<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/certified-the-cissp-prepcast" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Certified: The CISSP Audio Course</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/certified-the-cissp-prepcast</itunes:new-feed-url>
    <description>Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations to help you understand not just what to study, but how to think like a security professional. Whether you’re commuting, exercising, or studying after work, this series provides the clarity and direction you need to stay motivated and on track.

The CISSP certification, governed by ISC², is one of the most respected and globally recognized credentials in information security. It validates deep technical and managerial expertise across areas such as security architecture, risk management, asset protection, identity and access control, network and software security, and incident response. CISSP holders are trusted to design, implement, and manage comprehensive cybersecurity programs that protect critical systems and data. Earning this certification demonstrates both strategic understanding and hands-on mastery—an achievement that opens doors to leadership roles across government, corporate, and consulting environments.

Developed by BareMetalCyber.com, the CISSP Audio Course delivers structured, professional instruction that aligns with the latest exam outline and real-world best practices. It’s more than preparation—it’s a roadmap for advancing your cybersecurity career with confidence, clarity, and purpose.
</description>
    <copyright>2025 Bare Metal Cyber TM</copyright>
    <podcast:guid>143fc9c4-74e3-506c-8f6a-319fe2cb366d</podcast:guid>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="6ad73685-a446-5ab3-8b2c-c25af99834f6" feedUrl="https://feeds.transistor.fm/certified-the-security-prepcast"/>
      <podcast:remoteItem feedGuid="95828547-bd9f-5d7b-91db-b53509a3caf0" feedUrl="https://feeds.transistor.fm/certified-itil-foundation-v4"/>
      <podcast:remoteItem feedGuid="1e81ed4d-b3a7-5035-b12a-5171bdd497b8" feedUrl="https://feeds.transistor.fm/certified-the-crisc-prepcast"/>
      <podcast:remoteItem feedGuid="c424cfac-04e8-5c02-8ac7-4df13280735d" feedUrl="https://feeds.transistor.fm/certified-the-isaca-cisa-prepcast"/>
      <podcast:remoteItem feedGuid="506cc512-6361-5285-8cdf-7de14a0f5a64" feedUrl="https://feeds.transistor.fm/certified-aws-certified-cloud-practitioner"/>
      <podcast:remoteItem feedGuid="9af25f2f-f465-5c56-8635-fc5e831ff06a" feedUrl="https://feeds.transistor.fm/bare-metal-cyber-a725a484-8216-4f80-9a32-2bfd5efcc240"/>
      <podcast:remoteItem feedGuid="ac645ca7-7469-50bf-9010-f13c165e3e14" feedUrl="https://feeds.transistor.fm/baremetalcyber-dot-one"/>
      <podcast:remoteItem feedGuid="0a94ff8f-95c6-5b31-9262-c3761e5e5fc3" feedUrl="https://feeds.transistor.fm/certified-comptia-network"/>
      <podcast:remoteItem feedGuid="3620e13c-e0ca-5640-840a-2a3805dddeb7" feedUrl="https://feeds.transistor.fm/bmc-daily-cyber-news"/>
    </podcast:podroll>
    <podcast:locked owner="baremetalcyber@outlook.com">no</podcast:locked>
    <itunes:applepodcastsverify>43dcf4e0-8303-11f0-a92e-9f202ed855fd</itunes:applepodcastsverify>
    <podcast:trailer pubdate="Mon, 13 Oct 2025 22:33:34 -0500" url="https://media.transistor.fm/7ec9e96b/7e33da59.mp3" length="4175411" type="audio/mpeg">Welcome to the ISC2 CISSP Audio Course</podcast:trailer>
    <language>en</language>
    <pubDate>Sat, 24 Jan 2026 10:30:01 -0600</pubDate>
    <lastBuildDate>Wed, 11 Mar 2026 00:05:42 -0500</lastBuildDate>
    <link>https://baremetalcyber.com/isc2-cissp-audio-course</link>
    <image>
      <url>https://img.transistorcdn.com/wAiHmE3djEuaKqO6CNaFvDecYnwjVr6M9kNztLrzfjg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jY2Zl/ZWJiZDdlOTkzYTc2/YTJkZjk0OWY5NmUy/Njg1My5wbmc.jpg</url>
      <title>Certified: The CISSP Audio Course</title>
      <link>https://baremetalcyber.com/isc2-cissp-audio-course</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Education">
      <itunes:category text="Courses"/>
    </itunes:category>
    <itunes:type>serial</itunes:type>
    <itunes:author>Dr. Jason Edwards</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/wAiHmE3djEuaKqO6CNaFvDecYnwjVr6M9kNztLrzfjg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jY2Zl/ZWJiZDdlOTkzYTc2/YTJkZjk0OWY5NmUy/Njg1My5wbmc.jpg"/>
    <itunes:summary>Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations to help you understand not just what to study, but how to think like a security professional. Whether you’re commuting, exercising, or studying after work, this series provides the clarity and direction you need to stay motivated and on track.

The CISSP certification, governed by ISC², is one of the most respected and globally recognized credentials in information security. It validates deep technical and managerial expertise across areas such as security architecture, risk management, asset protection, identity and access control, network and software security, and incident response. CISSP holders are trusted to design, implement, and manage comprehensive cybersecurity programs that protect critical systems and data. Earning this certification demonstrates both strategic understanding and hands-on mastery—an achievement that opens doors to leadership roles across government, corporate, and consulting environments.

Developed by BareMetalCyber.com, the CISSP Audio Course delivers structured, professional instruction that aligns with the latest exam outline and real-world best practices. It’s more than preparation—it’s a roadmap for advancing your cybersecurity career with confidence, clarity, and purpose.
</itunes:summary>
    <itunes:subtitle>Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification.</itunes:subtitle>
    <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
    <itunes:owner>
      <itunes:name>Jason Edwards</itunes:name>
      <itunes:email>baremetalcyber@outlook.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Episode 1: What Is the CISSP and Why It Matters</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Episode 1: What Is the CISSP and Why It Matters</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">daf6bda2-db2c-4f2f-9e55-bb3f470b272a</guid>
      <link>https://share.transistor.fm/s/1ebb590d</link>
      <description>
        <![CDATA[<p>In this foundational episode, we introduce the Certified Information Systems Security Professional—better known as the CISSP. You’ll learn what the certification represents, who it’s designed for, and why it continues to be considered the gold standard for cybersecurity professionals around the world. We explore how the CISSP stands apart from other security credentials, what it proves about your skills, and how it fits into the broader cybersecurity career ecosystem. Whether you’re pursuing technical leadership, governance, or executive-level roles, understanding the CISSP’s value is the first step toward strategic career development.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this foundational episode, we introduce the Certified Information Systems Security Professional—better known as the CISSP. You’ll learn what the certification represents, who it’s designed for, and why it continues to be considered the gold standard for cybersecurity professionals around the world. We explore how the CISSP stands apart from other security credentials, what it proves about your skills, and how it fits into the broader cybersecurity career ecosystem. Whether you’re pursuing technical leadership, governance, or executive-level roles, understanding the CISSP’s value is the first step toward strategic career development.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:11:10 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1ebb590d/cbae10d4.mp3" length="32728605" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>817</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this foundational episode, we introduce the Certified Information Systems Security Professional—better known as the CISSP. You’ll learn what the certification represents, who it’s designed for, and why it continues to be considered the gold standard for cybersecurity professionals around the world. We explore how the CISSP stands apart from other security credentials, what it proves about your skills, and how it fits into the broader cybersecurity career ecosystem. Whether you’re pursuing technical leadership, governance, or executive-level roles, understanding the CISSP’s value is the first step toward strategic career development.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1ebb590d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 2: CISSP vs. Other Certifications: Which One’s Right for You?</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode 2: CISSP vs. Other Certifications: Which One’s Right for You?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1983c61c-10a2-4764-9af9-f194deb40fb8</guid>
      <link>https://share.transistor.fm/s/6f66cae6</link>
      <description>
        <![CDATA[<p>Choosing the right cybersecurity certification can shape your career for years to come. In this episode, we compare the CISSP to other well-known certifications including CompTIA Security+, CISM, CRISC, and CEH. We examine how these credentials differ in focus, experience level, and strategic alignment—helping you understand which path fits your background and goals. Whether you're looking for a technical launchpad or a management-level credential, this discussion highlights where the CISSP stands in the broader certification landscape and how it fits into a layered learning and professional development plan.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Choosing the right cybersecurity certification can shape your career for years to come. In this episode, we compare the CISSP to other well-known certifications including CompTIA Security+, CISM, CRISC, and CEH. We examine how these credentials differ in focus, experience level, and strategic alignment—helping you understand which path fits your background and goals. Whether you're looking for a technical launchpad or a management-level credential, this discussion highlights where the CISSP stands in the broader certification landscape and how it fits into a layered learning and professional development plan.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:11:59 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6f66cae6/eb5e9f8e.mp3" length="41752436" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1043</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Choosing the right cybersecurity certification can shape your career for years to come. In this episode, we compare the CISSP to other well-known certifications including CompTIA Security+, CISM, CRISC, and CEH. We examine how these credentials differ in focus, experience level, and strategic alignment—helping you understand which path fits your background and goals. Whether you're looking for a technical launchpad or a management-level credential, this discussion highlights where the CISSP stands in the broader certification landscape and how it fits into a layered learning and professional development plan.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6f66cae6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 3: Career Impact of the CISSP: Roles, Salaries, Growth</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Episode 3: Career Impact of the CISSP: Roles, Salaries, Growth</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">17122fc5-fe1c-4f6e-8059-0f32848ccbda</guid>
      <link>https://share.transistor.fm/s/03d4b360</link>
      <description>
        <![CDATA[<p>The CISSP isn’t just a certification—it’s a powerful career accelerator. This episode breaks down how earning your CISSP can open doors to high-level roles, raise your earning potential, and give you access to new leadership opportunities in the cybersecurity field. We cover the types of positions typically held by CISSP-certified professionals, explore industry data on salary trends, and discuss how employers view this credential during the hiring process. If you're wondering whether the CISSP is worth the investment, this episode lays out the tangible career benefits that come with certification.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The CISSP isn’t just a certification—it’s a powerful career accelerator. This episode breaks down how earning your CISSP can open doors to high-level roles, raise your earning potential, and give you access to new leadership opportunities in the cybersecurity field. We cover the types of positions typically held by CISSP-certified professionals, explore industry data on salary trends, and discuss how employers view this credential during the hiring process. If you're wondering whether the CISSP is worth the investment, this episode lays out the tangible career benefits that come with certification.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:12:50 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/03d4b360/4a228756.mp3" length="45697893" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1142</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The CISSP isn’t just a certification—it’s a powerful career accelerator. This episode breaks down how earning your CISSP can open doors to high-level roles, raise your earning potential, and give you access to new leadership opportunities in the cybersecurity field. We cover the types of positions typically held by CISSP-certified professionals, explore industry data on salary trends, and discuss how employers view this credential during the hiring process. If you're wondering whether the CISSP is worth the investment, this episode lays out the tangible career benefits that come with certification.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/03d4b360/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 4: How to Study and Pass the CISSP Exam: Resources and Mindset</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Episode 4: How to Study and Pass the CISSP Exam: Resources and Mindset</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">718f0843-e321-44c7-a3ff-b4a633b7e19d</guid>
      <link>https://share.transistor.fm/s/a9e7f7d2</link>
      <description>
        <![CDATA[<p>Success on the CISSP exam requires more than memorizing facts—it takes a strategy, the right materials, and a focused mindset. In this episode, we walk through the most effective ways to prepare for the test, from selecting the right books and practice exams to choosing between self-paced and instructor-led training. We also talk about managing study timelines, pacing your progress, and mentally preparing for the adaptive test environment. If you're committed to passing the CISSP on your first attempt, this episode will give you the tools and confidence to build a structured and effective study plan.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Success on the CISSP exam requires more than memorizing facts—it takes a strategy, the right materials, and a focused mindset. In this episode, we walk through the most effective ways to prepare for the test, from selecting the right books and practice exams to choosing between self-paced and instructor-led training. We also talk about managing study timelines, pacing your progress, and mentally preparing for the adaptive test environment. If you're committed to passing the CISSP on your first attempt, this episode will give you the tools and confidence to build a structured and effective study plan.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:13:42 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a9e7f7d2/aa659468.mp3" length="38890391" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>971</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Success on the CISSP exam requires more than memorizing facts—it takes a strategy, the right materials, and a focused mindset. In this episode, we walk through the most effective ways to prepare for the test, from selecting the right books and practice exams to choosing between self-paced and instructor-led training. We also talk about managing study timelines, pacing your progress, and mentally preparing for the adaptive test environment. If you're committed to passing the CISSP on your first attempt, this episode will give you the tools and confidence to build a structured and effective study plan.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a9e7f7d2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 5: The CIA Triad: Confidentiality, Integrity, Availability</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Episode 5: The CIA Triad: Confidentiality, Integrity, Availability</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">436d70d1-19a1-4c8a-bc9a-0553215aa910</guid>
      <link>https://share.transistor.fm/s/4e6830a7</link>
      <description>
        <![CDATA[<p>Every cybersecurity professional must understand the CIA triad—confidentiality, integrity, and availability. These three pillars form the core of nearly every security strategy, policy, and control. In this episode, we break down what each term means, how they apply to real-world environments, and why balancing them is critical to risk management. You’ll learn how breaches in confidentiality, corruption of data integrity, or denial of availability can disrupt business operations and violate trust. This foundational concept is essential for mastering other topics across the CISSP domains.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Every cybersecurity professional must understand the CIA triad—confidentiality, integrity, and availability. These three pillars form the core of nearly every security strategy, policy, and control. In this episode, we break down what each term means, how they apply to real-world environments, and why balancing them is critical to risk management. You’ll learn how breaches in confidentiality, corruption of data integrity, or denial of availability can disrupt business operations and violate trust. This foundational concept is essential for mastering other topics across the CISSP domains.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:14:45 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4e6830a7/24198a59.mp3" length="31646109" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>790</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Every cybersecurity professional must understand the CIA triad—confidentiality, integrity, and availability. These three pillars form the core of nearly every security strategy, policy, and control. In this episode, we break down what each term means, how they apply to real-world environments, and why balancing them is critical to risk management. You’ll learn how breaches in confidentiality, corruption of data integrity, or denial of availability can disrupt business operations and violate trust. This foundational concept is essential for mastering other topics across the CISSP domains.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4e6830a7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 6: Security Governance Principles: Frameworks and Strategy</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Episode 6: Security Governance Principles: Frameworks and Strategy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b7bb9c65-622a-4394-8309-157a18951649</guid>
      <link>https://share.transistor.fm/s/9e9769c8</link>
      <description>
        <![CDATA[<p>Governance gives structure and direction to an organization’s cybersecurity efforts. In this episode, we explore what it means to build a security strategy aligned with business goals, risk appetite, and compliance obligations. You’ll learn about common governance frameworks such as NIST, ISO, and COBIT, and how they guide policy creation, control selection, and program management. We also discuss the importance of leadership involvement, accountability, and communication when establishing effective governance. Mastering these principles is key for any cybersecurity leader working at the strategic level.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Governance gives structure and direction to an organization’s cybersecurity efforts. In this episode, we explore what it means to build a security strategy aligned with business goals, risk appetite, and compliance obligations. You’ll learn about common governance frameworks such as NIST, ISO, and COBIT, and how they guide policy creation, control selection, and program management. We also discuss the importance of leadership involvement, accountability, and communication when establishing effective governance. Mastering these principles is key for any cybersecurity leader working at the strategic level.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:15:40 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9e9769c8/3eed6253.mp3" length="42677097" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1066</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Governance gives structure and direction to an organization’s cybersecurity efforts. In this episode, we explore what it means to build a security strategy aligned with business goals, risk appetite, and compliance obligations. You’ll learn about common governance frameworks such as NIST, ISO, and COBIT, and how they guide policy creation, control selection, and program management. We also discuss the importance of leadership involvement, accountability, and communication when establishing effective governance. Mastering these principles is key for any cybersecurity leader working at the strategic level.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9e9769c8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 7: Compliance Requirements: Legal, Regulatory, Contractual</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Episode 7: Compliance Requirements: Legal, Regulatory, Contractual</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">76a023ad-ca3e-4c22-a225-304c9c78064c</guid>
      <link>https://share.transistor.fm/s/792da330</link>
      <description>
        <![CDATA[<p>Cybersecurity professionals must navigate a complex landscape of compliance obligations. This episode explains the differences between legal, regulatory, and contractual requirements, and how they impact your organization’s security posture. From privacy laws like GDPR and CCPA to industry frameworks such as HIPAA, PCI-DSS, and SOX, we explore what it takes to build and maintain compliance. We also address contractual security obligations that arise in third-party agreements. If you’re preparing for CISSP exam questions related to governance, law, and regulation, this episode provides critical clarity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cybersecurity professionals must navigate a complex landscape of compliance obligations. This episode explains the differences between legal, regulatory, and contractual requirements, and how they impact your organization’s security posture. From privacy laws like GDPR and CCPA to industry frameworks such as HIPAA, PCI-DSS, and SOX, we explore what it takes to build and maintain compliance. We also address contractual security obligations that arise in third-party agreements. If you’re preparing for CISSP exam questions related to governance, law, and regulation, this episode provides critical clarity.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:16:54 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/792da330/b9535b77.mp3" length="44970648" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1123</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cybersecurity professionals must navigate a complex landscape of compliance obligations. This episode explains the differences between legal, regulatory, and contractual requirements, and how they impact your organization’s security posture. From privacy laws like GDPR and CCPA to industry frameworks such as HIPAA, PCI-DSS, and SOX, we explore what it takes to build and maintain compliance. We also address contractual security obligations that arise in third-party agreements. If you’re preparing for CISSP exam questions related to governance, law, and regulation, this episode provides critical clarity.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/792da330/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 8: Organizational Roles and Responsibilities</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Episode 8: Organizational Roles and Responsibilities</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">40bc1ef5-1190-4bc1-a348-eb4d791bb4da</guid>
      <link>https://share.transistor.fm/s/b218f04a</link>
      <description>
        <![CDATA[<p>Security is not the job of a single person or department—it’s a shared responsibility across the organization. In this episode, we examine the roles of executives, managers, security teams, end users, and third-party stakeholders in protecting assets and managing risk. You’ll learn about role-based access, segregation of duties, the function of a CISO, and the interplay between business units and IT. Understanding how responsibilities are distributed is essential for implementing effective governance, managing incidents, and ensuring organizational accountability.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security is not the job of a single person or department—it’s a shared responsibility across the organization. In this episode, we examine the roles of executives, managers, security teams, end users, and third-party stakeholders in protecting assets and managing risk. You’ll learn about role-based access, segregation of duties, the function of a CISO, and the interplay between business units and IT. Understanding how responsibilities are distributed is essential for implementing effective governance, managing incidents, and ensuring organizational accountability.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:17:52 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b218f04a/f2f68e79.mp3" length="42640512" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1065</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security is not the job of a single person or department—it’s a shared responsibility across the organization. In this episode, we examine the roles of executives, managers, security teams, end users, and third-party stakeholders in protecting assets and managing risk. You’ll learn about role-based access, segregation of duties, the function of a CISO, and the interplay between business units and IT. Understanding how responsibilities are distributed is essential for implementing effective governance, managing incidents, and ensuring organizational accountability.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b218f04a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 9: Professional Ethics and (ISC)² Code of Ethics</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Episode 9: Professional Ethics and (ISC)² Code of Ethics</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">59d8e575-5e37-4e83-ac35-679d39fe29ee</guid>
      <link>https://share.transistor.fm/s/0f0b4e0f</link>
      <description>
        <![CDATA[<p>Ethics are the backbone of trust in the cybersecurity profession. This episode explores the professional responsibilities outlined in the ISC² Code of Ethics, including the duty to protect society, act honorably, provide competent service, and advance the profession. We explain how these ethical canons apply to real-world decision-making and the consequences of ethical violations. As a CISSP candidate, demonstrating ethical judgment isn’t just part of the exam—it’s a lifelong obligation. This episode lays the ethical foundation for your professional conduct in and beyond the certification.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Ethics are the backbone of trust in the cybersecurity profession. This episode explores the professional responsibilities outlined in the ISC² Code of Ethics, including the duty to protect society, act honorably, provide competent service, and advance the profession. We explain how these ethical canons apply to real-world decision-making and the consequences of ethical violations. As a CISSP candidate, demonstrating ethical judgment isn’t just part of the exam—it’s a lifelong obligation. This episode lays the ethical foundation for your professional conduct in and beyond the certification.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:18:43 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0f0b4e0f/2dcd9f9c.mp3" length="41347977" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1033</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Ethics are the backbone of trust in the cybersecurity profession. This episode explores the professional responsibilities outlined in the ISC² Code of Ethics, including the duty to protect society, act honorably, provide competent service, and advance the profession. We explain how these ethical canons apply to real-world decision-making and the consequences of ethical violations. As a CISSP candidate, demonstrating ethical judgment isn’t just part of the exam—it’s a lifelong obligation. This episode lays the ethical foundation for your professional conduct in and beyond the certification.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0f0b4e0f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 10: Risk Management Concepts: Threats, Vulnerabilities, Risk</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Episode 10: Risk Management Concepts: Threats, Vulnerabilities, Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">937d64f4-f9a0-46a8-9714-2a95128bc528</guid>
      <link>https://share.transistor.fm/s/974e2513</link>
      <description>
        <![CDATA[<p>Risk management is a cornerstone of cybersecurity, and this episode introduces the essential vocabulary and concepts you need to know. We define threats, vulnerabilities, likelihood, impact, and risk—and show how these elements interact in both assessments and real-world decision-making. You’ll also hear how organizations use risk tolerance and acceptance to prioritize controls and allocate resources. By mastering these fundamentals, you’ll be equipped to approach risk-based questions on the CISSP exam and to contribute to sound security decisions in your career.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Risk management is a cornerstone of cybersecurity, and this episode introduces the essential vocabulary and concepts you need to know. We define threats, vulnerabilities, likelihood, impact, and risk—and show how these elements interact in both assessments and real-world decision-making. You’ll also hear how organizations use risk tolerance and acceptance to prioritize controls and allocate resources. By mastering these fundamentals, you’ll be equipped to approach risk-based questions on the CISSP exam and to contribute to sound security decisions in your career.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:19:28 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/974e2513/58091071.mp3" length="39273867" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>981</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Risk management is a cornerstone of cybersecurity, and this episode introduces the essential vocabulary and concepts you need to know. We define threats, vulnerabilities, likelihood, impact, and risk—and show how these elements interact in both assessments and real-world decision-making. You’ll also hear how organizations use risk tolerance and acceptance to prioritize controls and allocate resources. By mastering these fundamentals, you’ll be equipped to approach risk-based questions on the CISSP exam and to contribute to sound security decisions in your career.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/974e2513/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 11: Risk Response and Risk Appetite</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Episode 11: Risk Response and Risk Appetite</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">46496af9-6e5f-47e6-b945-2ababf468cdc</guid>
      <link>https://share.transistor.fm/s/bfaa49e8</link>
      <description>
        <![CDATA[<p>Once a risk is identified and assessed, the next critical step is determining how to respond. In this episode, we examine the four primary risk response strategies: risk avoidance, risk mitigation, risk transference, and risk acceptance. We also clarify the concepts of risk appetite and risk tolerance, and how organizations use these to shape their security policies and control decisions. You'll learn how business objectives, regulatory pressure, and operational needs influence how much risk an organization is willing to take. Understanding these principles enables security professionals to align cybersecurity decisions with broader business goals.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Once a risk is identified and assessed, the next critical step is determining how to respond. In this episode, we examine the four primary risk response strategies: risk avoidance, risk mitigation, risk transference, and risk acceptance. We also clarify the concepts of risk appetite and risk tolerance, and how organizations use these to shape their security policies and control decisions. You'll learn how business objectives, regulatory pressure, and operational needs influence how much risk an organization is willing to take. Understanding these principles enables security professionals to align cybersecurity decisions with broader business goals.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:20:17 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bfaa49e8/d385c71e.mp3" length="38744079" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>968</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Once a risk is identified and assessed, the next critical step is determining how to respond. In this episode, we examine the four primary risk response strategies: risk avoidance, risk mitigation, risk transference, and risk acceptance. We also clarify the concepts of risk appetite and risk tolerance, and how organizations use these to shape their security policies and control decisions. You'll learn how business objectives, regulatory pressure, and operational needs influence how much risk an organization is willing to take. Understanding these principles enables security professionals to align cybersecurity decisions with broader business goals.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bfaa49e8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 12: Business Continuity Planning (BCP) Fundamentals</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Episode 12: Business Continuity Planning (BCP) Fundamentals</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6472584e-21f3-4424-b092-5bd1bfbd80e3</guid>
      <link>https://share.transistor.fm/s/09ca7f82</link>
      <description>
        <![CDATA[<p>Business Continuity Planning, or BCP, is essential for maintaining operations during unexpected disruptions. This episode explores the key elements of a successful BCP strategy, including risk identification, business impact analysis, and recovery planning. We discuss how organizations determine critical functions, establish recovery priorities, and ensure that people, systems, and processes can recover efficiently. You’ll also learn the difference between BCP and disaster recovery, and why both are necessary for resilience. Mastering BCP concepts not only prepares you for the CISSP exam but helps you contribute to real-world continuity efforts.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Business Continuity Planning, or BCP, is essential for maintaining operations during unexpected disruptions. This episode explores the key elements of a successful BCP strategy, including risk identification, business impact analysis, and recovery planning. We discuss how organizations determine critical functions, establish recovery priorities, and ensure that people, systems, and processes can recover efficiently. You’ll also learn the difference between BCP and disaster recovery, and why both are necessary for resilience. Mastering BCP concepts not only prepares you for the CISSP exam but helps you contribute to real-world continuity efforts.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:21:00 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/09ca7f82/71dc2b2f.mp3" length="36069156" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>901</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Business Continuity Planning, or BCP, is essential for maintaining operations during unexpected disruptions. This episode explores the key elements of a successful BCP strategy, including risk identification, business impact analysis, and recovery planning. We discuss how organizations determine critical functions, establish recovery priorities, and ensure that people, systems, and processes can recover efficiently. You’ll also learn the difference between BCP and disaster recovery, and why both are necessary for resilience. Mastering BCP concepts not only prepares you for the CISSP exam but helps you contribute to real-world continuity efforts.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/09ca7f82/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 13: Disaster Recovery Planning (DRP) and Continuity of Operations</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Episode 13: Disaster Recovery Planning (DRP) and Continuity of Operations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a25c4b19-69cf-4085-9151-84f1b6e79caf</guid>
      <link>https://share.transistor.fm/s/a44facac</link>
      <description>
        <![CDATA[<p>Disaster Recovery Planning is a focused component of business continuity that addresses the rapid restoration of IT infrastructure and systems. In this episode, we explore how DRP helps organizations bounce back after major incidents such as natural disasters, cyberattacks, or system failures. You'll learn about recovery time objectives (RTOs), recovery point objectives (RPOs), and different recovery site strategies like hot, warm, and cold sites. We also explain how DRP integrates with continuity of operations to ensure both technology and essential services remain functional. This episode equips you with tools for designing robust recovery capabilities.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Disaster Recovery Planning is a focused component of business continuity that addresses the rapid restoration of IT infrastructure and systems. In this episode, we explore how DRP helps organizations bounce back after major incidents such as natural disasters, cyberattacks, or system failures. You'll learn about recovery time objectives (RTOs), recovery point objectives (RPOs), and different recovery site strategies like hot, warm, and cold sites. We also explain how DRP integrates with continuity of operations to ensure both technology and essential services remain functional. This episode equips you with tools for designing robust recovery capabilities.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:21:46 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a44facac/1f4f5700.mp3" length="30773627" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>769</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Disaster Recovery Planning is a focused component of business continuity that addresses the rapid restoration of IT infrastructure and systems. In this episode, we explore how DRP helps organizations bounce back after major incidents such as natural disasters, cyberattacks, or system failures. You'll learn about recovery time objectives (RTOs), recovery point objectives (RPOs), and different recovery site strategies like hot, warm, and cold sites. We also explain how DRP integrates with continuity of operations to ensure both technology and essential services remain functional. This episode equips you with tools for designing robust recovery capabilities.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a44facac/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 14: Security Policies, Standards, Procedures, and Guidelines</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Episode 14: Security Policies, Standards, Procedures, and Guidelines</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9d691306-1bf1-4152-878a-f8406777c791</guid>
      <link>https://share.transistor.fm/s/28179250</link>
      <description>
        <![CDATA[<p>A strong cybersecurity program is built on clear and well-documented policies. In this episode, we break down the four foundational types of documentation: policies, standards, procedures, and guidelines. You'll learn how each plays a role in setting expectations, enforcing controls, and guiding behavior. We also explain who creates these documents, how they’re maintained, and why they matter for regulatory compliance and security culture. Understanding this documentation hierarchy is crucial for exam success and for implementing effective, enforceable cybersecurity programs in any organization.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>A strong cybersecurity program is built on clear and well-documented policies. In this episode, we break down the four foundational types of documentation: policies, standards, procedures, and guidelines. You'll learn how each plays a role in setting expectations, enforcing controls, and guiding behavior. We also explain who creates these documents, how they’re maintained, and why they matter for regulatory compliance and security culture. Understanding this documentation hierarchy is crucial for exam success and for implementing effective, enforceable cybersecurity programs in any organization.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:22:30 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/28179250/5419cc34.mp3" length="33095386" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>827</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>A strong cybersecurity program is built on clear and well-documented policies. In this episode, we break down the four foundational types of documentation: policies, standards, procedures, and guidelines. You'll learn how each plays a role in setting expectations, enforcing controls, and guiding behavior. We also explain who creates these documents, how they’re maintained, and why they matter for regulatory compliance and security culture. Understanding this documentation hierarchy is crucial for exam success and for implementing effective, enforceable cybersecurity programs in any organization.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/28179250/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 15: Personnel Security: Background Checks, Policies, Termination</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Episode 15: Personnel Security: Background Checks, Policies, Termination</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">29030b6c-b6ea-45b6-aec7-330c831fd48c</guid>
      <link>https://share.transistor.fm/s/71962164</link>
      <description>
        <![CDATA[<p>People are often the weakest link in cybersecurity, and managing personnel risk is a critical responsibility. In this episode, we discuss best practices for pre-employment screening, including background checks and reference validation. We also explore how organizations use security policies to govern employee behavior and set expectations for acceptable use, confidentiality, and compliance. Finally, we walk through secure termination processes that include revoking access, conducting exit interviews, and managing offboarding. Understanding the human side of cybersecurity is essential for risk reduction, especially in enterprise environments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>People are often the weakest link in cybersecurity, and managing personnel risk is a critical responsibility. In this episode, we discuss best practices for pre-employment screening, including background checks and reference validation. We also explore how organizations use security policies to govern employee behavior and set expectations for acceptable use, confidentiality, and compliance. Finally, we walk through secure termination processes that include revoking access, conducting exit interviews, and managing offboarding. Understanding the human side of cybersecurity is essential for risk reduction, especially in enterprise environments.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:23:13 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/71962164/ae08a8c5.mp3" length="36342933" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>908</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>People are often the weakest link in cybersecurity, and managing personnel risk is a critical responsibility. In this episode, we discuss best practices for pre-employment screening, including background checks and reference validation. We also explore how organizations use security policies to govern employee behavior and set expectations for acceptable use, confidentiality, and compliance. Finally, we walk through secure termination processes that include revoking access, conducting exit interviews, and managing offboarding. Understanding the human side of cybersecurity is essential for risk reduction, especially in enterprise environments.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/71962164/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 16: Security Awareness and Training Programs</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Episode 16: Security Awareness and Training Programs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e459a158-45dd-410b-a65a-f4ddd8e03db6</guid>
      <link>https://share.transistor.fm/s/f66aa3ed</link>
      <description>
