CISSP Cyber Training Podcast - CISSP Training Program cover art

CISSP Cyber Training Podcast - CISSP Training Program

CISSP Cyber Training Podcast - CISSP Training Program

By: Shon Gerber vCISO CISSP Cybersecurity Consultant and Entrepreneur
Listen for free

About this listen

Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable security strategies and tips that you can implement right away, giving you an edge in the cybersecurity realm. Tune in and take the reins of your cybersecurity journey—let’s ride into excellence together! 🚀

© 2026 CISSP Cyber Training Podcast - CISSP Training Program
Education
Episodes
  • CCT 337: UK Manufacture Attacks - CISSP Deep Dive (Domain 4)
    Apr 2 2026

    Send us Fan Mail

    A ransomware headline is easy to ignore until you realize it can shut down a factory line, break supplier networks, and trigger contract penalties that dwarf the original IT cleanup. We start with a real-world manufacturing case study from the UK where cyber incidents are becoming routine, then zoom in on why revenue hits are so brutal in an industry that often runs on tight margins. The Jaguar Land Rover disruption adds a sobering lesson: a single breach can ripple outward into suppliers, logistics, and even wider economic impact.

    From there, we switch into CISSP Question Thursday with Domain 4 focused practice that sharpens how you think under exam pressure. We walk through a zero trust private cloud scenario and explain why microsegmentation with software-defined networking gives the most granular workload-to-workload control for stopping east-west lateral movement after a compromised web server. We also tackle the split tunnel VPN tradeoff that can turn an endpoint into a bridge for attackers, plus a legacy ARP weakness that opens the door to ARP spoofing and man-in-the-middle attacks.

    We round it out with high-value protocols and technologies you’re likely to see on the CISSP exam: DKIM for cryptographic email integrity and domain validation, WPA3’s SAE for stronger protection against offline dictionary attacks, and VXLAN in shared infrastructure where encryption is not provided by default and must be layered in with controls like IPsec or MACsec. If you’re studying communications and network security, this one connects technical decisions to real business risk. Subscribe, share with a study partner, and leave a review so more CISSP candidates can find the show.

    Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.

    Join now and start your journey toward CISSP mastery today!

    Show More Show Less
    33 mins
  • CCT 336 - Cyber Niche's and Submitting CPEs
    Mar 30 2026

    Send us Fan Mail

    Passing the CISSP is a huge win, but the part that quietly ends careers is what comes after: keeping the certification active. I walk you through how to submit ISC2 CPEs in a way that is accurate, defensible, and easy to repeat, so you never wake up to a renewal deadline panic. We talk real numbers too: 120 CPE credits per three-year cycle, a minimum of 40 each year, and the $125 annual maintenance fee that can sneak up on you if you are not watching your dashboard.

    Before we get into the portal clicks, I bring up an idea that matters for every cybersecurity professional: the hidden cost of cybersecurity specialisation. Specialising can raise your income and sharpen your value, but without broad context you can lose the big picture, mis-prioritise risk, over-rely on tools, and slow down detection and response. The goal is to build depth while staying fluent across the CISSP domains and the business realities those domains protect.

    Then we go step by step through CPE submission: choosing the right category (education, contributions, professional development, or unique work experience), understanding Group A vs Group B, selecting relevant CISSP domain areas, converting time into credit hours, and attaching supporting documentation that holds up during an ISC2 audit. I also share the most common mistakes that waste time, including waiting until the last minute, entering hours incorrectly, miscategorising activities, and failing to save proof for at least 12 months beyond your certification expiration date.

    If you want more practical CISSP training and a smoother CPE routine, subscribe, share this with a friend who is newly certified, and leave a review so more people can find the show.

    Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.

    Join now and start your journey toward CISSP mastery today!

    Show More Show Less
    26 mins
  • CCT 337: Indian CCTV and CISSP Question Deep Dive (Domain 3)
    Mar 26 2026

    Send us Fan Mail

    A cheap camera on a pole can become a surveillance pipeline, and that’s not a movie plot, it’s a real security problem. I start with a news-driven look at alleged CCTV espionage tied to critical infrastructure and why CISSP Domain 3 isn’t just theory. If you don’t know what devices are installed at your sites, what they record, and where that data goes, you can lose control of your environment long before an attacker ever touches your firewall.

    From there, I pivot into a focused Domain 3 question set that drills the kind of reasoning the CISSP exam rewards. We unpack why collapsing multiple security layers into one “highly capable” security appliance creates a single point of failure, and how defense in depth is really about independent layers, resilience, and clear risk acceptance. I also review classic security models, including the Bell-LaPadula lattice model and its “no read up, no write down” confidentiality rules, plus how it differs from integrity-focused Biba and the commercial Clark-Wilson approach.

    We then hit core security architecture and engineering concepts: the trusted computing base (TCB), what the reference monitor is, and why the security kernel is the component that implements it. On the crypto side, I explain why elliptic curve cryptography (ECC) is the best strength-to-key ratio choice for digital signatures on low-powered IoT devices. Finally, we cover database security threats like inference (and how it relates to aggregation), and wrap with a practical safety topic for data centers: Class C electrical fires and why CO2 or clean agents are preferred to protect hardware.

    Subscribe for weekly CISSP prep, share this with a study partner, and if it helped you think more clearly, leave a review so more candidates can find the show.

    Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.

    Join now and start your journey toward CISSP mastery today!

    Show More Show Less
    21 mins
All stars
Most relevant
Supposed it doesn't have more reviews. I've enjoyed listening, the subject can sometimes be dull or via other materials it can be but the host manages to spin it well. Recommend 👍

Free, informative and upbeat - what's not to love?

Something went wrong. Please try again in a few minutes.