
CISSP Cyber Training Podcast - CISSP Training Program
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable security strategies and tips that you can implement right away, giving you an edge in the cybersecurity realm. Tune in and take the reins of your cybersecurity journey—let’s ride into excellence together! 🚀
Episodes
255 episodes
CCT 252: Logging and Monitoring Security Activities for the CISSP (Domain 7.2)
Dive deep into the critical world of security logging and monitoring as we explore Domain 7.2 of the CISSP certification. This episode unpacks the strategic considerations behind effective logging practices that balance comprehensive visibility...
•
Season 3
•
Episode 252
•
44:45

CCT 251: Practice CISSP Questions - Security Control Testing, Vulnerability Assessments and Network Scanning (Domain 6.2)
The boundaries between digital vulnerabilities and physical warfare are dissolving before our eyes. Ukrainian forces have dramatically shifted military paradigms by marrying cybersecurity breaches with commercial drone attacks against strategic...
•
Season 3
•
Episode 251
•
19:53

CCT 250: Vulnerability Assessments and Network Scanning and the CISSP (D6.2.1)
Vulnerability assessments serve as the frontline defense against cybersecurity threats, yet many professionals struggle to understand the terminology and methodologies that make them effective. In this comprehensive episode, we demystify the cr...
•
Season 3
•
Episode 250
•
39:54

CCT 249: Practice CISSP Questions - De-provisioning and Role Definitions (Domain 5.5.2-3)
Ransomware attacks are surging at an alarming rate - a Scottish non-profit recently reported a 100% increase year-over-year, with fraud cases expected to exceed $33 million. Even more concerning, businesses report feeling less resilient against...
•
Season 3
•
Episode 249
•
19:10

CT 248: Implementing Authentication Systems (SAML, OpenID, ODIC, Kerberos, RADIUS/TACACS+) - Domain 5.6
Navigating the complex landscape of authentication frameworks is essential for any cybersecurity professional, especially those preparing for the CISSP exam. This deep-dive episode unravels the intricate world of authentication systems that pro...
•
Season 3
•
Episode 248
•
34:21

CCT 247: Mastering Access Controls - From Biometrics to Administrative Policies (CISSP Domain 4)
A shocking incident in Spain recently left 60% of the country's power grid dark in less than five seconds. Was it a cyber attack? The jury's still out, but this real-world event perfectly illustrates why understanding access controls and securi...
•
Season 3
•
Episode 247
•
18:34

CCT Vendor 03: From Bomb Loader to Hacker - A Journey in Cybersecurity with Clint Steven (Phycyx.com)
What happens when a former Air Force weapons loader transforms into a cybersecurity expert? Clint Stevens from Physics joins us to share his remarkable journey through military intelligence, special operations support, and cyber warfare before ...
•
43:28

CCT 246: CISSP Training - Secure Communication Protocols (Domain 4.1.3)
Cybersecurity professionals need a solid understanding of secure communication protocols, not just for exam success but for real-world implementation. This episode unpacks the essential protocols covered in CISSP Domain 4.1.3, providing clear e...
•
Season 3
•
Episode 246
•
32:35

CCT 245: Practice CISSP Questions - Hashing - Ensuring Message Authenticity with the CISSP (D3.6)
Security regulations are changing dramatically in response to major breaches, and the implications for cybersecurity professionals are profound. Sean Gerber kicks off this episode with a career announcement, sharing his transition to independen...
•
Season 3
•
Episode 245
•
19:25

CCT 244: Cybersecurity Foundations - Message Integrity and Authentication (CISSP Domain 3.6)
Ever wondered how your sensitive messages stay secure in an increasingly dangerous digital landscape? The answer lies in message integrity controls, digital signatures, and certificate validation – the core components of modern cybersecurity we...
•
Season 3
•
Episode 244
•
31:17

CCT 243: Practice CISSP Questions - Information and Asset Handling Requirements (Domain 2.2)
What happens when a security professional falls victim to malicious AI? The consequences can be devastating, as demonstrated by our analysis of a recent high-profile breach where a Disney security engineer downloaded AI-generated artwork contai...
•
Season 3
•
Episode 243
•
24:50

CCT 242: CISSP and Information and Asset Handling Requirements (Domain 2.2)
Four million people affected by a single data breach. Let that sink in. This sobering reality frames today's deep dive into Domain 2 of the CISSP exam: Asset Security. As cybersecurity professionals, understanding how to establish proper inform...
•
Season 3
•
Episode 242
•
49:41

