התחל במצב לא מקוון עם האפליקציה Player FM !
CCT 218: Design and validate assessment, test, and audit strategies for the CISSP (Domain 6.1)
Manage episode 465943462 series 3464644
Unlock the secrets to safeguarding your cloud storage from becoming a cyber attack vector in our latest episode of the CISSP Cyber Training Podcast with Shon Gerber. Discover how neglected AWS S3 buckets can pose significant threats akin to the notorious SolarWinds attack. Shon breaks down the importance of auditing and access controls while providing strategic guidance aligned with domain 6.1 of the CISSP to fortify your knowledge for the exam. This episode promises to equip you with the essential tools to protect your cloud infrastructure and maintain robust security practices.
Transitioning to security testing, we explore various methodologies and the vital role they play in incident readiness and data integrity. From vulnerability assessments to penetration testing and the collaborative efforts of red, blue, and purple teams, Shon sheds light on the automation of these processes to enhance efficacy. We also demystify SOC 1 and SOC 2 reports and discuss their criticality in vendor risk management and regulatory compliance. With insights into audit standards like ISO 27001 and PCI DSS, this episode is your comprehensive guide to understanding and applying security measures across diverse sectors.
Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
פרקים
1. CISSP Cyber Training Podcast Overview (00:00:00)
2. Security Testing and Assessments Overview (00:12:07)
3. Understanding SOC Reports and Audit Standards (00:21:52)
256 פרקים
Manage episode 465943462 series 3464644
Unlock the secrets to safeguarding your cloud storage from becoming a cyber attack vector in our latest episode of the CISSP Cyber Training Podcast with Shon Gerber. Discover how neglected AWS S3 buckets can pose significant threats akin to the notorious SolarWinds attack. Shon breaks down the importance of auditing and access controls while providing strategic guidance aligned with domain 6.1 of the CISSP to fortify your knowledge for the exam. This episode promises to equip you with the essential tools to protect your cloud infrastructure and maintain robust security practices.
Transitioning to security testing, we explore various methodologies and the vital role they play in incident readiness and data integrity. From vulnerability assessments to penetration testing and the collaborative efforts of red, blue, and purple teams, Shon sheds light on the automation of these processes to enhance efficacy. We also demystify SOC 1 and SOC 2 reports and discuss their criticality in vendor risk management and regulatory compliance. With insights into audit standards like ISO 27001 and PCI DSS, this episode is your comprehensive guide to understanding and applying security measures across diverse sectors.
Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
פרקים
1. CISSP Cyber Training Podcast Overview (00:00:00)
2. Security Testing and Assessments Overview (00:12:07)
3. Understanding SOC Reports and Audit Standards (00:21:52)
256 פרקים
Kaikki jaksot
×
1 CCT 253: Practice CISSP Questions - Conduct logging and monitoring activities (Domain 7.2) 25:09

1 CCT 252: Logging and Monitoring Security Activities for the CISSP (Domain 7.2) 44:45

1 CCT 251: Practice CISSP Questions - Security Control Testing, Vulnerability Assessments and Network Scanning (Domain 6.2) 19:53

1 CCT 250: Vulnerability Assessments and Network Scanning and the CISSP (D6.2.1) 39:54

1 CCT 249: Practice CISSP Questions - De-provisioning and Role Definitions (Domain 5.5.2-3) 19:10

1 CT 248: Implementing Authentication Systems (SAML, OpenID, ODIC, Kerberos, RADIUS/TACACS+) - Domain 5.6 34:21

1 CCT 247: Mastering Access Controls - From Biometrics to Administrative Policies (CISSP Domain 4) 18:34

1 CCT Vendor 03: From Bomb Loader to Hacker - A Journey in Cybersecurity with Clint Steven (Phycyx.com) 43:28

1 CCT 246: CISSP Training - Secure Communication Protocols (Domain 4.1.3) 32:35

1 CCT 245: Practice CISSP Questions - Hashing - Ensuring Message Authenticity with the CISSP (D3.6) 19:25

1 CCT 244: Cybersecurity Foundations - Message Integrity and Authentication (CISSP Domain 3.6) 31:17

1 CCT 243: Practice CISSP Questions - Information and Asset Handling Requirements (Domain 2.2) 24:50

1 CCT 242: CISSP and Information and Asset Handling Requirements (Domain 2.2) 49:41

1 CCT 241: Practice CISSP Questions - Transborder Data Flows and the CISSP (Domain 1.5) 25:05

1 CCT Vendor 02: AI in Cybersecurity: Protecting Financial Institutions - NextPeak.net 31:05
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.