        <![CDATA[<p>Even the best technical defenses can fail if employees don’t understand their security responsibilities. This episode focuses on the development and delivery of effective security awareness and training programs. We explore how to tailor content for different roles, choose the right delivery formats, and measure effectiveness through assessments and behavioral monitoring. You’ll also learn how awareness programs support compliance and reduce risks such as phishing, social engineering, and insider threats. CISSP professionals must not only understand awareness programs but often play a key role in designing and leading them.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Even the best technical defenses can fail if employees don’t understand their security responsibilities. This episode focuses on the development and delivery of effective security awareness and training programs. We explore how to tailor content for different roles, choose the right delivery formats, and measure effectiveness through assessments and behavioral monitoring. You’ll also learn how awareness programs support compliance and reduce risks such as phishing, social engineering, and insider threats. CISSP professionals must not only understand awareness programs but often play a key role in designing and leading them.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:23:51 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f66aa3ed/1cb1be07.mp3" length="30896904" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>772</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Even the best technical defenses can fail if employees don’t understand their security responsibilities. This episode focuses on the development and delivery of effective security awareness and training programs. We explore how to tailor content for different roles, choose the right delivery formats, and measure effectiveness through assessments and behavioral monitoring. You’ll also learn how awareness programs support compliance and reduce risks such as phishing, social engineering, and insider threats. CISSP professionals must not only understand awareness programs but often play a key role in designing and leading them.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f66aa3ed/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 17: Third-Party Risk Management</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Episode 17: Third-Party Risk Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0a83e6c1-450b-455d-9ac6-4034e8eba5ac</guid>
      <link>https://share.transistor.fm/s/9c20bfe1</link>
      <description>
        <![CDATA[<p>Today’s organizations rely heavily on vendors, contractors, and service providers—but each relationship introduces potential risks. In this episode, we cover the principles of third-party risk management, including due diligence, contractual controls, and ongoing monitoring. You’ll learn how to assess a vendor’s security posture, enforce security requirements through service-level agreements (SLAs), and respond when third-party weaknesses are discovered. This topic is increasingly important as supply chain attacks and vendor-based breaches become more common. Managing third-party risk is a core responsibility for any CISSP-certified leader.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Today’s organizations rely heavily on vendors, contractors, and service providers—but each relationship introduces potential risks. In this episode, we cover the principles of third-party risk management, including due diligence, contractual controls, and ongoing monitoring. You’ll learn how to assess a vendor’s security posture, enforce security requirements through service-level agreements (SLAs), and respond when third-party weaknesses are discovered. This topic is increasingly important as supply chain attacks and vendor-based breaches become more common. Managing third-party risk is a core responsibility for any CISSP-certified leader.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:24:37 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9c20bfe1/4712d76c.mp3" length="32980418" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>824</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Today’s organizations rely heavily on vendors, contractors, and service providers—but each relationship introduces potential risks. In this episode, we cover the principles of third-party risk management, including due diligence, contractual controls, and ongoing monitoring. You’ll learn how to assess a vendor’s security posture, enforce security requirements through service-level agreements (SLAs), and respond when third-party weaknesses are discovered. This topic is increasingly important as supply chain attacks and vendor-based breaches become more common. Managing third-party risk is a core responsibility for any CISSP-certified leader.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9c20bfe1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 18: Supply Chain Risk and Due Diligence</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Episode 18: Supply Chain Risk and Due Diligence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c58804f1-22db-4ad8-b3b4-a595fbabf6e0</guid>
      <link>https://share.transistor.fm/s/57eb8891</link>
      <description>
        <![CDATA[<p>Supply chains extend far beyond traditional logistics—they now include digital components, cloud providers, software dependencies, and more. This episode explores how cyber threats enter through the supply chain and what due diligence processes are needed to prevent compromise. We discuss methods for evaluating supply chain partners, setting clear security expectations, and responding to incidents that originate outside your direct control. By understanding the dynamics of modern supply chain risk, CISSP candidates will be better prepared to assess and secure the full ecosystem surrounding their organization’s operations.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Supply chains extend far beyond traditional logistics—they now include digital components, cloud providers, software dependencies, and more. This episode explores how cyber threats enter through the supply chain and what due diligence processes are needed to prevent compromise. We discuss methods for evaluating supply chain partners, setting clear security expectations, and responding to incidents that originate outside your direct control. By understanding the dynamics of modern supply chain risk, CISSP candidates will be better prepared to assess and secure the full ecosystem surrounding their organization’s operations.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:25:26 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/57eb8891/b1bc21b6.mp3" length="31279332" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>781</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Supply chains extend far beyond traditional logistics—they now include digital components, cloud providers, software dependencies, and more. This episode explores how cyber threats enter through the supply chain and what due diligence processes are needed to prevent compromise. We discuss methods for evaluating supply chain partners, setting clear security expectations, and responding to incidents that originate outside your direct control. By understanding the dynamics of modern supply chain risk, CISSP candidates will be better prepared to assess and secure the full ecosystem surrounding their organization’s operations.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/57eb8891/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 19: Privacy Principles and Data Protection (GDPR, CCPA)</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Episode 19: Privacy Principles and Data Protection (GDPR, CCPA)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">575e949c-bff9-4111-b086-e1dde1a65f6c</guid>
      <link>https://share.transistor.fm/s/a6b8bd60</link>
      <description>
        <![CDATA[<p>Protecting personal data is not just a compliance requirement—it’s a trust imperative. In this episode, we dive into key privacy principles such as data minimization, purpose limitation, and transparency. You’ll learn how regulations like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) define privacy obligations and empower individuals with rights over their data. We also cover how organizations can embed privacy by design into their systems and policies. A solid grasp of privacy principles is vital for anyone working in security governance, policy, or legal alignment roles.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Protecting personal data is not just a compliance requirement—it’s a trust imperative. In this episode, we dive into key privacy principles such as data minimization, purpose limitation, and transparency. You’ll learn how regulations like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) define privacy obligations and empower individuals with rights over their data. We also cover how organizations can embed privacy by design into their systems and policies. A solid grasp of privacy principles is vital for anyone working in security governance, policy, or legal alignment roles.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:26:10 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a6b8bd60/d4023a20.mp3" length="32453813" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>811</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Protecting personal data is not just a compliance requirement—it’s a trust imperative. In this episode, we dive into key privacy principles such as data minimization, purpose limitation, and transparency. You’ll learn how regulations like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) define privacy obligations and empower individuals with rights over their data. We also cover how organizations can embed privacy by design into their systems and policies. A solid grasp of privacy principles is vital for anyone working in security governance, policy, or legal alignment roles.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a6b8bd60/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 20: Intellectual Property and Licensing Laws</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Episode 20: Intellectual Property and Licensing Laws</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4f7f61cc-a0a0-4141-ac89-0983d19633e4</guid>
      <link>https://share.transistor.fm/s/f40cb466</link>
      <description>
        <![CDATA[<p>Cybersecurity professionals must understand how to protect not only data but also intellectual property. This episode unpacks the key types of intellectual property—copyrights, trademarks, patents, and trade secrets—and how they apply in the digital world. We also examine licensing models for software and content, including open-source and proprietary agreements. Understanding the legal landscape helps prevent accidental infringement and supports secure software procurement, asset management, and contract design. CISSPs are often called upon to advise on or enforce policies around intellectual property and licensing compliance.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cybersecurity professionals must understand how to protect not only data but also intellectual property. This episode unpacks the key types of intellectual property—copyrights, trademarks, patents, and trade secrets—and how they apply in the digital world. We also examine licensing models for software and content, including open-source and proprietary agreements. Understanding the legal landscape helps prevent accidental infringement and supports secure software procurement, asset management, and contract design. CISSPs are often called upon to advise on or enforce policies around intellectual property and licensing compliance.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:26:52 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f40cb466/520f656f.mp3" length="31844627" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>795</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cybersecurity professionals must understand how to protect not only data but also intellectual property. This episode unpacks the key types of intellectual property—copyrights, trademarks, patents, and trade secrets—and how they apply in the digital world. We also examine licensing models for software and content, including open-source and proprietary agreements. Understanding the legal landscape helps prevent accidental infringement and supports secure software procurement, asset management, and contract design. CISSPs are often called upon to advise on or enforce policies around intellectual property and licensing compliance.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f40cb466/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 21: Legal Systems and Cybercrime Laws Globally</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Episode 21: Legal Systems and Cybercrime Laws Globally</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0baa906c-f582-4335-8374-647eece27a8f</guid>
      <link>https://share.transistor.fm/s/18e28bd0</link>
      <description>
        <![CDATA[<p>Cybersecurity professionals operate in a legal landscape that spans continents, jurisdictions, and regulatory systems. In this episode, we examine the major types of legal systems—common law, civil law, religious law, and customary law—and how each influences how cybersecurity is enforced. We also explore global cybercrime laws and treaties, including the Budapest Convention, and review how international cooperation is achieved in cyber investigations. Understanding the legal frameworks that govern data, privacy, and technology helps CISSPs ensure compliance, support law enforcement, and avoid conflicts across borders.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cybersecurity professionals operate in a legal landscape that spans continents, jurisdictions, and regulatory systems. In this episode, we examine the major types of legal systems—common law, civil law, religious law, and customary law—and how each influences how cybersecurity is enforced. We also explore global cybercrime laws and treaties, including the Budapest Convention, and review how international cooperation is achieved in cyber investigations. Understanding the legal frameworks that govern data, privacy, and technology helps CISSPs ensure compliance, support law enforcement, and avoid conflicts across borders.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:27:46 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/18e28bd0/7b898b91.mp3" length="31187388" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>779</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cybersecurity professionals operate in a legal landscape that spans continents, jurisdictions, and regulatory systems. In this episode, we examine the major types of legal systems—common law, civil law, religious law, and customary law—and how each influences how cybersecurity is enforced. We also explore global cybercrime laws and treaties, including the Budapest Convention, and review how international cooperation is achieved in cyber investigations. Understanding the legal frameworks that govern data, privacy, and technology helps CISSPs ensure compliance, support law enforcement, and avoid conflicts across borders.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/18e28bd0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 22: Security Documentation and Governance Metrics</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Episode 22: Security Documentation and Governance Metrics</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3b925c3e-732b-439a-af78-68a09615113e</guid>
      <link>https://share.transistor.fm/s/d4d18d83</link>
      <description>
        <![CDATA[<p>Effective security governance depends on clear documentation and measurable performance. This episode explains the structure and function of security documentation—including policies, standards, guidelines, and procedures—as well as how to manage these documents over time. We also explore key performance indicators (KPIs) and metrics used to assess the effectiveness of security controls and governance practices. You'll learn how to track compliance, measure risk reduction, and communicate results to stakeholders. These practices are essential for demonstrating due diligence and maintaining alignment with organizational objectives.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Effective security governance depends on clear documentation and measurable performance. This episode explains the structure and function of security documentation—including policies, standards, guidelines, and procedures—as well as how to manage these documents over time. We also explore key performance indicators (KPIs) and metrics used to assess the effectiveness of security controls and governance practices. You'll learn how to track compliance, measure risk reduction, and communicate results to stakeholders. These practices are essential for demonstrating due diligence and maintaining alignment with organizational objectives.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:29:05 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d4d18d83/1d748b1b.mp3" length="28868763" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>721</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Effective security governance depends on clear documentation and measurable performance. This episode explains the structure and function of security documentation—including policies, standards, guidelines, and procedures—as well as how to manage these documents over time. We also explore key performance indicators (KPIs) and metrics used to assess the effectiveness of security controls and governance practices. You'll learn how to track compliance, measure risk reduction, and communicate results to stakeholders. These practices are essential for demonstrating due diligence and maintaining alignment with organizational objectives.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d4d18d83/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 23: Information Lifecycle and Data Classification</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Episode 23: Information Lifecycle and Data Classification</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">92b022b2-f9bd-4f15-bbe0-a943f3708976</guid>
      <link>https://share.transistor.fm/s/4d9ad0c2</link>
      <description>
        <![CDATA[<p>Understanding how data flows through its lifecycle is essential for protecting it appropriately. This episode walks through the phases of the information lifecycle: creation, storage, usage, transmission, archival, and disposal. We then examine data classification schemes—such as public, internal, confidential, and restricted—and how classification drives the application of controls. You'll learn how to create classification policies, apply labels, and ensure data is treated consistently according to its value and sensitivity. This foundation is critical for managing risk and enforcing security policies across diverse data environments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Understanding how data flows through its lifecycle is essential for protecting it appropriately. This episode walks through the phases of the information lifecycle: creation, storage, usage, transmission, archival, and disposal. We then examine data classification schemes—such as public, internal, confidential, and restricted—and how classification drives the application of controls. You'll learn how to create classification policies, apply labels, and ensure data is treated consistently according to its value and sensitivity. This foundation is critical for managing risk and enforcing security policies across diverse data environments.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:29:56 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4d9ad0c2/17db62d1.mp3" length="32414101" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>810</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Understanding how data flows through its lifecycle is essential for protecting it appropriately. This episode walks through the phases of the information lifecycle: creation, storage, usage, transmission, archival, and disposal. We then examine data classification schemes—such as public, internal, confidential, and restricted—and how classification drives the application of controls. You'll learn how to create classification policies, apply labels, and ensure data is treated consistently according to its value and sensitivity. This foundation is critical for managing risk and enforcing security policies across diverse data environments.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4d9ad0c2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 24: Data Sensitivity and Labeling Requirements</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Episode 24: Data Sensitivity and Labeling Requirements</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fcb3efe1-afd2-447e-9df5-da2f963ce12e</guid>
      <link>https://share.transistor.fm/s/9bc3906f</link>
      <description>
        <![CDATA[<p>Labeling data according to its sensitivity is one of the most overlooked but powerful techniques in cybersecurity. In this episode, we explore what it means for data to be considered sensitive, how that sensitivity is determined, and how labels communicate handling requirements to users and systems. We also cover how to implement labeling technologies and ensure compliance with both organizational policies and regulatory requirements. Properly labeling data not only supports access control and encryption but also reinforces accountability and transparency throughout the information lifecycle.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Labeling data according to its sensitivity is one of the most overlooked but powerful techniques in cybersecurity. In this episode, we explore what it means for data to be considered sensitive, how that sensitivity is determined, and how labels communicate handling requirements to users and systems. We also cover how to implement labeling technologies and ensure compliance with both organizational policies and regulatory requirements. Properly labeling data not only supports access control and encryption but also reinforces accountability and transparency throughout the information lifecycle.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:32:26 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9bc3906f/f95bf02e.mp3" length="27590849" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>689</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Labeling data according to its sensitivity is one of the most overlooked but powerful techniques in cybersecurity. In this episode, we explore what it means for data to be considered sensitive, how that sensitivity is determined, and how labels communicate handling requirements to users and systems. We also cover how to implement labeling technologies and ensure compliance with both organizational policies and regulatory requirements. Properly labeling data not only supports access control and encryption but also reinforces accountability and transparency throughout the information lifecycle.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9bc3906f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 25: Ownership and Stewardship Responsibilities</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Episode 25: Ownership and Stewardship Responsibilities</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">151b7642-8082-46ad-bed0-51c139f13d79</guid>
      <link>https://share.transistor.fm/s/b2bbf9b0</link>
      <description>
        <![CDATA[<p>Every piece of information in an organization should have an assigned owner and one or more stewards. In this episode, we define what it means to be a data owner—someone accountable for the data’s use, classification, and protection. We also explore the role of stewards—those responsible for managing data quality and integrity on a day-to-day basis. Clarifying these roles strengthens governance, supports compliance, and streamlines incident response. Understanding how to define, document, and enforce ownership is essential for ensuring security accountability across the enterprise.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Every piece of information in an organization should have an assigned owner and one or more stewards. In this episode, we define what it means to be a data owner—someone accountable for the data’s use, classification, and protection. We also explore the role of stewards—those responsible for managing data quality and integrity on a day-to-day basis. Clarifying these roles strengthens governance, supports compliance, and streamlines incident response. Understanding how to define, document, and enforce ownership is essential for ensuring security accountability across the enterprise.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:33:12 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b2bbf9b0/9384fae0.mp3" length="29694229" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>742</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Every piece of information in an organization should have an assigned owner and one or more stewards. In this episode, we define what it means to be a data owner—someone accountable for the data’s use, classification, and protection. We also explore the role of stewards—those responsible for managing data quality and integrity on a day-to-day basis. Clarifying these roles strengthens governance, supports compliance, and streamlines incident response. Understanding how to define, document, and enforce ownership is essential for ensuring security accountability across the enterprise.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b2bbf9b0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 26: Data Retention and Archival Strategies</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Episode 26: Data Retention and Archival Strategies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b83b380d-7a04-4ffa-af0b-69056a1fc7fe</guid>
      <link>https://share.transistor.fm/s/b36d98c2</link>
      <description>
        <![CDATA[<p>Keeping data longer than necessary can increase your risk exposure, but disposing of it too early can create legal and operational gaps. This episode addresses how to build effective data retention and archival strategies that meet legal, regulatory, and business needs. You’ll learn how to define retention periods, implement secure storage solutions for inactive data, and manage transitions into archives. We also discuss how to ensure accessibility for audit and legal discovery without compromising security. These practices are essential for managing digital clutter while protecting valuable records.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Keeping data longer than necessary can increase your risk exposure, but disposing of it too early can create legal and operational gaps. This episode addresses how to build effective data retention and archival strategies that meet legal, regulatory, and business needs. You’ll learn how to define retention periods, implement secure storage solutions for inactive data, and manage transitions into archives. We also discuss how to ensure accessibility for audit and legal discovery without compromising security. These practices are essential for managing digital clutter while protecting valuable records.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:34:11 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b36d98c2/c296d2df.mp3" length="28916821" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>722</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Keeping data longer than necessary can increase your risk exposure, but disposing of it too early can create legal and operational gaps. This episode addresses how to build effective data retention and archival strategies that meet legal, regulatory, and business needs. You’ll learn how to define retention periods, implement secure storage solutions for inactive data, and manage transitions into archives. We also discuss how to ensure accessibility for audit and legal discovery without compromising security. These practices are essential for managing digital clutter while protecting valuable records.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b36d98c2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 27: Privacy Protection and PII Handling</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Episode 27: Privacy Protection and PII Handling</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2924d75e-98c0-4c4e-9659-d38780fa998a</guid>
      <link>https://share.transistor.fm/s/3a56e325</link>
      <description>
        <![CDATA[<p>Personally Identifiable Information (PII) is one of the most regulated and targeted types of data in cybersecurity. This episode focuses on how organizations identify, handle, and protect PII throughout its lifecycle. We explain what qualifies as PII, the risks associated with its misuse, and the controls needed to ensure confidentiality, integrity, and lawful processing. From consent management and access restrictions to anonymization techniques and breach response plans, you’ll gain a comprehensive view of how to build strong privacy protections into your security program.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Personally Identifiable Information (PII) is one of the most regulated and targeted types of data in cybersecurity. This episode focuses on how organizations identify, handle, and protect PII throughout its lifecycle. We explain what qualifies as PII, the risks associated with its misuse, and the controls needed to ensure confidentiality, integrity, and lawful processing. From consent management and access restrictions to anonymization techniques and breach response plans, you’ll gain a comprehensive view of how to build strong privacy protections into your security program.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:35:02 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3a56e325/58e572de.mp3" length="26581471" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>664</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Personally Identifiable Information (PII) is one of the most regulated and targeted types of data in cybersecurity. This episode focuses on how organizations identify, handle, and protect PII throughout its lifecycle. We explain what qualifies as PII, the risks associated with its misuse, and the controls needed to ensure confidentiality, integrity, and lawful processing. From consent management and access restrictions to anonymization techniques and breach response plans, you’ll gain a comprehensive view of how to build strong privacy protections into your security program.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3a56e325/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 28: Data Remanence and Secure Disposal Techniques</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Episode 28: Data Remanence and Secure Disposal Techniques</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">81a80312-7be7-44f2-ae15-04308bd7d8fb</guid>
      <link>https://share.transistor.fm/s/a7235434</link>
      <description>
        <![CDATA[<p>Even when you delete a file, remnants can linger—posing serious security risks. This episode delves into the concept of data remanence and the techniques used to ensure secure data disposal. You'll learn about data wiping, degaussing, shredding, cryptographic erasure, and the standards that guide their use, such as NIST SP 800-88. We also cover the importance of disposal audits, chain of custody for media, and the role of policy in enforcing proper end-of-life procedures. Secure disposal is a small step with massive implications for data confidentiality.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Even when you delete a file, remnants can linger—posing serious security risks. This episode delves into the concept of data remanence and the techniques used to ensure secure data disposal. You'll learn about data wiping, degaussing, shredding, cryptographic erasure, and the standards that guide their use, such as NIST SP 800-88. We also cover the importance of disposal audits, chain of custody for media, and the role of policy in enforcing proper end-of-life procedures. Secure disposal is a small step with massive implications for data confidentiality.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:38:32 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a7235434/30d013eb.mp3" length="27336942" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>683</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Even when you delete a file, remnants can linger—posing serious security risks. This episode delves into the concept of data remanence and the techniques used to ensure secure data disposal. You'll learn about data wiping, degaussing, shredding, cryptographic erasure, and the standards that guide their use, such as NIST SP 800-88. We also cover the importance of disposal audits, chain of custody for media, and the role of policy in enforcing proper end-of-life procedures. Secure disposal is a small step with massive implications for data confidentiality.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a7235434/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 29: Secure Data Handling in Transit and at Rest</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Episode 29: Secure Data Handling in Transit and at Rest</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1542d82d-0762-43e9-b132-5603f68442c8</guid>
      <link>https://share.transistor.fm/s/8e32605d</link>
      <description>
        <![CDATA[<p>Data is constantly on the move—or waiting to be accessed—and must be protected in both states. In this episode, we examine the best practices for securing data at rest (stored on disk or cloud) and data in transit (moving across networks). You'll learn about encryption methods, key management practices, access controls, and monitoring techniques. We also address compliance requirements that demand specific protections for data in these states. Protecting data wherever it resides or flows is a foundational concept every CISSP candidate must master.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Data is constantly on the move—or waiting to be accessed—and must be protected in both states. In this episode, we examine the best practices for securing data at rest (stored on disk or cloud) and data in transit (moving across networks). You'll learn about encryption methods, key management practices, access controls, and monitoring techniques. We also address compliance requirements that demand specific protections for data in these states. Protecting data wherever it resides or flows is a foundational concept every CISSP candidate must master.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:39:28 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8e32605d/135d41fc.mp3" length="30631503" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>765</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Data is constantly on the move—or waiting to be accessed—and must be protected in both states. In this episode, we examine the best practices for securing data at rest (stored on disk or cloud) and data in transit (moving across networks). You'll learn about encryption methods, key management practices, access controls, and monitoring techniques. We also address compliance requirements that demand specific protections for data in these states. Protecting data wherever it resides or flows is a foundational concept every CISSP candidate must master.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8e32605d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 30: Media Storage and Sanitization Methods</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Episode 30: Media Storage and Sanitization Methods</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">db5f773a-9a18-491e-ad0f-24ec467860d0</guid>
      <link>https://share.transistor.fm/s/cd1b658c</link>
      <description>
        <![CDATA[<p>Digital media—whether it’s a hard drive, USB stick, or backup tape—requires special handling to ensure data remains protected throughout its lifecycle. This episode explores how to securely store, track, and sanitize various types of storage media. We discuss media classification, physical protections, encryption, and environmental controls for storage, as well as different sanitization techniques including clearing, purging, and destruction. You’ll also learn how to enforce policy compliance using checklists, audits, and disposal logs. This topic reinforces your understanding of data confidentiality and end-of-life security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Digital media—whether it’s a hard drive, USB stick, or backup tape—requires special handling to ensure data remains protected throughout its lifecycle. This episode explores how to securely store, track, and sanitize various types of storage media. We discuss media classification, physical protections, encryption, and environmental controls for storage, as well as different sanitization techniques including clearing, purging, and destruction. You’ll also learn how to enforce policy compliance using checklists, audits, and disposal logs. This topic reinforces your understanding of data confidentiality and end-of-life security.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:40:22 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cd1b658c/94d3fea7.mp3" length="26123809" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>652</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Digital media—whether it’s a hard drive, USB stick, or backup tape—requires special handling to ensure data remains protected throughout its lifecycle. This episode explores how to securely store, track, and sanitize various types of storage media. We discuss media classification, physical protections, encryption, and environmental controls for storage, as well as different sanitization techniques including clearing, purging, and destruction. You’ll also learn how to enforce policy compliance using checklists, audits, and disposal logs. This topic reinforces your understanding of data confidentiality and end-of-life security.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cd1b658c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 31: Asset Inventory Management</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Episode 31: Asset Inventory Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a71684ab-e629-4fd7-aebe-48b3481cfa32</guid>
      <link>https://share.transistor.fm/s/f081764d</link>
      <description>
        <![CDATA[<p>You can’t protect what you don’t know you have. In this episode, we focus on the importance of maintaining a comprehensive and accurate inventory of all information assets—hardware, software, data, and even personnel. Asset inventory management supports effective risk assessments, helps identify gaps in coverage, and is a foundational requirement for many compliance standards. We explore asset classification, ownership, tracking methods, and how asset data feeds into broader security operations. Without a solid inventory process, security controls can’t be properly scoped, prioritized, or audited—making this topic essential for every CISSP candidate.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>You can’t protect what you don’t know you have. In this episode, we focus on the importance of maintaining a comprehensive and accurate inventory of all information assets—hardware, software, data, and even personnel. Asset inventory management supports effective risk assessments, helps identify gaps in coverage, and is a foundational requirement for many compliance standards. We explore asset classification, ownership, tracking methods, and how asset data feeds into broader security operations. Without a solid inventory process, security controls can’t be properly scoped, prioritized, or audited—making this topic essential for every CISSP candidate.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:41:09 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f081764d/b1a94957.mp3" length="37234197" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>930</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>You can’t protect what you don’t know you have. In this episode, we focus on the importance of maintaining a comprehensive and accurate inventory of all information assets—hardware, software, data, and even personnel. Asset inventory management supports effective risk assessments, helps identify gaps in coverage, and is a foundational requirement for many compliance standards. We explore asset classification, ownership, tracking methods, and how asset data feeds into broader security operations. Without a solid inventory process, security controls can’t be properly scoped, prioritized, or audited—making this topic essential for every CISSP candidate.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f081764d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 32: Data Sovereignty and Jurisdictional Control</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Episode 32: Data Sovereignty and Jurisdictional Control</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c04fe12f-da27-44ea-b4dd-afd3066119fa</guid>
      <link>https://share.transistor.fm/s/11038072</link>
      <description>
        <![CDATA[<p>In a global digital economy, where your data resides can determine which laws apply to it. This episode explains data sovereignty—the principle that data is subject to the laws of the country in which it’s stored—and how jurisdictional control affects compliance, privacy, and access. We examine common challenges organizations face when storing or processing data across borders, such as conflicting legal obligations or data transfer restrictions. We also explore strategies to manage these complexities, including data localization, cloud region selection, and contractual controls. CISSPs must understand how legal geography impacts cybersecurity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In a global digital economy, where your data resides can determine which laws apply to it. This episode explains data sovereignty—the principle that data is subject to the laws of the country in which it’s stored—and how jurisdictional control affects compliance, privacy, and access. We examine common challenges organizations face when storing or processing data across borders, such as conflicting legal obligations or data transfer restrictions. We also explore strategies to manage these complexities, including data localization, cloud region selection, and contractual controls. CISSPs must understand how legal geography impacts cybersecurity.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:42:49 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/11038072/abefa2b6.mp3" length="41335438" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1033</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In a global digital economy, where your data resides can determine which laws apply to it. This episode explains data sovereignty—the principle that data is subject to the laws of the country in which it’s stored—and how jurisdictional control affects compliance, privacy, and access. We examine common challenges organizations face when storing or processing data across borders, such as conflicting legal obligations or data transfer restrictions. We also explore strategies to manage these complexities, including data localization, cloud region selection, and contractual controls. CISSPs must understand how legal geography impacts cybersecurity.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/11038072/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 33: Secure Use of Cloud Storage and Shared Resources</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Episode 33: Secure Use of Cloud Storage and Shared Resources</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b67e78f2-7c45-43c6-b50a-94535566e7ff</guid>
      <link>https://share.transistor.fm/s/07c212b8</link>
      <description>
        <![CDATA[<p>Cloud services offer scalability and convenience, but they also introduce unique security risks—especially when sharing infrastructure with other tenants. In this episode, we cover best practices for securely using cloud storage, virtualized environments, and shared computing platforms. Topics include encryption, access control, tenant isolation, identity federation, and logging. We also discuss the shared responsibility model, where both provider and customer have distinct obligations. If you’re working with SaaS, IaaS, or hybrid cloud models, you need to know how to safeguard data, workloads, and services in dynamic cloud environments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cloud services offer scalability and convenience, but they also introduce unique security risks—especially when sharing infrastructure with other tenants. In this episode, we cover best practices for securely using cloud storage, virtualized environments, and shared computing platforms. Topics include encryption, access control, tenant isolation, identity federation, and logging. We also discuss the shared responsibility model, where both provider and customer have distinct obligations. If you’re working with SaaS, IaaS, or hybrid cloud models, you need to know how to safeguard data, workloads, and services in dynamic cloud environments.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:57:06 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/07c212b8/7b5b0264.mp3" length="40430561" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1010</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cloud services offer scalability and convenience, but they also introduce unique security risks—especially when sharing infrastructure with other tenants. In this episode, we cover best practices for securely using cloud storage, virtualized environments, and shared computing platforms. Topics include encryption, access control, tenant isolation, identity federation, and logging. We also discuss the shared responsibility model, where both provider and customer have distinct obligations. If you’re working with SaaS, IaaS, or hybrid cloud models, you need to know how to safeguard data, workloads, and services in dynamic cloud environments.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/07c212b8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 34: Backup Controls and Data Recovery</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Episode 34: Backup Controls and Data Recovery</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">743a1f6d-2e3f-42a7-808c-7dec4d50155c</guid>
      <link>https://share.transistor.fm/s/2ccce573</link>
      <description>