CCT 241: Practice CISSP Questions - Transborder Data Flows and the CISSP (Domain 1.5)
The cybersecurity talent gap is widening at an alarming rate. According to the 2023 ISC² Global Workforce Study, we're facing a shortfall of 5.5 million cybersecurity professionals by 2024, with the workforce needing to grow 12.6% annually just...
•
Season 3
•
Episode 241
•
25:05

CCT Vendor 02: AI in Cybersecurity: Protecting Financial Institutions - NextPeak.net
The rapid evolution of artificial intelligence and machine learning has created a pivotal moment for financial institutions. As these organizations race to implement AI solutions, they face both transformative opportunities and significant cybe...
•
Season 3
•
Episode 240
•
31:05

CCT 240: Cybersecurity Documentation: Policies, Standards, and Procedures (CISSP Domain 1.7)
Ever wonder why organizations with robust cybersecurity teams still fall victim to devastating attacks? The answer often lies not in fancy technology but in something far more fundamental: documentation.In this eye-opening episode, Shon...
•
Season 3
•
Episode 240
•
49:36

CCT 239: Practice CISSP Questions - Assess the Effectiveness of Software Security (D8.3)
Cybersecurity isn't just for enterprises—small and medium businesses face increasingly sophisticated threats with fewer resources to combat them. In this information-packed episode, Shon Gerber explores why cybersecurity matters critically for ...
•
Season 3
•
Episode 239
•
28:20

CCT 238: Assessing the Effectiveness of Software Security (Domain 8.3)
Software security assessment can make or break your organization's defense posture, yet many professionals struggle with implementing effective evaluation strategies. This deep dive into CISSP Domain 8.3 reveals critical approaches to software ...
•
Season 3
•
Episode 238
•
36:57

CCT 237: Practice CISSP Questions - Incident Management (Domain 7)
Wondering how to tackle incident response questions on the CISSP exam? This episode delivers exactly what you need, walking through fifteen essential incident management scenarios that test your understanding of this critical domain.Sea...
•
Season 3
•
Episode 237
•
13:52

CCT 236: Incident Management and the CISSP (Domain 7.6)
Cybersecurity incidents aren't a matter of if, but when. Are you prepared to respond effectively? Sean Gerber takes us through the complete incident response lifecycle, breaking down the seven essential phases every security profes...
•
Season 3
•
Episode 236
•
32:07

CCT 235: Practice CISSP Questions - Mastering Security Control Testing (CISSP Domain 6.2)
The collision of artificial intelligence and cybersecurity takes center stage in this episode as we explore how Agentic AI is revolutionizing Security Operations Centers. Moving beyond simple assistant AI or co-pilots, this new generation of au...
•
Season 3
•
Episode 235
•
23:09

CCT 234: Mastering Security Control Testing (CISSP Domain 6.2)
Digital signatures are coming to AI models as cybersecurity evolves to meet emerging threats. Google's collaboration with NVIDIA and HiddenLayer demonstrates how traditional security controls must adapt to protect machine learning systems vulne...
•
Season 3
•
Episode 234
•
43:28

CCT 233: Practice CISSP Questions - Managing Authentication in the Modern Enterprise (CISSP Domain 5.2)
Cybersecurity professionals know that mastering identity and access management concepts is essential for CISSP certification success. This deep dive into Domain 5.2 tackles fifteen carefully crafted questions covering everything from just-in-ti...
•
Season 3
•
Episode 233
•
16:47

CCT 232: Managing Authentication in the Modern Enterprise (CISSP Domain 5.2)
Identity management sits at the core of effective cybersecurity, yet many organizations still struggle with implementing it correctly. In this comprehensive breakdown of CISSP Domain 5.2, we dive deep into the critical components of managing id...
•
Season 3
•
Episode 232
•
48:09

CCT 231: Practice CISSP Questions - Secure Network Components and CISSP (Domain 4.2)
Cybersecurity professionals, alert! A dangerous Chrome zero-day vulnerability demands your immediate attention. In this action-packed episode, Sean Gerber breaks down CVE-25-2783, a critical security threat that allows attackers to execute remo...
•
Season 3
•
Episode 231
•
18:30

CCT 230: Drones to Fiber Optics - Secure Network Components and CISSP (Domain 4.2)
The unexpected convergence of consumer technology and warfare takes center stage as Sean Gruber explores how Chinese e-commerce giants now sell drone accessories that transform $300 toys into semi-autonomous weapons. This eye-opening discussion...
•
Season 3
•
Episode 230
•
47:14
