All Episodes

Displaying 61 - 80 of 119 in total

Episode 61 — Securing Data: Masking, Hashing, Filtering, Tokenization, Encryption, and Obfuscation (3.3)

This episode explains common methods used to protect data and how each method serves a different security purpose. Masking hides part of a value, such as showing only ...

Episode 62 — Data Protection Roles: Owner, Custodian, Steward, Operator, Controller, and Subprocessor (3.3)

This episode covers data protection roles and explains how responsibility is divided across people and organizations. A data owner is accountable for decisions about d...

Episode 63 — Data Handling, Geofencing, Lifecycle, Retention, Disposal, and Compliance (3.3)

This episode explains data handling across the full data lifecycle, from creation and collection through storage, use, sharing, retention, archival, and disposal. Stud...

Episode 64 — Resilience Sites: Hot, Warm, Cold, and Environmental Planning (3.4)

This episode explains hot, warm, and cold recovery sites and how they support resilience and disaster recovery planning. A hot site is ready for rapid failover with sy...

Episode 65 — Platform Diversity, Load Balancing, Clustering, Autoscaling, and High Availability (3.4)

This episode covers design methods that improve resilience and reduce single points of failure. Platform diversity can reduce the chance that one common flaw affects e...

Episode 66 — Power, Storage, Backups, Immutability, and Restoration Testing (3.4)

This episode explains resilience controls related to power, storage, backups, immutability, and recovery validation. Uninterruptible power supplies provide short-term ...

Episode 67 — Disaster Recovery and Business Continuity: Failover, Simulation, Parallel Processing, and Capacity Planning (3.4)

This episode explains the relationship between disaster recovery and business continuity. Disaster recovery focuses on restoring technology and data after disruption, ...

Episode 68 — Recovery Metrics: RTO, RPO, MTTR, and MTBF (3.4)

This episode explains four recovery and reliability metrics that frequently appear in Security+ questions. Recovery time objective defines the maximum acceptable time ...

Episode 69 — Mitigating Controls Overview: Segmentation, Access Control, Hardening, and Sandboxing (4.1)

This episode introduces mitigating controls as practical actions that reduce risk after threats, vulnerabilities, or exposures are identified. Segmentation limits move...

Episode 70 — Deception and Disruption: Honeypots, Honeynets, Honeyfiles, Honeytokens, and Canary Accounts (4.1)

This episode explains deception technologies that help detect, study, or slow attackers by presenting attractive fake targets or monitored artifacts. A honeypot is a d...

Episode 71 — Monitoring, MDM, Allow Lists, Block Lists, IDS, IPS, and WIPS (4.1)

This episode covers monitoring and access control technologies that help organizations identify suspicious behavior and reduce exposure. Monitoring provides visibility...

Episode 72 — Firewalls and Filtering: WAF, UTM, Layer 4/Layer 7, Rate Limiting, and DLP (4.1)

This episode compares firewall and filtering technologies by focusing on what each control is designed to inspect, block, or allow. Traditional firewalls often filter ...

Episode 73 — Endpoint and Network Access Control: EDR, XDR, Antivirus, Captive Portals, 802.1X, and Posture (4.1)

This episode explains how endpoint protection and network access control help determine whether a device should be trusted, monitored, restricted, or blocked. Antiviru...

Episode 74 — Repository, Application, and Code Security: Secrets Scanning, Input Validation, Secure Cookies, Static Analysis, and Code Signing (4.1)

This episode covers security controls that protect code, applications, and software repositories from preventable weaknesses. Secrets scanning detects exposed API keys...

Episode 75 — Email and OS Security: DMARC, SPF, DKIM, BIMI, Group Policy, and SELinux (4.1)

This episode explains email authentication and operating system security controls that help enforce trust and configuration standards. Sender Policy Framework helps id...

Episode 76 — Asset Management: Hardware, Software, and Data Life Cycle (4.2)

This episode introduces asset management as a security foundation for hardware, software, and data throughout their life cycles. Students should understand that organi...

Episode 77 — Planning, Procurement, Assignment, Tracking, Disposal, and Decommissioning (4.2)

This episode covers the asset lifecycle from planning and procurement through assignment, accounting, tracking, disposal, and decommissioning. Planning defines what th...

Episode 78 — Vulnerability Management Overview: Scanning, IPAM, CSPM, and Source Code Review (4.3)

This episode explains vulnerability management as a recurring operational process rather than a one-time scan. Vulnerability scanning identifies known weaknesses in sy...

Episode 79 — Prioritization: Severity, Business Impact, and Pen Test Report Review (4.3)

This episode teaches students how to prioritize vulnerabilities and penetration test findings using more than severity alone. Severity helps describe technical risk, b...

Episode 80 — Remediation, Verification, and Internal Reporting (4.3)

This episode explains what happens after a vulnerability or weakness has been identified and prioritized. Remediation may involve patching, configuration changes, disa...

Broadcast by