        <![CDATA[<p>Backup and recovery plans are your insurance against data loss. In this episode, we explore the critical controls necessary to ensure backups are available, secure, and usable when needed. We discuss types of backups (full, incremental, differential), retention policies, storage locations (on-site vs. off-site), and encryption strategies. You’ll also learn about recovery objectives like RTO (Recovery Time Objective) and RPO (Recovery Point Objective), and how to test your backup system effectively. An untested backup is a false sense of security—this episode equips you to build reliable data recovery capabilities.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Backup and recovery plans are your insurance against data loss. In this episode, we explore the critical controls necessary to ensure backups are available, secure, and usable when needed. We discuss types of backups (full, incremental, differential), retention policies, storage locations (on-site vs. off-site), and encryption strategies. You’ll also learn about recovery objectives like RTO (Recovery Time Objective) and RPO (Recovery Point Objective), and how to test your backup system effectively. An untested backup is a false sense of security—this episode equips you to build reliable data recovery capabilities.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:57:49 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2ccce573/4e5180e3.mp3" length="42185975" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1054</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Backup and recovery plans are your insurance against data loss. In this episode, we explore the critical controls necessary to ensure backups are available, secure, and usable when needed. We discuss types of backups (full, incremental, differential), retention policies, storage locations (on-site vs. off-site), and encryption strategies. You’ll also learn about recovery objectives like RTO (Recovery Time Objective) and RPO (Recovery Point Objective), and how to test your backup system effectively. An untested backup is a false sense of security—this episode equips you to build reliable data recovery capabilities.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2ccce573/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 35: Handling of Sensitive Systems and High-Value Assets</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Episode 35: Handling of Sensitive Systems and High-Value Assets</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">529e95ce-c25d-49fb-8e6f-22e91d0e2f66</guid>
      <link>https://share.transistor.fm/s/52f13432</link>
      <description>
        <![CDATA[<p>Some systems and data are too critical to treat like everything else. This episode focuses on how organizations identify, secure, and manage sensitive systems and high-value assets (HVAs), such as financial databases, intellectual property repositories, and industrial control systems. We discuss segmentation, access control, system hardening, monitoring, and tailored incident response plans for these resources. You’ll also learn how to align asset protection with business impact, risk appetite, and regulatory requirements. CISSP candidates must understand how to prioritize protections for the assets that matter most.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Some systems and data are too critical to treat like everything else. This episode focuses on how organizations identify, secure, and manage sensitive systems and high-value assets (HVAs), such as financial databases, intellectual property repositories, and industrial control systems. We discuss segmentation, access control, system hardening, monitoring, and tailored incident response plans for these resources. You’ll also learn how to align asset protection with business impact, risk appetite, and regulatory requirements. CISSP candidates must understand how to prioritize protections for the assets that matter most.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:58:47 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/52f13432/f8d85a83.mp3" length="47372866" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1184</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Some systems and data are too critical to treat like everything else. This episode focuses on how organizations identify, secure, and manage sensitive systems and high-value assets (HVAs), such as financial databases, intellectual property repositories, and industrial control systems. We discuss segmentation, access control, system hardening, monitoring, and tailored incident response plans for these resources. You’ll also learn how to align asset protection with business impact, risk appetite, and regulatory requirements. CISSP candidates must understand how to prioritize protections for the assets that matter most.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/52f13432/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 36: Logging, Monitoring, and Metadata Retention for Assets</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Episode 36: Logging, Monitoring, and Metadata Retention for Assets</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e6bfcee4-e182-43f4-a535-5b5689069038</guid>
      <link>https://share.transistor.fm/s/326a60c5</link>
      <description>
        <![CDATA[<p>Without visibility, security is just guesswork. In this episode, we explore how logging and monitoring give security teams the information they need to detect, investigate, and respond to incidents. We discuss log types (system, application, network), retention policies, log integrity, and secure storage. Metadata, such as timestamps, source IPs, and user actions, adds context to every alert and event. You'll also learn about regulatory and legal considerations for log retention, especially in forensic investigations. Monitoring is the heartbeat of any security program—this episode shows you how to keep it strong.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Without visibility, security is just guesswork. In this episode, we explore how logging and monitoring give security teams the information they need to detect, investigate, and respond to incidents. We discuss log types (system, application, network), retention policies, log integrity, and secure storage. Metadata, such as timestamps, source IPs, and user actions, adds context to every alert and event. You'll also learn about regulatory and legal considerations for log retention, especially in forensic investigations. Monitoring is the heartbeat of any security program—this episode shows you how to keep it strong.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 18:59:35 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/326a60c5/2ba34ea3.mp3" length="43017735" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1075</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Without visibility, security is just guesswork. In this episode, we explore how logging and monitoring give security teams the information they need to detect, investigate, and respond to incidents. We discuss log types (system, application, network), retention policies, log integrity, and secure storage. Metadata, such as timestamps, source IPs, and user actions, adds context to every alert and event. You'll also learn about regulatory and legal considerations for log retention, especially in forensic investigations. Monitoring is the heartbeat of any security program—this episode shows you how to keep it strong.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/326a60c5/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 37: Secure Design Principles: Defense in Depth, Least Privilege</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>Episode 37: Secure Design Principles: Defense in Depth, Least Privilege</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c943c462-ca25-4d24-9f66-1252bfa04f61</guid>
      <link>https://share.transistor.fm/s/d88a3b37</link>
      <description>
        <![CDATA[<p>Designing secure systems isn’t just about applying tools—it’s about embedding principles. This episode introduces two foundational security design concepts: defense in depth and least privilege. Defense in depth layers multiple controls to prevent, detect, and contain threats, while least privilege ensures users and systems operate with the minimum access necessary. We explain how these principles apply to networks, applications, and user environments, and how they reduce risk from both internal and external threats. Understanding and applying these design principles is critical for both the CISSP exam and real-world implementation.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Designing secure systems isn’t just about applying tools—it’s about embedding principles. This episode introduces two foundational security design concepts: defense in depth and least privilege. Defense in depth layers multiple controls to prevent, detect, and contain threats, while least privilege ensures users and systems operate with the minimum access necessary. We explain how these principles apply to networks, applications, and user environments, and how they reduce risk from both internal and external threats. Understanding and applying these design principles is critical for both the CISSP exam and real-world implementation.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:00:24 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d88a3b37/212c7db6.mp3" length="41407552" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1034</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Designing secure systems isn’t just about applying tools—it’s about embedding principles. This episode introduces two foundational security design concepts: defense in depth and least privilege. Defense in depth layers multiple controls to prevent, detect, and contain threats, while least privilege ensures users and systems operate with the minimum access necessary. We explain how these principles apply to networks, applications, and user environments, and how they reduce risk from both internal and external threats. Understanding and applying these design principles is critical for both the CISSP exam and real-world implementation.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d88a3b37/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 38: Security Models: Bell-LaPadula, Biba, Clark-Wilson</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Episode 38: Security Models: Bell-LaPadula, Biba, Clark-Wilson</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">774f4097-80ce-448a-b0a7-830196d8098c</guid>
      <link>https://share.transistor.fm/s/fc52c85d</link>
      <description>
        <![CDATA[<p>Security models are theoretical frameworks that help define how systems enforce access control, integrity, and confidentiality. In this episode, we review the three classic models: Bell-LaPadula (focused on confidentiality), Biba (focused on integrity), and Clark-Wilson (focused on well-formed transactions and separation of duties). We explain the core rules behind each model—like “no read up” and “no write down”—and discuss where each is applied in government, commercial, and financial systems. Understanding these models gives you a structured way to think about how systems enforce security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security models are theoretical frameworks that help define how systems enforce access control, integrity, and confidentiality. In this episode, we review the three classic models: Bell-LaPadula (focused on confidentiality), Biba (focused on integrity), and Clark-Wilson (focused on well-formed transactions and separation of duties). We explain the core rules behind each model—like “no read up” and “no write down”—and discuss where each is applied in government, commercial, and financial systems. Understanding these models gives you a structured way to think about how systems enforce security.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:01:19 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fc52c85d/2a1a116f.mp3" length="44281012" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1106</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security models are theoretical frameworks that help define how systems enforce access control, integrity, and confidentiality. In this episode, we review the three classic models: Bell-LaPadula (focused on confidentiality), Biba (focused on integrity), and Clark-Wilson (focused on well-formed transactions and separation of duties). We explain the core rules behind each model—like “no read up” and “no write down”—and discuss where each is applied in government, commercial, and financial systems. Understanding these models gives you a structured way to think about how systems enforce security.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fc52c85d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 39: Architecture Layers: OSI, System, Application</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>Episode 39: Architecture Layers: OSI, System, Application</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3197ab06-5b1b-4263-9ee5-842dce0b7e49</guid>
      <link>https://share.transistor.fm/s/2f77aed7</link>
      <description>
        <![CDATA[<p>Security must be applied across all layers of a system, from the physical infrastructure to the application interface. In this episode, we explore the layered nature of system architecture—starting with the OSI model’s seven layers, then expanding into how security is applied at the hardware, system, and application levels. You’ll learn how to align controls with each layer’s function, recognize common threats at each level, and understand how layered defenses provide coverage across the stack. This foundational knowledge helps you design and evaluate more secure system architectures.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security must be applied across all layers of a system, from the physical infrastructure to the application interface. In this episode, we explore the layered nature of system architecture—starting with the OSI model’s seven layers, then expanding into how security is applied at the hardware, system, and application levels. You’ll learn how to align controls with each layer’s function, recognize common threats at each level, and understand how layered defenses provide coverage across the stack. This foundational knowledge helps you design and evaluate more secure system architectures.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:02:01 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2f77aed7/af4eecf0.mp3" length="45592354" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1139</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security must be applied across all layers of a system, from the physical infrastructure to the application interface. In this episode, we explore the layered nature of system architecture—starting with the OSI model’s seven layers, then expanding into how security is applied at the hardware, system, and application levels. You’ll learn how to align controls with each layer’s function, recognize common threats at each level, and understand how layered defenses provide coverage across the stack. This foundational knowledge helps you design and evaluate more secure system architectures.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2f77aed7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 40: Secure Hardware Architecture and TPM</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>Episode 40: Secure Hardware Architecture and TPM</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d5a35a10-1c3c-4585-95ba-4c095292dfdb</guid>
      <link>https://share.transistor.fm/s/1a756911</link>
      <description>
        <![CDATA[<p>Security isn’t only about software—hardware matters too. This episode introduces key elements of secure hardware architecture, including trusted computing bases, secure boot processes, and hardware root of trust. We also dive into the Trusted Platform Module (TPM), a hardware chip that provides cryptographic key storage, platform integrity checks, and secure identity verification. You’ll learn how TPMs support secure encryption, authentication, and remote attestation. CISSP candidates must understand how hardware-based protections contribute to a system’s overall security posture—especially in high-assurance or regulated environments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security isn’t only about software—hardware matters too. This episode introduces key elements of secure hardware architecture, including trusted computing bases, secure boot processes, and hardware root of trust. We also dive into the Trusted Platform Module (TPM), a hardware chip that provides cryptographic key storage, platform integrity checks, and secure identity verification. You’ll learn how TPMs support secure encryption, authentication, and remote attestation. CISSP candidates must understand how hardware-based protections contribute to a system’s overall security posture—especially in high-assurance or regulated environments.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:02:48 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1a756911/5d5fc1de.mp3" length="44252786" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1106</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security isn’t only about software—hardware matters too. This episode introduces key elements of secure hardware architecture, including trusted computing bases, secure boot processes, and hardware root of trust. We also dive into the Trusted Platform Module (TPM), a hardware chip that provides cryptographic key storage, platform integrity checks, and secure identity verification. You’ll learn how TPMs support secure encryption, authentication, and remote attestation. CISSP candidates must understand how hardware-based protections contribute to a system’s overall security posture—especially in high-assurance or regulated environments.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1a756911/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 41: Virtualization and Cloud Infrastructure Considerations</title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>Episode 41: Virtualization and Cloud Infrastructure Considerations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cf5dcce5-d40e-45d1-a368-f8fa6ecf89a2</guid>
      <link>https://share.transistor.fm/s/e4fec2c2</link>
      <description>
        <![CDATA[<p>Virtualization and cloud computing are cornerstones of modern IT, but they also introduce unique security challenges. In this episode, we examine the architecture and risks associated with virtual machines, hypervisors, containers, and cloud platforms. You’ll learn how virtual environments increase complexity and expand the attack surface, and what controls are necessary to mitigate these risks. We also explore the shared responsibility model, virtualization sprawl, tenant isolation, and the importance of secure provisioning. Understanding these technologies is critical for designing secure, scalable, and compliant IT environments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Virtualization and cloud computing are cornerstones of modern IT, but they also introduce unique security challenges. In this episode, we examine the architecture and risks associated with virtual machines, hypervisors, containers, and cloud platforms. You’ll learn how virtual environments increase complexity and expand the attack surface, and what controls are necessary to mitigate these risks. We also explore the shared responsibility model, virtualization sprawl, tenant isolation, and the importance of secure provisioning. Understanding these technologies is critical for designing secure, scalable, and compliant IT environments.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:06:10 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e4fec2c2/abd3e961.mp3" length="31447580" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>785</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Virtualization and cloud computing are cornerstones of modern IT, but they also introduce unique security challenges. In this episode, we examine the architecture and risks associated with virtual machines, hypervisors, containers, and cloud platforms. You’ll learn how virtual environments increase complexity and expand the attack surface, and what controls are necessary to mitigate these risks. We also explore the shared responsibility model, virtualization sprawl, tenant isolation, and the importance of secure provisioning. Understanding these technologies is critical for designing secure, scalable, and compliant IT environments.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e4fec2c2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 42: Secure Baseline and Configuration Management</title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>Episode 42: Secure Baseline and Configuration Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2fbe6d26-fab3-4032-a0a1-8d6c2c25a3d3</guid>
      <link>https://share.transistor.fm/s/53b58b56</link>
      <description>
        <![CDATA[<p>Systems don’t stay secure by accident—they stay secure through consistent configuration and control. In this episode, we cover the concepts of secure baselining and configuration management. You’ll learn how to establish security baselines, enforce configuration standards, and use automation tools to detect and remediate drift. We also discuss patching, change control, and the role of configuration management databases (CMDBs). These practices ensure your systems remain hardened, predictable, and auditable—critical for minimizing attack surfaces, meeting compliance obligations, and maintaining operational stability.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Systems don’t stay secure by accident—they stay secure through consistent configuration and control. In this episode, we cover the concepts of secure baselining and configuration management. You’ll learn how to establish security baselines, enforce configuration standards, and use automation tools to detect and remediate drift. We also discuss patching, change control, and the role of configuration management databases (CMDBs). These practices ensure your systems remain hardened, predictable, and auditable—critical for minimizing attack surfaces, meeting compliance obligations, and maintaining operational stability.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:07:16 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/53b58b56/40b6cdaf.mp3" length="35481921" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>886</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Systems don’t stay secure by accident—they stay secure through consistent configuration and control. In this episode, we cover the concepts of secure baselining and configuration management. You’ll learn how to establish security baselines, enforce configuration standards, and use automation tools to detect and remediate drift. We also discuss patching, change control, and the role of configuration management databases (CMDBs). These practices ensure your systems remain hardened, predictable, and auditable—critical for minimizing attack surfaces, meeting compliance obligations, and maintaining operational stability.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/53b58b56/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 43: Common Security Flaws in Architecture</title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>Episode 43: Common Security Flaws in Architecture</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">01a5d3fb-0b82-4a20-a12e-1f602699d117</guid>
      <link>https://share.transistor.fm/s/6b7f5478</link>
      <description>
        <![CDATA[<p>Flawed architecture is one of the most serious vulnerabilities in any system. In this episode, we explore common architectural security weaknesses, including insecure defaults, lack of isolation, poor trust boundaries, and insufficient input validation. We explain how these flaws emerge during design and how they can be exploited by attackers. You’ll also learn how to apply secure design principles to avoid introducing systemic weaknesses in new systems. Whether you're evaluating an existing architecture or designing one from scratch, recognizing and addressing architectural flaws is a must-have skill for CISSPs.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Flawed architecture is one of the most serious vulnerabilities in any system. In this episode, we explore common architectural security weaknesses, including insecure defaults, lack of isolation, poor trust boundaries, and insufficient input validation. We explain how these flaws emerge during design and how they can be exploited by attackers. You’ll also learn how to apply secure design principles to avoid introducing systemic weaknesses in new systems. Whether you're evaluating an existing architecture or designing one from scratch, recognizing and addressing architectural flaws is a must-have skill for CISSPs.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:08:06 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6b7f5478/61d84871.mp3" length="29940820" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>748</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Flawed architecture is one of the most serious vulnerabilities in any system. In this episode, we explore common architectural security weaknesses, including insecure defaults, lack of isolation, poor trust boundaries, and insufficient input validation. We explain how these flaws emerge during design and how they can be exploited by attackers. You’ll also learn how to apply secure design principles to avoid introducing systemic weaknesses in new systems. Whether you're evaluating an existing architecture or designing one from scratch, recognizing and addressing architectural flaws is a must-have skill for CISSPs.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6b7f5478/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 44: Cryptographic Concepts: Symmetric and Asymmetric</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>Episode 44: Cryptographic Concepts: Symmetric and Asymmetric</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9c5cd60c-4d8e-4383-8f1c-2c203b30f345</guid>
      <link>https://share.transistor.fm/s/98e234f7</link>
      <description>
        <![CDATA[<p>Cryptography is the backbone of digital security, and understanding its core principles is essential. In this episode, we explain the difference between symmetric and asymmetric encryption, along with their real-world applications. You’ll learn how symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption relies on key pairs for secure key exchange, digital signatures, and more. We also discuss algorithm examples like AES, RSA, and ECC. Grasping these concepts enables you to evaluate the strength, use cases, and implementation considerations of cryptographic solutions.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cryptography is the backbone of digital security, and understanding its core principles is essential. In this episode, we explain the difference between symmetric and asymmetric encryption, along with their real-world applications. You’ll learn how symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption relies on key pairs for secure key exchange, digital signatures, and more. We also discuss algorithm examples like AES, RSA, and ECC. Grasping these concepts enables you to evaluate the strength, use cases, and implementation considerations of cryptographic solutions.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:08:58 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/98e234f7/450bdfa1.mp3" length="27620112" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>690</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cryptography is the backbone of digital security, and understanding its core principles is essential. In this episode, we explain the difference between symmetric and asymmetric encryption, along with their real-world applications. You’ll learn how symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption relies on key pairs for secure key exchange, digital signatures, and more. We also discuss algorithm examples like AES, RSA, and ECC. Grasping these concepts enables you to evaluate the strength, use cases, and implementation considerations of cryptographic solutions.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/98e234f7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 45: Cryptographic Lifecycle: Algorithms, Strength, Obsolescence</title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>Episode 45: Cryptographic Lifecycle: Algorithms, Strength, Obsolescence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ff70257d-ab06-42bf-aa7f-0f2cbbd14cbe</guid>
      <link>https://share.transistor.fm/s/5e8c1962</link>
      <description>
        <![CDATA[<p>Cryptographic tools aren’t set-and-forget solutions—they require lifecycle management. This episode explores how organizations select, deploy, and eventually retire cryptographic algorithms. We examine how algorithm strength is determined, the impact of key length, and the risks posed by deprecated or broken ciphers like MD5 and SHA-1. You’ll learn how to stay ahead of threats by monitoring crypto standards and planning for migration to newer algorithms. From algorithm selection to end-of-life planning, this topic helps CISSPs build cryptographic systems that remain secure over time.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cryptographic tools aren’t set-and-forget solutions—they require lifecycle management. This episode explores how organizations select, deploy, and eventually retire cryptographic algorithms. We examine how algorithm strength is determined, the impact of key length, and the risks posed by deprecated or broken ciphers like MD5 and SHA-1. You’ll learn how to stay ahead of threats by monitoring crypto standards and planning for migration to newer algorithms. From algorithm selection to end-of-life planning, this topic helps CISSPs build cryptographic systems that remain secure over time.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:09:49 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5e8c1962/89f6ff25.mp3" length="36967781" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>923</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cryptographic tools aren’t set-and-forget solutions—they require lifecycle management. This episode explores how organizations select, deploy, and eventually retire cryptographic algorithms. We examine how algorithm strength is determined, the impact of key length, and the risks posed by deprecated or broken ciphers like MD5 and SHA-1. You’ll learn how to stay ahead of threats by monitoring crypto standards and planning for migration to newer algorithms. From algorithm selection to end-of-life planning, this topic helps CISSPs build cryptographic systems that remain secure over time.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5e8c1962/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 46: Hashing and Message Integrity</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>Episode 46: Hashing and Message Integrity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c510fa2b-5fad-4875-b78a-f20dd036a1e7</guid>
      <link>https://share.transistor.fm/s/00b8b616</link>
      <description>
        <![CDATA[<p>Hashing ensures that data remains unchanged during storage or transmission—a core requirement for integrity. In this episode, we explore how cryptographic hash functions like SHA-256 and SHA-3 are used to detect tampering, generate digital signatures, and verify file authenticity. We discuss key properties such as collision resistance, pre-image resistance, and determinism. You'll also learn the difference between hashing and encryption, and how tools like checksums, MACs, and digital signatures work together to protect data. This is foundational knowledge for building secure applications and validating system outputs.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Hashing ensures that data remains unchanged during storage or transmission—a core requirement for integrity. In this episode, we explore how cryptographic hash functions like SHA-256 and SHA-3 are used to detect tampering, generate digital signatures, and verify file authenticity. We discuss key properties such as collision resistance, pre-image resistance, and determinism. You'll also learn the difference between hashing and encryption, and how tools like checksums, MACs, and digital signatures work together to protect data. This is foundational knowledge for building secure applications and validating system outputs.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:10:44 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/00b8b616/80415f94.mp3" length="30906298" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>772</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Hashing ensures that data remains unchanged during storage or transmission—a core requirement for integrity. In this episode, we explore how cryptographic hash functions like SHA-256 and SHA-3 are used to detect tampering, generate digital signatures, and verify file authenticity. We discuss key properties such as collision resistance, pre-image resistance, and determinism. You'll also learn the difference between hashing and encryption, and how tools like checksums, MACs, and digital signatures work together to protect data. This is foundational knowledge for building secure applications and validating system outputs.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/00b8b616/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 47: Key Management and Key Escrow</title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>Episode 47: Key Management and Key Escrow</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b2c1f804-0ab9-4c30-91a5-2ffd6925b181</guid>
      <link>https://share.transistor.fm/s/413af833</link>
      <description>
        <![CDATA[<p>Cryptographic systems are only as secure as the keys they use—and how those keys are managed. In this episode, we delve into key management principles, including generation, storage, distribution, rotation, and destruction. We also explore key escrow, where a third party securely stores encryption keys for legal or recovery purposes. You’ll learn about hardware security modules (HSMs), key management systems (KMS), and the challenges of managing keys in cloud environments. Whether protecting secrets or ensuring regulatory compliance, strong key management is non-negotiable for any CISSP.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cryptographic systems are only as secure as the keys they use—and how those keys are managed. In this episode, we delve into key management principles, including generation, storage, distribution, rotation, and destruction. We also explore key escrow, where a third party securely stores encryption keys for legal or recovery purposes. You’ll learn about hardware security modules (HSMs), key management systems (KMS), and the challenges of managing keys in cloud environments. Whether protecting secrets or ensuring regulatory compliance, strong key management is non-negotiable for any CISSP.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:11:26 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/413af833/a0308388.mp3" length="35465187" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>886</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cryptographic systems are only as secure as the keys they use—and how those keys are managed. In this episode, we delve into key management principles, including generation, storage, distribution, rotation, and destruction. We also explore key escrow, where a third party securely stores encryption keys for legal or recovery purposes. You’ll learn about hardware security modules (HSMs), key management systems (KMS), and the challenges of managing keys in cloud environments. Whether protecting secrets or ensuring regulatory compliance, strong key management is non-negotiable for any CISSP.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/413af833/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 48: PKI, Digital Certificates, and Trust Models</title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>Episode 48: PKI, Digital Certificates, and Trust Models</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">85844265-c2c9-43f8-8ea1-e2ec2137c4cd</guid>
      <link>https://share.transistor.fm/s/f589fdaf</link>
      <description>
        <![CDATA[<p>Public Key Infrastructure (PKI) is essential for enabling secure communication and verifying digital identities. This episode breaks down how PKI works, including the roles of certificate authorities (CAs), registration authorities (RAs), and digital certificates. You’ll learn about certificate chaining, revocation, validation protocols like OCSP and CRL, and how trust is established in both hierarchical and web-of-trust models. From SSL/TLS to code signing and user authentication, PKI is everywhere—and CISSPs need to know how to deploy and troubleshoot it securely.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Public Key Infrastructure (PKI) is essential for enabling secure communication and verifying digital identities. This episode breaks down how PKI works, including the roles of certificate authorities (CAs), registration authorities (RAs), and digital certificates. You’ll learn about certificate chaining, revocation, validation protocols like OCSP and CRL, and how trust is established in both hierarchical and web-of-trust models. From SSL/TLS to code signing and user authentication, PKI is everywhere—and CISSPs need to know how to deploy and troubleshoot it securely.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:12:17 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f589fdaf/98cb8460.mp3" length="31109022" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>777</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Public Key Infrastructure (PKI) is essential for enabling secure communication and verifying digital identities. This episode breaks down how PKI works, including the roles of certificate authorities (CAs), registration authorities (RAs), and digital certificates. You’ll learn about certificate chaining, revocation, validation protocols like OCSP and CRL, and how trust is established in both hierarchical and web-of-trust models. From SSL/TLS to code signing and user authentication, PKI is everywhere—and CISSPs need to know how to deploy and troubleshoot it securely.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f589fdaf/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 49: Cryptanalysis and Attacks Against Crypto</title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>Episode 49: Cryptanalysis and Attacks Against Crypto</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1fba272b-8aa0-473b-aa32-f98e21053b7e</guid>
      <link>https://share.transistor.fm/s/27c70da8</link>
      <description>
        <![CDATA[<p>No cryptographic system is immune to attack, and CISSPs must understand the methods used to break or weaken them. In this episode, we explore cryptanalysis techniques including brute-force, dictionary attacks, chosen plaintext attacks, and side-channel analysis. We explain how poor implementation, weak keys, and outdated algorithms create vulnerabilities, and how to mitigate those risks through proper design and monitoring. Understanding these threats enables security professionals to assess crypto deployments with a critical eye and defend against evolving attack strategies.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>No cryptographic system is immune to attack, and CISSPs must understand the methods used to break or weaken them. In this episode, we explore cryptanalysis techniques including brute-force, dictionary attacks, chosen plaintext attacks, and side-channel analysis. We explain how poor implementation, weak keys, and outdated algorithms create vulnerabilities, and how to mitigate those risks through proper design and monitoring. Understanding these threats enables security professionals to assess crypto deployments with a critical eye and defend against evolving attack strategies.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:13:06 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/27c70da8/f4eec5de.mp3" length="32886390" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>821</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>No cryptographic system is immune to attack, and CISSPs must understand the methods used to break or weaken them. In this episode, we explore cryptanalysis techniques including brute-force, dictionary attacks, chosen plaintext attacks, and side-channel analysis. We explain how poor implementation, weak keys, and outdated algorithms create vulnerabilities, and how to mitigate those risks through proper design and monitoring. Understanding these threats enables security professionals to assess crypto deployments with a critical eye and defend against evolving attack strategies.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/27c70da8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 50: Security Evaluations: Common Criteria, RMF, ISO/IEC</title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>Episode 50: Security Evaluations: Common Criteria, RMF, ISO/IEC</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2497494a-a935-4b4e-8dbb-67851c8d2adc</guid>
      <link>https://share.transistor.fm/s/8b39705f</link>
      <description>
        <![CDATA[<p>Security evaluations provide assurance that systems meet defined security requirements. In this episode, we examine key evaluation frameworks including Common Criteria (CC), the NIST Risk Management Framework (RMF), and the ISO/IEC 27000 series. You'll learn how these models define evaluation assurance levels, categorize controls, and guide secure system development. We also discuss how evaluation results support procurement, risk analysis, and compliance audits. For CISSP candidates and practitioners, understanding security evaluation frameworks is essential for aligning technical design with governance expectations.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security evaluations provide assurance that systems meet defined security requirements. In this episode, we examine key evaluation frameworks including Common Criteria (CC), the NIST Risk Management Framework (RMF), and the ISO/IEC 27000 series. You'll learn how these models define evaluation assurance levels, categorize controls, and guide secure system development. We also discuss how evaluation results support procurement, risk analysis, and compliance audits. For CISSP candidates and practitioners, understanding security evaluation frameworks is essential for aligning technical design with governance expectations.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:13:53 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8b39705f/bc82d109.mp3" length="30830042" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>770</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security evaluations provide assurance that systems meet defined security requirements. In this episode, we examine key evaluation frameworks including Common Criteria (CC), the NIST Risk Management Framework (RMF), and the ISO/IEC 27000 series. You'll learn how these models define evaluation assurance levels, categorize controls, and guide secure system development. We also discuss how evaluation results support procurement, risk analysis, and compliance audits. For CISSP candidates and practitioners, understanding security evaluation frameworks is essential for aligning technical design with governance expectations.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8b39705f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 51: Security Boundaries and Isolation Techniques</title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>Episode 51: Security Boundaries and Isolation Techniques</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f4d654c0-fc8e-4952-a656-ea8ee5a3b1f7</guid>
      <link>https://share.transistor.fm/s/390ce406</link>
      <description>
        <![CDATA[<p>Security boundaries are essential for creating logical separations between systems, users, and data flows. In this episode, we explore how boundaries are defined and enforced, using both physical and logical mechanisms. You’ll learn about concepts like trust zones, network segmentation, VLANs, virtualization, and sandboxing. We also discuss isolation techniques that prevent lateral movement, contain breaches, and ensure critical assets remain protected. Proper use of boundaries and isolation helps reduce attack surfaces, enforce policy, and support compliance. These principles are vital for scalable and secure infrastructure design.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security boundaries are essential for creating logical separations between systems, users, and data flows. In this episode, we explore how boundaries are defined and enforced, using both physical and logical mechanisms. You’ll learn about concepts like trust zones, network segmentation, VLANs, virtualization, and sandboxing. We also discuss isolation techniques that prevent lateral movement, contain breaches, and ensure critical assets remain protected. Proper use of boundaries and isolation helps reduce attack surfaces, enforce policy, and support compliance. These principles are vital for scalable and secure infrastructure design.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:14:41 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/390ce406/9dfe5549.mp3" length="33146574" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>828</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security boundaries are essential for creating logical separations between systems, users, and data flows. In this episode, we explore how boundaries are defined and enforced, using both physical and logical mechanisms. You’ll learn about concepts like trust zones, network segmentation, VLANs, virtualization, and sandboxing. We also discuss isolation techniques that prevent lateral movement, contain breaches, and ensure critical assets remain protected. Proper use of boundaries and isolation helps reduce attack surfaces, enforce policy, and support compliance. These principles are vital for scalable and secure infrastructure design.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/390ce406/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 52: Emerging Technologies and Security Architecture (e.g., IoT, AI)</title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>Episode 52: Emerging Technologies and Security Architecture (e.g., IoT, AI)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1d7bcc5b-b91a-43fc-a0c0-92c5465cac75</guid>
      <link>https://share.transistor.fm/s/b4d9c288</link>
      <description>
