Episodes
Ever get tangled up in the complexities of identity and access management? Tired of letting confusion rob you of effective cybersecurity strategies? Well, it's time to tune in and simplify it all! As your resident cybersecurity expert, Sean Gerber, I'll be taking the reins in this exciting journey into the heart of identity and access management. We'll tackle the big three – identity management, federated identity management, and credential management systems. Believe me when I say, by the...
Published 10/16/23
Ever wondered how to ace the CISSP Cyber exam's domain four? Or, perhaps, you're merely intrigued by the intricate world of Voiceover IP (VOIP)? Either way, this episode is packed with the insights you've been seeking! Join me, Sean Gerber, as we dissect the key protocols that VOIP uses for multimedia transmissions. Together, we'll unravel the complex intricacies of Session Initiation Protocol (SIP) messages and how sessions kick off in a VOIP implementation. You'll also gain an understanding...
Published 10/12/23
Ever wish you could decrypt the mysteries of cybersecurity and ace your CISSP exam? This episode is your treasure map to success, guiding you through the labyrinthine layers of the OSI model, starting with the physical transmission of data and the crucial role of physical access controls. We also enlighten you about MAC address filtering and how it fortifies network security.
As we move deeper, we unlock the secrets of encryption, digital signatures, and secure coding practices. We delve...
Published 10/09/23
Ready to conquer the CISSP exam? Join me, Sean Gerber, as I break down complex concepts and guide you through an in-depth exploration of threat models, including their components and the crucial role they play in identifying and mitigating potential threats. You'll not only get an understanding of the TRITE methodology and when to use STRIDE or DREAD, but also learn to pinpoint which threats in STRIDE refer to an act that modifies data or system configurations.
We'll unravel the secrets of...
Published 10/05/23
Are you prepared to defend your organization from cybersecurity threats? I'm Sean Gerber, and this week I'm unraveling the intimidating world of threat modeling. Get ready to supercharge your cybersecurity knowledge as we dissect threat identification, risk assessment, and mitigation strategies. This isn't just for acing your CISSP exam, it's for becoming an indispensable security professional who can effectively safeguard your organization.
We'll embark on a journey through the labyrinth of...
Published 10/02/23
Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
Published 09/28/23
Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
Published 09/25/23
Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
Published 09/21/23
Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
Published 09/19/23
Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
Published 09/14/23
Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
Published 09/11/23
Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
Published 09/07/23
Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
Published 09/04/23
Do you know the differences between security events and security incidents? Are you confident in your ability to protect log files from unauthorized access? Join me, your host Sean Gerber, in this week's episode of the CISSP Cyber Training Podcast as we explore domain 7 of the CISSP exam and tackle these important questions. Remember, it's all about understanding the concepts, not just memorizing the questions.
I'm also excited to introduce my CISSP blueprint, a product designed to guide you...
Published 07/27/23
Are you ready to level up your understanding of logging and monitoring in the world of cybersecurity? Join us, your host Sean Gerber, as we take a deep dive into CISSP domain seven, exploring the ins and outs of logging, monitoring, and how they play a crucial part in keeping your system protected. Listen closely as we unravel the challenges of managing vast amounts of data, deploying and disposing of resources, and utilizing cryptographic resources for physical security.
Discover the...
Published 07/24/23
Ready to ace the CISSP exam? Join me in this episode as we explore domain six, focusing on security controls and assessments. You'll not only learn the primary objective of security control testing but also gain insights into various types of tests and the limitations of vulnerability scanners. Together, we'll dive into the nitty-gritty of security control testing, ensuring you're well-equipped to tackle the CISSP exam with confidence.
We'll go beyond just understanding the concepts - I'll...
Published 07/20/23
Ready to ace the CISSP exam and level up your cybersecurity knowledge? Together with my background as a former red teamer, we guide you through domain six - security assessments and testing, covering both military and corporate America perspectives. We'll discuss essential concepts such as vulnerability assessments, risk tolerance of companies, and the tools required to identify vulnerabilities.
Join us as we explore the different types of testing, including manual and automated testing, and...
Published 07/17/23
Ready to conquer the CISSP exam and advance your cybersecurity career? Join me, Sean Gerber, as we break down identity and access management, exploring the primary benefits of single sign-on systems, session management, and multi-factor authentication. Plus, get insights on the differences between role-based access controls and other access controls, giving you the knowledge and tools to pass the CISSP exam the first time.
Not only will we discuss the importance of passing the CISSP for a...
Published 07/13/23
Are you ready to up your cybersecurity game? Look no further, as I, Sean Gerber, take you on a deep-dive into the world of identity and access management. Together, we'll explore various authentication methods, such as passwords, tokens, biometrics, and multi-factor authentication, and analyze their strengths and vulnerabilities. We'll also tackle the all-important concept of credential creeping and discuss how to prevent unauthorized access to sensitive data.
But wait, there's more!...
Published 07/10/23
Join Shon Gerber on the "CISSP Cyber Training Podcast" as he delves into Domain 4 of the CISSP exam, which focuses on Communications and Network Security. In this episode, Shon will cover some of the most challenging CISSP exam questions related to the OSI model, various TCP/IP layers, and protocols such as SYN, SYN/ACK, etc. He will explain the intricacies of each layer and how they work together to provide secure communication channels. Whether you are just starting to study for the CISSP...
Published 06/29/23
In this episode of the CISSP Cyber Training Podcast, we explore Domain 4 of the CISSP exam - Implementing a Secure Channel. We delve into the intricacies of the OSI model and TCP/IP, as well as the four layers of the TCP/IP model, to provide a comprehensive understanding of how to establish and maintain secure communication channels in your network. We discuss the importance of encryption, authentication, and authorization in maintaining network security. Our expert guests share their...
Published 06/26/23
Join cybersecurity expert Shon Gerber on the CISSP Cyber Training Podcast as we explore Domain 3 of the CISSP exam, focused on security models. In this episode, we delve into the various security models, including the Bell-LaPadula, Biba, Clark-Wilson, and other models. Our expert guests share their experiences and insights on these models, their applications, strengths, and weaknesses, and how they are used in real-world scenarios. We also provide an in-depth review of the associated CISSP...
Published 06/22/23
Description: In this episode, we delve into the fundamental concepts of security models, a critical topic in the CISSP exam. Aspiring CISSP professionals and cybersecurity enthusiasts will gain valuable insights on Domain 3.2, covering key concepts, principles, and best practices related to security models. Join us as we explore various security models, including the Bell-LaPadula model, the Biba model, the Clark-Wilson model, and the Brewer-Nash model, among others. We'll discuss their...
Published 06/19/23
Do you struggle with understanding CISSP exam questions related to data ownership in Domain 2?
Tune in to our latest episode of the CISSP Cyber Training Podcast, where we discuss the most challenging CISSP exam questions outlined by Shon Gerber in relation to data ownership.
We cover the legal and regulatory requirements, establishing data ownership policies, and data ownership in the cloud.
Our experts provide insights and tips to help you understand the nuances of these questions, so...
Published 06/15/23