All Episodes

Displaying 1 - 20 of 83 in total

Episode 1 — Decode the GSLC Exam Structure, Question Style, Scoring, and Timing Strategy

This episode explains how the GSLC exam is built so you can align your preparation to what is actually measured, including the pace required to finish 115 questions in...

Episode 2 — Build a Spoken Study Plan: Indexing, Pacing, and Retake-Ready Habits

This episode helps you create a study plan that works for busy schedules and is optimized for an open-book GIAC exam environment, where printed notes and a strong inde...

Episode 3 — Command Core Cryptography Vocabulary Leaders Must Use With Precision

This episode builds the cryptography vocabulary that leaders must use accurately to make sound decisions and communicate requirements without confusion, a frequent sou...

Episode 4 — Select Symmetric Encryption Algorithms Based on Speed, Use Case, and Risk

This episode focuses on symmetric encryption choices and the decision logic behind using fast shared-key cryptography for protecting data at rest and data in motion, a...

Episode 5 — Manage Keys Safely: Generation, Storage, Rotation, and Access Controls

This episode explains why key management is the deciding factor in whether encryption protects you or simply creates a false sense of safety, and it covers the full ke...

Episode 6 — Apply Public Key Cryptography for Identity, Exchange, and Secure Workflows

This episode teaches how public key cryptography enables secure exchange and identity assurance at scale, which is essential for modern authentication, secure communic...

Episode 7 — Explain Digital Signatures for Integrity, Nonrepudiation, and Trust Decisions

This episode explains digital signatures as a control for integrity and sender assurance, clarifying how signing differs from encryption so you can choose the correct ...

Episode 8 — Use Hashing Correctly for Integrity Checks and Tamper Detection

This episode covers cryptographic hashing as a one-way function used for integrity verification and tamper detection, and it clarifies where hashing is appropriate ver...

Episode 9 — Design Password Storage That Survives Breaches Using Modern Hash Strategies

This episode explains how to store passwords so that a database breach does not immediately become an account compromise event, focusing on modern hashing strategies a...

Episode 10 — Reinforce Crypto Decisions With Practical Threat Models and Failure Modes

This episode teaches how to make cryptography decisions using practical threat modeling so controls are matched to real attacker behaviors and operational failure mode...

Episode 11 — Lead Incident Response as a Lifecycle With Clear Roles and Authority

This episode teaches incident response as a managed lifecycle, emphasizing the leadership decisions that determine whether response is calm and effective or chaotic an...

Episode 12 — Build Triage Discipline: Severity, Scope, Impact, and Containment Priorities

This episode builds the triage discipline that separates high-performing response teams from noisy, reactive ones, and it reinforces the exam-relevant skill of priorit...

Episode 13 — Preserve Evidence Correctly: Chain of Custody, Logging, and Forensics Readiness

This episode focuses on preserving evidence so investigations remain credible and actionable, a key exam theme that connects incident response, monitoring, and governa...

Episode 14 — Coordinate Communications: Legal, PR, Executives, and Affected Stakeholders

This episode explains how to coordinate communications during security incidents so technical response is not undermined by confusion, contradictory messages, or prema...

Episode 15 — Run Containment Choices Without Breaking Business Operations or Safety

This episode teaches containment as a set of deliberate choices that must stop attacker progress while protecting critical operations, a leadership balancing act that ...

Episode 16 — Drive Eradication and Recovery With Verification, Monitoring, and Closure Criteria

This episode covers eradication and recovery as disciplined phases that restore trustworthy operations, not merely “getting systems back online,” and it emphasizes exa...

Episode 17 — Operationalize Lessons Learned Into Program Improvements and Reduced Recurrence

This episode shows how to turn incidents into measurable program improvements, a theme the certification exam often tests by asking how leaders prevent recurrence and ...

Episode 18 — Build Business Continuity Planning That Reflects Real Business Dependencies

This episode teaches business continuity planning as a practical map of what must keep working during disruption, focusing on dependencies and priorities that are comm...

Episode 19 — Design Disaster Recovery Targets: RTO, RPO, Testing, and Restoration Evidence

This episode explains disaster recovery targets and how leaders translate them into tested capabilities, reinforcing exam-critical definitions like RTO and RPO and the...

Episode 20 — Define SOC Mission and Scope That Matches Business Risk and Maturity

This episode defines what a Security Operations Center is supposed to accomplish and how to set mission and scope so the SOC delivers measurable value, a frequent cert...

Broadcast by