        <![CDATA[<p>Technological innovation continues to transform the security landscape. In this episode, we examine how emerging technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and machine learning are impacting security architecture. We discuss the benefits and vulnerabilities of these systems, including expanded attack surfaces, device sprawl, privacy concerns, and autonomous decision-making risks. You’ll also learn strategies for integrating these technologies securely using layered defenses, segmentation, and monitoring. CISSPs must understand both the opportunity and risk that innovation brings to cybersecurity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Technological innovation continues to transform the security landscape. In this episode, we examine how emerging technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and machine learning are impacting security architecture. We discuss the benefits and vulnerabilities of these systems, including expanded attack surfaces, device sprawl, privacy concerns, and autonomous decision-making risks. You’ll also learn strategies for integrating these technologies securely using layered defenses, segmentation, and monitoring. CISSPs must understand both the opportunity and risk that innovation brings to cybersecurity.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:15:24 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b4d9c288/d875720c.mp3" length="33106887" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>827</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Technological innovation continues to transform the security landscape. In this episode, we examine how emerging technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and machine learning are impacting security architecture. We discuss the benefits and vulnerabilities of these systems, including expanded attack surfaces, device sprawl, privacy concerns, and autonomous decision-making risks. You’ll also learn strategies for integrating these technologies securely using layered defenses, segmentation, and monitoring. CISSPs must understand both the opportunity and risk that innovation brings to cybersecurity.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b4d9c288/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 53: SCADA and Embedded System Security</title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>Episode 53: SCADA and Embedded System Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">640a26a8-7d44-42ea-be57-208fcde5ea6d</guid>
      <link>https://share.transistor.fm/s/f1fb7234</link>
      <description>
        <![CDATA[<p>Supervisory Control and Data Acquisition (SCADA) systems and embedded devices operate some of the most critical infrastructure in the world—from energy grids to transportation systems. This episode explores the unique challenges of securing these environments, including limited resources, outdated firmware, lack of patching, and real-time operational requirements. We cover best practices for access control, network isolation, vendor management, and secure configuration. As cyber threats increasingly target industrial systems, it’s crucial for CISSPs to understand how to protect these specialized and high-impact platforms.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Supervisory Control and Data Acquisition (SCADA) systems and embedded devices operate some of the most critical infrastructure in the world—from energy grids to transportation systems. This episode explores the unique challenges of securing these environments, including limited resources, outdated firmware, lack of patching, and real-time operational requirements. We cover best practices for access control, network isolation, vendor management, and secure configuration. As cyber threats increasingly target industrial systems, it’s crucial for CISSPs to understand how to protect these specialized and high-impact platforms.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:16:11 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f1fb7234/693775b2.mp3" length="31439200" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>785</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Supervisory Control and Data Acquisition (SCADA) systems and embedded devices operate some of the most critical infrastructure in the world—from energy grids to transportation systems. This episode explores the unique challenges of securing these environments, including limited resources, outdated firmware, lack of patching, and real-time operational requirements. We cover best practices for access control, network isolation, vendor management, and secure configuration. As cyber threats increasingly target industrial systems, it’s crucial for CISSPs to understand how to protect these specialized and high-impact platforms.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f1fb7234/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 54: Fault Tolerance, Redundancy, and High Availability</title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>Episode 54: Fault Tolerance, Redundancy, and High Availability</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">11cff013-af06-4056-b8bc-67cd0bcb3e2f</guid>
      <link>https://share.transistor.fm/s/200aca1e</link>
      <description>
        <![CDATA[<p>Downtime is not an option for mission-critical systems. In this episode, we dive into fault tolerance, redundancy, and high availability—design strategies that ensure continuity despite component failures or unexpected disruptions. You’ll learn the differences between active-active and active-passive configurations, the role of clustering, load balancing, failover mechanisms, and geographically distributed resources. We also cover the importance of regular testing and monitoring to validate these systems. Building resilient infrastructure is a core CISSP competency and a vital part of risk mitigation planning.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Downtime is not an option for mission-critical systems. In this episode, we dive into fault tolerance, redundancy, and high availability—design strategies that ensure continuity despite component failures or unexpected disruptions. You’ll learn the differences between active-active and active-passive configurations, the role of clustering, load balancing, failover mechanisms, and geographically distributed resources. We also cover the importance of regular testing and monitoring to validate these systems. Building resilient infrastructure is a core CISSP competency and a vital part of risk mitigation planning.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:17:10 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/200aca1e/2aedaa6f.mp3" length="30885421" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>771</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Downtime is not an option for mission-critical systems. In this episode, we dive into fault tolerance, redundancy, and high availability—design strategies that ensure continuity despite component failures or unexpected disruptions. You’ll learn the differences between active-active and active-passive configurations, the role of clustering, load balancing, failover mechanisms, and geographically distributed resources. We also cover the importance of regular testing and monitoring to validate these systems. Building resilient infrastructure is a core CISSP competency and a vital part of risk mitigation planning.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/200aca1e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 55: Network Architecture: LAN, WAN, Internet</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>Episode 55: Network Architecture: LAN, WAN, Internet</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">de105a33-7364-4bcc-9b3f-1800effcc557</guid>
      <link>https://share.transistor.fm/s/795c309e</link>
      <description>
        <![CDATA[<p>Understanding how networks are built and connected is foundational for any security professional. In this episode, we review core network architecture concepts, including the structure and purpose of Local Area Networks (LANs), Wide Area Networks (WANs), and the global Internet. We examine how data moves across these networks and where vulnerabilities may appear, from physical access points to routing protocols. You’ll also learn about segmentation, perimeter controls, and traffic flow management. A solid grasp of network architecture is necessary for applying controls and preventing unauthorized access.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Understanding how networks are built and connected is foundational for any security professional. In this episode, we review core network architecture concepts, including the structure and purpose of Local Area Networks (LANs), Wide Area Networks (WANs), and the global Internet. We examine how data moves across these networks and where vulnerabilities may appear, from physical access points to routing protocols. You’ll also learn about segmentation, perimeter controls, and traffic flow management. A solid grasp of network architecture is necessary for applying controls and preventing unauthorized access.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:18:08 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/795c309e/5ee8d34d.mp3" length="31943892" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>798</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Understanding how networks are built and connected is foundational for any security professional. In this episode, we review core network architecture concepts, including the structure and purpose of Local Area Networks (LANs), Wide Area Networks (WANs), and the global Internet. We examine how data moves across these networks and where vulnerabilities may appear, from physical access points to routing protocols. You’ll also learn about segmentation, perimeter controls, and traffic flow management. A solid grasp of network architecture is necessary for applying controls and preventing unauthorized access.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/795c309e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 56: OSI and TCP/IP Models Refresher</title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>Episode 56: OSI and TCP/IP Models Refresher</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cfc15029-0f52-4bb9-b7bb-26496986d751</guid>
      <link>https://share.transistor.fm/s/005506a7</link>
      <description>
        <![CDATA[<p>The OSI and TCP/IP models provide a layered approach to understanding how data is transmitted, received, and managed across networks. In this episode, we refresh your understanding of these models and their significance in network security. We explore the function of each layer—from physical cabling to application-level protocols—and explain how attacks and defenses map to specific layers. You’ll also learn how these models aid in troubleshooting, forensic analysis, and control implementation. Mastery of these foundational models helps CISSPs design and secure resilient networked systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The OSI and TCP/IP models provide a layered approach to understanding how data is transmitted, received, and managed across networks. In this episode, we refresh your understanding of these models and their significance in network security. We explore the function of each layer—from physical cabling to application-level protocols—and explain how attacks and defenses map to specific layers. You’ll also learn how these models aid in troubleshooting, forensic analysis, and control implementation. Mastery of these foundational models helps CISSPs design and secure resilient networked systems.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:19:00 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/005506a7/051b7bb9.mp3" length="29974251" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>749</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The OSI and TCP/IP models provide a layered approach to understanding how data is transmitted, received, and managed across networks. In this episode, we refresh your understanding of these models and their significance in network security. We explore the function of each layer—from physical cabling to application-level protocols—and explain how attacks and defenses map to specific layers. You’ll also learn how these models aid in troubleshooting, forensic analysis, and control implementation. Mastery of these foundational models helps CISSPs design and secure resilient networked systems.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/005506a7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 57: Secure Protocols: HTTPS, SSH, SFTP, SNMPv3</title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>Episode 57: Secure Protocols: HTTPS, SSH, SFTP, SNMPv3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1b20cd66-20a0-48f1-bcf8-4c174f5cb360</guid>
      <link>https://share.transistor.fm/s/0ecb47b9</link>
      <description>
        <![CDATA[<p>Secure communication protocols form the backbone of protected digital environments. In this episode, we explore widely used secure protocols like HTTPS, SSH, SFTP, and SNMPv3. You’ll learn how each one provides confidentiality, integrity, and authentication for various types of data exchanges—from web traffic and file transfers to remote administration and device management. We cover protocol strengths, configuration tips, and common pitfalls. CISSPs must understand which protocols are appropriate for specific use cases and how to deploy them effectively in enterprise environments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Secure communication protocols form the backbone of protected digital environments. In this episode, we explore widely used secure protocols like HTTPS, SSH, SFTP, and SNMPv3. You’ll learn how each one provides confidentiality, integrity, and authentication for various types of data exchanges—from web traffic and file transfers to remote administration and device management. We cover protocol strengths, configuration tips, and common pitfalls. CISSPs must understand which protocols are appropriate for specific use cases and how to deploy them effectively in enterprise environments.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:19:54 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0ecb47b9/601aacaf.mp3" length="31173804" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>779</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Secure communication protocols form the backbone of protected digital environments. In this episode, we explore widely used secure protocols like HTTPS, SSH, SFTP, and SNMPv3. You’ll learn how each one provides confidentiality, integrity, and authentication for various types of data exchanges—from web traffic and file transfers to remote administration and device management. We cover protocol strengths, configuration tips, and common pitfalls. CISSPs must understand which protocols are appropriate for specific use cases and how to deploy them effectively in enterprise environments.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0ecb47b9/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 58: Network Segmentation and Microsegmentation</title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>Episode 58: Network Segmentation and Microsegmentation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">699d7704-dcaa-4615-b51e-2332d6c985e7</guid>
      <link>https://share.transistor.fm/s/08cf8b6f</link>
      <description>
        <![CDATA[<p>Segmentation limits the spread of attacks and improves control over traffic flows within a network. In this episode, we examine both traditional network segmentation and microsegmentation techniques. You’ll learn how VLANs, firewalls, and subnetting create macro boundaries, while software-defined networking enables granular control over traffic between workloads and devices. We discuss how segmentation supports least privilege access, improves detection, and reduces risk. CISSPs must know how to design segmented architectures that balance performance, visibility, and security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Segmentation limits the spread of attacks and improves control over traffic flows within a network. In this episode, we examine both traditional network segmentation and microsegmentation techniques. You’ll learn how VLANs, firewalls, and subnetting create macro boundaries, while software-defined networking enables granular control over traffic between workloads and devices. We discuss how segmentation supports least privilege access, improves detection, and reduces risk. CISSPs must know how to design segmented architectures that balance performance, visibility, and security.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:20:40 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/08cf8b6f/1ef90d94.mp3" length="33993984" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>849</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Segmentation limits the spread of attacks and improves control over traffic flows within a network. In this episode, we examine both traditional network segmentation and microsegmentation techniques. You’ll learn how VLANs, firewalls, and subnetting create macro boundaries, while software-defined networking enables granular control over traffic between workloads and devices. We discuss how segmentation supports least privilege access, improves detection, and reduces risk. CISSPs must know how to design segmented architectures that balance performance, visibility, and security.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/08cf8b6f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 59: Defense in Depth with Firewalls and DMZs</title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>Episode 59: Defense in Depth with Firewalls and DMZs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">720f5992-b7b2-450b-8f3e-9fdf170c1eb6</guid>
      <link>https://share.transistor.fm/s/f7f8a055</link>
      <description>
        <![CDATA[<p>Layered security—known as defense in depth—is a core concept in cybersecurity architecture. This episode focuses on how firewalls and demilitarized zones (DMZs) serve as essential layers in protecting internal networks. We explore different types of firewalls (packet filtering, stateful, next-gen), the design of DMZs for public-facing services, and how to enforce traffic controls between zones. You'll also learn how to implement rule sets, audit firewall logs, and support intrusion detection systems. This is critical knowledge for securing enterprise perimeters and enforcing trust boundaries.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Layered security—known as defense in depth—is a core concept in cybersecurity architecture. This episode focuses on how firewalls and demilitarized zones (DMZs) serve as essential layers in protecting internal networks. We explore different types of firewalls (packet filtering, stateful, next-gen), the design of DMZs for public-facing services, and how to enforce traffic controls between zones. You'll also learn how to implement rule sets, audit firewall logs, and support intrusion detection systems. This is critical knowledge for securing enterprise perimeters and enforcing trust boundaries.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:21:29 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f7f8a055/175fba8d.mp3" length="30586570" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>764</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Layered security—known as defense in depth—is a core concept in cybersecurity architecture. This episode focuses on how firewalls and demilitarized zones (DMZs) serve as essential layers in protecting internal networks. We explore different types of firewalls (packet filtering, stateful, next-gen), the design of DMZs for public-facing services, and how to enforce traffic controls between zones. You'll also learn how to implement rule sets, audit firewall logs, and support intrusion detection systems. This is critical knowledge for securing enterprise perimeters and enforcing trust boundaries.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f7f8a055/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 60: Intrusion Detection and Prevention Systems</title>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:title>Episode 60: Intrusion Detection and Prevention Systems</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e2e69a86-ddf3-4f28-b392-4d6391059f40</guid>
      <link>https://share.transistor.fm/s/21179a0b</link>
      <description>
        <![CDATA[<p>Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are crucial for identifying and stopping threats in real time. This episode explores how these tools work, their deployment strategies, and how they integrate with broader security operations. You’ll learn about signature-based and anomaly-based detection, false positives, evasion techniques, and tuning practices. We also cover network-based and host-based implementations, and how alerts are correlated in a Security Information and Event Management (SIEM) platform. IDS and IPS are key components of active defense and threat response.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are crucial for identifying and stopping threats in real time. This episode explores how these tools work, their deployment strategies, and how they integrate with broader security operations. You’ll learn about signature-based and anomaly-based detection, false positives, evasion techniques, and tuning practices. We also cover network-based and host-based implementations, and how alerts are correlated in a Security Information and Event Management (SIEM) platform. IDS and IPS are key components of active defense and threat response.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:22:20 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/21179a0b/4ebebc50.mp3" length="31733870" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>793</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are crucial for identifying and stopping threats in real time. This episode explores how these tools work, their deployment strategies, and how they integrate with broader security operations. You’ll learn about signature-based and anomaly-based detection, false positives, evasion techniques, and tuning practices. We also cover network-based and host-based implementations, and how alerts are correlated in a Security Information and Event Management (SIEM) platform. IDS and IPS are key components of active defense and threat response.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/21179a0b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 61: Secure Routing and Switching</title>
      <itunes:episode>61</itunes:episode>
      <podcast:episode>61</podcast:episode>
      <itunes:title>Episode 61: Secure Routing and Switching</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8263e5bf-cbd6-4e12-8cc5-4c7a3566a51c</guid>
      <link>https://share.transistor.fm/s/e4129dfc</link>
      <description>
        <![CDATA[<p>Secure routing and switching are foundational elements of network security. In this episode, we explore how routers and switches operate, and how attackers exploit their misconfigurations or weaknesses to gain access or disrupt communication. Topics include route hijacking, ARP poisoning, MAC flooding, and VLAN hopping. You’ll learn best practices for hardening these devices, including access control lists (ACLs), management plane protection, port security, and proper firmware management. Ensuring routing and switching infrastructure is properly secured is a critical skill for any CISSP responsible for protecting the integrity of network environments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Secure routing and switching are foundational elements of network security. In this episode, we explore how routers and switches operate, and how attackers exploit their misconfigurations or weaknesses to gain access or disrupt communication. Topics include route hijacking, ARP poisoning, MAC flooding, and VLAN hopping. You’ll learn best practices for hardening these devices, including access control lists (ACLs), management plane protection, port security, and proper firmware management. Ensuring routing and switching infrastructure is properly secured is a critical skill for any CISSP responsible for protecting the integrity of network environments.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:22:57 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e4129dfc/079880f2.mp3" length="34639717" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>865</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Secure routing and switching are foundational elements of network security. In this episode, we explore how routers and switches operate, and how attackers exploit their misconfigurations or weaknesses to gain access or disrupt communication. Topics include route hijacking, ARP poisoning, MAC flooding, and VLAN hopping. You’ll learn best practices for hardening these devices, including access control lists (ACLs), management plane protection, port security, and proper firmware management. Ensuring routing and switching infrastructure is properly secured is a critical skill for any CISSP responsible for protecting the integrity of network environments.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e4129dfc/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 62: VPNs, Remote Access, and Tunneling Protocols</title>
      <itunes:episode>62</itunes:episode>
      <podcast:episode>62</podcast:episode>
      <itunes:title>Episode 62: VPNs, Remote Access, and Tunneling Protocols</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">88bc2da6-71bb-493b-b9cb-5afcd014e93f</guid>
      <link>https://share.transistor.fm/s/ca0d55b5</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:23:42 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ca0d55b5/86e2751c.mp3" length="37099423" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>927</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ca0d55b5/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 63: Wireless Network Security (WEP, WPA2/3, 802.1X)</title>
      <itunes:episode>63</itunes:episode>
      <podcast:episode>63</podcast:episode>
      <itunes:title>Episode 63: Wireless Network Security (WEP, WPA2/3, 802.1X)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3baeaff8-d119-48c1-8181-e5279a688e7d</guid>
      <link>https://share.transistor.fm/s/520a7954</link>
      <description>
        <![CDATA[<p>Wireless networks present a unique set of vulnerabilities due to their reliance on open air transmission. In this episode, we examine wireless security protocols and controls, including WEP, WPA2, WPA3, and 802.1X. We explain how authentication frameworks, encryption standards, and access controls protect against threats like rogue access points, packet sniffing, and brute-force attacks. You’ll also learn about secure SSID broadcasting, segmentation, and signal isolation. Securing wireless environments is a critical task for CISSPs, especially as more enterprise traffic shifts to mobile and remote connections.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Wireless networks present a unique set of vulnerabilities due to their reliance on open air transmission. In this episode, we examine wireless security protocols and controls, including WEP, WPA2, WPA3, and 802.1X. We explain how authentication frameworks, encryption standards, and access controls protect against threats like rogue access points, packet sniffing, and brute-force attacks. You’ll also learn about secure SSID broadcasting, segmentation, and signal isolation. Securing wireless environments is a critical task for CISSPs, especially as more enterprise traffic shifts to mobile and remote connections.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:24:27 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/520a7954/b7eac94f.mp3" length="42741875" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1068</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Wireless networks present a unique set of vulnerabilities due to their reliance on open air transmission. In this episode, we examine wireless security protocols and controls, including WEP, WPA2, WPA3, and 802.1X. We explain how authentication frameworks, encryption standards, and access controls protect against threats like rogue access points, packet sniffing, and brute-force attacks. You’ll also learn about secure SSID broadcasting, segmentation, and signal isolation. Securing wireless environments is a critical task for CISSPs, especially as more enterprise traffic shifts to mobile and remote connections.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/520a7954/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 64: VOIP and Secure Communication Channels</title>
      <itunes:episode>64</itunes:episode>
      <podcast:episode>64</podcast:episode>
      <itunes:title>Episode 64: VOIP and Secure Communication Channels</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2ec319ba-2176-4dd7-a6fc-13d5afbb6b98</guid>
      <link>https://share.transistor.fm/s/d14cf325</link>
      <description>
        <![CDATA[<p>Voice over IP (VOIP) technologies have replaced traditional telephony in many organizations, but they come with their own set of security concerns. This episode explores the architecture of VOIP systems and the threats they face, including call interception, eavesdropping, spoofing, and denial-of-service attacks. We also cover secure communication protocols such as SRTP, SIPS, and encrypted signaling mechanisms. You’ll learn how to harden VOIP infrastructure, apply access controls, and monitor for anomalies. CISSPs must be prepared to evaluate communication channels not just for functionality, but also for confidentiality and integrity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Voice over IP (VOIP) technologies have replaced traditional telephony in many organizations, but they come with their own set of security concerns. This episode explores the architecture of VOIP systems and the threats they face, including call interception, eavesdropping, spoofing, and denial-of-service attacks. We also cover secure communication protocols such as SRTP, SIPS, and encrypted signaling mechanisms. You’ll learn how to harden VOIP infrastructure, apply access controls, and monitor for anomalies. CISSPs must be prepared to evaluate communication channels not just for functionality, but also for confidentiality and integrity.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:25:12 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d14cf325/6616830d.mp3" length="37236298" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>930</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Voice over IP (VOIP) technologies have replaced traditional telephony in many organizations, but they come with their own set of security concerns. This episode explores the architecture of VOIP systems and the threats they face, including call interception, eavesdropping, spoofing, and denial-of-service attacks. We also cover secure communication protocols such as SRTP, SIPS, and encrypted signaling mechanisms. You’ll learn how to harden VOIP infrastructure, apply access controls, and monitor for anomalies. CISSPs must be prepared to evaluate communication channels not just for functionality, but also for confidentiality and integrity.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d14cf325/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 65: Network Address Translation and Proxy Usage</title>
      <itunes:episode>65</itunes:episode>
      <podcast:episode>65</podcast:episode>
      <itunes:title>Episode 65: Network Address Translation and Proxy Usage</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1b3b0888-282e-44d1-9f04-911ae598fe7b</guid>
      <link>https://share.transistor.fm/s/8d64d752</link>
      <description>
        <![CDATA[<p>NAT and proxy servers play important roles in hiding internal IP addresses, enforcing access policies, and controlling traffic flow. In this episode, we explore how Network Address Translation (NAT) works to conserve IP space and obscure internal architectures. We also explain how proxies—forward, reverse, and transparent—support web filtering, anonymization, caching, and load balancing. You’ll learn how to implement these technologies securely, monitor their usage, and avoid common pitfalls. CISSPs must understand how to integrate NAT and proxy mechanisms into broader network defense strategies.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>NAT and proxy servers play important roles in hiding internal IP addresses, enforcing access policies, and controlling traffic flow. In this episode, we explore how Network Address Translation (NAT) works to conserve IP space and obscure internal architectures. We also explain how proxies—forward, reverse, and transparent—support web filtering, anonymization, caching, and load balancing. You’ll learn how to implement these technologies securely, monitor their usage, and avoid common pitfalls. CISSPs must understand how to integrate NAT and proxy mechanisms into broader network defense strategies.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:25:55 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8d64d752/bfc09576.mp3" length="41732499" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1042</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>NAT and proxy servers play important roles in hiding internal IP addresses, enforcing access policies, and controlling traffic flow. In this episode, we explore how Network Address Translation (NAT) works to conserve IP space and obscure internal architectures. We also explain how proxies—forward, reverse, and transparent—support web filtering, anonymization, caching, and load balancing. You’ll learn how to implement these technologies securely, monitor their usage, and avoid common pitfalls. CISSPs must understand how to integrate NAT and proxy mechanisms into broader network defense strategies.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8d64d752/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 66: Network Monitoring and Traffic Analysis</title>
      <itunes:episode>66</itunes:episode>
      <podcast:episode>66</podcast:episode>
      <itunes:title>Episode 66: Network Monitoring and Traffic Analysis</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c05811cc-2584-4480-b4d2-ef43acf38dff</guid>
      <link>https://share.transistor.fm/s/fa53bc21</link>
      <description>
        <![CDATA[<p>Continuous monitoring and traffic analysis are essential for detecting threats, performance issues, and policy violations. In this episode, we explore tools and techniques used to observe network behavior in real time. Topics include flow monitoring, deep packet inspection, NetFlow, and behavioral analytics. You’ll also learn about the role of Security Information and Event Management (SIEM) in aggregating data and generating actionable alerts. By understanding normal traffic patterns, CISSPs can more effectively detect anomalies, trace intrusions, and support forensic investigations. Monitoring is not optional—it's the pulse of your security operations.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Continuous monitoring and traffic analysis are essential for detecting threats, performance issues, and policy violations. In this episode, we explore tools and techniques used to observe network behavior in real time. Topics include flow monitoring, deep packet inspection, NetFlow, and behavioral analytics. You’ll also learn about the role of Security Information and Event Management (SIEM) in aggregating data and generating actionable alerts. By understanding normal traffic patterns, CISSPs can more effectively detect anomalies, trace intrusions, and support forensic investigations. Monitoring is not optional—it's the pulse of your security operations.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:26:41 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fa53bc21/7ccae785.mp3" length="41562177" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1038</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Continuous monitoring and traffic analysis are essential for detecting threats, performance issues, and policy violations. In this episode, we explore tools and techniques used to observe network behavior in real time. Topics include flow monitoring, deep packet inspection, NetFlow, and behavioral analytics. You’ll also learn about the role of Security Information and Event Management (SIEM) in aggregating data and generating actionable alerts. By understanding normal traffic patterns, CISSPs can more effectively detect anomalies, trace intrusions, and support forensic investigations. Monitoring is not optional—it's the pulse of your security operations.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fa53bc21/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 67: Zero Trust and Software-Defined Networking (SDN)</title>
      <itunes:episode>67</itunes:episode>
      <podcast:episode>67</podcast:episode>
      <itunes:title>Episode 67: Zero Trust and Software-Defined Networking (SDN)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b23126ef-d3af-4e7f-99d8-cacdc44e5263</guid>
      <link>https://share.transistor.fm/s/2aa87b33</link>
      <description>
        <![CDATA[<p>Zero Trust has emerged as a powerful model for modern cybersecurity, shifting the focus from perimeter defenses to granular, identity-centric control. In this episode, we explain the principles of Zero Trust—never trust, always verify—and how it’s implemented using continuous authentication, microsegmentation, and least privilege access. We also explore Software-Defined Networking (SDN), a framework for dynamically managing and securing network resources through centralized controllers. Together, Zero Trust and SDN provide the flexibility and control needed for cloud-first, hybrid, and highly distributed environments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Zero Trust has emerged as a powerful model for modern cybersecurity, shifting the focus from perimeter defenses to granular, identity-centric control. In this episode, we explain the principles of Zero Trust—never trust, always verify—and how it’s implemented using continuous authentication, microsegmentation, and least privilege access. We also explore Software-Defined Networking (SDN), a framework for dynamically managing and securing network resources through centralized controllers. Together, Zero Trust and SDN provide the flexibility and control needed for cloud-first, hybrid, and highly distributed environments.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:27:21 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2aa87b33/892a9a14.mp3" length="41662496" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1041</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Zero Trust has emerged as a powerful model for modern cybersecurity, shifting the focus from perimeter defenses to granular, identity-centric control. In this episode, we explain the principles of Zero Trust—never trust, always verify—and how it’s implemented using continuous authentication, microsegmentation, and least privilege access. We also explore Software-Defined Networking (SDN), a framework for dynamically managing and securing network resources through centralized controllers. Together, Zero Trust and SDN provide the flexibility and control needed for cloud-first, hybrid, and highly distributed environments.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2aa87b33/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 68: Content Delivery Networks and Edge Security</title>
      <itunes:episode>68</itunes:episode>
      <podcast:episode>68</podcast:episode>
      <itunes:title>Episode 68: Content Delivery Networks and Edge Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">39fad0c2-a919-4df9-82d1-ed6f24fea7e1</guid>
      <link>https://share.transistor.fm/s/d9b70f44</link>
      <description>
        <![CDATA[<p>Content Delivery Networks (CDNs) accelerate access to web content by distributing it across global edge nodes, but they also introduce new attack surfaces. In this episode, we discuss how CDNs work, their role in performance optimization, and the security challenges they present, such as cache poisoning, misconfigured access controls, and DDoS targeting. We also explore edge computing security—protecting data and services closer to the end user. CISSPs must understand how to secure the entire content delivery path, from cloud origin to user browser, while balancing speed, scalability, and control.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Content Delivery Networks (CDNs) accelerate access to web content by distributing it across global edge nodes, but they also introduce new attack surfaces. In this episode, we discuss how CDNs work, their role in performance optimization, and the security challenges they present, such as cache poisoning, misconfigured access controls, and DDoS targeting. We also explore edge computing security—protecting data and services closer to the end user. CISSPs must understand how to secure the entire content delivery path, from cloud origin to user browser, while balancing speed, scalability, and control.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:27:58 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d9b70f44/1385b58d.mp3" length="43416875" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1085</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Content Delivery Networks (CDNs) accelerate access to web content by distributing it across global edge nodes, but they also introduce new attack surfaces. In this episode, we discuss how CDNs work, their role in performance optimization, and the security challenges they present, such as cache poisoning, misconfigured access controls, and DDoS targeting. We also explore edge computing security—protecting data and services closer to the end user. CISSPs must understand how to secure the entire content delivery path, from cloud origin to user browser, while balancing speed, scalability, and control.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d9b70f44/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 69: Cloud Network Security (CASB, SASE, Virtual Firewalls)</title>
      <itunes:episode>69</itunes:episode>
      <podcast:episode>69</podcast:episode>
      <itunes:title>Episode 69: Cloud Network Security (CASB, SASE, Virtual Firewalls)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3fd6039c-82a8-4119-914a-4b6016fc5cac</guid>
      <link>https://share.transistor.fm/s/7ce7410f</link>
      <description>
        <![CDATA[<p>As more organizations move to the cloud, network security must evolve. This episode focuses on cloud-native controls including Cloud Access Security Brokers (CASB), Secure Access Service Edge (SASE), and virtual firewalls. You’ll learn how these tools provide visibility, policy enforcement, data loss prevention, and threat protection across hybrid and multi-cloud environments. We also cover identity-based access control, cloud segmentation, and encryption in transit. With cloud services extending beyond traditional boundaries, CISSPs must adopt new strategies to maintain consistent and scalable network protections.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>As more organizations move to the cloud, network security must evolve. This episode focuses on cloud-native controls including Cloud Access Security Brokers (CASB), Secure Access Service Edge (SASE), and virtual firewalls. You’ll learn how these tools provide visibility, policy enforcement, data loss prevention, and threat protection across hybrid and multi-cloud environments. We also cover identity-based access control, cloud segmentation, and encryption in transit. With cloud services extending beyond traditional boundaries, CISSPs must adopt new strategies to maintain consistent and scalable network protections.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:28:46 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7ce7410f/42fd081a.mp3" length="44582992" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1114</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>As more organizations move to the cloud, network security must evolve. This episode focuses on cloud-native controls including Cloud Access Security Brokers (CASB), Secure Access Service Edge (SASE), and virtual firewalls. You’ll learn how these tools provide visibility, policy enforcement, data loss prevention, and threat protection across hybrid and multi-cloud environments. We also cover identity-based access control, cloud segmentation, and encryption in transit. With cloud services extending beyond traditional boundaries, CISSPs must adopt new strategies to maintain consistent and scalable network protections.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7ce7410f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 70: DDoS Protection and High Availability Networks</title>
      <itunes:episode>70</itunes:episode>
      <podcast:episode>70</podcast:episode>
      <itunes:title>Episode 70: DDoS Protection and High Availability Networks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8f27c5a9-de50-4679-af4f-485052cb56dc</guid>
      <link>https://share.transistor.fm/s/44ab3c22</link>
      <description>
        <![CDATA[<p>Distributed Denial of Service (DDoS) attacks are designed to overwhelm systems and take down critical services. In this episode, we explain how these attacks work—volumetric, protocol, and application-layer—and the techniques used to defend against them. You’ll learn about scrubbing centers, rate limiting, traffic shaping, and the role of content delivery networks in mitigation. We also explore how to design high-availability network architectures with redundancy, failover, and load balancing to ensure service continuity even under stress. CISSPs must be equipped to anticipate, prevent, and recover from large-scale disruption events.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Distributed Denial of Service (DDoS) attacks are designed to overwhelm systems and take down critical services. In this episode, we explain how these attacks work—volumetric, protocol, and application-layer—and the techniques used to defend against them. You’ll learn about scrubbing centers, rate limiting, traffic shaping, and the role of content delivery networks in mitigation. We also explore how to design high-availability network architectures with redundancy, failover, and load balancing to ensure service continuity even under stress. CISSPs must be equipped to anticipate, prevent, and recover from large-scale disruption events.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:29:55 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/44ab3c22/d8df1afb.mp3" length="44310266" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1107</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Distributed Denial of Service (DDoS) attacks are designed to overwhelm systems and take down critical services. In this episode, we explain how these attacks work—volumetric, protocol, and application-layer—and the techniques used to defend against them. You’ll learn about scrubbing centers, rate limiting, traffic shaping, and the role of content delivery networks in mitigation. We also explore how to design high-availability network architectures with redundancy, failover, and load balancing to ensure service continuity even under stress. CISSPs must be equipped to anticipate, prevent, and recover from large-scale disruption events.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/44ab3c22/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 71: Authentication Factors and Methods</title>
