (Task 2)

This episode focuses on cloud technology risk where the most damaging incidents often come from identity mistakes and misconfigurations rather than advanced exploits. ...

Episode 29 — Spot Application Risk Early: Insecure Design, Misconfigurations, and Input Abuse (Task 2)

This episode explains application risk as a combination of design choices, configuration reality, and how attackers manipulate inputs to bypass intent. You will learn ...

Episode 28 — Use Cybersecurity Models to Think Clearly: Defense Layers and Zero Trust (Task 4)

This episode teaches how to use cybersecurity models as thinking tools that improve decision-making in both exam scenarios and real incidents. You will learn how layer...

Episode 27 — Clarify Roles and Responsibilities: SOC, IT, Legal, and Business Alignment (Task 20)

This episode explains role clarity as a core operational control, because unclear responsibilities create delays, evidence gaps, and inconsistent decisions during inci...

Episode 26 — Risk Management Deep Dive: Appetite, Registers, Exceptions, and Risk Communication (Task 4)

This episode deepens risk management by focusing on how risk decisions are documented, communicated, and sustained when real-world constraints force tradeoffs. You wil...

Episode 25 — Risk Management Foundations: Identify, Assess, Treat, and Monitor Risk (Task 4)

This episode builds the risk management foundation that underpins many CCOA questions, especially those involving prioritization, control selection, and communication ...

Episode 24 — Governance in Practice: Decision Rights, Policy Hierarchies, and Accountability (Task 21)

This episode explains governance as the system that decides who can approve risk, who owns controls, and how policy becomes consistent action across the organization. ...

Episode 23 — Define Cybersecurity Objectives That Truly Support Business Outcomes (Task 19)

This episode teaches how to define cybersecurity objectives that align with business outcomes, because exam scenarios often require prioritization decisions that balan...

Episode 22 — Navigate Compliance Realities: Regulations, Controls Evidence, and Audit-Ready Operations (Task 21)

This episode explains compliance as a practical operating reality, where the real challenge is producing credible evidence that controls exist, work, and are maintaine...

Episode 21 — Spaced Retrieval Review: Technology Essentials Across Networks, Systems, and Applications (Task 18)

This episode consolidates technology essentials into an integrated review that strengthens recall by connecting concepts across networks, operating systems, and applic...

Episode 20 — Scripting and Coding for Analysts: Read, Tweak, and Automate Repeatable Checks (Task 6)

This episode explains scripting and coding as an analyst skill for repeatability, accuracy, and speed, not as a requirement to become a software engineer. You will lea...

Episode 19 — Cloud Applications Explained: Shared Responsibility, Identity Boundaries, and Visibility Gaps (Task 2)

This episode explains cloud applications using the shared responsibility model so you can correctly assign accountability for controls, evidence, and incident response...

Episode 18 — Harden Automated Deployment Thinking: CI/CD Risks, Secrets, and Supply Chains (Task 2)

This episode explains why automated deployment pipelines are both a productivity advantage and a high-impact attack surface, especially when secrets and third-party de...

Episode 17 — API Basics for Security Analysts: Requests, Authentication, and Common Failures (Task 2)

This episode teaches API basics in security terms so you can evaluate risk, investigate incidents, and answer exam questions that assume modern application architectur...

Episode 16 — Operating Systems Essentials: Permissions, Services, Memory, and Persistence Paths (Task 2)

This episode reviews operating system essentials with a defender’s perspective, emphasizing the concepts most likely to appear in questions about access control, malwa...

Episode 15 — Make Middleware Make Sense: Queues, App Servers, APIs, and Hidden Trust (Task 2)

This episode clarifies middleware components that often become invisible trust zones in modern applications, creating security gaps when they are not explicitly monito...

Episode 14 — Containerization and Virtualization Demystified: Isolation, Images, and Escape Risks (Task 2)

This episode explains containers and virtualization in security terms, focusing on how isolation works, where it fails, and what evidence proves controls are correctly...

Episode 13 — Command Line for Triage: Fast Evidence Collection Without Breaking Systems (Task 10)

This episode focuses on triage behavior at the command line, where speed matters but evidence quality and system stability must not be sacrificed. You will learn what ...

Episode 12 — Command Line Fundamentals: Navigate Systems, Inspect Processes, and Read Logs (Task 10)

This episode builds command line fundamentals as a practical skill set for incident response, triage, and verification tasks commonly tested by the exam. You will lear...

Broadcast by