Certified: The ISC(2) ISSAP Audio Course
Varighed i alt:
10 h 56 min
Welcome to Certified: The ISC(2) ISSAP Audio Course
Certified: The ISC(2) ISSAP Audio Course
00:57
Episode 1 — Decode the ISSAP Exam Blueprint, Domain Weights, and Question Styles
Certified: The ISC(2) ISSAP Audio Course
14:18
Episode 2 — Build a Spoken, Realistic Study Rhythm That Fits a Working Architect:
Certified: The ISC(2) ISSAP Audio Course
12:27
Episode 3 — Execute Exam Registration, Policies, and Time Management Without Surprises
Certified: The ISC(2) ISSAP Audio Course
12:44
Episode 4 — Identify Applicable Security Standards and Guidelines That Shape Architecture Decisions
Certified: The ISC(2) ISSAP Audio Course
14:01
Episode 5 — Translate Legal and Regulatory Requirements Into Enforceable Architecture Constraints
Certified: The ISC(2) ISSAP Audio Course
13:25
Episode 6 — Design for Third-Party and Contractual Obligations Across Partners and Outsourcing
Certified: The ISC(2) ISSAP Audio Course
14:56
Episode 7 — Architect for Supply Chain Risk Without Slowing Delivery and Operations
Certified: The ISC(2) ISSAP Audio Course
13:20
Episode 8 — Apply Privacy Regulations and Sensitive Data Standards to Real System Designs
Certified: The ISC(2) ISSAP Audio Course
14:01
Episode 9 — Build Resilient Solutions That Preserve Security Under Failure and Disruption
Certified: The ISC(2) ISSAP Audio Course
14:06
Episode 10 — Identify Key Assets and Business Objectives That Drive GRC Architecture Priorities
Certified: The ISC(2) ISSAP Audio Course
13:57
Episode 11 — Map Stakeholders to Security Outcomes Without Losing Accountability and Ownership
Certified: The ISC(2) ISSAP Audio Course
16:49
Episode 12 — Design Monitoring and Reporting for Vulnerability Management and Audit Readiness
Certified: The ISC(2) ISSAP Audio Course
16:33
Episode 13 — Engineer Compliance Evidence Flows That Survive Audits and Incident Scrutiny
Certified: The ISC(2) ISSAP Audio Course
15:44
Episode 14 — Design for Auditability, Segregation, Forensics, and High-Assurance Requirements
Certified: The ISC(2) ISSAP Audio Course
16:52
Episode 15 — Incorporate Risk Assessment Artifacts Into Architecture Choices and Tradeoffs
Certified: The ISC(2) ISSAP Audio Course
17:08
Episode 16 — Advise Risk Treatment Options With Clear Rationale and Decision Traceability
Certified: The ISC(2) ISSAP Audio Course
18:27
Episode 17 — Define Security Architecture Scope and Types for Enterprise and Cloud
Certified: The ISC(2) ISSAP Audio Course
20:04
Episode 18 — Choose Network and SOA Architecture Approaches That Match Threat Realities
Certified: The ISC(2) ISSAP Audio Course
20:21
Episode 19 — Apply TOGAF and SABSA to Structure Security Architecture Work Products
Certified: The ISC(2) ISSAP Audio Course
19:56
Episode 20 — Use Reference Architectures and Blueprints Without Copying Hidden Assumptions
Certified: The ISC(2) ISSAP Audio Course
18:46
Episode 21 — Operationalize STRIDE Threat Modeling From Concept to Concrete Mitigations
Certified: The ISC(2) ISSAP Audio Course
20:40
Episode 22 — Apply CVSS and Threat Intelligence to Prioritize Architecture Risk Decisions
Certified: The ISC(2) ISSAP Audio Course
16:38
Episode 23 — Verify Design With Functional Acceptance Testing Without Missing Security Behaviors
Certified: The ISC(2) ISSAP Audio Course
16:11
Episode 24 — Validate Design With Regression Thinking When Systems and Dependencies Change
Certified: The ISC(2) ISSAP Audio Course
14:31
Episode 25 — Turn Threat Vectors, Impact, and Probability Into Testable Design Requirements
Certified: The ISC(2) ISSAP Audio Course
14:02
Episode 26 — Identify Architecture Gaps Early and Document Them for Fast Remediation
Certified: The ISC(2) ISSAP Audio Course
14:40
Episode 27 — Select Alternative Mitigations and Compensating Controls That Truly Reduce Risk
Certified: The ISC(2) ISSAP Audio Course
14:41
Episode 28 — Run Tabletop Exercises to Validate Security Architecture Under Real Stress
Certified: The ISC(2) ISSAP Audio Course
14:16
Episode 29 — Use Modeling and Simulation to Expose Security Failures Before Production
Certified: The ISC(2) ISSAP Audio Course
14:14
Episode 30 — Perform Manual Function Reviews to Catch Design Flaws Automated Tools Miss
Certified: The ISC(2) ISSAP Audio Course
14:29
Episode 31 — Execute Peer Review Practices That Improve Architecture Quality Without Politics
Certified: The ISC(2) ISSAP Audio Course
16:02
Episode 32 — Choose Dynamic Analysis Approaches That Reveal Runtime Security Weaknesses
Certified: The ISC(2) ISSAP Audio Course
21:40
Episode 33 — Use Static Analysis Effectively Without Drowning in False Positives
Certified: The ISC(2) ISSAP Audio Course
19:53
Episode 34 — Apply Manual Code Review Techniques for High-Risk Components and Interfaces
Certified: The ISC(2) ISSAP Audio Course
20:27
Episode 35 — Use Source Composition Analysis to Control Supply Chain and Dependency Risk
Certified: The ISC(2) ISSAP Audio Course
16:14
Episode 36 — Define Deployment Model Requirements Across On-Premises, Cloud, and Hybrid Systems
Certified: The ISC(2) ISSAP Audio Course
20:18
Episode 37 — Separate IT and Operational Technology Requirements Without Breaking Safety Goals
Certified: The ISC(2) ISSAP Audio Course
23:27
Episode 38 — Architect Physical Security Requirements, Perimeter Controls, Zoning, and Fire Suppression
Certified: The ISC(2) ISSAP Audio Course
19:38
Episode 39 — Specify Infrastructure and System Monitoring Requirements for Detection and Response
Certified: The ISC(2) ISSAP Audio Course
25:41