      <itunes:episode>71</itunes:episode>
      <podcast:episode>71</podcast:episode>
      <itunes:title>Episode 71: Authentication Factors and Methods</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">be448b61-c157-49bc-97bf-28639370a4dd</guid>
      <link>https://share.transistor.fm/s/b8b9f04b</link>
      <description>
        <![CDATA[<p>Authentication is the process of verifying identity, and it forms the first line of defense in access control. In this episode, we explore the different authentication factors: something you know (passwords, PINs), something you have (tokens, smart cards), something you are (biometrics), somewhere you are (location), and something you do (behavioral patterns). We also examine common authentication methods, including single-factor, multi-factor, and risk-based authentication. Understanding how these factors work—individually and in combination—is essential for designing secure systems and passing CISSP exam questions that deal with identity assurance.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Authentication is the process of verifying identity, and it forms the first line of defense in access control. In this episode, we explore the different authentication factors: something you know (passwords, PINs), something you have (tokens, smart cards), something you are (biometrics), somewhere you are (location), and something you do (behavioral patterns). We also examine common authentication methods, including single-factor, multi-factor, and risk-based authentication. Understanding how these factors work—individually and in combination—is essential for designing secure systems and passing CISSP exam questions that deal with identity assurance.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:30:40 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b8b9f04b/92f83de0.mp3" length="38741992" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>968</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Authentication is the process of verifying identity, and it forms the first line of defense in access control. In this episode, we explore the different authentication factors: something you know (passwords, PINs), something you have (tokens, smart cards), something you are (biometrics), somewhere you are (location), and something you do (behavioral patterns). We also examine common authentication methods, including single-factor, multi-factor, and risk-based authentication. Understanding how these factors work—individually and in combination—is essential for designing secure systems and passing CISSP exam questions that deal with identity assurance.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b8b9f04b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 72: Identity Proofing and Registration Processes</title>
      <itunes:episode>72</itunes:episode>
      <podcast:episode>72</podcast:episode>
      <itunes:title>Episode 72: Identity Proofing and Registration Processes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6d368f54-5e53-4693-919b-7b126af1afd2</guid>
      <link>https://share.transistor.fm/s/28f00a5b</link>
      <description>
        <![CDATA[<p>Before you can authenticate someone, you must first establish their identity through a process called identity proofing. In this episode, we cover how identity proofing works—from in-person validation and biometric capture to document verification and knowledge-based authentication. We explain how organizations perform registration, bind credentials, and manage onboarding securely. These processes form the foundation of digital identity and trust. Whether you're issuing smart cards for physical access or provisioning accounts for a cloud service, CISSPs must understand the lifecycle of identity creation and assurance.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Before you can authenticate someone, you must first establish their identity through a process called identity proofing. In this episode, we cover how identity proofing works—from in-person validation and biometric capture to document verification and knowledge-based authentication. We explain how organizations perform registration, bind credentials, and manage onboarding securely. These processes form the foundation of digital identity and trust. Whether you're issuing smart cards for physical access or provisioning accounts for a cloud service, CISSPs must understand the lifecycle of identity creation and assurance.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:32:27 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/28f00a5b/091d18b2.mp3" length="35223831" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>880</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Before you can authenticate someone, you must first establish their identity through a process called identity proofing. In this episode, we cover how identity proofing works—from in-person validation and biometric capture to document verification and knowledge-based authentication. We explain how organizations perform registration, bind credentials, and manage onboarding securely. These processes form the foundation of digital identity and trust. Whether you're issuing smart cards for physical access or provisioning accounts for a cloud service, CISSPs must understand the lifecycle of identity creation and assurance.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/28f00a5b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 73: Authorization Techniques: RBAC, ABAC, MAC, DAC</title>
      <itunes:episode>73</itunes:episode>
      <podcast:episode>73</podcast:episode>
      <itunes:title>Episode 73: Authorization Techniques: RBAC, ABAC, MAC, DAC</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ded0eb69-ddad-49a1-b1c6-fc7f156d7420</guid>
      <link>https://share.transistor.fm/s/222c3f99</link>
      <description>
        <![CDATA[<p>Once a user’s identity is authenticated, the system must decide what they are allowed to do. This episode focuses on common authorization models: Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Mandatory Access Control (MAC), and Discretionary Access Control (DAC). We explore the rules and policies that govern each model, along with their strengths, weaknesses, and appropriate use cases. You'll learn how to align authorization mechanisms with security policies and compliance requirements. For the CISSP exam and real-world implementation, these models form the core of secure resource management.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Once a user’s identity is authenticated, the system must decide what they are allowed to do. This episode focuses on common authorization models: Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Mandatory Access Control (MAC), and Discretionary Access Control (DAC). We explore the rules and policies that govern each model, along with their strengths, weaknesses, and appropriate use cases. You'll learn how to align authorization mechanisms with security policies and compliance requirements. For the CISSP exam and real-world implementation, these models form the core of secure resource management.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:33:08 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/222c3f99/205df351.mp3" length="32425596" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>810</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Once a user’s identity is authenticated, the system must decide what they are allowed to do. This episode focuses on common authorization models: Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Mandatory Access Control (MAC), and Discretionary Access Control (DAC). We explore the rules and policies that govern each model, along with their strengths, weaknesses, and appropriate use cases. You'll learn how to align authorization mechanisms with security policies and compliance requirements. For the CISSP exam and real-world implementation, these models form the core of secure resource management.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/222c3f99/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 74: IAM Lifecycle and Governance</title>
      <itunes:episode>74</itunes:episode>
      <podcast:episode>74</podcast:episode>
      <itunes:title>Episode 74: IAM Lifecycle and Governance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">81db59eb-ebae-4201-b3f9-9c7d50a3a33b</guid>
      <link>https://share.transistor.fm/s/e5fb29e4</link>
      <description>
        <![CDATA[<p>Identity and Access Management (IAM) is not just about technology—it’s a continuous lifecycle that requires strong governance. This episode walks through each stage of the IAM lifecycle: provisioning, access management, auditing, revalidation, and deprovisioning. We also examine governance frameworks that ensure IAM aligns with policy, risk appetite, and regulatory standards. From role design and separation of duties to periodic access reviews and exception handling, we explain how to maintain control and accountability over digital identities. A strong IAM governance model is essential for CISSPs managing access at scale.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Identity and Access Management (IAM) is not just about technology—it’s a continuous lifecycle that requires strong governance. This episode walks through each stage of the IAM lifecycle: provisioning, access management, auditing, revalidation, and deprovisioning. We also examine governance frameworks that ensure IAM aligns with policy, risk appetite, and regulatory standards. From role design and separation of duties to periodic access reviews and exception handling, we explain how to maintain control and accountability over digital identities. A strong IAM governance model is essential for CISSPs managing access at scale.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:33:48 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e5fb29e4/9ea2a6ee.mp3" length="35408762" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>884</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Identity and Access Management (IAM) is not just about technology—it’s a continuous lifecycle that requires strong governance. This episode walks through each stage of the IAM lifecycle: provisioning, access management, auditing, revalidation, and deprovisioning. We also examine governance frameworks that ensure IAM aligns with policy, risk appetite, and regulatory standards. From role design and separation of duties to periodic access reviews and exception handling, we explain how to maintain control and accountability over digital identities. A strong IAM governance model is essential for CISSPs managing access at scale.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e5fb29e4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 75: Password Policy Design and Management</title>
      <itunes:episode>75</itunes:episode>
      <podcast:episode>75</podcast:episode>
      <itunes:title>Episode 75: Password Policy Design and Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c7c25e2f-dc1d-42bb-b22e-8cc8c10c310a</guid>
      <link>https://share.transistor.fm/s/4a403e01</link>
      <description>
        <![CDATA[<p>Passwords remain one of the most widely used—but frequently abused—authentication methods. In this episode, we explore how to design and manage effective password policies that balance usability with security. We cover best practices like minimum complexity, reuse prevention, expiration cycles, and password vaulting. You’ll also learn about modern recommendations from NIST that challenge older practices like frequent forced changes. CISSPs must understand how password policies impact behavior, system integration, and the broader security landscape, especially in hybrid and cloud environments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Passwords remain one of the most widely used—but frequently abused—authentication methods. In this episode, we explore how to design and manage effective password policies that balance usability with security. We cover best practices like minimum complexity, reuse prevention, expiration cycles, and password vaulting. You’ll also learn about modern recommendations from NIST that challenge older practices like frequent forced changes. CISSPs must understand how password policies impact behavior, system integration, and the broader security landscape, especially in hybrid and cloud environments.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:34:27 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4a403e01/d505b281.mp3" length="35462061" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>886</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Passwords remain one of the most widely used—but frequently abused—authentication methods. In this episode, we explore how to design and manage effective password policies that balance usability with security. We cover best practices like minimum complexity, reuse prevention, expiration cycles, and password vaulting. You’ll also learn about modern recommendations from NIST that challenge older practices like frequent forced changes. CISSPs must understand how password policies impact behavior, system integration, and the broader security landscape, especially in hybrid and cloud environments.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4a403e01/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 76: Biometric Authentication Strengths and Weaknesses</title>
      <itunes:episode>76</itunes:episode>
      <podcast:episode>76</podcast:episode>
      <itunes:title>Episode 76: Biometric Authentication Strengths and Weaknesses</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">27ac3149-301d-44af-b551-ad617a7d10ff</guid>
      <link>https://share.transistor.fm/s/3e9f6ead</link>
      <description>
        <![CDATA[<p>Biometric authentication uses unique physical or behavioral traits—like fingerprints, facial features, or voice—to verify identity. In this episode, we explore how biometrics work, including the concepts of enrollment, matching algorithms, false acceptance rates (FAR), false rejection rates (FRR), and spoofing resistance. We also examine the strengths and weaknesses of different biometric systems, their privacy implications, and where they’re most effectively deployed. As biometric technologies continue to evolve and gain adoption, CISSPs must understand how to assess, implement, and monitor them securely and ethically.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Biometric authentication uses unique physical or behavioral traits—like fingerprints, facial features, or voice—to verify identity. In this episode, we explore how biometrics work, including the concepts of enrollment, matching algorithms, false acceptance rates (FAR), false rejection rates (FRR), and spoofing resistance. We also examine the strengths and weaknesses of different biometric systems, their privacy implications, and where they’re most effectively deployed. As biometric technologies continue to evolve and gain adoption, CISSPs must understand how to assess, implement, and monitor them securely and ethically.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:35:13 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3e9f6ead/915f69ef.mp3" length="34497632" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>862</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Biometric authentication uses unique physical or behavioral traits—like fingerprints, facial features, or voice—to verify identity. In this episode, we explore how biometrics work, including the concepts of enrollment, matching algorithms, false acceptance rates (FAR), false rejection rates (FRR), and spoofing resistance. We also examine the strengths and weaknesses of different biometric systems, their privacy implications, and where they’re most effectively deployed. As biometric technologies continue to evolve and gain adoption, CISSPs must understand how to assess, implement, and monitor them securely and ethically.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3e9f6ead/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 77: Federation and SSO: SAML, OAuth, OpenID</title>
      <itunes:episode>77</itunes:episode>
      <podcast:episode>77</podcast:episode>
      <itunes:title>Episode 77: Federation and SSO: SAML, OAuth, OpenID</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">16ce7de3-4550-4a50-994b-ddcd0579432a</guid>
      <link>https://share.transistor.fm/s/6d005ea7</link>
      <description>
        <![CDATA[<p>Federated identity systems allow users to authenticate across multiple platforms using a single identity, often enabling Single Sign-On (SSO). In this episode, we explain how standards like SAML, OAuth 2.0, and OpenID Connect enable cross-domain authentication. You’ll learn the difference between authentication and authorization, how token exchanges work, and what security concerns arise with federated systems. These technologies reduce friction, improve user experience, and centralize control—but only when implemented correctly. CISSPs must understand how to secure identity federation for enterprise and cloud environments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Federated identity systems allow users to authenticate across multiple platforms using a single identity, often enabling Single Sign-On (SSO). In this episode, we explain how standards like SAML, OAuth 2.0, and OpenID Connect enable cross-domain authentication. You’ll learn the difference between authentication and authorization, how token exchanges work, and what security concerns arise with federated systems. These technologies reduce friction, improve user experience, and centralize control—but only when implemented correctly. CISSPs must understand how to secure identity federation for enterprise and cloud environments.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:36:09 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6d005ea7/ffad23a7.mp3" length="31505034" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>787</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Federated identity systems allow users to authenticate across multiple platforms using a single identity, often enabling Single Sign-On (SSO). In this episode, we explain how standards like SAML, OAuth 2.0, and OpenID Connect enable cross-domain authentication. You’ll learn the difference between authentication and authorization, how token exchanges work, and what security concerns arise with federated systems. These technologies reduce friction, improve user experience, and centralize control—but only when implemented correctly. CISSPs must understand how to secure identity federation for enterprise and cloud environments.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6d005ea7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 78: Privileged Access Management (PAM)</title>
      <itunes:episode>78</itunes:episode>
      <podcast:episode>78</podcast:episode>
      <itunes:title>Episode 78: Privileged Access Management (PAM)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d8c45ff4-6ea4-4932-87e6-a1b73a11b87d</guid>
      <link>https://share.transistor.fm/s/60290b2c</link>
      <description>
        <![CDATA[<p>Privileged accounts have elevated access and are among the most targeted assets in any organization. In this episode, we examine Privileged Access Management (PAM) solutions, including vaulting, session recording, just-in-time provisioning, and approval workflows. We explain how PAM helps enforce least privilege, reduce insider threats, and meet compliance obligations. You'll also learn how to monitor, audit, and respond to anomalous privileged activity. Managing administrative access is critical to defending your environment, and CISSPs must know how to control the power that comes with privileged credentials.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Privileged accounts have elevated access and are among the most targeted assets in any organization. In this episode, we examine Privileged Access Management (PAM) solutions, including vaulting, session recording, just-in-time provisioning, and approval workflows. We explain how PAM helps enforce least privilege, reduce insider threats, and meet compliance obligations. You'll also learn how to monitor, audit, and respond to anomalous privileged activity. Managing administrative access is critical to defending your environment, and CISSPs must know how to control the power that comes with privileged credentials.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:36:54 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/60290b2c/4d120660.mp3" length="32254221" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>806</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Privileged accounts have elevated access and are among the most targeted assets in any organization. In this episode, we examine Privileged Access Management (PAM) solutions, including vaulting, session recording, just-in-time provisioning, and approval workflows. We explain how PAM helps enforce least privilege, reduce insider threats, and meet compliance obligations. You'll also learn how to monitor, audit, and respond to anomalous privileged activity. Managing administrative access is critical to defending your environment, and CISSPs must know how to control the power that comes with privileged credentials.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/60290b2c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 79: Directory Services: LDAP, Active Directory</title>
      <itunes:episode>79</itunes:episode>
      <podcast:episode>79</podcast:episode>
      <itunes:title>Episode 79: Directory Services: LDAP, Active Directory</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c8f8c72d-661a-4748-8aa6-35131344eab1</guid>
      <link>https://share.transistor.fm/s/b6d282d1</link>
      <description>
        <![CDATA[<p>Directory services are centralized databases that store and manage user credentials, permissions, and group memberships. In this episode, we explore how Lightweight Directory Access Protocol (LDAP) and Microsoft Active Directory (AD) function as the backbone of identity infrastructure. Topics include directory hierarchies, schema design, authentication flows, and integration with Kerberos. We also discuss common attacks on directories—like privilege escalation and replication abuse—and how to defend against them. For CISSPs, understanding directory services is essential for building scalable, secure access management systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Directory services are centralized databases that store and manage user credentials, permissions, and group memberships. In this episode, we explore how Lightweight Directory Access Protocol (LDAP) and Microsoft Active Directory (AD) function as the backbone of identity infrastructure. Topics include directory hierarchies, schema design, authentication flows, and integration with Kerberos. We also discuss common attacks on directories—like privilege escalation and replication abuse—and how to defend against them. For CISSPs, understanding directory services is essential for building scalable, secure access management systems.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:37:36 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b6d282d1/5cb99043.mp3" length="37962506" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>948</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Directory services are centralized databases that store and manage user credentials, permissions, and group memberships. In this episode, we explore how Lightweight Directory Access Protocol (LDAP) and Microsoft Active Directory (AD) function as the backbone of identity infrastructure. Topics include directory hierarchies, schema design, authentication flows, and integration with Kerberos. We also discuss common attacks on directories—like privilege escalation and replication abuse—and how to defend against them. For CISSPs, understanding directory services is essential for building scalable, secure access management systems.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b6d282d1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 80: Multi-Factor Authentication and Implementation</title>
      <itunes:episode>80</itunes:episode>
      <podcast:episode>80</podcast:episode>
      <itunes:title>Episode 80: Multi-Factor Authentication and Implementation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b727c4f4-471f-405d-a08b-03db8ee2c50f</guid>
      <link>https://share.transistor.fm/s/3567ddd6</link>
      <description>
        <![CDATA[<p>Multi-Factor Authentication (MFA) significantly strengthens identity verification by requiring more than one authentication factor. In this episode, we break down the different types of factors—something you know, have, are, do, or where you are—and how they’re combined for robust protection. We explore methods such as SMS codes, authenticator apps, smart cards, biometrics, and physical tokens. You’ll also learn how to implement MFA in various environments, manage usability challenges, and respond to bypass attempts. For CISSPs, mastering MFA is critical to securing both cloud and on-premise access paths.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Multi-Factor Authentication (MFA) significantly strengthens identity verification by requiring more than one authentication factor. In this episode, we break down the different types of factors—something you know, have, are, do, or where you are—and how they’re combined for robust protection. We explore methods such as SMS codes, authenticator apps, smart cards, biometrics, and physical tokens. You’ll also learn how to implement MFA in various environments, manage usability challenges, and respond to bypass attempts. For CISSPs, mastering MFA is critical to securing both cloud and on-premise access paths.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:39:16 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3567ddd6/d26b1c1c.mp3" length="31865531" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>796</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Multi-Factor Authentication (MFA) significantly strengthens identity verification by requiring more than one authentication factor. In this episode, we break down the different types of factors—something you know, have, are, do, or where you are—and how they’re combined for robust protection. We explore methods such as SMS codes, authenticator apps, smart cards, biometrics, and physical tokens. You’ll also learn how to implement MFA in various environments, manage usability challenges, and respond to bypass attempts. For CISSPs, mastering MFA is critical to securing both cloud and on-premise access paths.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3567ddd6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 81: Identity-as-a-Service (IDaaS) and Cloud IAM</title>
      <itunes:episode>81</itunes:episode>
      <podcast:episode>81</podcast:episode>
      <itunes:title>Episode 81: Identity-as-a-Service (IDaaS) and Cloud IAM</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2efb8819-ee0d-44a9-9f44-9e80ed59bc9b</guid>
      <link>https://share.transistor.fm/s/82d9d65e</link>
      <description>
        <![CDATA[<p>Identity-as-a-Service (IDaaS) provides centralized identity and access management capabilities from the cloud. In this episode, we explore the architecture and benefits of IDaaS solutions, including scalability, simplified administration, and integration with cloud-native applications. You’ll learn how IDaaS supports federated identity, multi-factor authentication, and compliance through managed platforms. We also cover risks such as vendor lock-in, data privacy concerns, and API exposure. CISSPs must be prepared to evaluate IDaaS providers, configure identity governance, and ensure secure, policy-driven access in hybrid environments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Identity-as-a-Service (IDaaS) provides centralized identity and access management capabilities from the cloud. In this episode, we explore the architecture and benefits of IDaaS solutions, including scalability, simplified administration, and integration with cloud-native applications. You’ll learn how IDaaS supports federated identity, multi-factor authentication, and compliance through managed platforms. We also cover risks such as vendor lock-in, data privacy concerns, and API exposure. CISSPs must be prepared to evaluate IDaaS providers, configure identity governance, and ensure secure, policy-driven access in hybrid environments.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:39:57 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/82d9d65e/349a7ae6.mp3" length="32704581" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>817</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Identity-as-a-Service (IDaaS) provides centralized identity and access management capabilities from the cloud. In this episode, we explore the architecture and benefits of IDaaS solutions, including scalability, simplified administration, and integration with cloud-native applications. You’ll learn how IDaaS supports federated identity, multi-factor authentication, and compliance through managed platforms. We also cover risks such as vendor lock-in, data privacy concerns, and API exposure. CISSPs must be prepared to evaluate IDaaS providers, configure identity governance, and ensure secure, policy-driven access in hybrid environments.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/82d9d65e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 82: Credential Management and Recovery</title>
      <itunes:episode>82</itunes:episode>
      <podcast:episode>82</podcast:episode>
      <itunes:title>Episode 82: Credential Management and Recovery</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d0e8c7aa-544e-40ce-9580-1f57253799de</guid>
      <link>https://share.transistor.fm/s/769833ef</link>
      <description>
        <![CDATA[<p>Managing credentials securely is critical to preventing unauthorized access and ensuring business continuity. This episode explores techniques for secure credential issuance, storage, expiration, and revocation. We discuss the lifecycle of credentials across devices, users, and systems, including integration with password managers, key vaults, and enterprise authentication platforms. You'll also learn about secure recovery mechanisms such as self-service portals, identity proofing, and multi-step revalidation. CISSPs must understand how to enforce strong credential management policies while balancing usability, privacy, and administrative efficiency.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Managing credentials securely is critical to preventing unauthorized access and ensuring business continuity. This episode explores techniques for secure credential issuance, storage, expiration, and revocation. We discuss the lifecycle of credentials across devices, users, and systems, including integration with password managers, key vaults, and enterprise authentication platforms. You'll also learn about secure recovery mechanisms such as self-service portals, identity proofing, and multi-step revalidation. CISSPs must understand how to enforce strong credential management policies while balancing usability, privacy, and administrative efficiency.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:40:39 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/769833ef/5f091aea.mp3" length="32223919" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>805</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Managing credentials securely is critical to preventing unauthorized access and ensuring business continuity. This episode explores techniques for secure credential issuance, storage, expiration, and revocation. We discuss the lifecycle of credentials across devices, users, and systems, including integration with password managers, key vaults, and enterprise authentication platforms. You'll also learn about secure recovery mechanisms such as self-service portals, identity proofing, and multi-step revalidation. CISSPs must understand how to enforce strong credential management policies while balancing usability, privacy, and administrative efficiency.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/769833ef/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 83: Access Control Lists and Capability Tables</title>
      <itunes:episode>83</itunes:episode>
      <podcast:episode>83</podcast:episode>
      <itunes:title>Episode 83: Access Control Lists and Capability Tables</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">85cd9173-1b51-42fc-b679-ad6372d2f452</guid>
      <link>https://share.transistor.fm/s/db76e9e8</link>
      <description>
        <![CDATA[<p>Access control mechanisms determine who can access what—and how. In this episode, we compare two classic models: Access Control Lists (ACLs) and capability tables. ACLs associate permissions with objects, while capability tables associate them with subjects. We examine their strengths, limitations, and real-world implementations in file systems, network devices, and operating systems. You’ll also learn about how these mechanisms enforce discretionary and mandatory access controls, and how they can be extended using role or attribute-based models. Understanding these concepts is essential for effective system authorization design.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Access control mechanisms determine who can access what—and how. In this episode, we compare two classic models: Access Control Lists (ACLs) and capability tables. ACLs associate permissions with objects, while capability tables associate them with subjects. We examine their strengths, limitations, and real-world implementations in file systems, network devices, and operating systems. You’ll also learn about how these mechanisms enforce discretionary and mandatory access controls, and how they can be extended using role or attribute-based models. Understanding these concepts is essential for effective system authorization design.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:41:22 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/db76e9e8/6c761861.mp3" length="34147584" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>853</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Access control mechanisms determine who can access what—and how. In this episode, we compare two classic models: Access Control Lists (ACLs) and capability tables. ACLs associate permissions with objects, while capability tables associate them with subjects. We examine their strengths, limitations, and real-world implementations in file systems, network devices, and operating systems. You’ll also learn about how these mechanisms enforce discretionary and mandatory access controls, and how they can be extended using role or attribute-based models. Understanding these concepts is essential for effective system authorization design.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/db76e9e8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 84: Access Recertification and Review</title>
      <itunes:episode>84</itunes:episode>
      <podcast:episode>84</podcast:episode>
      <itunes:title>Episode 84: Access Recertification and Review</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">676055b2-72cc-427c-bb01-eaa646f34d3b</guid>
      <link>https://share.transistor.fm/s/5a23a585</link>
      <description>
        <![CDATA[<p>Access permissions tend to accumulate over time, creating a significant security risk if not reviewed regularly. This episode focuses on access recertification—the process of periodically validating that users still need the permissions they’ve been granted. We explain how to plan, automate, and document access reviews, and how to manage exceptions and approvals. You’ll also learn how access governance tools integrate with identity platforms to support audits and compliance. CISSPs play a vital role in ensuring that the principle of least privilege is continuously enforced across dynamic environments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Access permissions tend to accumulate over time, creating a significant security risk if not reviewed regularly. This episode focuses on access recertification—the process of periodically validating that users still need the permissions they’ve been granted. We explain how to plan, automate, and document access reviews, and how to manage exceptions and approvals. You’ll also learn how access governance tools integrate with identity platforms to support audits and compliance. CISSPs play a vital role in ensuring that the principle of least privilege is continuously enforced across dynamic environments.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:42:06 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5a23a585/bc68008d.mp3" length="31188424" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>779</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Access permissions tend to accumulate over time, creating a significant security risk if not reviewed regularly. This episode focuses on access recertification—the process of periodically validating that users still need the permissions they’ve been granted. We explain how to plan, automate, and document access reviews, and how to manage exceptions and approvals. You’ll also learn how access governance tools integrate with identity platforms to support audits and compliance. CISSPs play a vital role in ensuring that the principle of least privilege is continuously enforced across dynamic environments.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5a23a585/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 85: Session Management and Timeout Policies</title>
      <itunes:episode>85</itunes:episode>
      <podcast:episode>85</podcast:episode>
      <itunes:title>Episode 85: Session Management and Timeout Policies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">59c16554-8c1d-40a2-a03b-c21731687fe2</guid>
      <link>https://share.transistor.fm/s/6d4b76da</link>
      <description>
        <![CDATA[<p>Controlling user sessions is a critical part of maintaining secure access. In this episode, we examine how session tokens are issued, maintained, and terminated—along with techniques to prevent hijacking and session fixation attacks. We explore timeout policies, inactivity limits, reauthentication triggers, and secure logout practices. You’ll learn how session management differs across web applications, VPNs, and enterprise software. By enforcing proper session controls, CISSPs can prevent unauthorized reuse, detect anomalies, and strengthen overall authentication posture.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Controlling user sessions is a critical part of maintaining secure access. In this episode, we examine how session tokens are issued, maintained, and terminated—along with techniques to prevent hijacking and session fixation attacks. We explore timeout policies, inactivity limits, reauthentication triggers, and secure logout practices. You’ll learn how session management differs across web applications, VPNs, and enterprise software. By enforcing proper session controls, CISSPs can prevent unauthorized reuse, detect anomalies, and strengthen overall authentication posture.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:42:52 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6d4b76da/d8330889.mp3" length="32808022" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>819</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Controlling user sessions is a critical part of maintaining secure access. In this episode, we examine how session tokens are issued, maintained, and terminated—along with techniques to prevent hijacking and session fixation attacks. We explore timeout policies, inactivity limits, reauthentication triggers, and secure logout practices. You’ll learn how session management differs across web applications, VPNs, and enterprise software. By enforcing proper session controls, CISSPs can prevent unauthorized reuse, detect anomalies, and strengthen overall authentication posture.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6d4b76da/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 86: Threats to IAM: Replay, Pass-the-Hash, Credential Stuffing</title>
      <itunes:episode>86</itunes:episode>
      <podcast:episode>86</podcast:episode>
      <itunes:title>Episode 86: Threats to IAM: Replay, Pass-the-Hash, Credential Stuffing</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">32d792b6-e548-437a-b1f7-b83e545226e2</guid>
      <link>https://share.transistor.fm/s/f5c64bc6</link>
      <description>
        <![CDATA[<p>Identity systems are high-value targets, and attackers use increasingly sophisticated techniques to exploit them. This episode examines key IAM-related attack vectors, including replay attacks, pass-the-hash, credential stuffing, brute-force, and phishing-based compromise. We explain how these attacks work, the conditions that enable them, and the defenses needed to detect and prevent them. Controls discussed include session binding, MFA, rate limiting, password hygiene, and advanced behavioral analytics. CISSPs must understand not just how to build IAM systems, but how to defend them against persistent and evolving threats.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Identity systems are high-value targets, and attackers use increasingly sophisticated techniques to exploit them. This episode examines key IAM-related attack vectors, including replay attacks, pass-the-hash, credential stuffing, brute-force, and phishing-based compromise. We explain how these attacks work, the conditions that enable them, and the defenses needed to detect and prevent them. Controls discussed include session binding, MFA, rate limiting, password hygiene, and advanced behavioral analytics. CISSPs must understand not just how to build IAM systems, but how to defend them against persistent and evolving threats.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:43:48 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f5c64bc6/bbcec05a.mp3" length="32254245" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>806</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Identity systems are high-value targets, and attackers use increasingly sophisticated techniques to exploit them. This episode examines key IAM-related attack vectors, including replay attacks, pass-the-hash, credential stuffing, brute-force, and phishing-based compromise. We explain how these attacks work, the conditions that enable them, and the defenses needed to detect and prevent them. Controls discussed include session binding, MFA, rate limiting, password hygiene, and advanced behavioral analytics. CISSPs must understand not just how to build IAM systems, but how to defend them against persistent and evolving threats.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f5c64bc6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 87: Assessment Types: Vulnerability Scans, Pen Testing, Audits</title>
      <itunes:episode>87</itunes:episode>
      <podcast:episode>87</podcast:episode>
      <itunes:title>Episode 87: Assessment Types: Vulnerability Scans, Pen Testing, Audits</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">96d86539-0f82-45ef-a845-77337fd01e4e</guid>
      <link>https://share.transistor.fm/s/73478340</link>
      <description>
        <![CDATA[<p>Security assessments come in many forms—each with a specific purpose. In this episode, we compare and contrast vulnerability scanning, penetration testing, and formal security audits. We cover the methodologies, tools, scope definitions, and reporting standards associated with each type. You’ll learn how to select the right assessment based on business goals, risk tolerance, and compliance requirements. We also examine legal considerations and rules of engagement for ethical hacking. For CISSPs, choosing and interpreting assessment results is key to effective security governance.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security assessments come in many forms—each with a specific purpose. In this episode, we compare and contrast vulnerability scanning, penetration testing, and formal security audits. We cover the methodologies, tools, scope definitions, and reporting standards associated with each type. You’ll learn how to select the right assessment based on business goals, risk tolerance, and compliance requirements. We also examine legal considerations and rules of engagement for ethical hacking. For CISSPs, choosing and interpreting assessment results is key to effective security governance.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:44:30 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/73478340/d1873055.mp3" length="29608563" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>739</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security assessments come in many forms—each with a specific purpose. In this episode, we compare and contrast vulnerability scanning, penetration testing, and formal security audits. We cover the methodologies, tools, scope definitions, and reporting standards associated with each type. You’ll learn how to select the right assessment based on business goals, risk tolerance, and compliance requirements. We also examine legal considerations and rules of engagement for ethical hacking. For CISSPs, choosing and interpreting assessment results is key to effective security governance.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/73478340/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 88: Planning a Security Assessment</title>
      <itunes:episode>88</itunes:episode>
