All Episodes
Displaying 121 - 150 of 221 in total
Vulnerability Identification Methods (Part 2) (Domain 4)
Continuing our exploration of how vulnerabilities are identified, this episode focuses on external and community-driven methods, including penetration testing, bug bou...

System and Process Auditing (Domain 4)
Auditing is how security teams verify that controls are working, policies are being followed, and no one is operating outside expected behavior—and in this episode, we...

Vulnerability Analysis and Prioritization (Part 1) (Domain 4)
Once vulnerabilities are identified, the next challenge is determining which ones require immediate action—and that’s where vulnerability analysis and prioritization c...

Vulnerability Analysis and Prioritization (Part 2) (Domain 4)
Expanding on the concepts of vulnerability prioritization, this episode introduces industry-standard scoring and classification systems like CVSS (Common Vulnerability...

Vulnerability Response and Remediation (Part 1) (Domain 4)
Finding vulnerabilities is only useful if you have a plan to fix them—and this episode dives into the critical processes of response and remediation. We begin with pat...

Vulnerability Response and Remediation (Part 2) (Domain 4)
Not all vulnerabilities can be patched right away, and in these cases, compensating controls, segmentation, and exceptions become essential components of a realistic r...

Validation of Remediation Efforts (Domain 4)
Fixing a vulnerability doesn’t mean it’s gone—it means it needs to be verified. In this episode, we focus on the importance of validating remediation efforts to ensure...

Effective Vulnerability Reporting (Domain 4)
Clear, actionable reporting is the bridge between technical discovery and organizational response, and in this episode, we explore what makes vulnerability reports use...

Monitoring Computing Resources (Domain 4)
Monitoring is the heartbeat of any modern security operation, providing real-time visibility into systems, applications, and infrastructure. In this episode, we explor...

Key Security Monitoring Activities (Part 1) (Domain 4)
Monitoring is most valuable when it drives action, and in this episode, we explore foundational activities that turn data into defense—starting with log aggregation, a...

Key Security Monitoring Activities (Part 2) (Domain 4)
Beyond real-time alerting, monitoring supports long-term visibility, compliance, and forensics through disciplined reporting and archiving practices. In this episode, ...

Alert Response and Validation (Domain 4)
Alerts are only effective when they result in meaningful, timely responses—and this episode explores how organizations structure alert triage, validation, and remediat...

Security Monitoring Tools (Part 1) (Domain 4)
Choosing the right tools shapes how effectively you can detect, understand, and respond to threats. In this episode, we focus on foundational monitoring tools like the...

Security Monitoring Tools (Part 2) (Domain 4)
Building on our previous discussion, this episode explores more advanced and specialized monitoring tools—starting with Security Information and Event Management (SIEM...

Endpoint and Data Security Monitoring Tools (Domain 4)
Endpoints—laptops, desktops, mobile devices—are where most cyberattacks begin, making endpoint security monitoring a frontline defense. In this episode, we explore too...

Network-Based Monitoring Tools (Domain 4)
The network is where everything intersects—making it one of the most important vantage points for threat detection. In this episode, we examine key tools used for moni...

Vulnerability Scanning Tools and Practices (Domain 4)
Proactive security means finding and fixing weaknesses before attackers do, and vulnerability scanning is the tool that makes that possible at scale. In this episode, ...

Enhancing Firewall Capabilities (Domain 4)
Firewalls are often the first line of defense—but they’re only as effective as the rules, architecture, and tuning behind them. In this episode, we explore advanced fi...

Enhancing IDS/IPS Effectiveness (Domain 4)
Intrusion Detection and Prevention Systems (IDS/IPS) are powerful tools—but their effectiveness depends entirely on tuning, context, and visibility. In this episode, w...

Web Filtering and Content Security (Domain 4)
Web filtering and content security are essential for managing user behavior and blocking malicious or inappropriate content before it ever reaches the endpoint. In thi...

Operating System Security Enhancements (Domain 4)
The operating system is the beating heart of any computing device—and securing it properly lays the groundwork for all other defenses. In this episode, we focus on OS-...

Secure Protocol Implementation (Domain 4)
Not all protocols are created equal—and using the wrong one can open a serious security hole in your environment. In this episode, we examine the implementation of sec...

DNS Filtering and Email Security Enhancements (Domain 4)
DNS and email are two of the most commonly exploited services in cyberattacks—and securing them requires layered, policy-driven controls. In this episode, we explore D...

File Integrity Monitoring and Data Loss Prevention (Domain 4)
File Integrity Monitoring (FIM) and Data Loss Prevention (DLP) tools are essential for detecting tampering and protecting sensitive data from unauthorized exfiltration...

Network Access Control and Endpoint Protection (Domain 4)
Controlling access at the point of connection is one of the most effective ways to prevent unauthorized entry, and in this episode, we explore the implementation of Ne...

User Behavior Analytics (Domain 4)
User Behavior Analytics (UBA) shifts the security paradigm from rules-based alerts to behavioral baselines, allowing defenders to spot anomalies that signal potential ...

User Account Provisioning and Permission Management (Domain 4)
Creating, modifying, and revoking user accounts may sound like routine IT work—but it’s a fundamental part of security control. In this episode, we examine account pro...

Identity Proofing and Federation (Domain 4)
Before you can secure access, you have to know who’s requesting it—and identity proofing ensures that the person behind a login is who they claim to be. In this episod...

Single Sign-On (SSO) and Protocols (Domain 4)
Single Sign-On (SSO) allows users to access multiple systems with a single set of credentials, enhancing both convenience and security when implemented with care. In t...

Interoperability and Attestation (Domain 4)
As organizations adopt more diverse platforms, cloud services, and third-party integrations, the ability for systems to work together securely—known as interoperabilit...
