allfeeds.ai

 

CISSP Cyber Training Podcast - CISSP Training Program  

CISSP Cyber Training Podcast - CISSP Training Program

Author: Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable security strategies and tips that you can implement right away, giving you an edge in the cybersecurity realm. Tune in and take the reins of your cybersecurity journeylets ride into excellence together!
Be a guest on this podcast

Language: en

Genres: Courses, Education

Contact email: Get it

Feed URL: Get it

iTunes ID: Get it


Get all podcast data

Listen Now...

CCT 311: Practice CISSP Questions and AI In The SOC (Domain 3)
Episode 311
Thursday, 1 January, 2026

Send us a textReady to turn CISSP Domain 3.5 into practical moves you can deploy on Monday? We unpack how real SOC teams apply microsegmentation, identity-aware controls, and targeted inspection to crush lateral movement without dragging performance. Along the way, we demystify AI’s role: where detection engineering benefits from crisp use cases, how Tier 1 triage speeds up, and why models still need human oversight and rigorous validation to stay trustworthy.We also step through common network design traps that drain budgets and weaken defenses. VLAN sprawl looks tidy on paper but collapses under hybrid cloud dynamics. Central chokepoints promise control yet introduce latency and single failure domains. The smarter path is selective inline inspection where risk is highest, strong encryption everywhere else, and host-based enforcement that understands identity and context after decryption. If you’ve been tempted to collapse controls into one “do-everything” appliance, we lay out the hidden cost: a fragile core that turns into a single point of failure when you need it most.To ground the theory, we walk through scenario-style questions that mirror real decisions security leaders face: stopping east-west movement, balancing HA with inspection, drawing zero trust boundaries that don’t assume implicit trust, and enforcing policy on encrypted traffic. You’ll leave with patterns you can adapt immediately: start small, define use cases, validate outputs like code, and iterate with tight feedback loops. Whether you run a SOC, partner with an MSP, or are targeting a first-time CISSP pass, this conversation gives you a clear map from concept to control. If this helped, follow the show, share it with a teammate, and leave a quick review so others can find it too.Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

 

We also recommend:


From His Heart Ministries with Pastor Jeff Schreve - Audio
From His Heart Ministries

Learn French with daily podcasts

Up Close Research Talk Show

CAP SimLab
Joe Blalock

Animal Rights: The Abolitionist Approach Commentary
Gary L. Francione

The Language Mastery Show
John Fotheringham

Mcatforme Podcast - Free MCAT/Premed Advice Podcasts | Premed | MCAT | Advice
Eric: Mcatforme Tutor, Co-founder and Program Coordinator

JUST SAYY IT - Your S.T.O.R.Y. - Someone's Thoughts Of Remembering You... Does Matters
JUST SAYY IT

Filósofo de nuestra América. Dr. Leopoldo Zea
UNAM

FuErZa letelier
andalaosa

Healthy Conversations
andrew milne

Tucsan Real Estate Podcast with Kathy Vallee
Vallee Gold Team