Certified: The CompTIA SecurityX Audio Course

Загальна тривалість:10 h 56 min
Welcome to Certified: The CompTIA SecurityX Audio Course
Certified: The CompTIA SecurityX Audio Course
00:55
Episode 1 — Master the SecurityX Exam Format, Policies, Scoring, and PBQ Time Tactics
Certified: The CompTIA SecurityX Audio Course
15:35
Episode 2 — Build a Spoken Study Plan and Exam-Day Mental Models for SecurityX Success
Certified: The CompTIA SecurityX Audio Course
14:47
Episode 3 — Operationalize Security Program Documentation: Policies, Standards, Procedures, Guidelines
Certified: The CompTIA SecurityX Audio Course
17:16
Episode 4 — Run Security Program Management Like a Pro: Training, RACI, Reporting
Certified: The CompTIA SecurityX Audio Course
14:46
Episode 5 — Apply Governance Frameworks Wisely: COBIT, ITIL, and Practical Control Mapping
Certified: The CompTIA SecurityX Audio Course
15:09
Episode 6 — Control Change and Configuration Management Without Creating Security Drift
Certified: The CompTIA SecurityX Audio Course
14:49
Episode 7 — Use GRC Tools for Mapping, Automation, Continuous Monitoring, and Evidence
Certified: The CompTIA SecurityX Audio Course
14:00
Episode 8 — Govern Data Across Staging Environments: Dev, Test, QA, and Production
Certified: The CompTIA SecurityX Audio Course
15:05
Episode 9 — Perform Impact Analysis Using Extreme-but-Plausible Scenarios That Actually Matter
Certified: The CompTIA SecurityX Audio Course
14:08
Episode 10 — Execute Risk Assessments: Quantitative vs Qualitative, Appetite, Tolerance, Prioritization
Certified: The CompTIA SecurityX Audio Course
14:05
Episode 11 — Manage Third-Party Risk: Supply Chain, Vendors, and Subprocessors Without Blind Spots
Certified: The CompTIA SecurityX Audio Course
17:38
Episode 12 — Protect Availability: BC/DR Testing, Connected Backups, Disconnected Backups, Recovery
Certified: The CompTIA SecurityX Audio Course
19:19
Episode 13 — Protect Confidentiality: Leak Response, Privileged Data Breach, Reporting, Encryption
Certified: The CompTIA SecurityX Audio Course
20:56
Episode 14 — Protect Integrity: Hashing, Remote Journaling, Anti-Tampering, Interference Controls
Certified: The CompTIA SecurityX Audio Course
19:02
Episode 15 — Build Privacy Into Risk Decisions: Sovereignty, Biometrics, and Data Subject Rights
Certified: The CompTIA SecurityX Audio Course
20:18
Episode 16 — Explain Compliance Impacts: Industry Requirements and Cross-Jurisdiction Realities
Certified: The CompTIA SecurityX Audio Course
17:41
Episode 17 — Map Standards and Frameworks: PCI DSS, ISO/IEC 27000, SOC 2, NIST CSF, CIS, CSA
Certified: The CompTIA SecurityX Audio Course
19:00
Episode 18 — Threat Modeling Like You Mean It: Actors, Motivations, Resources, Capabilities
Certified: The CompTIA SecurityX Audio Course
16:34
Episode 19 — Threat Modeling Frameworks in Practice: ATT&CK, CAPEC, STRIDE, Kill Chain, OWASP
Certified: The CompTIA SecurityX Audio Course
16:51
Episode 20 — Determine Attack Surface Fast: Trust Boundaries, Data Flows, Code Reviews, Discovery
Certified: The CompTIA SecurityX Audio Course
16:25
Episode 21 — Model Threat Applicability: Control Selection With and Without Existing Systems
Certified: The CompTIA SecurityX Audio Course
15:58
Episode 22 — Secure AI Adoption: Prompt Injection, Data Poisoning, Model Theft, and Model DoS
Certified: The CompTIA SecurityX Audio Course
15:44
Episode 23 — Reduce AI Risk: Guardrails, DLP, Permissions, Disclosure, and Overreliance Traps
Certified: The CompTIA SecurityX Audio Course
15:28
Episode 24 — Design Resilient Systems: Component Placement for Firewalls, IDS/IPS, WAF, VPN, NAC
Certified: The CompTIA SecurityX Audio Course
17:50
Episode 25 — Engineer Availability and Integrity: Scaling, Recoverability, Persistence, Geography
Certified: The CompTIA SecurityX Audio Course
15:03
Episode 26 — Define Security Requirements Early: Functional, Non-Functional, and Usability Tradeoffs
Certified: The CompTIA SecurityX Audio Course
14:18
Episode 27 — Build Security Through the SDLC: Coding Practices, Reviews, Testing, and Retesting
Certified: The CompTIA SecurityX Audio Course
14:47
Episode 28 — Handle Supply Chain Risk in the SDLC: Software, Hardware, Assurance, and EOL
Certified: The CompTIA SecurityX Audio Course
16:03
Episode 29 — Integrate Controls Into Secure Architecture: Defense-in-Depth, Hardening, Legacy Reality
Certified: The CompTIA SecurityX Audio Course
14:44
Episode 30 — Enable Detection by Design: Central Logging, Monitoring, Alerting, and Sensor Placement
Certified: The CompTIA SecurityX Audio Course
14:28
Episode 31 — Design Data Security Controls: Classification Models, Labeling, and Tagging Strategies
Certified: The CompTIA SecurityX Audio Course
18:44
Episode 32 — Operationalize DLP Architecture: At Rest, In Transit, and Data Discovery
Certified: The CompTIA SecurityX Audio Course
18:30
Episode 33 — Secure Hybrid Architectures and Third-Party Integrations Without Weak Trust Boundaries
Certified: The CompTIA SecurityX Audio Course
17:30
Episode 34 — Measure Control Effectiveness: Assessments, Scanning, and Metrics That Drive Action
Certified: The CompTIA SecurityX Audio Course
18:58
Episode 35 — Design Secure Access Systems: Provisioning, Deprovisioning, Federation, and SSO
Certified: The CompTIA SecurityX Audio Course
19:32
Episode 36 — Apply Access Control Models Precisely: RBAC, ABAC, MAC, DAC, and Enforcement Points
Certified: The CompTIA SecurityX Audio Course
15:47
Episode 37 — Build PKI Architecture That Works: CA/RA, Templates, OCSP Stapling, Certificate Types
Certified: The CompTIA SecurityX Audio Course
20:11
Episode 38 — Secure Physical and Logical Access Control Systems With Auditable Decisions
Certified: The CompTIA SecurityX Audio Course
19:30
Episode 39 — Securely Implement Cloud Capabilities: CASB, CI/CD, Containers, Serverless, API Security
Certified: The CompTIA SecurityX Audio Course
19:17