All Episodes
Displaying 21 - 40 of 64 in total
Episode 22 — Business Continuity Purpose: Keep Critical Work Going During Disruption
This episode introduces business continuity as the discipline of keeping essential business functions operating during disruptive events, which is foundational knowled...
Episode 23 — Business Continuity Importance: Downtime Costs, Priorities, and Stakeholder Trust
This episode explains why business continuity matters, focusing on the real costs of downtime and the broader impacts that reach beyond IT into revenue, safety, legal ...
Episode 24 — Business Continuity Components: Roles, Dependencies, Plans, and Testing Cadence
This episode breaks down the core components of a business continuity program and prepares you to answer CC questions that ask what a continuity plan must include to b...
Episode 25 — Disaster Recovery Purpose: Restore IT Services Fast and Validate the Return
This episode introduces disaster recovery as the focused effort to restore IT systems and data after an outage or major disruption, and it clarifies how disaster recov...
Episode 26 — Disaster Recovery Importance: RTO, RPO, and Tradeoffs You Must Understand
This episode explains why disaster recovery planning is essential, focusing on how RTO and RPO translate into real business tradeoffs and investment decisions that sec...
Episode 27 — Disaster Recovery Components: Backups, Failover, Runbooks, and Recovery Checks
This episode covers the building blocks of a workable disaster recovery capability, including backups, replication, failover planning, documented runbooks, and validat...
Episode 28 — Incident Response Purpose: Contain Damage and Restore Normal Operations
This episode introduces incident response as the structured approach for handling security events so the organization can limit damage, preserve evidence, and recover ...
Episode 29 — Incident Response Importance: Speed, Evidence, and Communication Under Stress
This episode explains why incident response is important, emphasizing the time-sensitive nature of attacks and the need for disciplined decisions when pressure is high...
Episode 30 — Incident Response Components: Prepare, Detect, Contain, Eradicate, Recover
This episode walks through the major components of incident response, showing how preparation, detection, containment, eradication, and recovery fit together as a repe...
Episode 31 — Physical Access Controls: Badges, Gate Entry, and Environmental Design Basics
This episode explains physical access controls and how they reduce risk by limiting who can enter facilities and restricted areas, a foundational topic for the CC exam...
Episode 32 — Monitoring Physical Security: Guards, CCTV, Alarms, and Logs That Matter
This episode focuses on physical security monitoring and how detection mechanisms support deterrence, response, and investigation, which the CC exam expects you to und...
Episode 33 — Authorized Versus Unauthorized Personnel: Verification, Escorts, and Real Control
This episode teaches you how organizations separate authorized personnel from unauthorized personnel, which is essential for both physical and logical security and app...
Episode 34 — Least Privilege in Practice: Reducing Risk Without Slowing Work to a Crawl
This episode covers least privilege as the principle of giving users and systems only the access they need to perform required tasks, and it prepares you for CC questi...
Episode 35 — Segregation of Duties Made Simple: Preventing Abuse and Catching Mistakes Early
This episode explains segregation of duties (SoD) and why it is a powerful administrative control for preventing fraud, reducing insider threat risk, and catching erro...
Episode 36 — Discretionary Access Control: Ownership, Permissions, and Where It Breaks Down
This episode focuses on discretionary access control (DAC), a model where resource owners decide who gets access and what level of permission is granted, and it helps ...
Episode 37 — Mandatory Access Control: Labels, Rules, and High-Control Environments
This episode explains mandatory access control (MAC), a model where a central authority defines access rules and users cannot override them, which is frequently tested...
Episode 38 — Role-Based Access Control: Designing Roles That Actually Reflect Job Duties
This episode covers role-based access control (RBAC) and prepares you to apply it in exam questions that ask how to manage access at scale without creating chaos. You ...
Episode 39 — Computer Networking Foundations: OSI and TCP/IP Models for Security Thinking
This episode teaches networking fundamentals through the OSI and TCP/IP models, focusing on how layered communication helps you reason about where security controls op...
Episode 40 — IPv4 and IPv6 Basics: Addressing, Notation, and Security-Relevant Differences
This episode explains IPv4 and IPv6 addressing in practical terms, helping you recognize what you are looking at in exam questions and understand how addressing influe...
Episode 41 — WiFi Fundamentals for Security: How Wireless Works and Where Attacks Hide
This episode explains WiFi fundamentals with a security lens, helping you understand what wireless networks are doing behind the scenes and why the CC exam expects you...