Certified: The ISC2 CC Audio Course (2026 Version)

Toplam süre:11 h 12 min
Welcome to the ISC2 CC Course!
Certified: The ISC2 CC Audio Course (2026 Version)
01:06
Episode 1 — Decode the 2026 CC Blueprint Structure and Spoken Learning Path
Certified: The ISC2 CC Audio Course (2026 Version)
15:20
Episode 2 — Build Steady Pacing and Decision Habits for Adaptive Question Thinking
Certified: The ISC2 CC Audio Course (2026 Version)
14:42
Episode 3 — Master Confidentiality Integrity and Availability as Your Security Compass
Certified: The ISC2 CC Audio Course (2026 Version)
16:40
Episode 4 — Connect Authentication Authorization Accounting Non Repudiation and Privacy in Practice
Certified: The ISC2 CC Audio Course (2026 Version)
17:02
Episode 5 — Protect AI Integrity Privacy and Availability Against Model Poisoning Risks
Certified: The ISC2 CC Audio Course (2026 Version)
15:07
Episode 6 — Navigate the Risk Management Lifecycle and Risk Management Processes
Certified: The ISC2 CC Audio Course (2026 Version)
16:59
Episode 7 — Map Regulations Laws Frameworks Guidelines Policies Standards Procedures ISO and CIS
Certified: The ISC2 CC Audio Course (2026 Version)
18:49
Episode 8 — Govern AI Adoption with Policies Laws Risk Appetite Transparency and Bias Awareness
Certified: The ISC2 CC Audio Course (2026 Version)
17:38
Episode 9 — Compare Technical Administrative and Physical Controls for Better Decisions
Certified: The ISC2 CC Audio Course (2026 Version)
17:30
Episode 10 — Maintain Professional Conduct with Due Care Diligence and ISC2 Ethics
Certified: The ISC2 CC Audio Course (2026 Version)
18:18
Episode 11 — Apply Security Principles Through Fast Scenario Based Decision Making
Certified: The ISC2 CC Audio Course (2026 Version)
16:52
Episode 12 — Plan Governance Risk and Compliance with Purpose and Practical Tools
Certified: The ISC2 CC Audio Course (2026 Version)
18:15
Episode 13 — Build Redundancy Thinking Around Business Continuity and Disaster Recovery
Certified: The ISC2 CC Audio Course (2026 Version)
17:37
Episode 14 — Protect AI Continuity Through Dataset Backups Configuration Recovery and Model Drift
Certified: The ISC2 CC Audio Course (2026 Version)
16:42
Episode 15 — Shape Security Awareness Through Organizational Culture and Leadership
Certified: The ISC2 CC Audio Course (2026 Version)
17:50
Episode 16 — Defend Against Social Engineering with Password Protection and Phishing Awareness
Certified: The ISC2 CC Audio Course (2026 Version)
17:44
Episode 17 — Measure Cybersecurity Effectiveness Using KRIs Dashboards Scorecards and Reports
Certified: The ISC2 CC Audio Course (2026 Version)
16:50
Episode 18 — Connect GRC Redundancy Awareness and Metrics into Practical Governance Thinking
Certified: The ISC2 CC Audio Course (2026 Version)
19:17
Episode 19 — Define Identity Roles Before Provisioning Decisions Create Access Risk
Certified: The ISC2 CC Audio Course (2026 Version)
17:35
Episode 20 — Provision Access with Lifecycle Control and Accountability in Mind
Certified: The ISC2 CC Audio Course (2026 Version)
17:00
Episode 21 — Review Identity Access Regularly Before Privilege Drift Becomes Dangerous
Certified: The ISC2 CC Audio Course (2026 Version)
15:27
Episode 22 — Deprovision Access Cleanly When Roles People or Systems Change
Certified: The ISC2 CC Audio Course (2026 Version)
16:22
Episode 23 — Compare IAM Frameworks and Tools Without Losing the Lifecycle View
Certified: The ISC2 CC Audio Course (2026 Version)
15:29
Episode 24 — Control AI Bots and Service Accounts Through Lifecycle and Least Privilege
Certified: The ISC2 CC Audio Course (2026 Version)
16:45
Episode 25 — Enforce Least Privilege and Separation of Duties in Daily Decisions
Certified: The ISC2 CC Audio Course (2026 Version)
16:03
Episode 26 — Evaluate Access Control Models for Realistic Logical Control Choices
Certified: The ISC2 CC Audio Course (2026 Version)
17:29
Episode 27 — Apply IAM Concepts Through Role Lifecycle and Access Scenarios
Certified: The ISC2 CC Audio Course (2026 Version)
18:33
Episode 28 — Map OSI TCP IP IPv4 IPv6 and VPN Concepts Clearly
Certified: The ISC2 CC Audio Course (2026 Version)
17:13
Episode 29 — Interpret Firewalls Ports and Applications as Network Control Points
Certified: The ISC2 CC Audio Course (2026 Version)
16:18
Episode 30 — Secure Wireless Concepts Across Wi-Fi Bluetooth and Everyday Connections
Certified: The ISC2 CC Audio Course (2026 Version)
17:50
Episode 31 — Recognize Embedded Systems ICS and IoT Security Boundaries
Certified: The ISC2 CC Audio Course (2026 Version)
18:26
Episode 32 — Design Segmentation with Firewall Zones VLANs and Micro-Segmentation
Certified: The ISC2 CC Audio Course (2026 Version)
18:42
Episode 33 — Layer Defense in Depth and Zero Trust into Architecture
Certified: The ISC2 CC Audio Course (2026 Version)
17:21
Episode 34 — Secure AI Data Pathways with Segmentation Zero Trust and Protected Environments
Certified: The ISC2 CC Audio Course (2026 Version)
16:57
Episode 35 — Understand Cloud Characteristics That Shape Security Expectations and Risk
Certified: The ISC2 CC Audio Course (2026 Version)
19:34
Episode 36 — Compare Cloud Service Models SaaS PaaS IaaS and Responsibility Boundaries
Certified: The ISC2 CC Audio Course (2026 Version)
16:26
Episode 37 — Choose Cloud Deployment Models with Clear Security Tradeoff Thinking
Certified: The ISC2 CC Audio Course (2026 Version)
18:25
Episode 38 — Apply Shared Security Models Across Roles Responsibilities and Boundaries
Certified: The ISC2 CC Audio Course (2026 Version)
16:02
Episode 39 — Protect Data Through Classification Labeling Masking Sanitization and Handling
Certified: The ISC2 CC Audio Course (2026 Version)
17:49