Certified: The ISACA CCOA Audio Course
Duración total:
10 h 34 min
Welcome to the ISACA CCOA Audio Course
Certified: The ISACA CCOA Audio Course
00:53
Episode 70 — Exam-Day Tactics: Calm Mental Models for Confident Incident Prioritization (Task 12)
Certified: The ISACA CCOA Audio Course
16:35
Episode 69 — Essential Terms: Plain-Language Glossary for Fast Recall Under Pressure (Task 5)
Certified: The ISACA CCOA Audio Course
17:16
Episode 68 — Vulnerability Tracking Discipline: Ownership, SLAs, Verification, and Closure Proof (Task 18)
Certified: The ISACA CCOA Audio Course
18:59
Episode 67 — Vulnerability Remediation Strategies: Patch, Mitigate, Accept, or Compensate (Task 2)
Certified: The ISACA CCOA Audio Course
16:09
Episode 66 — Vulnerability Identification Skills: CVE Context, Validation Steps, and False Positives (Task 2)
Certified: The ISACA CCOA Audio Course
18:23
Episode 65 — Vulnerability Assessment Basics: Scopes, Methods, Evidence, and Interpreting Findings (Task 2)
Certified: The ISACA CCOA Audio Course
14:28
Episode 64 — Apply Industry Best Practices and Frameworks Without Overcomplicating Operations (Task 21)
Certified: The ISACA CCOA Audio Course
20:39
Episode 63 — Identity and Access Management Mastery: Authentication, Authorization, and Least Privilege (Task 4)
Certified: The ISACA CCOA Audio Course
17:48
Episode 62 — Choose Controls and Techniques Wisely: Prevent, Detect, Correct, and Deter (Task 4)
Certified: The ISACA CCOA Audio Course
13:47
Episode 61 — Contingency Planning That Works: Backups, RTO RPO, and Recovery Priorities (Task 4)
Certified: The ISACA CCOA Audio Course
14:14
Episode 60 — Spaced Retrieval Review: Detection and Response From Signal to Lessons Learned (Task 18)
Certified: The ISACA CCOA Audio Course
14:15
Episode 59 — Threat Analysis Synthesis: Hypotheses, Root Cause, and Adversary Objectives (Task 15)
Certified: The ISACA CCOA Audio Course
13:55
Episode 58 — Packet Analysis Deep Listening: Decode Protocols and Reconstruct Conversations (Task 10)
Certified: The ISACA CCOA Audio Course
13:22
Episode 57 — Network Traffic Analysis: Flows, Sessions, and Finding the Needle Fast (Task 10)
Certified: The ISACA CCOA Audio Course
14:02
Episode 56 — Malware Analysis Essentials: Static Clues, Behavioral Signals, and Scope Estimation (Task 10)
Certified: The ISACA CCOA Audio Course
16:37
Episode 55 — Forensic Analysis in Practice: Timelines, Artifacts, and Proving What Happened (Task 14)
Certified: The ISACA CCOA Audio Course
14:49
Episode 54 — Forensic Analysis Fundamentals: Preservation, Collection, Integrity, and Chain of Custody (Task 14)
Certified: The ISACA CCOA Audio Course
15:45
Episode 53 — Incident Handling End to End: Classification, Escalation, Notification, and Handoffs (Task 9)
Certified: The ISACA CCOA Audio Course
17:17
Episode 52 — Incident Containment Choices: Isolate, Block, Disable, or Deceive Safely (Task 13)
Certified: The ISACA CCOA Audio Course
17:21
Episode 51 — Compare Monitoring Tools and Technologies: SIEM, EDR, NDR, SOAR, and IDS (Task 7)
Certified: The ISACA CCOA Audio Course
19:10
Episode 50 — Logs and Alerts Triage: Prioritization, Enrichment, and Next-Best Questions (Task 8)
Certified: The ISACA CCOA Audio Course
17:07
Episode 49 — Master Logs and Alerts: Sources, Normalization, Context, and Alert Fatigue (Task 7)
Certified: The ISACA CCOA Audio Course
15:30
Episode 48 — Recognize Indicators of Compromise and or Attack With High Confidence (Task 7)
Certified: The ISACA CCOA Audio Course
18:55
Episode 47 — Tune Detection Use Cases: Reduce Noise Without Missing True Positives (Task 6)
Certified: The ISACA CCOA Audio Course
17:19
Episode 46 — Build Detection Use Cases That Map to Real Adversary Behavior (Task 6)
Certified: The ISACA CCOA Audio Course
17:26
Episode 45 — Data Analytics for Detection: Baselines, Outliers, Correlation, and Meaningful Signals (Task 6)
Certified: The ISACA CCOA Audio Course
17:22
Episode 44 — Spaced Retrieval Review: Adversary Tactics, Techniques, and Procedures Rapid Recall (Task 18)
Certified: The ISACA CCOA Audio Course
15:29
Episode 43 — Penetration Testing Explained for Defenders: Reading Results and Closing Gaps (Task 2)
Certified: The ISACA CCOA Audio Course
18:03
Episode 42 — Grasp Exploit Techniques: Privilege Escalation, Lateral Movement, and Living Off Land (Task 1)
Certified: The ISACA CCOA Audio Course
16:05
Episode 41 — Walk Through Cyber Attack Stages: Recon, Exploit, Persist, and Exfiltrate (Task 1)
Certified: The ISACA CCOA Audio Course
15:34
Episode 40 — Differentiate Attack Types: Ransomware, BEC, DDoS, and Data Theft (Task 1)
Certified: The ISACA CCOA Audio Course
14:36
Episode 39 — Evaluate Threat Intelligence Sources: Credibility, Context, Timeliness, and Actionability (Task 3)
Certified: The ISACA CCOA Audio Course
15:03
Episode 38 — Profile Threat Actors and Agents: Motivation, Capability, and Likely Next Moves (Task 1)
Certified: The ISACA CCOA Audio Course
13:53
Episode 36 — Spaced Retrieval Review: Cybersecurity Principles and Risk in One Narrative (Task 18)
Certified: The ISACA CCOA Audio Course
14:50
Episode 35 — Understand Web Application Risk: OWASP Patterns and Real-World Attack Paths (Task 2)
Certified: The ISACA CCOA Audio Course
15:42
Episode 34 — Contain System and Endpoint Risk: Patching, Hardening, and EDR Realities (Task 2)
Certified: The ISACA CCOA Audio Course
16:18
Episode 33 — Tackle Supply Chain Risk: Vendors, Dependencies, and Software Integrity Validation (Task 17)
Certified: The ISACA CCOA Audio Course
15:46
Episode 32 — Manage Network Risk: Exposure, Lateral Movement Paths, and Resilience Weaknesses (Task 2)
Certified: The ISACA CCOA Audio Course
16:26
Episode 31 — Reduce Data Risk: Classification, Encryption, Retention, and Exfiltration Signals (Task 4)
Certified: The ISACA CCOA Audio Course
17:01