Welcome to CISSP Central, the ultimate podcast for aspiring and certified CISSP professionals! Whether you’re studying for the CISSP 2024 syllabus exam or looking to sharpen your cybersecurity skills, this podcast is your go-to resource. Each episode dives deep into the critical domains of cybersecurity, offering insights, tips, and real-world experiences from industry experts.Join us as we explore the latest trends, challenges, and solutions in information security, helping you stay ahead in a rapidly evolving digital world. From encryption to risk management, compliance to cloud security, CISSP Central covers it all!Perfect for CISSP candidates, InfoSec pros, and anyone passionate about safeguarding information in the modern age. Tune in, learn, and become the cybersecurity expert you were meant to be!Note: This entire podcast has been prepared based on a published book on Amazon named C(R)ISSP: The Most Concise Handbook for CISSP 2024, written by myself, which can be purchased directly from Amazon by clicking this link.
📻 Siste episoder av CISSP Central
Her er de nyeste episodene tilgjengelige via RSS-feeden:
8.5 Define and apply secure coding guidelines and standards8.5.1 Security weaknesses and vulnerabilities at the source-code level8.5.2 Security of application programming interfaces (API)8.5.3 Secure ...
CISSP Domain8 Section 3 and 4 (00:13:44)
8.3 Assess the effectiveness of software security8.3.1 Auditing and logging of changes8.3.2 Risk analysis and mitigation8.4 Assess security impact of acquired software8.4.1 Commercial-off-the-shelf (C...
CISSP Domain8 Section2 (00:11:26)
8.2 Identify & apply security controls in development environments8.2.1 Programming languages8.2.2 Libraries8.2.3 Tool sets8.2.4 Integrated Development Environment (IDE)8.2.5 Runtime8.2.6 Continuous I...
CISSP Domain8 Intro and Section 1 (00:13:08)
8.1 Understand and integrate security in the software development lifecycle8.1.1 Development Methodologies8.1.2 Maturity Models (e.g., Capability Maturity Model (CMM), Software Assurance Maturity Mode...
CISSP Domain7 Section 13, 14 and 15 (00:03:45)
7.13 Participate in Business Continuity (BC) planning and exercises7.14 Implement and manage physical security7.15 Address personnel safety and security concerns7.15.1 Travel7.15.2 Security Training &...
CISSP Domain7 Section 12 (00:10:50)
7.12 Test Disaster Recovery Plans7.12.1 Read-through/Checklist7.12.2 Walk-through/Tabletop7.12.3 Simulation7.12.4 Parallel7.12.5 Full Interruption7.12.6 Communications (e.g., stakeholders, test status...
7.8 Implement and support patch and vulnerability management7.9 Understand and participate in change management processes7.10 Implement recovery strategies7.10.1 Backup storage strategies7.10.2 Recove...
CISSP Domain7 Section 7 (00:07:28)
7.7 Operate and maintain detection and preventative measures7.7.1 Firewall7.7.2 Intrusion detection and prevention systems7.7.3 Whitelisting/Blacklisting7.7.4 Third-party provided security services7.7...
7.5 Apply resource protection techniques7.5.1 Media Management7.5.2 Hardware and software asset management7.5.3 Data at rest/Data in transit
CISSP Domain7 Section 3 and Section 4 (00:08:39)
7.3 Perform Configuration Management (e.g., provisioning, baselining, automation)7.4 Apply foundational security operations concepts7.4.1 Need to know/Least privileges7.4.2 Separation of Duties (SoD) ...
CISSP Domain7 Section 2 (00:15:51)
7.2 Conduct logging and monitoring activities7.2.1 Intrusion detection and prevention systems (IDPS)7.2.2 Security information and Event Management (SIEM)7.2.3 Security orchestration, automation, and ...
CISSP Domain7 Intro and Section 1 (00:17:30)
7.0 DOMAIN 7: SECURITY OPERATIONS7.1 Understand and support investigations7.1.1 Evidence Collection and Handling7.1.2 Reporting and Documentation7.1.3 Investigation Techniques7.1.4 Digital forensics t...
CISSP Domain6 Intro and Section 4 (00:13:59)
6.4 Analyze test output and generate report6.4.1 Remediation6.4.2 Exception Handling6.4.3 Ethical disclosure6.5 Conduct or facilitate security audits6.5.1 Internal6.5.2 External6.5.3 Third Party6.5.4 ...
CISSP Domain6 Intro and Section 3 (00:10:02)
6.3 Collect Security Process data6.3.1 Account Management6.3.2 Management review and approval6.3.3 Key Performance and Risk Indicator6.3.4 Backup Verification data6.3.5 Training and Awareness6.3.6 Dis...
CISSP Domain6 Section 2 (00:11:43)
6.2 Conduct Security Control Testing6.2.1 Vulnerability Assessment6.2.2 Penetration Testing6.2.3 Log Reviews6.2.4 Synthetic Transaction6.2.5 Code review and testing6.2.6 Misuse case testing6.2.7 Cover...
CISSP Domain6 Intro and Section 1 (00:11:25)
6.0 DOMAIN 6: SECURITY ASSESSMENT AND TESTING6.1 Design and Validate assessment, test, and audit strategies6.1.1 Internal6.1.2 External6.1.3 Third-party6.1.4 Location (e.g. on-premises, cloud, hybrid)
CISSP Domain5 Intro and Section 5 (00:14:08)
5.5 Manage the identity and access provisioning lifecycle5.5.1 Account access review (e.g., user, system, service)5.5.2 Provisioning and deprovisioning (e.g., on/off boarding & transfers)5.5.3 Role de...
CISSP Domain5 Intro and Section 4 (00:10:36)
5.4 Implement and manage authorization mechanisms
CISSP Domain5 Intro and Section 3 (00:12:12)
5.3 Federated identity with a third-party service5.3.1 On-Premises5.3.2 Cloud5.3.3 Hybrid
CISSP Domain5 Section 2 (00:18:37)
5.2 Design identification and authentication Strategy (e.g., people, devices, and services)5.2.1 Groups and Roles5.2.2 Authentication, Authorization and Accounting (AAA) (e.g., MFA, password-less auth...
CISSP Domain5 Intro and Section 1 (00:16:28)
5.0 DOMAIN 5: IDENTITY & ACCESS MANAGEMENT (IAM)5.1 Control physical and logical access to assets5.1.1 Information5.1.2 Systems5.1.3 Devices5.1.4 Facilities5.1.5 Applications5.1.6 Services
CISSP Domain4 Section 3 (00:11:27)
4.3 Implement secure communication channels according to design4.3.1 Voice, video, and collaboration (e.g., conferencing, Zoom rooms)4.3.2 Remote access (e.g., network administrative functions)4.3.3 D...
CISSP Domain4 Section 2 (00:10:08)
4.2 Secure Network Components4.2.1 Operation of infrastructure4.2.2 Transmission Media4.2.3 Network Access Control (NAC) devices4.2.4 Endpoint Security (e.g. host-based)
Side 1 av 1
CISSP Central - Gratis RSS Feed for Norsk Podcast | OpenPodMe | OpenPodMe - Åpen RSS for Norske Podcaster