All Episodes
Displaying 41 - 60 of 64 in total
Episode 42 — Ports and Applications: Mapping Network Conversations to Real Risk
This episode connects ports, services, and applications so you can interpret common exam scenarios that describe traffic, blocked connections, or suspicious network be...
Episode 43 — Network Threat Types: DDoS, Viruses, Worms, Trojans, MITM, Side-Channels
This episode surveys common network and malware threat types that the CC exam expects you to recognize, focusing on what each threat aims to do and how it typically sh...
Episode 44 — Identify Attacks Using IDS Concepts: What Detection Can and Cannot Prove
This episode explains intrusion detection system (IDS) concepts and helps you understand how detection works at a high level, which the CC exam often tests through sce...
Episode 45 — HIDS and NIDS Explained: Host Versus Network Detection Tradeoffs
This episode compares host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS), giving you a practical framework for choosing...
Episode 46 — Prevent Attacks with Antivirus and Scanning: Strengths, Limits, and Good Use
This episode covers antivirus and scanning as preventive and detective measures, helping you understand what these tools do well, where they fail, and how the CC exam ...
Episode 47 — Firewalls and IPS Fundamentals: Blocking, Allowing, and Stopping What Matters
This episode explains firewalls and intrusion prevention systems (IPS) at a foundational level, emphasizing how they support confidentiality, integrity, and availabili...
Episode 48 — On-Prem Network Infrastructure: Power, HVAC, Fire Suppression, Redundancy
This episode covers on-premises infrastructure considerations that affect security and resilience, helping you answer CC questions where physical and operational reali...
Episode 49 — MOUs and MOAs in Infrastructure Planning: Shared Responsibilities and Risk
This episode explains memorandums of understanding (MOUs) and memorandums of agreement (MOAs) as governance tools that clarify shared responsibilities, which is useful...
Episode 50 — Network Design Security: DMZ, VLAN, VPN, and Micro-Segmentation Done Right
This episode teaches secure network design concepts, including DMZs, VLANs, VPNs, and micro-segmentation, focusing on how segmentation reduces attack surface and limit...
Episode 51 — Defense in Depth and NAC: Segmentation for Embedded Systems and IoT
This episode focuses on defense in depth and network access control (NAC) as practical strategies for managing risk from embedded systems and IoT devices, which freque...
Episode 52 — Cloud Network Concepts: SLA, MSP, SaaS, PaaS, IaaS, Hybrid Explained
This episode introduces cloud service models and key terms such as service level agreements (SLAs), managed service providers (MSPs), and hybrid deployments, helping y...
Episode 53 — Encryption Essentials: Symmetric, Asymmetric, and Hashing Without Confusion
This episode explains foundational cryptography concepts that appear frequently on the CC exam, focusing on how symmetric encryption, asymmetric encryption, and hashin...
Episode 54 — Data Handling Discipline: Classification, Labeling, Retention, and Destruction
This episode covers data handling as a practical security skill, connecting classification, labeling, retention, and secure destruction to the confidentiality and comp...
Episode 55 — Logging and Monitoring Security Events: What to Capture for Real Value
This episode explains logging and monitoring as foundational security capabilities, showing how collecting the right events supports detection, investigation, and acco...
Episode 56 — System Hardening Through Configuration Management: Baselines, Updates, Patches
This episode focuses on system hardening through configuration management, which is the discipline of maintaining secure, consistent settings across systems while cont...
Episode 57 — Data Handling Policy Essentials: Rules That Prevent the Most Common Mistakes
This episode explains data handling policies as administrative controls that translate confidentiality and privacy expectations into clear, repeatable behaviors across...
Episode 58 — Password Policy Essentials: Strength, Rotation Myths, and Practical Enforcement
This episode covers password policy fundamentals and prepares you for CC questions that test how authentication controls should be designed and enforced in real enviro...
Episode 59 — Acceptable Use Policy: Setting Boundaries Without Creating Shadow IT
This episode explains acceptable use policies (AUPs) as governance tools that set clear expectations for how users may access and use organizational systems, data, and...
Episode 60 — BYOD Policy Basics: Balancing User Convenience and Organizational Security
This episode introduces bring your own device (BYOD) policy concepts and helps you understand how organizations manage the security risks of personal devices accessing...
Episode 61 — Change Management Policy: Documentation, Approval, and Rollback That Works
This episode explains change management policy as a control that protects integrity and availability by ensuring system changes are planned, reviewed, implemented care...