Certified: The ISC(2) CC Audio Course
Duración total:
10 h 22 min
Episode 1 — Decode the ISC2 CC CAT Exam: Structure, Scoring, Policies, Tactics
Certified: The ISC(2) CC Audio Course
14:15
Episode 2 — Build a Spoken Study Plan That Matches the Official CC Objectives
Certified: The ISC(2) CC Audio Course
14:20
Episode 3 — Exam-Day Execution Without Panic: Time, Guessing, and CAT Decision Rules
Certified: The ISC(2) CC Audio Course
13:05
Episode 4 — Master Confidentiality: Prevent Data Exposure Through Practical Security Thinking
Certified: The ISC(2) CC Audio Course
14:39
Episode 6 — Safeguard Availability: Keep Systems Reliable Through Disruptions and Failures
Certified: The ISC(2) CC Audio Course
14:13
Episode 7 — Choose Authentication Methods Wisely: Factors, Strengths, and Common Mistakes
Certified: The ISC(2) CC Audio Course
13:20
Episode 8 — Make MFA Make Sense: When to Require It and How It Fails
Certified: The ISC(2) CC Audio Course
12:54
Episode 9 — Non-Repudiation Explained Clearly: Proof, Accountability, and Digital Assurance
Certified: The ISC(2) CC Audio Course
13:59
Episode 10 — Understand Privacy as a Security Concept: Data Use, Consent, and Minimization
Certified: The ISC(2) CC Audio Course
17:10
Episode 11 — Set Risk Priorities That Match the Business Mission and Real Constraints
Certified: The ISC(2) CC Audio Course
17:31
Episode 12 — Define Risk Tolerance Clearly: What the Organization Will Live With
Certified: The ISC(2) CC Audio Course
17:36
Episode 13 — Identify Risk Inputs: Assets, Threats, Vulnerabilities, and Exposure Pathways
Certified: The ISC(2) CC Audio Course
16:25
Episode 14 — Assess Risk Properly: Likelihood, Impact, and Meaningful Risk Statements
Certified: The ISC(2) CC Audio Course
19:06
Episode 15 — Treat Risk Confidently: Avoid, Mitigate, Transfer, or Accept With Rationale
Certified: The ISC(2) CC Audio Course
18:50
Episode 16 — Apply Technical Controls That Reduce Risk Without Breaking Operations
Certified: The ISC(2) CC Audio Course
18:02
Episode 17 — Use Administrative Controls Well: Policies, Process Discipline, and Human Factors
Certified: The ISC(2) CC Audio Course
17:25
Episode 18 — Strengthen Physical Controls: Layers, Barriers, and Practical Deterrence Strategies
Certified: The ISC(2) CC Audio Course
18:08
Episode 19 — Operationalize the ISC2 Code of Ethics Under Real Workplace Pressure
Certified: The ISC(2) CC Audio Course
17:43
Episode 20 — Turn Governance Into Action: Policies, Procedures, and Standards That Stick
Certified: The ISC(2) CC Audio Course
17:38
Episode 21 — Navigate Regulations and Laws: What Compliance Demands From Security Work
Certified: The ISC(2) CC Audio Course
14:52
Episode 22 — Business Continuity Purpose: Keep Critical Work Going During Disruption
Certified: The ISC(2) CC Audio Course
13:10
Episode 23 — Business Continuity Importance: Downtime Costs, Priorities, and Stakeholder Trust
Certified: The ISC(2) CC Audio Course
13:46
Episode 24 — Business Continuity Components: Roles, Dependencies, Plans, and Testing Cadence
Certified: The ISC(2) CC Audio Course
14:25
Episode 25 — Disaster Recovery Purpose: Restore IT Services Fast and Validate the Return
Certified: The ISC(2) CC Audio Course
13:22
Episode 26 — Disaster Recovery Importance: RTO, RPO, and Tradeoffs You Must Understand
Certified: The ISC(2) CC Audio Course
12:38
Episode 27 — Disaster Recovery Components: Backups, Failover, Runbooks, and Recovery Checks
Certified: The ISC(2) CC Audio Course
13:04
Episode 28 — Incident Response Purpose: Contain Damage and Restore Normal Operations
Certified: The ISC(2) CC Audio Course
11:57
Episode 29 — Incident Response Importance: Speed, Evidence, and Communication Under Stress
Certified: The ISC(2) CC Audio Course
12:43
Episode 30 — Incident Response Components: Prepare, Detect, Contain, Eradicate, Recover
Certified: The ISC(2) CC Audio Course
13:22
Episode 31 — Physical Access Controls: Badges, Gate Entry, and Environmental Design Basics
Certified: The ISC(2) CC Audio Course
15:39
Episode 32 — Monitoring Physical Security: Guards, CCTV, Alarms, and Logs That Matter
Certified: The ISC(2) CC Audio Course
18:02
Episode 33 — Authorized Versus Unauthorized Personnel: Verification, Escorts, and Real Control
Certified: The ISC(2) CC Audio Course
15:03
Episode 34 — Least Privilege in Practice: Reducing Risk Without Slowing Work to a Crawl
Certified: The ISC(2) CC Audio Course
16:33
Episode 35 — Segregation of Duties Made Simple: Preventing Abuse and Catching Mistakes Early
Certified: The ISC(2) CC Audio Course
17:11
Episode 36 — Discretionary Access Control: Ownership, Permissions, and Where It Breaks Down
Certified: The ISC(2) CC Audio Course
18:38
Episode 37 — Mandatory Access Control: Labels, Rules, and High-Control Environments
Certified: The ISC(2) CC Audio Course
16:31
Episode 38 — Role-Based Access Control: Designing Roles That Actually Reflect Job Duties
Certified: The ISC(2) CC Audio Course
16:16
Episode 39 — Computer Networking Foundations: OSI and TCP/IP Models for Security Thinking
Certified: The ISC(2) CC Audio Course
16:24
Episode 40 — IPv4 and IPv6 Basics: Addressing, Notation, and Security-Relevant Differences
Certified: The ISC(2) CC Audio Course
17:10
Episode 41 — WiFi Fundamentals for Security: How Wireless Works and Where Attacks Hide
Certified: The ISC(2) CC Audio Course
15:00