All Episodes
Certified: The ISC2 CC Audio Course (2026 Version) — 60 episodes
Episode 59 — Connect Controls Metrics Threats and Response into One Security Story
Episode 58 — Build Scenario Chains Across Security Principles Governance IAM Cloud and Operations
Episode 57 — Integrate Data Identity Network Cloud and Governance Decisions Together
Episode 56 — Essential Terms Plain Language Glossary for Core Cybersecurity Vocabulary
Episode 55 — Strengthen Operations and Incident Response Through Full Lifecycle Scenarios
Episode 54 — Recognize Physical Penetration Testing Through Phishing Tailgating and Impersonation
Episode 53 — Model Application Threats Before Weaknesses Become Security Events
Episode 52 — Assess Applications with Vulnerability Scanning Static and Dynamic Analysis
Episode 51 — Validate Readiness Using Blue Teaming Purple Teaming and Red Teaming
Episode 50 — Control Configuration and Change Management Without Creating New Risk
Episode 49 — Manage Asset Lifecycles Across End Of Life Software and Devices
Episode 48 — Rehearse Incident Response Exercises with Testing and Tabletop Thinking
Episode 47 — Implement Incident Response Plans Through Data Handling Policy Decisions
Episode 46 — Organize Adversary Behavior with Threat Frameworks and Repeatable Thinking
Episode 45 — Turn Cyber Threat Intelligence into Stronger Security Operations Decisions
Episode 44 — Profile Threat Actors by Type Motivation and Likely Behavior
Episode 43 — Triage AI Assisted SIEM Outputs and Prevent LLM Workspace Data Leakage
Episode 42 — Triage Security Events with Use Cases Prioritization and Correlation
Episode 41 — Monitor Logs and Security Events Without Missing Important Signals
Episode 40 — Explain Symmetric Asymmetric Hashing and Quantum Resistant Cryptography Clearly
Episode 39 — Protect Data Through Classification Labeling Masking Sanitization and Handling
Episode 38 — Apply Shared Security Models Across Roles Responsibilities and Boundaries
Episode 37 — Choose Cloud Deployment Models with Clear Security Tradeoff Thinking
Episode 36 — Compare Cloud Service Models SaaS PaaS IaaS and Responsibility Boundaries
Episode 35 — Understand Cloud Characteristics That Shape Security Expectations and Risk
Episode 34 — Secure AI Data Pathways with Segmentation Zero Trust and Protected Environments
Episode 33 — Layer Defense in Depth and Zero Trust into Architecture
Episode 32 — Design Segmentation with Firewall Zones VLANs and Micro-Segmentation
Episode 31 — Recognize Embedded Systems ICS and IoT Security Boundaries
Episode 30 — Secure Wireless Concepts Across Wi-Fi Bluetooth and Everyday Connections
Episode 29 — Interpret Firewalls Ports and Applications as Network Control Points
Episode 28 — Map OSI TCP IP IPv4 IPv6 and VPN Concepts Clearly
Episode 27 — Apply IAM Concepts Through Role Lifecycle and Access Scenarios
Episode 26 — Evaluate Access Control Models for Realistic Logical Control Choices
Episode 25 — Enforce Least Privilege and Separation of Duties in Daily Decisions
Episode 24 — Control AI Bots and Service Accounts Through Lifecycle and Least Privilege
Episode 23 — Compare IAM Frameworks and Tools Without Losing the Lifecycle View
Episode 22 — Deprovision Access Cleanly When Roles People or Systems Change
Episode 21 — Review Identity Access Regularly Before Privilege Drift Becomes Dangerous
Episode 20 — Provision Access with Lifecycle Control and Accountability in Mind
Episode 19 — Define Identity Roles Before Provisioning Decisions Create Access Risk
Episode 18 — Connect GRC Redundancy Awareness and Metrics into Practical Governance Thinking
Episode 17 — Measure Cybersecurity Effectiveness Using KRIs Dashboards Scorecards and Reports
Episode 16 — Defend Against Social Engineering with Password Protection and Phishing Awareness
Episode 15 — Shape Security Awareness Through Organizational Culture and Leadership
Episode 14 — Protect AI Continuity Through Dataset Backups Configuration Recovery and Model Drift
Episode 13 — Build Redundancy Thinking Around Business Continuity and Disaster Recovery
Episode 12 — Plan Governance Risk and Compliance with Purpose and Practical Tools
Episode 11 — Apply Security Principles Through Fast Scenario Based Decision Making
Episode 10 — Maintain Professional Conduct with Due Care Diligence and ISC2 Ethics
Episode 9 — Compare Technical Administrative and Physical Controls for Better Decisions
Episode 8 — Govern AI Adoption with Policies Laws Risk Appetite Transparency and Bias Awareness
Episode 7 — Map Regulations Laws Frameworks Guidelines Policies Standards Procedures ISO and CIS
Episode 6 — Navigate the Risk Management Lifecycle and Risk Management Processes
Episode 5 — Protect AI Integrity Privacy and Availability Against Model Poisoning Risks
Episode 4 — Connect Authentication Authorization Accounting Non Repudiation and Privacy in Practice
Episode 3 — Master Confidentiality Integrity and Availability as Your Security Compass
Episode 2 — Build Steady Pacing and Decision Habits for Adaptive Question Thinking
Episode 1 — Decode the 2026 CC Blueprint Structure and Spoken Learning Path
Welcome to the ISC2 CC Course!