      <podcast:episode>88</podcast:episode>
      <itunes:title>Episode 88: Planning a Security Assessment</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0c072c4f-59c6-43c0-b1d1-cb07d6192aa7</guid>
      <link>https://share.transistor.fm/s/ea04d308</link>
      <description>
        <![CDATA[<p>Security assessments must be planned thoroughly to be effective, safe, and actionable. This episode walks through the planning phase of an assessment project, including goal setting, scope definition, timeline management, and stakeholder communication. We explain how to assess organizational readiness, gain necessary approvals, and avoid disrupting operations. You’ll also learn about risk categorization, asset selection, test environment configuration, and the importance of documentation. CISSPs often serve as project leads or advisors for assessments, making this planning knowledge essential for both technical and governance roles.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security assessments must be planned thoroughly to be effective, safe, and actionable. This episode walks through the planning phase of an assessment project, including goal setting, scope definition, timeline management, and stakeholder communication. We explain how to assess organizational readiness, gain necessary approvals, and avoid disrupting operations. You’ll also learn about risk categorization, asset selection, test environment configuration, and the importance of documentation. CISSPs often serve as project leads or advisors for assessments, making this planning knowledge essential for both technical and governance roles.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:45:27 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ea04d308/ee58e936.mp3" length="31366054" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>783</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security assessments must be planned thoroughly to be effective, safe, and actionable. This episode walks through the planning phase of an assessment project, including goal setting, scope definition, timeline management, and stakeholder communication. We explain how to assess organizational readiness, gain necessary approvals, and avoid disrupting operations. You’ll also learn about risk categorization, asset selection, test environment configuration, and the importance of documentation. CISSPs often serve as project leads or advisors for assessments, making this planning knowledge essential for both technical and governance roles.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ea04d308/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 89: Security Control Testing: Manual vs. Automated</title>
      <itunes:episode>89</itunes:episode>
      <podcast:episode>89</podcast:episode>
      <itunes:title>Episode 89: Security Control Testing: Manual vs. Automated</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ce0d4c50-6526-4061-ac41-eec53f9b5734</guid>
      <link>https://share.transistor.fm/s/7b3d65be</link>
      <description>
        <![CDATA[<p>Security controls are only effective if they’re working as designed. In this episode, we explore how to test those controls using both manual and automated methods. We compare control validation techniques such as checklists, code reviews, synthetic transactions, vulnerability scanners, and red team exercises. You’ll learn when human judgment is needed, when automation scales better, and how to combine the two for comprehensive testing. As a CISSP, knowing how to assess the effectiveness of physical, technical, and administrative controls is key to maintaining a secure and compliant environment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security controls are only effective if they’re working as designed. In this episode, we explore how to test those controls using both manual and automated methods. We compare control validation techniques such as checklists, code reviews, synthetic transactions, vulnerability scanners, and red team exercises. You’ll learn when human judgment is needed, when automation scales better, and how to combine the two for comprehensive testing. As a CISSP, knowing how to assess the effectiveness of physical, technical, and administrative controls is key to maintaining a secure and compliant environment.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:46:39 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7b3d65be/3bbcbc9c.mp3" length="28420502" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>710</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security controls are only effective if they’re working as designed. In this episode, we explore how to test those controls using both manual and automated methods. We compare control validation techniques such as checklists, code reviews, synthetic transactions, vulnerability scanners, and red team exercises. You’ll learn when human judgment is needed, when automation scales better, and how to combine the two for comprehensive testing. As a CISSP, knowing how to assess the effectiveness of physical, technical, and administrative controls is key to maintaining a secure and compliant environment.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7b3d65be/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 90: Code Review and Static/Dynamic Testing</title>
      <itunes:episode>90</itunes:episode>
      <podcast:episode>90</podcast:episode>
      <itunes:title>Episode 90: Code Review and Static/Dynamic Testing</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8902bad8-a7e7-4e02-bf53-486d031ee398</guid>
      <link>https://share.transistor.fm/s/34fed8ee</link>
      <description>
        <![CDATA[<p>Code is a frequent source of vulnerabilities, and reviewing it is essential for secure software development. In this episode, we discuss secure code review techniques—both manual and tool-assisted. We explain how static application security testing (SAST) scans source code before runtime, while dynamic application security testing (DAST) analyzes behavior during execution. You’ll also learn about interactive testing, false positives, secure development lifecycles, and DevSecOps integration. CISSPs don’t have to write code, but they do need to understand how to validate its security and guide development practices.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Code is a frequent source of vulnerabilities, and reviewing it is essential for secure software development. In this episode, we discuss secure code review techniques—both manual and tool-assisted. We explain how static application security testing (SAST) scans source code before runtime, while dynamic application security testing (DAST) analyzes behavior during execution. You’ll also learn about interactive testing, false positives, secure development lifecycles, and DevSecOps integration. CISSPs don’t have to write code, but they do need to understand how to validate its security and guide development practices.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:47:43 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/34fed8ee/a8f0bcff.mp3" length="29345229" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>733</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Code is a frequent source of vulnerabilities, and reviewing it is essential for secure software development. In this episode, we discuss secure code review techniques—both manual and tool-assisted. We explain how static application security testing (SAST) scans source code before runtime, while dynamic application security testing (DAST) analyzes behavior during execution. You’ll also learn about interactive testing, false positives, secure development lifecycles, and DevSecOps integration. CISSPs don’t have to write code, but they do need to understand how to validate its security and guide development practices.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/34fed8ee/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 91: Security Test Data and Environment Management</title>
      <itunes:episode>91</itunes:episode>
      <podcast:episode>91</podcast:episode>
      <itunes:title>Episode 91: Security Test Data and Environment Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0a02be25-7575-41b5-8617-e90ce851a4e1</guid>
      <link>https://share.transistor.fm/s/3955fd9d</link>
      <description>
        <![CDATA[<p>Security testing requires careful control over both the test environment and the data used within it. In this episode, we explore how to create and manage dedicated testing environments that accurately simulate production systems without risking real assets. We cover the importance of data masking, synthetic data generation, and environment segmentation. You'll also learn how to prevent test environments from becoming security liabilities. CISSPs must understand how to manage test data in compliance with privacy regulations while ensuring integrity and realism in the testing process.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security testing requires careful control over both the test environment and the data used within it. In this episode, we explore how to create and manage dedicated testing environments that accurately simulate production systems without risking real assets. We cover the importance of data masking, synthetic data generation, and environment segmentation. You'll also learn how to prevent test environments from becoming security liabilities. CISSPs must understand how to manage test data in compliance with privacy regulations while ensuring integrity and realism in the testing process.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:48:42 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3955fd9d/a03026f1.mp3" length="29626314" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>740</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security testing requires careful control over both the test environment and the data used within it. In this episode, we explore how to create and manage dedicated testing environments that accurately simulate production systems without risking real assets. We cover the importance of data masking, synthetic data generation, and environment segmentation. You'll also learn how to prevent test environments from becoming security liabilities. CISSPs must understand how to manage test data in compliance with privacy regulations while ensuring integrity and realism in the testing process.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3955fd9d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 92: Test Coverage and Measurement</title>
      <itunes:episode>92</itunes:episode>
      <podcast:episode>92</podcast:episode>
      <itunes:title>Episode 92: Test Coverage and Measurement</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">60a0ac34-9cce-4e9d-a548-75300ab246a5</guid>
      <link>https://share.transistor.fm/s/9bc991f1</link>
      <description>
        <![CDATA[<p>How do you know your security testing is thorough? In this episode, we examine test coverage metrics and how they help evaluate the effectiveness and completeness of assessments. We explain different forms of coverage—such as code path coverage, requirement coverage, and risk-based coverage—and how to map test cases to threat models and control objectives. You'll also learn how to interpret results and identify coverage gaps. Effective measurement allows CISSPs to ensure that testing efforts align with business risks and produce actionable insights for continuous improvement.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How do you know your security testing is thorough? In this episode, we examine test coverage metrics and how they help evaluate the effectiveness and completeness of assessments. We explain different forms of coverage—such as code path coverage, requirement coverage, and risk-based coverage—and how to map test cases to threat models and control objectives. You'll also learn how to interpret results and identify coverage gaps. Effective measurement allows CISSPs to ensure that testing efforts align with business risks and produce actionable insights for continuous improvement.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:49:57 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9bc991f1/22a1431f.mp3" length="35448469" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>885</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How do you know your security testing is thorough? In this episode, we examine test coverage metrics and how they help evaluate the effectiveness and completeness of assessments. We explain different forms of coverage—such as code path coverage, requirement coverage, and risk-based coverage—and how to map test cases to threat models and control objectives. You'll also learn how to interpret results and identify coverage gaps. Effective measurement allows CISSPs to ensure that testing efforts align with business risks and produce actionable insights for continuous improvement.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9bc991f1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 93: Risk Assessment and Gap Analysis</title>
      <itunes:episode>93</itunes:episode>
      <podcast:episode>93</podcast:episode>
      <itunes:title>Episode 93: Risk Assessment and Gap Analysis</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a7c9e658-f269-4e49-91ea-c9ca00f697ee</guid>
      <link>https://share.transistor.fm/s/140043b0</link>
      <description>
        <![CDATA[<p>Risk assessments help prioritize security controls by identifying vulnerabilities, evaluating threats, and estimating potential impacts. In this episode, we break down how to conduct both qualitative and quantitative assessments, including risk matrix construction, asset valuation, and likelihood estimation. We also explain gap analysis—comparing current security posture against frameworks, regulations, or internal standards to find missing controls. CISSPs must be able to interpret these assessments, communicate their implications to stakeholders, and use them to justify security investments and policy changes.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Risk assessments help prioritize security controls by identifying vulnerabilities, evaluating threats, and estimating potential impacts. In this episode, we break down how to conduct both qualitative and quantitative assessments, including risk matrix construction, asset valuation, and likelihood estimation. We also explain gap analysis—comparing current security posture against frameworks, regulations, or internal standards to find missing controls. CISSPs must be able to interpret these assessments, communicate their implications to stakeholders, and use them to justify security investments and policy changes.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:50:43 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/140043b0/7d7943b4.mp3" length="39125468" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>977</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Risk assessments help prioritize security controls by identifying vulnerabilities, evaluating threats, and estimating potential impacts. In this episode, we break down how to conduct both qualitative and quantitative assessments, including risk matrix construction, asset valuation, and likelihood estimation. We also explain gap analysis—comparing current security posture against frameworks, regulations, or internal standards to find missing controls. CISSPs must be able to interpret these assessments, communicate their implications to stakeholders, and use them to justify security investments and policy changes.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/140043b0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 94: Compliance Auditing and Evidence Collection</title>
      <itunes:episode>94</itunes:episode>
      <podcast:episode>94</podcast:episode>
      <itunes:title>Episode 94: Compliance Auditing and Evidence Collection</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">aaf10fc5-364c-4967-be14-5df4651e257d</guid>
      <link>https://share.transistor.fm/s/8019b804</link>
      <description>
        <![CDATA[<p>Audits provide assurance that an organization is following its security policies and regulatory obligations. In this episode, we explore how compliance audits are structured, conducted, and evaluated. You’ll learn how to collect evidence, prepare audit trails, manage interviews, and handle audit scope creep. We also cover the role of internal vs. external auditors and discuss popular frameworks like ISO 27001, SOC 2, and PCI DSS. For CISSPs, knowing how to support audits with accurate records and professional communication is essential to demonstrating due diligence and regulatory alignment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Audits provide assurance that an organization is following its security policies and regulatory obligations. In this episode, we explore how compliance audits are structured, conducted, and evaluated. You’ll learn how to collect evidence, prepare audit trails, manage interviews, and handle audit scope creep. We also cover the role of internal vs. external auditors and discuss popular frameworks like ISO 27001, SOC 2, and PCI DSS. For CISSPs, knowing how to support audits with accurate records and professional communication is essential to demonstrating due diligence and regulatory alignment.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:51:30 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8019b804/30f6a7e2.mp3" length="36476663" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>911</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Audits provide assurance that an organization is following its security policies and regulatory obligations. In this episode, we explore how compliance audits are structured, conducted, and evaluated. You’ll learn how to collect evidence, prepare audit trails, manage interviews, and handle audit scope creep. We also cover the role of internal vs. external auditors and discuss popular frameworks like ISO 27001, SOC 2, and PCI DSS. For CISSPs, knowing how to support audits with accurate records and professional communication is essential to demonstrating due diligence and regulatory alignment.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8019b804/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 95: Log Analysis for Forensics and Compliance</title>
      <itunes:episode>95</itunes:episode>
      <podcast:episode>95</podcast:episode>
      <itunes:title>Episode 95: Log Analysis for Forensics and Compliance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">53105474-8db9-4488-9fd7-46dc9e686048</guid>
      <link>https://share.transistor.fm/s/3ff45937</link>
      <description>
        <![CDATA[<p>Logs are a goldmine of insight—but only if you know how to analyze them effectively. This episode dives into log collection, normalization, and correlation to support both forensic investigations and compliance reporting. We cover log sources such as firewalls, IDS/IPS, servers, applications, and cloud services, as well as how to identify anomalies, detect patterns, and preserve evidence. We also discuss the use of SIEM tools and log retention policies. CISSPs must understand how to leverage log data to validate events, investigate incidents, and meet audit requirements.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Logs are a goldmine of insight—but only if you know how to analyze them effectively. This episode dives into log collection, normalization, and correlation to support both forensic investigations and compliance reporting. We cover log sources such as firewalls, IDS/IPS, servers, applications, and cloud services, as well as how to identify anomalies, detect patterns, and preserve evidence. We also discuss the use of SIEM tools and log retention policies. CISSPs must understand how to leverage log data to validate events, investigate incidents, and meet audit requirements.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:53:10 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3ff45937/797aae5d.mp3" length="32172726" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>804</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Logs are a goldmine of insight—but only if you know how to analyze them effectively. This episode dives into log collection, normalization, and correlation to support both forensic investigations and compliance reporting. We cover log sources such as firewalls, IDS/IPS, servers, applications, and cloud services, as well as how to identify anomalies, detect patterns, and preserve evidence. We also discuss the use of SIEM tools and log retention policies. CISSPs must understand how to leverage log data to validate events, investigate incidents, and meet audit requirements.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3ff45937/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 96: Threat Hunting and Red Team Exercises</title>
      <itunes:episode>96</itunes:episode>
      <podcast:episode>96</podcast:episode>
      <itunes:title>Episode 96: Threat Hunting and Red Team Exercises</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1536bd48-44cb-4d21-831f-fa471854d77e</guid>
      <link>https://share.transistor.fm/s/132e227e</link>
      <description>
        <![CDATA[<p>Proactive threat hunting involves searching for signs of compromise that automated tools may miss. In this episode, we explain how threat hunters use hypothesis-driven analysis, threat intelligence, and behavioral indicators to uncover hidden risks. We also explore red team exercises—simulated attacks designed to test detection and response capabilities. You'll learn about attack frameworks like MITRE ATT&amp;CK and how to coordinate purple teaming to maximize value. These offensive techniques, when used ethically, provide deep insight into real-world readiness and resilience—essential knowledge for CISSP professionals.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Proactive threat hunting involves searching for signs of compromise that automated tools may miss. In this episode, we explain how threat hunters use hypothesis-driven analysis, threat intelligence, and behavioral indicators to uncover hidden risks. We also explore red team exercises—simulated attacks designed to test detection and response capabilities. You'll learn about attack frameworks like MITRE ATT&amp;CK and how to coordinate purple teaming to maximize value. These offensive techniques, when used ethically, provide deep insight into real-world readiness and resilience—essential knowledge for CISSP professionals.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:54:03 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/132e227e/6f0938fb.mp3" length="40777457" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1019</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Proactive threat hunting involves searching for signs of compromise that automated tools may miss. In this episode, we explain how threat hunters use hypothesis-driven analysis, threat intelligence, and behavioral indicators to uncover hidden risks. We also explore red team exercises—simulated attacks designed to test detection and response capabilities. You'll learn about attack frameworks like MITRE ATT&amp;CK and how to coordinate purple teaming to maximize value. These offensive techniques, when used ethically, provide deep insight into real-world readiness and resilience—essential knowledge for CISSP professionals.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/132e227e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 97: Reporting Assessment Results Effectively</title>
      <itunes:episode>97</itunes:episode>
      <podcast:episode>97</podcast:episode>
      <itunes:title>Episode 97: Reporting Assessment Results Effectively</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cecf089f-5156-45f8-8dfb-65ea3f0fa5b0</guid>
      <link>https://share.transistor.fm/s/49ac6771</link>
      <description>
        <![CDATA[<p>The value of a security assessment is only realized when the results are communicated clearly. In this episode, we discuss how to structure, write, and deliver effective reports for vulnerability scans, penetration tests, audits, and more. You'll learn how to prioritize findings by risk, provide context for business stakeholders, and recommend actionable remediation. We also explore visualizations, executive summaries, and post-report follow-ups. Strong reporting bridges the gap between technical detail and strategic decision-making—a vital skill for CISSPs responsible for communicating risk.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The value of a security assessment is only realized when the results are communicated clearly. In this episode, we discuss how to structure, write, and deliver effective reports for vulnerability scans, penetration tests, audits, and more. You'll learn how to prioritize findings by risk, provide context for business stakeholders, and recommend actionable remediation. We also explore visualizations, executive summaries, and post-report follow-ups. Strong reporting bridges the gap between technical detail and strategic decision-making—a vital skill for CISSPs responsible for communicating risk.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:54:55 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/49ac6771/59a88a5e.mp3" length="28873982" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>721</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The value of a security assessment is only realized when the results are communicated clearly. In this episode, we discuss how to structure, write, and deliver effective reports for vulnerability scans, penetration tests, audits, and more. You'll learn how to prioritize findings by risk, provide context for business stakeholders, and recommend actionable remediation. We also explore visualizations, executive summaries, and post-report follow-ups. Strong reporting bridges the gap between technical detail and strategic decision-making—a vital skill for CISSPs responsible for communicating risk.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/49ac6771/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 98: Metrics and KPIs for Security Performance</title>
      <itunes:episode>98</itunes:episode>
      <podcast:episode>98</podcast:episode>
      <itunes:title>Episode 98: Metrics and KPIs for Security Performance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">71dacef1-33c7-4837-bb09-143cda7f1fae</guid>
      <link>https://share.transistor.fm/s/32f422d0</link>
      <description>
        <![CDATA[<p>What gets measured gets managed—and security is no exception. This episode focuses on security metrics and key performance indicators (KPIs) that help organizations evaluate the effectiveness of their controls and programs. We cover types of metrics (operational, compliance, risk-based), how to design meaningful KPIs, and how to avoid common pitfalls like vanity metrics. You'll also learn how to tie metrics to business objectives and use them in dashboards and reports. CISSPs must understand how to measure what matters and use those insights to drive continuous improvement.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What gets measured gets managed—and security is no exception. This episode focuses on security metrics and key performance indicators (KPIs) that help organizations evaluate the effectiveness of their controls and programs. We cover types of metrics (operational, compliance, risk-based), how to design meaningful KPIs, and how to avoid common pitfalls like vanity metrics. You'll also learn how to tie metrics to business objectives and use them in dashboards and reports. CISSPs must understand how to measure what matters and use those insights to drive continuous improvement.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:55:52 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/32f422d0/0b2a548c.mp3" length="33323159" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>832</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What gets measured gets managed—and security is no exception. This episode focuses on security metrics and key performance indicators (KPIs) that help organizations evaluate the effectiveness of their controls and programs. We cover types of metrics (operational, compliance, risk-based), how to design meaningful KPIs, and how to avoid common pitfalls like vanity metrics. You'll also learn how to tie metrics to business objectives and use them in dashboards and reports. CISSPs must understand how to measure what matters and use those insights to drive continuous improvement.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/32f422d0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 99: Continuous Monitoring and Feedback Loops</title>
      <itunes:episode>99</itunes:episode>
      <podcast:episode>99</podcast:episode>
      <itunes:title>Episode 99: Continuous Monitoring and Feedback Loops</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dc1294cb-997e-4af8-a7c8-60b5ce2ad630</guid>
      <link>https://share.transistor.fm/s/769dc503</link>
      <description>
        <![CDATA[<p>Security is not a one-time event—it’s a continuous process. In this episode, we explore how continuous monitoring helps organizations detect changes, uncover risks, and maintain compliance in dynamic environments. We discuss how to implement automated data collection, baseline comparison, and event correlation across networks, endpoints, cloud services, and applications. You'll also learn how feedback loops from incidents, audits, and testing drive program maturity. CISSPs must understand how to design, scale, and sustain continuous monitoring efforts that support real-time decision-making and operational resilience.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security is not a one-time event—it’s a continuous process. In this episode, we explore how continuous monitoring helps organizations detect changes, uncover risks, and maintain compliance in dynamic environments. We discuss how to implement automated data collection, baseline comparison, and event correlation across networks, endpoints, cloud services, and applications. You'll also learn how feedback loops from incidents, audits, and testing drive program maturity. CISSPs must understand how to design, scale, and sustain continuous monitoring efforts that support real-time decision-making and operational resilience.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:56:43 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/769dc503/cb426a2e.mp3" length="35985558" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>899</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security is not a one-time event—it’s a continuous process. In this episode, we explore how continuous monitoring helps organizations detect changes, uncover risks, and maintain compliance in dynamic environments. We discuss how to implement automated data collection, baseline comparison, and event correlation across networks, endpoints, cloud services, and applications. You'll also learn how feedback loops from incidents, audits, and testing drive program maturity. CISSPs must understand how to design, scale, and sustain continuous monitoring efforts that support real-time decision-making and operational resilience.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/769dc503/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 100: Assessing Third-Party and Vendor Risk</title>
      <itunes:episode>100</itunes:episode>
      <podcast:episode>100</podcast:episode>
      <itunes:title>Episode 100: Assessing Third-Party and Vendor Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7542b9d7-9924-42b7-9615-4bde7c894095</guid>
      <link>https://share.transistor.fm/s/58b9f28c</link>
      <description>
        <![CDATA[<p>Vendors and service providers often have privileged access to your data and systems—making them a potential weak link. This episode focuses on third-party risk management, including how to evaluate a vendor's security posture before and after engagement. We cover due diligence checklists, contract clauses, security questionnaires, and ongoing monitoring practices. You'll also learn about shared responsibility models and how to manage risks across cloud, SaaS, and supply chain relationships. CISSPs must ensure that third-party access is governed with the same rigor as internal controls.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Vendors and service providers often have privileged access to your data and systems—making them a potential weak link. This episode focuses on third-party risk management, including how to evaluate a vendor's security posture before and after engagement. We cover due diligence checklists, contract clauses, security questionnaires, and ongoing monitoring practices. You'll also learn about shared responsibility models and how to manage risks across cloud, SaaS, and supply chain relationships. CISSPs must ensure that third-party access is governed with the same rigor as internal controls.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:57:30 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/58b9f28c/27876a46.mp3" length="38601981" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>964</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Vendors and service providers often have privileged access to your data and systems—making them a potential weak link. This episode focuses on third-party risk management, including how to evaluate a vendor's security posture before and after engagement. We cover due diligence checklists, contract clauses, security questionnaires, and ongoing monitoring practices. You'll also learn about shared responsibility models and how to manage risks across cloud, SaaS, and supply chain relationships. CISSPs must ensure that third-party access is governed with the same rigor as internal controls.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/58b9f28c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 101: Daily Operations: Procedures, Monitoring, Checklists</title>
      <itunes:episode>101</itunes:episode>
      <podcast:episode>101</podcast:episode>
      <itunes:title>Episode 101: Daily Operations: Procedures, Monitoring, Checklists</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c2c1ee4b-b873-44e3-ac60-b6c54a6e1907</guid>
      <link>https://share.transistor.fm/s/7c5707e4</link>
      <description>
        <![CDATA[<p>Security operations are built on consistency, structure, and clear documentation. In this episode, we explore the daily tasks that keep cybersecurity programs running—such as log reviews, system checks, user access reviews, and patch verification. We explain how operational procedures and checklists reduce errors, promote accountability, and streamline incident response. You’ll also learn how to align these routines with compliance requirements and best practices. CISSPs are expected to understand how standard operating procedures (SOPs) and continuous monitoring form the backbone of an effective and auditable security operations center (SOC).</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security operations are built on consistency, structure, and clear documentation. In this episode, we explore the daily tasks that keep cybersecurity programs running—such as log reviews, system checks, user access reviews, and patch verification. We explain how operational procedures and checklists reduce errors, promote accountability, and streamline incident response. You’ll also learn how to align these routines with compliance requirements and best practices. CISSPs are expected to understand how standard operating procedures (SOPs) and continuous monitoring form the backbone of an effective and auditable security operations center (SOC).</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:58:27 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7c5707e4/0e2fb195.mp3" length="29029686" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>725</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security operations are built on consistency, structure, and clear documentation. In this episode, we explore the daily tasks that keep cybersecurity programs running—such as log reviews, system checks, user access reviews, and patch verification. We explain how operational procedures and checklists reduce errors, promote accountability, and streamline incident response. You’ll also learn how to align these routines with compliance requirements and best practices. CISSPs are expected to understand how standard operating procedures (SOPs) and continuous monitoring form the backbone of an effective and auditable security operations center (SOC).</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7c5707e4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 102: Logging, Event Correlation, and SIEM</title>
      <itunes:episode>102</itunes:episode>
      <podcast:episode>102</podcast:episode>
      <itunes:title>Episode 102: Logging, Event Correlation, and SIEM</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0d71e6f2-02dc-4f1d-8b0a-3e0ff0ee30e7</guid>
      <link>https://share.transistor.fm/s/3ad91b48</link>
      <description>
        <![CDATA[<p>Capturing events is only the beginning—making sense of them is where the real value lies. This episode covers how organizations collect, normalize, and correlate logs from various systems and devices using Security Information and Event Management (SIEM) platforms. We discuss the components of a SIEM, alert tuning, and the use of correlation rules to detect complex threat patterns. You'll learn how SIEMs enhance visibility, speed up investigations, and support compliance with standards like HIPAA and PCI DSS. CISSPs must understand how to use logging and SIEM tools to build proactive and resilient detection capabilities.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Capturing events is only the beginning—making sense of them is where the real value lies. This episode covers how organizations collect, normalize, and correlate logs from various systems and devices using Security Information and Event Management (SIEM) platforms. We discuss the components of a SIEM, alert tuning, and the use of correlation rules to detect complex threat patterns. You'll learn how SIEMs enhance visibility, speed up investigations, and support compliance with standards like HIPAA and PCI DSS. CISSPs must understand how to use logging and SIEM tools to build proactive and resilient detection capabilities.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:59:11 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3ad91b48/a2d60ba6.mp3" length="25888707" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>646</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Capturing events is only the beginning—making sense of them is where the real value lies. This episode covers how organizations collect, normalize, and correlate logs from various systems and devices using Security Information and Event Management (SIEM) platforms. We discuss the components of a SIEM, alert tuning, and the use of correlation rules to detect complex threat patterns. You'll learn how SIEMs enhance visibility, speed up investigations, and support compliance with standards like HIPAA and PCI DSS. CISSPs must understand how to use logging and SIEM tools to build proactive and resilient detection capabilities.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3ad91b48/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 103: Incident Management: Preparation and Response</title>
      <itunes:episode>103</itunes:episode>
      <podcast:episode>103</podcast:episode>
      <itunes:title>Episode 103: Incident Management: Preparation and Response</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">42e41d10-fc27-443b-84d7-8eb325ecd52e</guid>
      <link>https://share.transistor.fm/s/c7f30f04</link>
      <description>
        <![CDATA[<p>Incidents are inevitable, and how you respond can determine the scale of impact. In this episode, we walk through the phases of incident management—preparation, identification, containment, eradication, recovery, and lessons learned. We explain how to build an incident response plan, assemble a response team, and establish escalation protocols. You’ll also learn how to coordinate with legal, PR, and law enforcement when necessary. Incident management is a high-priority domain for CISSPs because it brings together technical expertise, process discipline, and communication under pressure.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Incidents are inevitable, and how you respond can determine the scale of impact. In this episode, we walk through the phases of incident management—preparation, identification, containment, eradication, recovery, and lessons learned. We explain how to build an incident response plan, assemble a response team, and establish escalation protocols. You’ll also learn how to coordinate with legal, PR, and law enforcement when necessary. Incident management is a high-priority domain for CISSPs because it brings together technical expertise, process discipline, and communication under pressure.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 19:59:57 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c7f30f04/a0704e79.mp3" length="29588699" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>739</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Incidents are inevitable, and how you respond can determine the scale of impact. In this episode, we walk through the phases of incident management—preparation, identification, containment, eradication, recovery, and lessons learned. We explain how to build an incident response plan, assemble a response team, and establish escalation protocols. You’ll also learn how to coordinate with legal, PR, and law enforcement when necessary. Incident management is a high-priority domain for CISSPs because it brings together technical expertise, process discipline, and communication under pressure.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c7f30f04/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 104: Digital Forensics and Chain of Custody</title>
      <itunes:episode>104</itunes:episode>
      <podcast:episode>104</podcast:episode>
      <itunes:title>Episode 104: Digital Forensics and Chain of Custody</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a772c8bd-ff35-455b-8bf2-5df9190a4048</guid>
      <link>https://share.transistor.fm/s/ad46f486</link>
      <description>
        <![CDATA[<p>Preserving and analyzing digital evidence requires precision, consistency, and legal awareness. This episode explores the fundamentals of digital forensics—from identifying and collecting evidence to maintaining a documented chain of custody. We discuss volatile data acquisition, imaging tools, hashing for integrity verification, and timeline reconstruction. You’ll also learn about legal standards that govern admissibility and the responsibilities of forensic investigators. CISSPs don’t have to be deep forensic experts, but they must understand how to support investigations and preserve evidence in a defensible manner.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Preserving and analyzing digital evidence requires precision, consistency, and legal awareness. This episode explores the fundamentals of digital forensics—from identifying and collecting evidence to maintaining a documented chain of custody. We discuss volatile data acquisition, imaging tools, hashing for integrity verification, and timeline reconstruction. You’ll also learn about legal standards that govern admissibility and the responsibilities of forensic investigators. CISSPs don’t have to be deep forensic experts, but they must understand how to support investigations and preserve evidence in a defensible manner.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:00:52 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ad46f486/59fda8f2.mp3" length="29628398" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>740</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Preserving and analyzing digital evidence requires precision, consistency, and legal awareness. This episode explores the fundamentals of digital forensics—from identifying and collecting evidence to maintaining a documented chain of custody. We discuss volatile data acquisition, imaging tools, hashing for integrity verification, and timeline reconstruction. You’ll also learn about legal standards that govern admissibility and the responsibilities of forensic investigators. CISSPs don’t have to be deep forensic experts, but they must understand how to support investigations and preserve evidence in a defensible manner.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ad46f486/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 105: Evidence Acquisition and Preservation</title>
      <itunes:episode>105</itunes:episode>
      <podcast:episode>105</podcast:episode>
      <itunes:title>Episode 105: Evidence Acquisition and Preservation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0ce1366d-e428-49ce-b682-42e4bf10cbd6</guid>
      <link>https://share.transistor.fm/s/d965ea4f</link>
      <description>
        <![CDATA[<p>The reliability of evidence hinges on how it’s handled. In this episode, we dive deeper into the principles and techniques for acquiring and preserving digital evidence. Topics include imaging storage media, capturing memory dumps, recording live sessions, and documenting every step in the collection process. We also address how to avoid contamination, preserve timestamps, and ensure repeatability for court presentation. CISSPs must ensure that any evidence collected during investigations—whether by internal teams or third-party experts—is done with integrity and according to accepted forensic procedures.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The reliability of evidence hinges on how it’s handled. In this episode, we dive deeper into the principles and techniques for acquiring and preserving digital evidence. Topics include imaging storage media, capturing memory dumps, recording live sessions, and documenting every step in the collection process. We also address how to avoid contamination, preserve timestamps, and ensure repeatability for court presentation. CISSPs must ensure that any evidence collected during investigations—whether by internal teams or third-party experts—is done with integrity and according to accepted forensic procedures.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:01:41 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d965ea4f/000cc80b.mp3" length="27610699" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>689</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The reliability of evidence hinges on how it’s handled. In this episode, we dive deeper into the principles and techniques for acquiring and preserving digital evidence. Topics include imaging storage media, capturing memory dumps, recording live sessions, and documenting every step in the collection process. We also address how to avoid contamination, preserve timestamps, and ensure repeatability for court presentation. CISSPs must ensure that any evidence collected during investigations—whether by internal teams or third-party experts—is done with integrity and according to accepted forensic procedures.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d965ea4f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 106: Disaster Recovery Planning: RTO, RPO</title>
