Certified: The CompTIA SecAI+ Audio Course
Gesamtdauer:
8 h 52 min
Episode 90 — Prevent Shadow AI: Sanctioned Tools, Usage Rules, and Enforcement Patterns
Certified: The CompTIA SecAI+ Audio Course
10:31
Episode 89 — Apply Responsible AI Principles: Fairness, Transparency, and Explainability Choices
Certified: The CompTIA SecAI+ Audio Course
11:42
Episode 88 — Define AI Security Responsibilities: Owners, Approvers, Builders, and Auditors
Certified: The CompTIA SecAI+ Audio Course
11:12
Episode 87 — Build AI Governance Structures: Policies, Roles, and a Working Operating Model
Certified: The CompTIA SecAI+ Audio Course
10:38
Episode 86 — Manage CI/CD With AI Assistants: Secure Pipelines, Tests, and Change Control
Certified: The CompTIA SecAI+ Audio Course
11:18
Episode 85 — Apply Safe Automation: Low-Code Workflows With Guardrails and Auditability
Certified: The CompTIA SecAI+ Audio Course
11:40
Episode 84 — Recognize AI-Assisted Malware Evolution: Obfuscation, Mutation, and Detection Gaps
Certified: The CompTIA SecAI+ Audio Course
11:56
Episode 83 — Track AI-Accelerated Recon: Target Discovery, Enumeration, and Defensive Signals
Certified: The CompTIA SecAI+ Audio Course
12:31
Episode 82 — Counter AI-Scaled Social Engineering: Phishing, Vishing, and Pretext Detection
Certified: The CompTIA SecAI+ Audio Course
13:30
Episode 81 — Understand AI-Driven Deepfakes: Impersonation Risk and Verification Countermeasures
Certified: The CompTIA SecAI+ Audio Course
14:17
Episode 80 — Use AI for Threat Intel: Entity Extraction, Clustering, and Confidence Handling
Certified: The CompTIA SecAI+ Audio Course
13:31
Episode 79 — Use AI for Incident Triage: Summaries, Prioritization, and Evidence Integrity
Certified: The CompTIA SecAI+ Audio Course
13:23
Episode 78 — Use AI for Detection Engineering: Rules, Correlation, and Noise Reduction
Certified: The CompTIA SecAI+ Audio Course
14:06
Episode 77 — Use AI for Code Review: Linting, SAST Triage, and False-Positive Control
Certified: The CompTIA SecAI+ Audio Course
13:58
Episode 76 — Use AI in Secure Coding: Generating Code Without Injecting Vulnerabilities
Certified: The CompTIA SecAI+ Audio Course
13:47
Episode 75 — Reduce Overreliance Risk: Human Verification Loops and Safe Escalation Rules
Certified: The CompTIA SecAI+ Audio Course
13:25
Episode 74 — Secure Integrations and Plug-Ins: Trust Boundaries, Validation, and Least Privilege
Certified: The CompTIA SecAI+ Audio Course
14:11
Episode 73 — Handle Denial-of-Service Risks: Model DoS, Cost Bombs, and Resilience
Certified: The CompTIA SecAI+ Audio Course
14:18
Episode 72 — Prevent Model Theft: Extraction Risks, Query Limits, and Watermark Strategies
Certified: The CompTIA SecAI+ Audio Course
14:10
Episode 71 — Analyze Membership Inference Risks: Privacy Exposure and Defensive Techniques
Certified: The CompTIA SecAI+ Audio Course
15:04
Episode 70 — Analyze Model Inversion Risks: What Can Leak and How to Reduce It
Certified: The CompTIA SecAI+ Audio Course
13:19
Episode 69 — Investigate Model Poisoning: Artifact Integrity, Supply Chain, and Remediation
Certified: The CompTIA SecAI+ Audio Course
13:06
Episode 68 — Investigate Data Poisoning: Detection Clues, Impact Analysis, and Recovery Steps
Certified: The CompTIA SecAI+ Audio Course
13:21
Episode 67 — Defend Against Jailbreaking: Common Tactics and Practical Mitigations
Certified: The CompTIA SecAI+ Audio Course
15:04
Episode 66 — Detect Prompt Injection Attempts: Indicators, Triage, and Containment Options
Certified: The CompTIA SecAI+ Audio Course
14:15
Episode 65 — Interpret Confidence Signals: Limits, Miscalibration, and Operational Risk
Certified: The CompTIA SecAI+ Audio Course
14:01
Episode 64 — Audit AI Use at Scale: Who Asked What, When, and With What Data
Certified: The CompTIA SecAI+ Audio Course
13:58
Episode 63 — Log AI Interactions Safely: Sanitization, Redaction, and Tamper-Resistance
Certified: The CompTIA SecAI+ Audio Course
14:45
Episode 62 — Monitor Prompts as Telemetry: Signals, Patterns, and Threat-Hunting Hooks
Certified: The CompTIA SecAI+ Audio Course
15:01
Episode 61 — Apply Key Management Right: Rotation, Storage, and Separation of Duties
Certified: The CompTIA SecAI+ Audio Course
18:25
Episode 60 — Apply Access Controls Across Layers: Data, Models, Tools, and Agents
Certified: The CompTIA SecAI+ Audio Course
13:36
Episode 59 — Lock Down Endpoints: Network Controls, Segmentation, and Service Hardening
Certified: The CompTIA SecAI+ Audio Course
11:53
Episode 58 — Secure Agent Toolchains: Least Privilege, Scoped Credentials, and Audit Trails
Certified: The CompTIA SecAI+ Audio Course
12:04
Episode 57 — Control Outputs Safely: Dangerous Content Filters and Secure Output Encoding
Certified: The CompTIA SecAI+ Audio Course
12:50
Episode 56 — Validate Inputs Rigorously: File Types, Length Limits, and Content Sanitization
Certified: The CompTIA SecAI+ Audio Course
12:40
Episode 55 — Set Rate Limits and Quotas: Token Caps, Cost Controls, and Abuse Prevention
Certified: The CompTIA SecAI+ Audio Course
11:05
Episode 54 — Build Prompt Firewalls: Filtering, Classification, and Instruction Boundary Checks
Certified: The CompTIA SecAI+ Audio Course
11:45
Episode 53 — Implement Guardrails That Hold: Policy Rules, Validators, and Refusal Logic
Certified: The CompTIA SecAI+ Audio Course
12:24
Episode 52 — Model the Attack Surface: Data, Model, Agent, Tooling, and Integrations
Certified: The CompTIA SecAI+ Audio Course
12:59
Episode 51 — Track AI Vulnerabilities: CVE Workflows, Advisories, and Exposure Management
Certified: The CompTIA SecAI+ Audio Course
16:39