Artwork

Conteúdo fornecido por Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.
Player FM - Aplicativo de podcast
Fique off-line com o app Player FM !

CCT 147: Practice CISSP Questions - Defense in Depth and Secure Defaults (D3.1.2-3)

17:27
 
Compartilhar
 

Manage episode 422217038 series 3464644
Conteúdo fornecido por Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.

Send us a Text Message.

What if your organization's data could be breached through an exposed API in your modem? Join me, Sean Gerber, in this week's CISSP Cyber Training Podcast as we unravel the hidden dangers of API connections and dive into the latest security flaws found in Cox modems. We'll also kick off our thrilling CISSP Question Thursday, tackling complex queries from domains 3.1.2 and 3.1.3. Plus, discover why AES-256 stands as the gold standard for cloud data encryption and how implementing custom APIs with complex database schemas can fortify abstraction and access controls within your systems.
In another gripping segment, we break down the pillars of network segmentation and data protection, showcasing their critical roles in crafting a robust cybersecurity framework. Understand the nuances of data hiding through network segmentation, the essentiality of encrypting data at every stage, and the profound impact of secure boot in maintaining system integrity. We also discuss the pitfalls of storing encryption keys on poorly secured servers and the vital function of hashing algorithms for software verification. Wrap up with a detailed exploration of the dual-edged sword of patching vulnerabilities, ensuring you leave equipped with actionable insights for your CISSP exam and your cybersecurity career.

Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

  continue reading

Capítulos

1. CISSP Cyber Training Podcast (00:00:00)

2. Network Segmentation and Data Protection (00:09:31)

3. Patching Vulnerabilities in CISSP Training (00:15:54)

152 episódios

Artwork
iconCompartilhar
 
Manage episode 422217038 series 3464644
Conteúdo fornecido por Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.

Send us a Text Message.

What if your organization's data could be breached through an exposed API in your modem? Join me, Sean Gerber, in this week's CISSP Cyber Training Podcast as we unravel the hidden dangers of API connections and dive into the latest security flaws found in Cox modems. We'll also kick off our thrilling CISSP Question Thursday, tackling complex queries from domains 3.1.2 and 3.1.3. Plus, discover why AES-256 stands as the gold standard for cloud data encryption and how implementing custom APIs with complex database schemas can fortify abstraction and access controls within your systems.
In another gripping segment, we break down the pillars of network segmentation and data protection, showcasing their critical roles in crafting a robust cybersecurity framework. Understand the nuances of data hiding through network segmentation, the essentiality of encrypting data at every stage, and the profound impact of secure boot in maintaining system integrity. We also discuss the pitfalls of storing encryption keys on poorly secured servers and the vital function of hashing algorithms for software verification. Wrap up with a detailed exploration of the dual-edged sword of patching vulnerabilities, ensuring you leave equipped with actionable insights for your CISSP exam and your cybersecurity career.

Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

  continue reading

Capítulos

1. CISSP Cyber Training Podcast (00:00:00)

2. Network Segmentation and Data Protection (00:09:31)

3. Patching Vulnerabilities in CISSP Training (00:15:54)

152 episódios

Todos os episódios

×
 
Loading …

Bem vindo ao Player FM!

O Player FM procura na web por podcasts de alta qualidade para você curtir agora mesmo. É o melhor app de podcast e funciona no Android, iPhone e web. Inscreva-se para sincronizar as assinaturas entre os dispositivos.

 

Guia rápido de referências