Certified: The GIAC GCCC Audio Course

Duración total:6 h 51 min
Episode 1 — Decode the GCCC blueprint: domains, scoring, pacing, and what 71% demands
Certified: The GIAC GCCC Audio Course
13:38
Episode 2 — Build an audio-first study plan: recall cycles, review rhythm, and exam-day flow
Certified: The GIAC GCCC Audio Course
11:46
Episode 3 — Understand CIS Controls v8 history, purpose, and how the model is organized
Certified: The GIAC GCCC Audio Course
11:12
Episode 4 — Map CIS Controls to major security standards and governance expectations
Certified: The GIAC GCCC Audio Course
12:41
Episode 5 — Operationalize CIS Controls governance: owners, metrics, reporting, and accountability
Certified: The GIAC GCCC Audio Course
12:15
Episode 6 — Define enterprise asset scope: what counts, why it matters, who owns accuracy
Certified: The GIAC GCCC Audio Course
10:27
Episode 7 — Discover enterprise assets continuously using multiple sources and reconciliation discipline
Certified: The GIAC GCCC Audio Course
10:23
Episode 8 — Validate enterprise asset inventory quality with drift checks and audit-ready evidence
Certified: The GIAC GCCC Audio Course
10:39
Episode 9 — Establish software asset authority: approved lists, licensing realities, and control points
Certified: The GIAC GCCC Audio Course
10:33
Episode 10 — Detect unauthorized software quickly using discovery signals, baselines, and change patterns
Certified: The GIAC GCCC Audio Course
09:23
Episode 11 — Prevent unapproved execution with allowlisting logic and tightly governed exceptions
Certified: The GIAC GCCC Audio Course
09:55
Episode 12 — Design secure configuration baselines that are measurable, repeatable, and realistic
Certified: The GIAC GCCC Audio Course
09:30
Episode 13 — Control configuration drift with monitoring, remediation workflows, and change discipline
Certified: The GIAC GCCC Audio Course
10:16
Episode 14 — Prove configuration compliance with sampling, evidence, and exception governance
Certified: The GIAC GCCC Audio Course
10:11
Episode 15 — Clarify account types and lifecycles: user, admin, service, shared, and temporary
Certified: The GIAC GCCC Audio Course
15:56
Episode 16 — Provision accounts safely with approvals, role fit, and minimum privilege intent
Certified: The GIAC GCCC Audio Course
13:21
Episode 17 — Deprovision accounts cleanly to eliminate orphaned access and lingering entitlements
Certified: The GIAC GCCC Audio Course
12:05
Episode 18 — Strengthen authentication foundations: factors, session controls, and identity assurance
Certified: The GIAC GCCC Audio Course
15:34
Episode 19 — Build authorization models that match real work without privilege creep
Certified: The GIAC GCCC Audio Course
12:49
Episode 20 — Validate access control effectiveness with reviews, testing, and corrective action
Certified: The GIAC GCCC Audio Course
07:41
Episode 21 — Build continuous vulnerability management: coverage, scan cadence, and owner assignment
Certified: The GIAC GCCC Audio Course
06:14
Episode 22 — Prioritize vulnerabilities with risk context, exploitability, and exposure-driven triage
Certified: The GIAC GCCC Audio Course
06:51
Episode 23 — Close vulnerabilities with verification evidence, rollback planning, and durable tracking
Certified: The GIAC GCCC Audio Course
05:17
Episode 24 — Decide what to log and why: events that power detection and investigations
Certified: The GIAC GCCC Audio Course
09:05
Episode 25 — Centralize and normalize logs for correlation, retention integrity, and fast search
Certified: The GIAC GCCC Audio Course
08:31
Episode 26 — Turn logs into outcomes: alerting strategy, review routines, and noise reduction
Certified: The GIAC GCCC Audio Course
07:44
Episode 27 — Prevent malware execution using layered controls across endpoints and servers
Certified: The GIAC GCCC Audio Course
09:15
Episode 28 — Contain malware spread with segmentation, privilege limits, and rapid isolation routines
Certified: The GIAC GCCC Audio Course
09:00
Episode 29 — Validate malware defenses with testing, tuning, and incident-driven improvement loops
Certified: The GIAC GCCC Audio Course
08:06
Episode 30 — Inventory network infrastructure: devices, services, dependencies, and ownership clarity
Certified: The GIAC GCCC Audio Course
08:09
Episode 31 — Harden network device management planes to reduce takeover and tampering risk
Certified: The GIAC GCCC Audio Course
08:13
Episode 32 — Control network changes safely with baselines, approvals, and rollback discipline
Certified: The GIAC GCCC Audio Course
07:39
Episode 33 — Design network visibility that matters: telemetry selection and baseline behavior modeling
Certified: The GIAC GCCC Audio Course
13:19
Episode 34 — Detect threats faster with triage workflows, escalation rules, and response coordination
Certified: The GIAC GCCC Audio Course
12:47
Episode 35 — Improve monitoring outcomes with tuning, validation, and gap-driven coverage fixes
Certified: The GIAC GCCC Audio Course
12:00
Episode 36 — Reduce phishing success with email controls that block, warn, and verify safely
Certified: The GIAC GCCC Audio Course
10:27
Episode 37 — Harden web browsing with technical safeguards and safer execution pathways
Certified: The GIAC GCCC Audio Course
10:55
Episode 38 — Confirm email and browser protections work with testing and measurable outcomes
Certified: The GIAC GCCC Audio Course
09:22
Episode 39 — Classify data in practice: sensitivity tiers, handling rules, and real-world exceptions
Certified: The GIAC GCCC Audio Course
08:46
Episode 40 — Protect data with access boundaries, encryption decisions, and controlled sharing patterns
Certified: The GIAC GCCC Audio Course
09:45