      <itunes:episode>106</itunes:episode>
      <podcast:episode>106</podcast:episode>
      <itunes:title>Episode 106: Disaster Recovery Planning: RTO, RPO</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0784aa58-c3cb-407f-854d-b1c6edd7471c</guid>
      <link>https://share.transistor.fm/s/43e68488</link>
      <description>
        <![CDATA[<p>When disaster strikes, organizations must restore operations quickly—and with minimal data loss. This episode focuses on Disaster Recovery Planning (DRP), particularly the metrics used to guide recovery strategies: Recovery Time Objective (RTO) and Recovery Point Objective (RPO). We explain how to define recovery priorities, select appropriate backup and failover solutions, and develop DR plans that meet business expectations. You’ll also learn about recovery site options, communication planning, and regular testing. CISSPs must understand DRP as part of a broader resilience strategy tied to business continuity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>When disaster strikes, organizations must restore operations quickly—and with minimal data loss. This episode focuses on Disaster Recovery Planning (DRP), particularly the metrics used to guide recovery strategies: Recovery Time Objective (RTO) and Recovery Point Objective (RPO). We explain how to define recovery priorities, select appropriate backup and failover solutions, and develop DR plans that meet business expectations. You’ll also learn about recovery site options, communication planning, and regular testing. CISSPs must understand DRP as part of a broader resilience strategy tied to business continuity.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:02:24 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/43e68488/c3c12c59.mp3" length="32006584" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>799</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>When disaster strikes, organizations must restore operations quickly—and with minimal data loss. This episode focuses on Disaster Recovery Planning (DRP), particularly the metrics used to guide recovery strategies: Recovery Time Objective (RTO) and Recovery Point Objective (RPO). We explain how to define recovery priorities, select appropriate backup and failover solutions, and develop DR plans that meet business expectations. You’ll also learn about recovery site options, communication planning, and regular testing. CISSPs must understand DRP as part of a broader resilience strategy tied to business continuity.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/43e68488/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 107: Business Continuity Testing and Tabletop Exercises</title>
      <itunes:episode>107</itunes:episode>
      <podcast:episode>107</podcast:episode>
      <itunes:title>Episode 107: Business Continuity Testing and Tabletop Exercises</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">65da5fa5-0d91-462d-be52-fac0dbedeff6</guid>
      <link>https://share.transistor.fm/s/17002b21</link>
      <description>
        <![CDATA[<p>Plans are only useful if they’re tested. In this episode, we explore the various methods for testing business continuity and disaster recovery plans—including walkthroughs, simulations, functional tests, and tabletop exercises. We discuss how to design tests, involve key stakeholders, and evaluate performance without disrupting operations. You’ll learn how testing helps uncover weaknesses in coordination, communication, and recovery capabilities. For CISSPs, facilitating and analyzing these exercises is crucial to strengthening organizational resilience and ensuring plans work under real-world conditions.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Plans are only useful if they’re tested. In this episode, we explore the various methods for testing business continuity and disaster recovery plans—including walkthroughs, simulations, functional tests, and tabletop exercises. We discuss how to design tests, involve key stakeholders, and evaluate performance without disrupting operations. You’ll learn how testing helps uncover weaknesses in coordination, communication, and recovery capabilities. For CISSPs, facilitating and analyzing these exercises is crucial to strengthening organizational resilience and ensuring plans work under real-world conditions.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:03:13 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/17002b21/0cdcecaf.mp3" length="29179104" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>729</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Plans are only useful if they’re tested. In this episode, we explore the various methods for testing business continuity and disaster recovery plans—including walkthroughs, simulations, functional tests, and tabletop exercises. We discuss how to design tests, involve key stakeholders, and evaluate performance without disrupting operations. You’ll learn how testing helps uncover weaknesses in coordination, communication, and recovery capabilities. For CISSPs, facilitating and analyzing these exercises is crucial to strengthening organizational resilience and ensuring plans work under real-world conditions.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/17002b21/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 108: Patch Management and Configuration Control</title>
      <itunes:episode>108</itunes:episode>
      <podcast:episode>108</podcast:episode>
      <itunes:title>Episode 108: Patch Management and Configuration Control</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8fb607f2-dbfd-4b68-aaaa-4c0a2a3e9166</guid>
      <link>https://share.transistor.fm/s/e72aa126</link>
      <description>
        <![CDATA[<p>Unpatched systems are one of the leading causes of successful cyberattacks. In this episode, we explore the role of patch management and configuration control in maintaining secure and reliable systems. We explain how to evaluate patches, schedule deployments, and monitor success. You'll also learn how to track configuration baselines, control changes, and enforce consistent settings across environments. CISSPs must ensure that vulnerabilities are addressed promptly and that unauthorized changes are detected and corrected before they become security issues.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Unpatched systems are one of the leading causes of successful cyberattacks. In this episode, we explore the role of patch management and configuration control in maintaining secure and reliable systems. We explain how to evaluate patches, schedule deployments, and monitor success. You'll also learn how to track configuration baselines, control changes, and enforce consistent settings across environments. CISSPs must ensure that vulnerabilities are addressed promptly and that unauthorized changes are detected and corrected before they become security issues.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:04:10 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e72aa126/5220cd5d.mp3" length="25716304" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>642</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Unpatched systems are one of the leading causes of successful cyberattacks. In this episode, we explore the role of patch management and configuration control in maintaining secure and reliable systems. We explain how to evaluate patches, schedule deployments, and monitor success. You'll also learn how to track configuration baselines, control changes, and enforce consistent settings across environments. CISSPs must ensure that vulnerabilities are addressed promptly and that unauthorized changes are detected and corrected before they become security issues.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e72aa126/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 109: Change Control and Approval Processes</title>
      <itunes:episode>109</itunes:episode>
      <podcast:episode>109</podcast:episode>
      <itunes:title>Episode 109: Change Control and Approval Processes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">735151d7-af27-4d67-a4e5-48fbba15dc24</guid>
      <link>https://share.transistor.fm/s/3e80b09a</link>
      <description>
        <![CDATA[<p>Security isn’t just about stopping bad changes—it’s about managing all changes effectively. In this episode, we examine the formal process of change control: how to submit change requests, perform impact assessments, obtain approvals, test in controlled environments, and document results. We also cover the importance of change advisory boards (CABs), rollback planning, and post-implementation review. For CISSPs, understanding change control is key to maintaining operational stability, preventing unauthorized modifications, and aligning IT operations with regulatory and security frameworks.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security isn’t just about stopping bad changes—it’s about managing all changes effectively. In this episode, we examine the formal process of change control: how to submit change requests, perform impact assessments, obtain approvals, test in controlled environments, and document results. We also cover the importance of change advisory boards (CABs), rollback planning, and post-implementation review. For CISSPs, understanding change control is key to maintaining operational stability, preventing unauthorized modifications, and aligning IT operations with regulatory and security frameworks.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:05:01 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3e80b09a/3b7460a1.mp3" length="26029769" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>650</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security isn’t just about stopping bad changes—it’s about managing all changes effectively. In this episode, we examine the formal process of change control: how to submit change requests, perform impact assessments, obtain approvals, test in controlled environments, and document results. We also cover the importance of change advisory boards (CABs), rollback planning, and post-implementation review. For CISSPs, understanding change control is key to maintaining operational stability, preventing unauthorized modifications, and aligning IT operations with regulatory and security frameworks.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3e80b09a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 110: Secure Disposal and Media Sanitization</title>
      <itunes:episode>110</itunes:episode>
      <podcast:episode>110</podcast:episode>
      <itunes:title>Episode 110: Secure Disposal and Media Sanitization</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e3207926-b358-4caf-9a70-acac060aa3a6</guid>
      <link>https://share.transistor.fm/s/ef4dbf88</link>
      <description>
        <![CDATA[<p>Data doesn’t disappear just because you delete it. In this episode, we focus on how to securely dispose of media and sanitize storage devices to prevent data recovery. We cover techniques such as overwriting, degaussing, cryptographic erasure, and physical destruction, as well as when and how to apply each. You’ll also learn about documentation requirements, chain of custody for retired media, and applicable standards like NIST SP 800-88. CISSPs must ensure that end-of-life processes are consistent, auditable, and aligned with regulatory and organizational data protection obligations.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Data doesn’t disappear just because you delete it. In this episode, we focus on how to securely dispose of media and sanitize storage devices to prevent data recovery. We cover techniques such as overwriting, degaussing, cryptographic erasure, and physical destruction, as well as when and how to apply each. You’ll also learn about documentation requirements, chain of custody for retired media, and applicable standards like NIST SP 800-88. CISSPs must ensure that end-of-life processes are consistent, auditable, and aligned with regulatory and organizational data protection obligations.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:05:53 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ef4dbf88/66990ef2.mp3" length="27002570" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>674</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Data doesn’t disappear just because you delete it. In this episode, we focus on how to securely dispose of media and sanitize storage devices to prevent data recovery. We cover techniques such as overwriting, degaussing, cryptographic erasure, and physical destruction, as well as when and how to apply each. You’ll also learn about documentation requirements, chain of custody for retired media, and applicable standards like NIST SP 800-88. CISSPs must ensure that end-of-life processes are consistent, auditable, and aligned with regulatory and organizational data protection obligations.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ef4dbf88/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 111: Endpoint Detection and Response (EDR)</title>
      <itunes:episode>111</itunes:episode>
      <podcast:episode>111</podcast:episode>
      <itunes:title>Episode 111: Endpoint Detection and Response (EDR)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dfde192e-d773-477a-b123-995344e25b6c</guid>
      <link>https://share.transistor.fm/s/c061ef89</link>
      <description>
        <![CDATA[<p>Endpoints remain a primary target for cyberattacks, and protecting them requires more than traditional antivirus solutions. This episode explores Endpoint Detection and Response (EDR), a modern approach to securing laptops, desktops, servers, and mobile devices. We explain how EDR tools provide real-time monitoring, behavioral analysis, threat hunting, and automated response capabilities. You'll learn how EDR integrates with SIEM platforms, supports forensic investigations, and helps contain lateral movement during incidents. CISSPs must understand how to evaluate, deploy, and tune EDR solutions to protect the front lines of enterprise environments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Endpoints remain a primary target for cyberattacks, and protecting them requires more than traditional antivirus solutions. This episode explores Endpoint Detection and Response (EDR), a modern approach to securing laptops, desktops, servers, and mobile devices. We explain how EDR tools provide real-time monitoring, behavioral analysis, threat hunting, and automated response capabilities. You'll learn how EDR integrates with SIEM platforms, supports forensic investigations, and helps contain lateral movement during incidents. CISSPs must understand how to evaluate, deploy, and tune EDR solutions to protect the front lines of enterprise environments.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:06:49 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c061ef89/49cd6b3b.mp3" length="26349508" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>658</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Endpoints remain a primary target for cyberattacks, and protecting them requires more than traditional antivirus solutions. This episode explores Endpoint Detection and Response (EDR), a modern approach to securing laptops, desktops, servers, and mobile devices. We explain how EDR tools provide real-time monitoring, behavioral analysis, threat hunting, and automated response capabilities. You'll learn how EDR integrates with SIEM platforms, supports forensic investigations, and helps contain lateral movement during incidents. CISSPs must understand how to evaluate, deploy, and tune EDR solutions to protect the front lines of enterprise environments.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c061ef89/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 112: Insider Threat Identification and Mitigation</title>
      <itunes:episode>112</itunes:episode>
      <podcast:episode>112</podcast:episode>
      <itunes:title>Episode 112: Insider Threat Identification and Mitigation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">873fd84b-4999-42ca-8892-4945b5b598af</guid>
      <link>https://share.transistor.fm/s/ec533f19</link>
      <description>
        <![CDATA[<p>Not all threats come from the outside. Insider threats—whether malicious or accidental—pose a significant risk to organizational security. In this episode, we examine how to identify, monitor, and respond to threats from employees, contractors, or partners with legitimate access. We discuss behavioral indicators, user activity monitoring, data loss prevention (DLP), and privacy considerations. You'll also learn how to balance detection efforts with employee trust and legal requirements. CISSPs must be able to design and enforce insider threat programs that protect assets without undermining culture or morale.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Not all threats come from the outside. Insider threats—whether malicious or accidental—pose a significant risk to organizational security. In this episode, we examine how to identify, monitor, and respond to threats from employees, contractors, or partners with legitimate access. We discuss behavioral indicators, user activity monitoring, data loss prevention (DLP), and privacy considerations. You'll also learn how to balance detection efforts with employee trust and legal requirements. CISSPs must be able to design and enforce insider threat programs that protect assets without undermining culture or morale.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:07:38 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ec533f19/be425d17.mp3" length="28543800" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>713</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Not all threats come from the outside. Insider threats—whether malicious or accidental—pose a significant risk to organizational security. In this episode, we examine how to identify, monitor, and respond to threats from employees, contractors, or partners with legitimate access. We discuss behavioral indicators, user activity monitoring, data loss prevention (DLP), and privacy considerations. You'll also learn how to balance detection efforts with employee trust and legal requirements. CISSPs must be able to design and enforce insider threat programs that protect assets without undermining culture or morale.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ec533f19/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 113: Malware Analysis and Containment</title>
      <itunes:episode>113</itunes:episode>
      <podcast:episode>113</podcast:episode>
      <itunes:title>Episode 113: Malware Analysis and Containment</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">21b83188-b81d-4090-849a-e33e076a7e80</guid>
      <link>https://share.transistor.fm/s/cb6abbad</link>
      <description>
        <![CDATA[<p>Understanding malware is essential for effective defense. This episode explores how security teams analyze and contain malicious software, including viruses, worms, ransomware, and trojans. We break down static and dynamic analysis techniques, sandboxing environments, signature development, and reverse engineering basics. You'll also learn how to contain outbreaks, remove malware safely, and update detection tools. CISSPs may not perform deep malware analysis themselves, but they must understand how malware spreads, how it's investigated, and how to manage risk during outbreaks.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Understanding malware is essential for effective defense. This episode explores how security teams analyze and contain malicious software, including viruses, worms, ransomware, and trojans. We break down static and dynamic analysis techniques, sandboxing environments, signature development, and reverse engineering basics. You'll also learn how to contain outbreaks, remove malware safely, and update detection tools. CISSPs may not perform deep malware analysis themselves, but they must understand how malware spreads, how it's investigated, and how to manage risk during outbreaks.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:08:27 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cb6abbad/d8796e14.mp3" length="29533307" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>738</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Understanding malware is essential for effective defense. This episode explores how security teams analyze and contain malicious software, including viruses, worms, ransomware, and trojans. We break down static and dynamic analysis techniques, sandboxing environments, signature development, and reverse engineering basics. You'll also learn how to contain outbreaks, remove malware safely, and update detection tools. CISSPs may not perform deep malware analysis themselves, but they must understand how malware spreads, how it's investigated, and how to manage risk during outbreaks.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cb6abbad/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 114: Physical Security Operations: Locks, Guards, Cameras</title>
      <itunes:episode>114</itunes:episode>
      <podcast:episode>114</podcast:episode>
      <itunes:title>Episode 114: Physical Security Operations: Locks, Guards, Cameras</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ff7ef5a3-4ffc-442d-b6d4-1f700dcea9bc</guid>
      <link>https://share.transistor.fm/s/9474a95d</link>
      <description>
        <![CDATA[<p>Cybersecurity extends into the physical world, where threats like unauthorized access, theft, and sabotage can bypass digital defenses. In this episode, we explore physical security operations, including the use of barriers, locks, access control systems, security guards, surveillance cameras, and visitor management. We also cover how physical security integrates with IT through badges, biometrics, and monitoring. CISSPs must understand how to assess facility risks, implement layered physical defenses, and coordinate between IT and facilities teams to protect critical assets from physical compromise.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cybersecurity extends into the physical world, where threats like unauthorized access, theft, and sabotage can bypass digital defenses. In this episode, we explore physical security operations, including the use of barriers, locks, access control systems, security guards, surveillance cameras, and visitor management. We also cover how physical security integrates with IT through badges, biometrics, and monitoring. CISSPs must understand how to assess facility risks, implement layered physical defenses, and coordinate between IT and facilities teams to protect critical assets from physical compromise.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:09:11 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9474a95d/f2530c59.mp3" length="28648298" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>715</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cybersecurity extends into the physical world, where threats like unauthorized access, theft, and sabotage can bypass digital defenses. In this episode, we explore physical security operations, including the use of barriers, locks, access control systems, security guards, surveillance cameras, and visitor management. We also cover how physical security integrates with IT through badges, biometrics, and monitoring. CISSPs must understand how to assess facility risks, implement layered physical defenses, and coordinate between IT and facilities teams to protect critical assets from physical compromise.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9474a95d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 115: Personnel Security Controls and Separation of Duties</title>
      <itunes:episode>115</itunes:episode>
      <podcast:episode>115</podcast:episode>
      <itunes:title>Episode 115: Personnel Security Controls and Separation of Duties</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0a31b6b5-25b7-4394-ba99-48b587926fc4</guid>
      <link>https://share.transistor.fm/s/7ad96a50</link>
      <description>
        <![CDATA[<p>People are at the heart of every security program—and also one of its greatest vulnerabilities. In this episode, we examine personnel security controls that mitigate human-based risks. Topics include background checks, onboarding protocols, security training, acceptable use policies, and ongoing behavior monitoring. We also explore separation of duties, job rotation, and least privilege principles that reduce fraud and error. CISSPs must be able to design and enforce personnel policies that protect the organization while supporting a strong security culture and clear accountability.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>People are at the heart of every security program—and also one of its greatest vulnerabilities. In this episode, we examine personnel security controls that mitigate human-based risks. Topics include background checks, onboarding protocols, security training, acceptable use policies, and ongoing behavior monitoring. We also explore separation of duties, job rotation, and least privilege principles that reduce fraud and error. CISSPs must be able to design and enforce personnel policies that protect the organization while supporting a strong security culture and clear accountability.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:09:59 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7ad96a50/914b1ab9.mp3" length="26114420" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>652</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>People are at the heart of every security program—and also one of its greatest vulnerabilities. In this episode, we examine personnel security controls that mitigate human-based risks. Topics include background checks, onboarding protocols, security training, acceptable use policies, and ongoing behavior monitoring. We also explore separation of duties, job rotation, and least privilege principles that reduce fraud and error. CISSPs must be able to design and enforce personnel policies that protect the organization while supporting a strong security culture and clear accountability.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7ad96a50/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 116: Security Operations Center (SOC) Best Practices</title>
      <itunes:episode>116</itunes:episode>
      <podcast:episode>116</podcast:episode>
      <itunes:title>Episode 116: Security Operations Center (SOC) Best Practices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f0c710a6-a4ed-4981-8acb-b5121131ac20</guid>
      <link>https://share.transistor.fm/s/fbfcbfd2</link>
      <description>
        <![CDATA[<p>The Security Operations Center (SOC) is the nerve center of cybersecurity monitoring and incident response. In this episode, we explore SOC roles, responsibilities, staffing models, tools, and key performance indicators. We discuss shift scheduling, escalation paths, use cases, and integration with threat intelligence feeds. You'll also learn about SOC maturity models and how to evolve from reactive operations to proactive threat hunting. CISSPs must understand how to structure, support, and evaluate SOCs to ensure they deliver measurable protection and business value.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The Security Operations Center (SOC) is the nerve center of cybersecurity monitoring and incident response. In this episode, we explore SOC roles, responsibilities, staffing models, tools, and key performance indicators. We discuss shift scheduling, escalation paths, use cases, and integration with threat intelligence feeds. You'll also learn about SOC maturity models and how to evolve from reactive operations to proactive threat hunting. CISSPs must understand how to structure, support, and evaluate SOCs to ensure they deliver measurable protection and business value.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:10:48 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fbfcbfd2/55bcd746.mp3" length="26990040" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>674</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The Security Operations Center (SOC) is the nerve center of cybersecurity monitoring and incident response. In this episode, we explore SOC roles, responsibilities, staffing models, tools, and key performance indicators. We discuss shift scheduling, escalation paths, use cases, and integration with threat intelligence feeds. You'll also learn about SOC maturity models and how to evolve from reactive operations to proactive threat hunting. CISSPs must understand how to structure, support, and evaluate SOCs to ensure they deliver measurable protection and business value.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fbfcbfd2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 117: Software Development Lifecycle (SDLC) Models</title>
      <itunes:episode>117</itunes:episode>
      <podcast:episode>117</podcast:episode>
      <itunes:title>Episode 117: Software Development Lifecycle (SDLC) Models</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">16c7e5f3-a67a-4665-9fd3-4c000548d969</guid>
      <link>https://share.transistor.fm/s/35b0dc13</link>
      <description>
        <![CDATA[<p>Secure software doesn’t happen by accident—it’s the result of disciplined development practices. This episode explores common Software Development Lifecycle (SDLC) models, including waterfall, spiral, and V-model, and how they structure phases such as requirements, design, coding, testing, deployment, and maintenance. We also discuss where and how security should be integrated into each phase. CISSPs must understand SDLC frameworks to support secure software planning, ensure oversight of third-party development, and implement governance for both agile and traditional projects.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Secure software doesn’t happen by accident—it’s the result of disciplined development practices. This episode explores common Software Development Lifecycle (SDLC) models, including waterfall, spiral, and V-model, and how they structure phases such as requirements, design, coding, testing, deployment, and maintenance. We also discuss where and how security should be integrated into each phase. CISSPs must understand SDLC frameworks to support secure software planning, ensure oversight of third-party development, and implement governance for both agile and traditional projects.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:11:32 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/35b0dc13/e8b9f3ad.mp3" length="26792551" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>669</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Secure software doesn’t happen by accident—it’s the result of disciplined development practices. This episode explores common Software Development Lifecycle (SDLC) models, including waterfall, spiral, and V-model, and how they structure phases such as requirements, design, coding, testing, deployment, and maintenance. We also discuss where and how security should be integrated into each phase. CISSPs must understand SDLC frameworks to support secure software planning, ensure oversight of third-party development, and implement governance for both agile and traditional projects.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/35b0dc13/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 118: Waterfall vs. Agile vs. DevOps Approaches</title>
      <itunes:episode>118</itunes:episode>
      <podcast:episode>118</podcast:episode>
      <itunes:title>Episode 118: Waterfall vs. Agile vs. DevOps Approaches</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a96893c6-727d-4538-9666-fe625adcfa70</guid>
      <link>https://share.transistor.fm/s/909a0a48</link>
      <description>
        <![CDATA[<p>Development methodologies have a direct impact on how security is integrated into software projects. This episode compares three major approaches—Waterfall, Agile, and DevOps—and how each handles risk, testing, and control. You'll learn the strengths and challenges of each model, including change management, documentation, and time-to-delivery. We also explore how DevSecOps brings security into the CI/CD pipeline. CISSPs must be familiar with these approaches to advise development teams, align controls with process realities, and adapt governance to fast-moving development environments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Development methodologies have a direct impact on how security is integrated into software projects. This episode compares three major approaches—Waterfall, Agile, and DevOps—and how each handles risk, testing, and control. You'll learn the strengths and challenges of each model, including change management, documentation, and time-to-delivery. We also explore how DevSecOps brings security into the CI/CD pipeline. CISSPs must be familiar with these approaches to advise development teams, align controls with process realities, and adapt governance to fast-moving development environments.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:12:28 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/909a0a48/007c2056.mp3" length="24757087" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>618</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Development methodologies have a direct impact on how security is integrated into software projects. This episode compares three major approaches—Waterfall, Agile, and DevOps—and how each handles risk, testing, and control. You'll learn the strengths and challenges of each model, including change management, documentation, and time-to-delivery. We also explore how DevSecOps brings security into the CI/CD pipeline. CISSPs must be familiar with these approaches to advise development teams, align controls with process realities, and adapt governance to fast-moving development environments.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/909a0a48/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 119: Secure Design and Secure Coding Guidelines</title>
      <itunes:episode>119</itunes:episode>
      <podcast:episode>119</podcast:episode>
      <itunes:title>Episode 119: Secure Design and Secure Coding Guidelines</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7803385b-0fb6-4681-b3b8-0fa7a3f795bc</guid>
      <link>https://share.transistor.fm/s/cdcec9f0</link>
      <description>
        <![CDATA[<p>Secure applications start with secure design. In this episode, we explore how to incorporate security into architecture and code from the very beginning. Topics include threat modeling, input validation, secure defaults, and fail-safe mechanisms. We also cover secure coding practices that prevent common vulnerabilities such as injection, buffer overflows, and improper error handling. CISSPs must understand the principles of secure design so they can set expectations, evaluate vendor software, and collaborate effectively with developers to reduce risks before code is ever deployed.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Secure applications start with secure design. In this episode, we explore how to incorporate security into architecture and code from the very beginning. Topics include threat modeling, input validation, secure defaults, and fail-safe mechanisms. We also cover secure coding practices that prevent common vulnerabilities such as injection, buffer overflows, and improper error handling. CISSPs must understand the principles of secure design so they can set expectations, evaluate vendor software, and collaborate effectively with developers to reduce risks before code is ever deployed.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:13:17 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cdcec9f0/60a63e2a.mp3" length="26553268" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>663</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Secure applications start with secure design. In this episode, we explore how to incorporate security into architecture and code from the very beginning. Topics include threat modeling, input validation, secure defaults, and fail-safe mechanisms. We also cover secure coding practices that prevent common vulnerabilities such as injection, buffer overflows, and improper error handling. CISSPs must understand the principles of secure design so they can set expectations, evaluate vendor software, and collaborate effectively with developers to reduce risks before code is ever deployed.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cdcec9f0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 120: Input Validation and Output Encoding</title>
      <itunes:episode>120</itunes:episode>
      <podcast:episode>120</podcast:episode>
      <itunes:title>Episode 120: Input Validation and Output Encoding</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">342ab6d1-74e6-41f2-a3df-e8f433117a38</guid>
      <link>https://share.transistor.fm/s/bcb70eb1</link>
      <description>
        <![CDATA[<p>User input is one of the most common vectors for exploitation in modern applications. In this episode, we focus on two critical programming techniques: input validation and output encoding. We explain how to validate input to ensure it meets expected formats and prevents attacks like SQL injection and cross-site scripting (XSS). We also explore how to encode output for different contexts—such as HTML, JavaScript, or SQL—to avoid executing untrusted data. CISSPs may not write code, but they must understand these defenses to reduce software vulnerabilities and enforce security requirements in development projects.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>User input is one of the most common vectors for exploitation in modern applications. In this episode, we focus on two critical programming techniques: input validation and output encoding. We explain how to validate input to ensure it meets expected formats and prevents attacks like SQL injection and cross-site scripting (XSS). We also explore how to encode output for different contexts—such as HTML, JavaScript, or SQL—to avoid executing untrusted data. CISSPs may not write code, but they must understand these defenses to reduce software vulnerabilities and enforce security requirements in development projects.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:14:36 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bcb70eb1/f6e3dfbd.mp3" length="27015107" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>675</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>User input is one of the most common vectors for exploitation in modern applications. In this episode, we focus on two critical programming techniques: input validation and output encoding. We explain how to validate input to ensure it meets expected formats and prevents attacks like SQL injection and cross-site scripting (XSS). We also explore how to encode output for different contexts—such as HTML, JavaScript, or SQL—to avoid executing untrusted data. CISSPs may not write code, but they must understand these defenses to reduce software vulnerabilities and enforce security requirements in development projects.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bcb70eb1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 121: OWASP Top 10 Threats and Controls</title>
      <itunes:episode>121</itunes:episode>
      <podcast:episode>121</podcast:episode>
      <itunes:title>Episode 121: OWASP Top 10 Threats and Controls</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">230455a6-43e2-484c-9143-98232594ffd1</guid>
      <link>https://share.transistor.fm/s/bd40ad11</link>
      <description>
        <![CDATA[<p>The OWASP Top 10 is a widely recognized list of the most critical security risks to web applications. In this episode, we walk through each entry—from injection and broken authentication to cross-site scripting, insecure deserialization, and insufficient logging. You'll learn how these vulnerabilities occur, the business impact they can have, and the recommended controls to prevent or mitigate them. We also discuss how developers and security professionals can use the OWASP Top 10 as a baseline for secure coding practices. CISSPs must understand these threats to assess application risk and implement effective defense strategies.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The OWASP Top 10 is a widely recognized list of the most critical security risks to web applications. In this episode, we walk through each entry—from injection and broken authentication to cross-site scripting, insecure deserialization, and insufficient logging. You'll learn how these vulnerabilities occur, the business impact they can have, and the recommended controls to prevent or mitigate them. We also discuss how developers and security professionals can use the OWASP Top 10 as a baseline for secure coding practices. CISSPs must understand these threats to assess application risk and implement effective defense strategies.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:15:24 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bd40ad11/0d4ee850.mp3" length="61803936" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>1544</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The OWASP Top 10 is a widely recognized list of the most critical security risks to web applications. In this episode, we walk through each entry—from injection and broken authentication to cross-site scripting, insecure deserialization, and insufficient logging. You'll learn how these vulnerabilities occur, the business impact they can have, and the recommended controls to prevent or mitigate them. We also discuss how developers and security professionals can use the OWASP Top 10 as a baseline for secure coding practices. CISSPs must understand these threats to assess application risk and implement effective defense strategies.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bd40ad11/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 122: Buffer Overflows, SQL Injection, and Common Flaws</title>
      <itunes:episode>122</itunes:episode>
      <podcast:episode>122</podcast:episode>
      <itunes:title>Episode 122: Buffer Overflows, SQL Injection, and Common Flaws</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">56b18713-9061-492d-9abb-d4f0ed82b29e</guid>
      <link>https://share.transistor.fm/s/61aeb22e</link>
      <description>
        <![CDATA[<p>Many devastating cyberattacks originate from well-known coding flaws. This episode examines classic vulnerabilities including buffer overflows, SQL injection, and other input-related attacks. We explain how these issues arise, what they allow attackers to do, and how to defend against them using secure coding, bounds checking, input validation, and runtime protections like DEP and ASLR. You'll also learn about real-world incidents that exploited these flaws. For CISSPs, understanding common software weaknesses is critical for conducting risk assessments, reviewing software, and advising development teams.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Many devastating cyberattacks originate from well-known coding flaws. This episode examines classic vulnerabilities including buffer overflows, SQL injection, and other input-related attacks. We explain how these issues arise, what they allow attackers to do, and how to defend against them using secure coding, bounds checking, input validation, and runtime protections like DEP and ASLR. You'll also learn about real-world incidents that exploited these flaws. For CISSPs, understanding common software weaknesses is critical for conducting risk assessments, reviewing software, and advising development teams.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:16:09 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/61aeb22e/df1d1c10.mp3" length="31773585" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>794</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Many devastating cyberattacks originate from well-known coding flaws. This episode examines classic vulnerabilities including buffer overflows, SQL injection, and other input-related attacks. We explain how these issues arise, what they allow attackers to do, and how to defend against them using secure coding, bounds checking, input validation, and runtime protections like DEP and ASLR. You'll also learn about real-world incidents that exploited these flaws. For CISSPs, understanding common software weaknesses is critical for conducting risk assessments, reviewing software, and advising development teams.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/61aeb22e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 123: Security Testing: SAST, DAST, IAST</title>
      <itunes:episode>123</itunes:episode>
      <podcast:episode>123</podcast:episode>
      <itunes:title>Episode 123: Security Testing: SAST, DAST, IAST</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9ac0a308-3b9c-40fa-8067-86e3e2579b89</guid>
      <link>https://share.transistor.fm/s/286259b7</link>
      <description>
