All Episodes

Displaying 41 - 60 of 64 in total

Episode 42 — Ports and Applications: Mapping Network Conversations to Real Risk

This episode connects ports, services, and applications so you can interpret common exam scenarios that describe traffic, blocked connections, or suspicious network be...

Episode 43 — Network Threat Types: DDoS, Viruses, Worms, Trojans, MITM, Side-Channels

This episode surveys common network and malware threat types that the CC exam expects you to recognize, focusing on what each threat aims to do and how it typically sh...

Episode 44 — Identify Attacks Using IDS Concepts: What Detection Can and Cannot Prove

This episode explains intrusion detection system (IDS) concepts and helps you understand how detection works at a high level, which the CC exam often tests through sce...

Episode 45 — HIDS and NIDS Explained: Host Versus Network Detection Tradeoffs

This episode compares host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS), giving you a practical framework for choosing...

Episode 46 — Prevent Attacks with Antivirus and Scanning: Strengths, Limits, and Good Use

This episode covers antivirus and scanning as preventive and detective measures, helping you understand what these tools do well, where they fail, and how the CC exam ...

Episode 47 — Firewalls and IPS Fundamentals: Blocking, Allowing, and Stopping What Matters

This episode explains firewalls and intrusion prevention systems (IPS) at a foundational level, emphasizing how they support confidentiality, integrity, and availabili...

Episode 48 — On-Prem Network Infrastructure: Power, HVAC, Fire Suppression, Redundancy

This episode covers on-premises infrastructure considerations that affect security and resilience, helping you answer CC questions where physical and operational reali...

Episode 49 — MOUs and MOAs in Infrastructure Planning: Shared Responsibilities and Risk

This episode explains memorandums of understanding (MOUs) and memorandums of agreement (MOAs) as governance tools that clarify shared responsibilities, which is useful...

Episode 50 — Network Design Security: DMZ, VLAN, VPN, and Micro-Segmentation Done Right

This episode teaches secure network design concepts, including DMZs, VLANs, VPNs, and micro-segmentation, focusing on how segmentation reduces attack surface and limit...

Episode 51 — Defense in Depth and NAC: Segmentation for Embedded Systems and IoT

This episode focuses on defense in depth and network access control (NAC) as practical strategies for managing risk from embedded systems and IoT devices, which freque...

Episode 52 — Cloud Network Concepts: SLA, MSP, SaaS, PaaS, IaaS, Hybrid Explained

This episode introduces cloud service models and key terms such as service level agreements (SLAs), managed service providers (MSPs), and hybrid deployments, helping y...

Episode 53 — Encryption Essentials: Symmetric, Asymmetric, and Hashing Without Confusion

This episode explains foundational cryptography concepts that appear frequently on the CC exam, focusing on how symmetric encryption, asymmetric encryption, and hashin...

Episode 54 — Data Handling Discipline: Classification, Labeling, Retention, and Destruction

This episode covers data handling as a practical security skill, connecting classification, labeling, retention, and secure destruction to the confidentiality and comp...

Episode 55 — Logging and Monitoring Security Events: What to Capture for Real Value

This episode explains logging and monitoring as foundational security capabilities, showing how collecting the right events supports detection, investigation, and acco...

Episode 56 — System Hardening Through Configuration Management: Baselines, Updates, Patches

This episode focuses on system hardening through configuration management, which is the discipline of maintaining secure, consistent settings across systems while cont...

Episode 57 — Data Handling Policy Essentials: Rules That Prevent the Most Common Mistakes

This episode explains data handling policies as administrative controls that translate confidentiality and privacy expectations into clear, repeatable behaviors across...

Episode 58 — Password Policy Essentials: Strength, Rotation Myths, and Practical Enforcement

This episode covers password policy fundamentals and prepares you for CC questions that test how authentication controls should be designed and enforced in real enviro...

Episode 59 — Acceptable Use Policy: Setting Boundaries Without Creating Shadow IT

This episode explains acceptable use policies (AUPs) as governance tools that set clear expectations for how users may access and use organizational systems, data, and...

Episode 60 — BYOD Policy Basics: Balancing User Convenience and Organizational Security

This episode introduces bring your own device (BYOD) policy concepts and helps you understand how organizations manage the security risks of personal devices accessing...

Episode 61 — Change Management Policy: Documentation, Approval, and Rollback That Works

This episode explains change management policy as a control that protects integrity and availability by ensuring system changes are planned, reviewed, implemented care...

Broadcast by