All Episodes

Displaying 21 - 40 of 64 in total

Episode 22 — Business Continuity Purpose: Keep Critical Work Going During Disruption

This episode introduces business continuity as the discipline of keeping essential business functions operating during disruptive events, which is foundational knowled...

Episode 23 — Business Continuity Importance: Downtime Costs, Priorities, and Stakeholder Trust

This episode explains why business continuity matters, focusing on the real costs of downtime and the broader impacts that reach beyond IT into revenue, safety, legal ...

Episode 24 — Business Continuity Components: Roles, Dependencies, Plans, and Testing Cadence

This episode breaks down the core components of a business continuity program and prepares you to answer CC questions that ask what a continuity plan must include to b...

Episode 25 — Disaster Recovery Purpose: Restore IT Services Fast and Validate the Return

This episode introduces disaster recovery as the focused effort to restore IT systems and data after an outage or major disruption, and it clarifies how disaster recov...

Episode 26 — Disaster Recovery Importance: RTO, RPO, and Tradeoffs You Must Understand

This episode explains why disaster recovery planning is essential, focusing on how RTO and RPO translate into real business tradeoffs and investment decisions that sec...

Episode 27 — Disaster Recovery Components: Backups, Failover, Runbooks, and Recovery Checks

This episode covers the building blocks of a workable disaster recovery capability, including backups, replication, failover planning, documented runbooks, and validat...

Episode 28 — Incident Response Purpose: Contain Damage and Restore Normal Operations

This episode introduces incident response as the structured approach for handling security events so the organization can limit damage, preserve evidence, and recover ...

Episode 29 — Incident Response Importance: Speed, Evidence, and Communication Under Stress

This episode explains why incident response is important, emphasizing the time-sensitive nature of attacks and the need for disciplined decisions when pressure is high...

Episode 30 — Incident Response Components: Prepare, Detect, Contain, Eradicate, Recover

This episode walks through the major components of incident response, showing how preparation, detection, containment, eradication, and recovery fit together as a repe...

Episode 31 — Physical Access Controls: Badges, Gate Entry, and Environmental Design Basics

This episode explains physical access controls and how they reduce risk by limiting who can enter facilities and restricted areas, a foundational topic for the CC exam...

Episode 32 — Monitoring Physical Security: Guards, CCTV, Alarms, and Logs That Matter

This episode focuses on physical security monitoring and how detection mechanisms support deterrence, response, and investigation, which the CC exam expects you to und...

Episode 33 — Authorized Versus Unauthorized Personnel: Verification, Escorts, and Real Control

This episode teaches you how organizations separate authorized personnel from unauthorized personnel, which is essential for both physical and logical security and app...

Episode 34 — Least Privilege in Practice: Reducing Risk Without Slowing Work to a Crawl

This episode covers least privilege as the principle of giving users and systems only the access they need to perform required tasks, and it prepares you for CC questi...

Episode 35 — Segregation of Duties Made Simple: Preventing Abuse and Catching Mistakes Early

This episode explains segregation of duties (SoD) and why it is a powerful administrative control for preventing fraud, reducing insider threat risk, and catching erro...

Episode 36 — Discretionary Access Control: Ownership, Permissions, and Where It Breaks Down

This episode focuses on discretionary access control (DAC), a model where resource owners decide who gets access and what level of permission is granted, and it helps ...

Episode 37 — Mandatory Access Control: Labels, Rules, and High-Control Environments

This episode explains mandatory access control (MAC), a model where a central authority defines access rules and users cannot override them, which is frequently tested...

Episode 38 — Role-Based Access Control: Designing Roles That Actually Reflect Job Duties

This episode covers role-based access control (RBAC) and prepares you to apply it in exam questions that ask how to manage access at scale without creating chaos. You ...

Episode 39 — Computer Networking Foundations: OSI and TCP/IP Models for Security Thinking

This episode teaches networking fundamentals through the OSI and TCP/IP models, focusing on how layered communication helps you reason about where security controls op...

Episode 40 — IPv4 and IPv6 Basics: Addressing, Notation, and Security-Relevant Differences

This episode explains IPv4 and IPv6 addressing in practical terms, helping you recognize what you are looking at in exam questions and understand how addressing influe...

Episode 41 — WiFi Fundamentals for Security: How Wireless Works and Where Attacks Hide

This episode explains WiFi fundamentals with a security lens, helping you understand what wireless networks are doing behind the scenes and why the CC exam expects you...

Broadcast by