        <![CDATA[<p>Security testing helps ensure software behaves as intended under hostile conditions. In this episode, we explore different application security testing methodologies, including Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST). We explain how each method works, their strengths and limitations, and when to use them during the software development lifecycle. You’ll also learn how these tools integrate with DevOps workflows and how to interpret test results. CISSPs must be able to recommend and evaluate testing strategies to support secure software delivery.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security testing helps ensure software behaves as intended under hostile conditions. In this episode, we explore different application security testing methodologies, including Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST). We explain how each method works, their strengths and limitations, and when to use them during the software development lifecycle. You’ll also learn how these tools integrate with DevOps workflows and how to interpret test results. CISSPs must be able to recommend and evaluate testing strategies to support secure software delivery.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:17:00 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/286259b7/a10798af.mp3" length="26967039" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>673</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security testing helps ensure software behaves as intended under hostile conditions. In this episode, we explore different application security testing methodologies, including Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST). We explain how each method works, their strengths and limitations, and when to use them during the software development lifecycle. You’ll also learn how these tools integrate with DevOps workflows and how to interpret test results. CISSPs must be able to recommend and evaluate testing strategies to support secure software delivery.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/286259b7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 124: Code Repositories and Access Controls</title>
      <itunes:episode>124</itunes:episode>
      <podcast:episode>124</podcast:episode>
      <itunes:title>Episode 124: Code Repositories and Access Controls</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ecb546ba-4b27-4198-9537-eb3427e11833</guid>
      <link>https://share.transistor.fm/s/2ab75302</link>
      <description>
        <![CDATA[<p>Source code repositories are central to modern software development—and to software security. This episode covers the security considerations for using platforms like GitHub, GitLab, Bitbucket, and internal repositories. We examine access control policies, branching strategies, commit tracking, and how to detect malicious code changes. You’ll learn about secrets scanning, signed commits, and repository hardening. CISSPs must understand how to secure the development pipeline and enforce controls that protect intellectual property and prevent code tampering at its source.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Source code repositories are central to modern software development—and to software security. This episode covers the security considerations for using platforms like GitHub, GitLab, Bitbucket, and internal repositories. We examine access control policies, branching strategies, commit tracking, and how to detect malicious code changes. You’ll learn about secrets scanning, signed commits, and repository hardening. CISSPs must understand how to secure the development pipeline and enforce controls that protect intellectual property and prevent code tampering at its source.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:17:46 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2ab75302/89bf9d5a.mp3" length="30399532" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>759</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Source code repositories are central to modern software development—and to software security. This episode covers the security considerations for using platforms like GitHub, GitLab, Bitbucket, and internal repositories. We examine access control policies, branching strategies, commit tracking, and how to detect malicious code changes. You’ll learn about secrets scanning, signed commits, and repository hardening. CISSPs must understand how to secure the development pipeline and enforce controls that protect intellectual property and prevent code tampering at its source.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2ab75302/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 125: Configuration Management and CI/CD Pipelines</title>
      <itunes:episode>125</itunes:episode>
      <podcast:episode>125</podcast:episode>
      <itunes:title>Episode 125: Configuration Management and CI/CD Pipelines</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ff66bdc2-dbdc-4909-b68d-a0c1899a5aae</guid>
      <link>https://share.transistor.fm/s/8104ee1d</link>
      <description>
        <![CDATA[<p>Secure development doesn't stop at writing code—it includes how that code is built, tested, and deployed. In this episode, we explore configuration management and continuous integration/continuous delivery (CI/CD) pipelines. We discuss how insecure configurations, exposed secrets, and unmonitored automation can lead to compromise. Topics include infrastructure as code (IaC), environment hardening, automated security gates, and rollback procedures. CISSPs must know how to assess CI/CD pipeline security and ensure that automation enhances, rather than undermines, control over software deployment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Secure development doesn't stop at writing code—it includes how that code is built, tested, and deployed. In this episode, we explore configuration management and continuous integration/continuous delivery (CI/CD) pipelines. We discuss how insecure configurations, exposed secrets, and unmonitored automation can lead to compromise. Topics include infrastructure as code (IaC), environment hardening, automated security gates, and rollback procedures. CISSPs must know how to assess CI/CD pipeline security and ensure that automation enhances, rather than undermines, control over software deployment.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:18:28 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8104ee1d/8da6d213.mp3" length="34596894" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>864</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Secure development doesn't stop at writing code—it includes how that code is built, tested, and deployed. In this episode, we explore configuration management and continuous integration/continuous delivery (CI/CD) pipelines. We discuss how insecure configurations, exposed secrets, and unmonitored automation can lead to compromise. Topics include infrastructure as code (IaC), environment hardening, automated security gates, and rollback procedures. CISSPs must know how to assess CI/CD pipeline security and ensure that automation enhances, rather than undermines, control over software deployment.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8104ee1d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 126: Version Control and Code Integrity</title>
      <itunes:episode>126</itunes:episode>
      <podcast:episode>126</podcast:episode>
      <itunes:title>Episode 126: Version Control and Code Integrity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f6b39c61-6d00-41a7-83ff-109d87afaac3</guid>
      <link>https://share.transistor.fm/s/06f330e4</link>
      <description>
        <![CDATA[<p>Version control systems track changes to code—but they also need to be protected themselves. This episode explores how tools like Git help enforce code integrity, collaboration, and traceability across development teams. We cover commit histories, branching strategies, and how to detect unauthorized or malicious changes. You’ll learn about tagging, rollbacks, signed commits, and hash verification to ensure that what gets deployed is what was intended. For CISSPs, maintaining code integrity across distributed teams and tools is key to supporting trustworthy software development practices.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Version control systems track changes to code—but they also need to be protected themselves. This episode explores how tools like Git help enforce code integrity, collaboration, and traceability across development teams. We cover commit histories, branching strategies, and how to detect unauthorized or malicious changes. You’ll learn about tagging, rollbacks, signed commits, and hash verification to ensure that what gets deployed is what was intended. For CISSPs, maintaining code integrity across distributed teams and tools is key to supporting trustworthy software development practices.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:19:13 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/06f330e4/d5102b6b.mp3" length="31898958" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>797</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Version control systems track changes to code—but they also need to be protected themselves. This episode explores how tools like Git help enforce code integrity, collaboration, and traceability across development teams. We cover commit histories, branching strategies, and how to detect unauthorized or malicious changes. You’ll learn about tagging, rollbacks, signed commits, and hash verification to ensure that what gets deployed is what was intended. For CISSPs, maintaining code integrity across distributed teams and tools is key to supporting trustworthy software development practices.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/06f330e4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 127: Application Whitelisting and Sandboxing</title>
      <itunes:episode>127</itunes:episode>
      <podcast:episode>127</podcast:episode>
      <itunes:title>Episode 127: Application Whitelisting and Sandboxing</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fd6c2000-7a3a-41f4-90fc-70f101e4d81a</guid>
      <link>https://share.transistor.fm/s/079005e4</link>
      <description>
        <![CDATA[<p>Not all applications should be allowed to run in your environment. This episode explores application control mechanisms like whitelisting and sandboxing. You'll learn how whitelisting enforces control by allowing only approved executables, and how sandboxing isolates applications to prevent them from affecting system integrity. We also discuss implementation strategies, policy management, and how to handle exceptions. These controls are especially valuable in high-security or highly regulated environments. CISSPs must understand how to limit application behavior to reduce attack surfaces and contain potential damage.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Not all applications should be allowed to run in your environment. This episode explores application control mechanisms like whitelisting and sandboxing. You'll learn how whitelisting enforces control by allowing only approved executables, and how sandboxing isolates applications to prevent them from affecting system integrity. We also discuss implementation strategies, policy management, and how to handle exceptions. These controls are especially valuable in high-security or highly regulated environments. CISSPs must understand how to limit application behavior to reduce attack surfaces and contain potential damage.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:20:00 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/079005e4/72b3ad77.mp3" length="35709705" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>892</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Not all applications should be allowed to run in your environment. This episode explores application control mechanisms like whitelisting and sandboxing. You'll learn how whitelisting enforces control by allowing only approved executables, and how sandboxing isolates applications to prevent them from affecting system integrity. We also discuss implementation strategies, policy management, and how to handle exceptions. These controls are especially valuable in high-security or highly regulated environments. CISSPs must understand how to limit application behavior to reduce attack surfaces and contain potential damage.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/079005e4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 128: Mobile Application Security and Reverse Engineering</title>
      <itunes:episode>128</itunes:episode>
      <podcast:episode>128</podcast:episode>
      <itunes:title>Episode 128: Mobile Application Security and Reverse Engineering</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fa19104b-b5d5-4d0c-8caf-0d0a91ce96dc</guid>
      <link>https://share.transistor.fm/s/0a881855</link>
      <description>
        <![CDATA[<p>Mobile apps introduce unique risks due to their widespread use, diverse platforms, and limited control over user devices. In this episode, we explore mobile app security concerns, including insecure storage, weak authentication, exposed APIs, and code tampering. We also introduce reverse engineering concepts—how attackers decompile apps to uncover secrets or modify behavior. You’ll learn mitigation strategies such as code obfuscation, secure storage APIs, and runtime protections. CISSPs must understand how to assess mobile application threats and ensure that mobile deployments align with organizational security standards.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Mobile apps introduce unique risks due to their widespread use, diverse platforms, and limited control over user devices. In this episode, we explore mobile app security concerns, including insecure storage, weak authentication, exposed APIs, and code tampering. We also introduce reverse engineering concepts—how attackers decompile apps to uncover secrets or modify behavior. You’ll learn mitigation strategies such as code obfuscation, secure storage APIs, and runtime protections. CISSPs must understand how to assess mobile application threats and ensure that mobile deployments align with organizational security standards.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:20:58 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0a881855/ddd8bd1f.mp3" length="35452673" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>886</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Mobile apps introduce unique risks due to their widespread use, diverse platforms, and limited control over user devices. In this episode, we explore mobile app security concerns, including insecure storage, weak authentication, exposed APIs, and code tampering. We also introduce reverse engineering concepts—how attackers decompile apps to uncover secrets or modify behavior. You’ll learn mitigation strategies such as code obfuscation, secure storage APIs, and runtime protections. CISSPs must understand how to assess mobile application threats and ensure that mobile deployments align with organizational security standards.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0a881855/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 129: Secure APIs and Service Integration</title>
      <itunes:episode>129</itunes:episode>
      <podcast:episode>129</podcast:episode>
      <itunes:title>Episode 129: Secure APIs and Service Integration</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b01e6b6d-d051-44a6-a98c-3b4357eaf9de</guid>
      <link>https://share.transistor.fm/s/0f5c00c5</link>
      <description>
        <![CDATA[<p>APIs enable system integration but can expose your infrastructure to serious vulnerabilities if not secured properly. This episode focuses on how to design and manage secure APIs. We cover authentication methods (API keys, OAuth), input validation, rate limiting, logging, and error handling. You’ll also learn about common API security issues like broken object-level authorization and excessive data exposure. Secure API development is essential for any modern digital service, and CISSPs must ensure that APIs are managed with the same rigor as traditional application interfaces.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>APIs enable system integration but can expose your infrastructure to serious vulnerabilities if not secured properly. This episode focuses on how to design and manage secure APIs. We cover authentication methods (API keys, OAuth), input validation, rate limiting, logging, and error handling. You’ll also learn about common API security issues like broken object-level authorization and excessive data exposure. Secure API development is essential for any modern digital service, and CISSPs must ensure that APIs are managed with the same rigor as traditional application interfaces.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:21:42 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0f5c00c5/9ee2091a.mp3" length="35981375" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>899</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>APIs enable system integration but can expose your infrastructure to serious vulnerabilities if not secured properly. This episode focuses on how to design and manage secure APIs. We cover authentication methods (API keys, OAuth), input validation, rate limiting, logging, and error handling. You’ll also learn about common API security issues like broken object-level authorization and excessive data exposure. Secure API development is essential for any modern digital service, and CISSPs must ensure that APIs are managed with the same rigor as traditional application interfaces.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0f5c00c5/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 130: DevSecOps Culture and Continuous Assurance</title>
      <itunes:episode>130</itunes:episode>
      <podcast:episode>130</podcast:episode>
      <itunes:title>Episode 130: DevSecOps Culture and Continuous Assurance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c99ae1e2-cfd2-4c65-8289-77023d79867f</guid>
      <link>https://share.transistor.fm/s/4360959a</link>
      <description>
        <![CDATA[<p>DevSecOps is not just a toolset—it’s a culture that integrates security into every phase of the software development lifecycle. In this episode, we explore how DevSecOps breaks down silos between development, operations, and security teams. Topics include automated security testing, continuous compliance checks, secure coding training, and real-time feedback loops. You’ll learn how to embed security into CI/CD pipelines and enforce policy-as-code principles. For CISSPs, fostering a DevSecOps culture means shifting security left, enabling rapid innovation while maintaining rigorous standards for protection and assurance.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>DevSecOps is not just a toolset—it’s a culture that integrates security into every phase of the software development lifecycle. In this episode, we explore how DevSecOps breaks down silos between development, operations, and security teams. Topics include automated security testing, continuous compliance checks, secure coding training, and real-time feedback loops. You’ll learn how to embed security into CI/CD pipelines and enforce policy-as-code principles. For CISSPs, fostering a DevSecOps culture means shifting security left, enabling rapid innovation while maintaining rigorous standards for protection and assurance.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:22:24 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4360959a/64690867.mp3" length="37583210" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>939</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>DevSecOps is not just a toolset—it’s a culture that integrates security into every phase of the software development lifecycle. In this episode, we explore how DevSecOps breaks down silos between development, operations, and security teams. Topics include automated security testing, continuous compliance checks, secure coding training, and real-time feedback loops. You’ll learn how to embed security into CI/CD pipelines and enforce policy-as-code principles. For CISSPs, fostering a DevSecOps culture means shifting security left, enabling rapid innovation while maintaining rigorous standards for protection and assurance.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4360959a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 131: Top 10 Hardest CISSP Concepts Demystified</title>
      <itunes:episode>131</itunes:episode>
      <podcast:episode>131</podcast:episode>
      <itunes:title>Episode 131: Top 10 Hardest CISSP Concepts Demystified</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b04fe686-1b03-4230-a2f2-57dad338c624</guid>
      <link>https://share.transistor.fm/s/918a6ab1</link>
      <description>
        <![CDATA[<p>Some CISSP topics consistently challenge even experienced professionals. In this episode, we break down ten of the most difficult concepts on the exam—ranging from cryptographic key lifecycle and security models to risk calculations and legal frameworks. We clarify the nuances, provide examples, and share memory aids to help you master these areas. Whether you’re struggling with asset valuation formulas, access control methodologies, or cloud governance, this review will sharpen your understanding. CISSPs must be confident in these complex subjects to handle exam scenarios and real-world leadership challenges.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Some CISSP topics consistently challenge even experienced professionals. In this episode, we break down ten of the most difficult concepts on the exam—ranging from cryptographic key lifecycle and security models to risk calculations and legal frameworks. We clarify the nuances, provide examples, and share memory aids to help you master these areas. Whether you’re struggling with asset valuation formulas, access control methodologies, or cloud governance, this review will sharpen your understanding. CISSPs must be confident in these complex subjects to handle exam scenarios and real-world leadership challenges.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:23:54 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/918a6ab1/daa99440.mp3" length="9124986" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>571</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Some CISSP topics consistently challenge even experienced professionals. In this episode, we break down ten of the most difficult concepts on the exam—ranging from cryptographic key lifecycle and security models to risk calculations and legal frameworks. We clarify the nuances, provide examples, and share memory aids to help you master these areas. Whether you’re struggling with asset valuation formulas, access control methodologies, or cloud governance, this review will sharpen your understanding. CISSPs must be confident in these complex subjects to handle exam scenarios and real-world leadership challenges.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/918a6ab1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 135: Memory Tricks and Mnemonics for the CISSP</title>
      <itunes:episode>135</itunes:episode>
      <podcast:episode>135</podcast:episode>
      <itunes:title>Episode 135: Memory Tricks and Mnemonics for the CISSP</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">47381493-aed5-4c3d-8943-0fe0a3d2063f</guid>
      <link>https://share.transistor.fm/s/6711d050</link>
      <description>
        <![CDATA[<p>With so much material to retain, memory tools are a CISSP candidate’s secret weapon. In this episode, we provide proven mnemonics, visual associations, and acronym expansions to help you remember everything from the OSI model and CIA triad to the phases of incident response and risk treatment options. You’ll also learn strategies for reducing cognitive overload and improving recall under exam pressure. These techniques are designed to make memorization more efficient and retention more reliable—especially when you're balancing study time with professional responsibilities.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>With so much material to retain, memory tools are a CISSP candidate’s secret weapon. In this episode, we provide proven mnemonics, visual associations, and acronym expansions to help you remember everything from the OSI model and CIA triad to the phases of incident response and risk treatment options. You’ll also learn strategies for reducing cognitive overload and improving recall under exam pressure. These techniques are designed to make memorization more efficient and retention more reliable—especially when you're balancing study time with professional responsibilities.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:24:58 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6711d050/b0ae451e.mp3" length="24241952" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>605</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>With so much material to retain, memory tools are a CISSP candidate’s secret weapon. In this episode, we provide proven mnemonics, visual associations, and acronym expansions to help you remember everything from the OSI model and CIA triad to the phases of incident response and risk treatment options. You’ll also learn strategies for reducing cognitive overload and improving recall under exam pressure. These techniques are designed to make memorization more efficient and retention more reliable—especially when you're balancing study time with professional responsibilities.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6711d050/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 136: How to Deconstruct CISSP Questions</title>
      <itunes:episode>136</itunes:episode>
      <podcast:episode>136</podcast:episode>
      <itunes:title>Episode 136: How to Deconstruct CISSP Questions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d6a3f7d4-26a0-4c05-ad36-cddd453c96c5</guid>
      <link>https://share.transistor.fm/s/7326e185</link>
      <description>
        <![CDATA[<p>CISSP exam questions are known for being complex, layered, and sometimes intentionally confusing. In this episode, we teach you how to break questions apart to find the real point being tested. You'll learn how to identify the scenario, isolate the question stem, and evaluate answer choices using elimination strategies. We also discuss common distractors, keywords like “best,” “first,” and “most likely,” and how to avoid overthinking. CISSPs must be able to think critically, quickly, and clearly—this episode helps you build the habits to do just that.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>CISSP exam questions are known for being complex, layered, and sometimes intentionally confusing. In this episode, we teach you how to break questions apart to find the real point being tested. You'll learn how to identify the scenario, isolate the question stem, and evaluate answer choices using elimination strategies. We also discuss common distractors, keywords like “best,” “first,” and “most likely,” and how to avoid overthinking. CISSPs must be able to think critically, quickly, and clearly—this episode helps you build the habits to do just that.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:26:03 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7326e185/9d7fcf71.mp3" length="27598158" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>689</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>CISSP exam questions are known for being complex, layered, and sometimes intentionally confusing. In this episode, we teach you how to break questions apart to find the real point being tested. You'll learn how to identify the scenario, isolate the question stem, and evaluate answer choices using elimination strategies. We also discuss common distractors, keywords like “best,” “first,” and “most likely,” and how to avoid overthinking. CISSPs must be able to think critically, quickly, and clearly—this episode helps you build the habits to do just that.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7326e185/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 137: Understanding "Best", "First", and "Most Likely" Wording</title>
      <itunes:episode>137</itunes:episode>
      <podcast:episode>137</podcast:episode>
      <itunes:title>Episode 137: Understanding "Best", "First", and "Most Likely" Wording</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ca28c215-a0f6-482b-a4dd-4b244e5c418c</guid>
      <link>https://share.transistor.fm/s/9506c2d4</link>
      <description>
        <![CDATA[<p>CISSP exam questions often hinge on a single word that changes everything. In this episode, we examine how to interpret qualifiers like “best,” “first,” “most appropriate,” and “least likely.” We explain what each prompt is asking you to consider—whether it’s prioritization, sequencing, or judgment—and how to choose the answer that aligns with ISC2's expected mindset. You'll hear examples and practice strategies that train you to read between the lines. CISSPs must be precise thinkers, and this episode ensures you don't miss points over semantics.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>CISSP exam questions often hinge on a single word that changes everything. In this episode, we examine how to interpret qualifiers like “best,” “first,” “most appropriate,” and “least likely.” We explain what each prompt is asking you to consider—whether it’s prioritization, sequencing, or judgment—and how to choose the answer that aligns with ISC2's expected mindset. You'll hear examples and practice strategies that train you to read between the lines. CISSPs must be precise thinkers, and this episode ensures you don't miss points over semantics.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:27:13 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9506c2d4/022d3231.mp3" length="23671453" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>591</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>CISSP exam questions often hinge on a single word that changes everything. In this episode, we examine how to interpret qualifiers like “best,” “first,” “most appropriate,” and “least likely.” We explain what each prompt is asking you to consider—whether it’s prioritization, sequencing, or judgment—and how to choose the answer that aligns with ISC2's expected mindset. You'll hear examples and practice strategies that train you to read between the lines. CISSPs must be precise thinkers, and this episode ensures you don't miss points over semantics.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9506c2d4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 138: Adaptive Testing Tips and Time Management</title>
      <itunes:episode>138</itunes:episode>
      <podcast:episode>138</podcast:episode>
      <itunes:title>Episode 138: Adaptive Testing Tips and Time Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">549d75e9-f8c8-4a0d-bef0-8172c81cff68</guid>
      <link>https://share.transistor.fm/s/2316d5a2</link>
      <description>
        <![CDATA[<p>The CISSP exam uses Computerized Adaptive Testing (CAT), which means question difficulty and test length vary based on your performance. In this episode, we demystify the CAT format, explain how scoring works, and share strategies to manage your time across the exam. You’ll learn when to move quickly, when to slow down, and how to pace yourself under pressure. We also provide techniques for staying focused during long test sessions and avoiding mental fatigue. CISSP candidates who understand CAT mechanics have a clear advantage in approaching the exam with confidence and control.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The CISSP exam uses Computerized Adaptive Testing (CAT), which means question difficulty and test length vary based on your performance. In this episode, we demystify the CAT format, explain how scoring works, and share strategies to manage your time across the exam. You’ll learn when to move quickly, when to slow down, and how to pace yourself under pressure. We also provide techniques for staying focused during long test sessions and avoiding mental fatigue. CISSP candidates who understand CAT mechanics have a clear advantage in approaching the exam with confidence and control.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:28:06 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2316d5a2/2924f593.mp3" length="27449789" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>685</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The CISSP exam uses Computerized Adaptive Testing (CAT), which means question difficulty and test length vary based on your performance. In this episode, we demystify the CAT format, explain how scoring works, and share strategies to manage your time across the exam. You’ll learn when to move quickly, when to slow down, and how to pace yourself under pressure. We also provide techniques for staying focused during long test sessions and avoiding mental fatigue. CISSP candidates who understand CAT mechanics have a clear advantage in approaching the exam with confidence and control.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2316d5a2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 139: What Comes After the CISSP: Career and Certification Roadmap</title>
      <itunes:episode>139</itunes:episode>
      <podcast:episode>139</podcast:episode>
      <itunes:title>Episode 139: What Comes After the CISSP: Career and Certification Roadmap</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bf48b1d0-88d0-4306-aa8c-59a69e724725</guid>
      <link>https://share.transistor.fm/s/d5b6657e</link>
      <description>
        <![CDATA[<p>Earning your CISSP opens new doors—but where you go next depends on your goals. In this episode, we explore the post-CISSP landscape, including leadership roles like CISO, and technical specializations like cloud security and digital forensics. We also review advanced certifications such as CCSP, CISM, CRISC, and the CISSP concentrations in architecture, engineering, and management. You’ll learn how to use your CISSP as a launchpad for continuous professional development. CISSPs are expected to lead—this episode shows you how to build a career path that’s secure, strategic, and sustainable.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Earning your CISSP opens new doors—but where you go next depends on your goals. In this episode, we explore the post-CISSP landscape, including leadership roles like CISO, and technical specializations like cloud security and digital forensics. We also review advanced certifications such as CCSP, CISM, CRISC, and the CISSP concentrations in architecture, engineering, and management. You’ll learn how to use your CISSP as a launchpad for continuous professional development. CISSPs are expected to lead—this episode shows you how to build a career path that’s secure, strategic, and sustainable.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:28:56 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d5b6657e/b7ae090c.mp3" length="7686789" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>481</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Earning your CISSP opens new doors—but where you go next depends on your goals. In this episode, we explore the post-CISSP landscape, including leadership roles like CISO, and technical specializations like cloud security and digital forensics. We also review advanced certifications such as CCSP, CISM, CRISC, and the CISSP concentrations in architecture, engineering, and management. You’ll learn how to use your CISSP as a launchpad for continuous professional development. CISSPs are expected to lead—this episode shows you how to build a career path that’s secure, strategic, and sustainable.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d5b6657e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 140: What to Do If You Fail the CISSP</title>
      <itunes:episode>140</itunes:episode>
      <podcast:episode>140</podcast:episode>
      <itunes:title>Episode 140: What to Do If You Fail the CISSP</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b65b7869-5214-4d93-8daf-a814b785c9c4</guid>
      <link>https://share.transistor.fm/s/bc8fa131</link>
      <description>
        <![CDATA[<p>Not everyone passes on the first try—but failure doesn’t define your journey. In this episode, we guide you through a structured plan for recovery if you don’t pass the CISSP exam. We cover how to interpret your exam feedback, identify weak domains, revise your study strategy, and rebuild confidence. You’ll also learn how to maintain momentum and avoid burnout during your next round of preparation. CISSPs are persistent by nature, and this episode helps you turn setbacks into setups for future success—because your path forward is still wide open.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Not everyone passes on the first try—but failure doesn’t define your journey. In this episode, we guide you through a structured plan for recovery if you don’t pass the CISSP exam. We cover how to interpret your exam feedback, identify weak domains, revise your study strategy, and rebuild confidence. You’ll also learn how to maintain momentum and avoid burnout during your next round of preparation. CISSPs are persistent by nature, and this episode helps you turn setbacks into setups for future success—because your path forward is still wide open.</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jun 2025 20:29:37 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bc8fa131/82a75357.mp3" length="7120927" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>442</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Not everyone passes on the first try—but failure doesn’t define your journey. In this episode, we guide you through a structured plan for recovery if you don’t pass the CISSP exam. We cover how to interpret your exam feedback, identify weak domains, revise your study strategy, and rebuild confidence. You’ll also learn how to maintain momentum and avoid burnout during your next round of preparation. CISSPs are persistent by nature, and this episode helps you turn setbacks into setups for future success—because your path forward is still wide open.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bc8fa131/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Welcome to the ISC2 CISSP Audio Course</title>
      <itunes:title>Welcome to the ISC2 CISSP Audio Course</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">871f09d4-cf22-4109-9ea5-0243995c2df9</guid>
      <link>https://share.transistor.fm/s/7ec9e96b</link>
      <description>
        <![CDATA[<p>Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes as they drop and start listening smarter from day one.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes as they drop and start listening smarter from day one.</p>]]>
      </content:encoded>
      <pubDate>Mon, 13 Oct 2025 22:33:34 -0500</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7ec9e96b/7e33da59.mp3" length="4175411" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>105</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes as they drop and start listening smarter from day one.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7ec9e96b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 132: Memory Tricks and Mnemonics for the CISSP</title>
      <itunes:episode>132</itunes:episode>
      <podcast:episode>132</podcast:episode>
      <itunes:title>Episode 132: Memory Tricks and Mnemonics for the CISSP</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">600eab13-c8be-43ee-b93d-8aa638ad9a78</guid>
      <link>https://share.transistor.fm/s/2ce39648</link>
      <description>
        <![CDATA[<p>With so much material to retain, memory tools are a CISSP candidate’s secret weapon. In this episode, we provide proven mnemonics, visual associations, and acronym expansions to help you remember everything from the OSI model and CIA triad to the phases of incident response and risk treatment options. You’ll also learn strategies for reducing cognitive overload and improving recall under exam pressure. These techniques are designed to make memorization more efficient and retention more reliable—especially when you're balancing study time with professional responsibilities.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>With so much material to retain, memory tools are a CISSP candidate’s secret weapon. In this episode, we provide proven mnemonics, visual associations, and acronym expansions to help you remember everything from the OSI model and CIA triad to the phases of incident response and risk treatment options. You’ll also learn strategies for reducing cognitive overload and improving recall under exam pressure. These techniques are designed to make memorization more efficient and retention more reliable—especially when you're balancing study time with professional responsibilities.</p>]]>
      </content:encoded>
      <pubDate>Sat, 17 Jan 2026 13:31:14 -0600</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2ce39648/65fa9115.mp3" length="25351634" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>633</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>With so much material to retain, memory tools are a CISSP candidate’s secret weapon. In this episode, we provide proven mnemonics, visual associations, and acronym expansions to help you remember everything from the OSI model and CIA triad to the phases of incident response and risk treatment options. You’ll also learn strategies for reducing cognitive overload and improving recall under exam pressure. These techniques are designed to make memorization more efficient and retention more reliable—especially when you're balancing study time with professional responsibilities.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2ce39648/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 133: How to Deconstruct CISSP Questions</title>
      <itunes:episode>129</itunes:episode>
      <podcast:episode>129</podcast:episode>
      <itunes:title>Episode 133: How to Deconstruct CISSP Questions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0cd00385-aa93-4437-ada4-0651ad83afab</guid>
      <link>https://share.transistor.fm/s/0cf7de1d</link>
      <description>
        <![CDATA[<p>CISSP exam questions are known for being complex, layered, and sometimes intentionally confusing. In this episode, we teach you how to break questions apart to find the real point being tested. You'll learn how to identify the scenario, isolate the question stem, and evaluate answer choices using elimination strategies. We also discuss common distractors, keywords like “best,” “first,” and “most likely,” and how to avoid overthinking. CISSPs must be able to think critically, quickly, and clearly—this episode helps you build the habits to do just that.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>CISSP exam questions are known for being complex, layered, and sometimes intentionally confusing. In this episode, we teach you how to break questions apart to find the real point being tested. You'll learn how to identify the scenario, isolate the question stem, and evaluate answer choices using elimination strategies. We also discuss common distractors, keywords like “best,” “first,” and “most likely,” and how to avoid overthinking. CISSPs must be able to think critically, quickly, and clearly—this episode helps you build the habits to do just that.</p>]]>
      </content:encoded>
      <pubDate>Sat, 17 Jan 2026 13:31:37 -0600</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0cf7de1d/c4cfe5c4.mp3" length="26208443" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>654</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>CISSP exam questions are known for being complex, layered, and sometimes intentionally confusing. In this episode, we teach you how to break questions apart to find the real point being tested. You'll learn how to identify the scenario, isolate the question stem, and evaluate answer choices using elimination strategies. We also discuss common distractors, keywords like “best,” “first,” and “most likely,” and how to avoid overthinking. CISSPs must be able to think critically, quickly, and clearly—this episode helps you build the habits to do just that.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0cf7de1d/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 134: Understanding "Best", "First", and "Most Likely" Wording</title>
      <itunes:episode>134</itunes:episode>
      <podcast:episode>134</podcast:episode>
      <itunes:title>Episode 134: Understanding "Best", "First", and "Most Likely" Wording</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">783c2fa3-7744-4825-a453-5bfa1935d219</guid>
      <link>https://share.transistor.fm/s/be129b65</link>
      <description>
        <![CDATA[<p>CISSP exam questions often hinge on a single word that changes everything. In this episode, we examine how to interpret qualifiers like “best,” “first,” “most appropriate,” and “least likely.” We explain what each prompt is asking you to consider—whether it’s prioritization, sequencing, or judgment—and how to choose the answer that aligns with ISC2's expected mindset. You'll hear examples and practice strategies that train you to read between the lines. CISSPs must be precise thinkers, and this episode ensures you don't miss points over semantics.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>CISSP exam questions often hinge on a single word that changes everything. In this episode, we examine how to interpret qualifiers like “best,” “first,” “most appropriate,” and “least likely.” We explain what each prompt is asking you to consider—whether it’s prioritization, sequencing, or judgment—and how to choose the answer that aligns with ISC2's expected mindset. You'll hear examples and practice strategies that train you to read between the lines. CISSPs must be precise thinkers, and this episode ensures you don't miss points over semantics.</p>]]>
      </content:encoded>
      <pubDate>Sat, 17 Jan 2026 13:32:01 -0600</pubDate>
      <author>Dr. Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/be129b65/4054626f.mp3" length="30473739" type="audio/mpeg"/>
      <itunes:author>Dr. Jason Edwards</itunes:author>
      <itunes:duration>761</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>CISSP exam questions often hinge on a single word that changes everything. In this episode, we examine how to interpret qualifiers like “best,” “first,” “most appropriate,” and “least likely.” We explain what each prompt is asking you to consider—whether it’s prioritization, sequencing, or judgment—and how to choose the answer that aligns with ISC2's expected mindset. You'll hear examples and practice strategies that train you to read between the lines. CISSPs must be precise thinkers, and this episode ensures you don't miss points over semantics.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISSP, certification, prepcast, bootcamp, education, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/be129b65/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
  </channel>
</rss>
