All Episodes

Displaying 1 - 20 of 64 in total

Episode 1 — Decode the ISC2 CC CAT Exam: Structure, Scoring, Policies, Tactics

This episode explains how the ISC2 Certified in Cybersecurity (CC) exam is delivered as a computer-adaptive test (CAT), what that means for question selection, and how...

Episode 2 — Build a Spoken Study Plan That Matches the Official CC Objectives

This episode turns the CC objectives into a realistic, audio-friendly study plan that prioritizes comprehension, repetition, and exam-relevant recall instead of passiv...

Episode 3 — Exam-Day Execution Without Panic: Time, Guessing, and CAT Decision Rules

This episode focuses on an exam-day operating model you can run in your head: manage time, handle uncertainty, and make consistent decisions under pressure. You will l...

Episode 4 — Master Confidentiality: Prevent Data Exposure Through Practical Security Thinking

This episode builds a clear, exam-ready understanding of confidentiality as the goal of preventing unauthorized disclosure of information. You will learn how confident...

Episode 6 — Safeguard Availability: Keep Systems Reliable Through Disruptions and Failures

This episode covers availability as the security goal of keeping systems and data accessible to authorized users when needed, even during failures, attacks, or unexpec...

Episode 7 — Choose Authentication Methods Wisely: Factors, Strengths, and Common Mistakes

This episode explains authentication as the process of proving identity, and it prepares you to recognize common authentication methods and their strengths and weaknes...

Episode 8 — Make MFA Make Sense: When to Require It and How It Fails

This episode focuses on multi-factor authentication (MFA) and why it is a high-value control for reducing account takeover risk, a concept that shows up frequently in ...

Episode 9 — Non-Repudiation Explained Clearly: Proof, Accountability, and Digital Assurance

This episode explains non-repudiation as the ability to prove that a specific action occurred and that a specific party performed it, which supports accountability and...

Episode 10 — Understand Privacy as a Security Concept: Data Use, Consent, and Minimization

This episode frames privacy as a core security-adjacent concept focused on appropriate collection, use, sharing, and protection of personal data, which the CC exam exp...

Episode 11 — Set Risk Priorities That Match the Business Mission and Real Constraints

This episode explains how risk prioritization works in a practical security program, and why the CC exam expects you to connect technical issues to business impact ins...

Episode 12 — Define Risk Tolerance Clearly: What the Organization Will Live With

This episode focuses on risk tolerance, which is the boundary an organization sets for how much risk it is willing to accept to achieve its goals, and it is a frequent...

Episode 13 — Identify Risk Inputs: Assets, Threats, Vulnerabilities, and Exposure Pathways

This episode builds the core vocabulary of risk by teaching you how to identify the inputs that create risk, which is essential for answering CC questions that describ...

Episode 14 — Assess Risk Properly: Likelihood, Impact, and Meaningful Risk Statements

This episode teaches you how to assess risk in a way that produces a meaningful risk statement, which is what security teams use to communicate clearly and what the CC...

Episode 15 — Treat Risk Confidently: Avoid, Mitigate, Transfer, or Accept With Rationale

This episode explains the four classic risk treatment options—avoid, mitigate, transfer, and accept—and prepares you to choose the best response when an exam question ...

Episode 16 — Apply Technical Controls That Reduce Risk Without Breaking Operations

This episode focuses on technical controls and how they are used to reduce risk in practical, testable ways that show up in the CC objectives. You will learn how contr...

Episode 17 — Use Administrative Controls Well: Policies, Process Discipline, and Human Factors

This episode explains administrative controls, which are the governance and process mechanisms that shape behavior and reduce risk, and they are critical for CC becaus...

Episode 18 — Strengthen Physical Controls: Layers, Barriers, and Practical Deterrence Strategies

This episode covers physical controls, which protect facilities, equipment, and people from unauthorized access, theft, and environmental hazards, a topic the CC exam ...

Episode 19 — Operationalize the ISC2 Code of Ethics Under Real Workplace Pressure

This episode explains how the ISC2 Code of Ethics guides professional behavior, and why the CC exam expects you to recognize ethical responsibilities as part of being ...

Episode 20 — Turn Governance Into Action: Policies, Procedures, and Standards That Stick

This episode focuses on governance as the structure that makes security consistent, measurable, and aligned with business goals, which is a recurring theme in the CC o...

Episode 21 — Navigate Regulations and Laws: What Compliance Demands From Security Work

This episode explains how laws and regulations influence security requirements, and it prepares you for CC questions that test your ability to recognize compliance dri...

Broadcast by