CISSP Cyber Training Podcast - CISSP Training Program cover art

CISSP Cyber Training Podcast - CISSP Training Program

CISSP Cyber Training Podcast - CISSP Training Program

Written by: Shon Gerber vCISO CISSP Cybersecurity Consultant and Entrepreneur
Listen for free

About this listen

Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable security strategies and tips that you can implement right away, giving you an edge in the cybersecurity realm. Tune in and take the reins of your cybersecurity journey—let’s ride into excellence together! 🚀

© 2026 CISSP Cyber Training Podcast - CISSP Training Program
Education
Episodes
  • CCT 341: Deepfake Nudify (Wired) - CISSP Exam Practice Test (Deep Dive)
    Apr 16 2026

    Send us Fan Mail

    AI didn’t just make deepfakes easier. It made targeted sexual abuse scalable. I open with a Wired-reported reality that’s hitting schools worldwide: AI tools that can generate fake nude images from ordinary photos, spread through bots and subscription services, and leave students and families dealing with humiliation, harassment, and real trauma. If you’re a cybersecurity professional, this is a moment where your skills can protect your community, not just your company.

    I walk through concrete ways to help: offering free threat briefings to school districts, helping draft acceptable use and AI governance policies, adding mandatory reporting language, and building age-appropriate deepfake awareness training for staff and students. If you’re in threat intelligence, you can document and report active infrastructure. If you’re in GRC or vendor risk, you can push synthetic media controls and stronger AI governance. I also talk about incident response basics for schools: evidence collection, platform takedowns, and tabletop exercises that prepare teams for a fast-moving crisis.

    Then we pivot into CISSP exam prep with practical questions tied to today’s threats. We break down quantitative risk assessment (ALE, SLE, ARO) and how cost of mitigation drives the right response. We hit GDPR Article 22 and AI transparency, post-quantum cryptography for long-term retention, SSD sanitisation aligned to NIST 800-88 using cryptographic erasure, and zero trust in 5G edge networks using software-defined perimeter controls for least privilege IoT communications.

    Subscribe for weekly CISSP training, share this with someone who works with schools, and leave a review so more defenders can find it.

    Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.

    Join now and start your journey toward CISSP mastery today!

    Show More Show Less
    31 mins
  • CCT 340: Anthropic Mythos - Risk Management Concepts (Domain 1.10)
    Apr 13 2026

    Send us Fan Mail

    An AI model that can uncover thousands of zero-days and potentially chain multiple vulnerabilities into an automated exploit is not just a scary headline, it’s a stress test for every risk program on the planet. I open with what the Mythos news implies for real-world defense: attacker behavior may shift from human pace to machine speed, and many SIEM and EDR detections are still tuned for human patterns. That’s why we talk candidly about what security teams may need to do next, including tightening externally facing systems and moving faster toward a zero trust architecture.

    Then we pivot into CISSP Domain 1 risk management concepts, translating exam language into decisions you’ll actually make in a business. We define the core terminology like assets, threats, vulnerabilities, exposure, safeguards, attacks and breaches, then walk through control categories (technical, administrative, physical) and control types (preventive, detective, corrective, deterrent, recovery and compensating). If you’ve ever wondered why risk conversations go sideways, we also dig into the difference between risk appetite, risk capacity, and risk tolerance, and why you can’t set these without business leaders in the room.

    We also tackle quantitative risk analysis versus qualitative risk analysis, including CISSP formulas such as AV, EF, SLE, ARO and ALE, plus a critical reality check on “fake precision” and how to apply a cost-benefit analysis that holds up. Finally, we cover security control assessments, monitoring and measurement, building a risk register safely, and how maturity models and risk frameworks like CMMI, ISO 31000, NIST approaches, ISO 27005, COBIT, SABSA and PCI DSS fit into a defensible cybersecurity risk management program. Subscribe, share this with a CISSP study partner, and leave a review so more security pros can find the show.

    Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.

    Join now and start your journey toward CISSP mastery today!

    Show More Show Less
    41 mins
  • CCT 339: Infrastructure Insider - Cyber Career Roadmap - No One is Talking About
    Apr 9 2026

    Send us Fan Mail

    Check us out at: https://www.cisspcybertraining.com/

    Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout

    Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv


    A single disgruntled admin can do more damage with “normal” IT tools than many attackers can with malware, and that reality changes how we should think about both security and careers. I start with a true insider attack story where legitimate administrative access was used to lock out users, disrupt operations, and attempt extortion, then I break down the practical controls that reduce insider threat risk: least privilege, immutable backups, privileged activity alerting, and real segregation of duties.

    From there, I share the cybersecurity career roadmap most people never get. Instead of pushing everyone into the same crowded paths, I talk through high-demand roles with less competition, especially GRC (governance, risk, and compliance) and OT/ICS security. If you’re breaking into cyber, we cover how risk assessments, policy writing, audit coordination, and vendor risk management can become your unfair advantage, even with a non-traditional background. If you’re drawn to critical infrastructure, we dig into why IT plus OT security skills are rare, how to start learning SCADA and industrial environments, and why the salary upside is real.

    For mid-career and senior pros, we shift into what actually unlocks leadership: risk quantification, FAIR methodology, supply chain security, cloud security architecture, and speaking the language of the board through metrics and a risk register. If you want to move toward CISO or virtual CISO work, this is about becoming a business risk advisor, not just the person who runs tools. Subscribe, share this with a friend building their cyber career, and leave a review. What role are you aiming for next?

    Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.

    Join now and start your journey toward CISSP mastery today!

    Show More Show Less
    27 mins
All stars
Most relevant
not suitable if you're preparing for exam. too much personal and non relevant information. Avoid.

Only for casual listening

Something went wrong. Please try again in a few minutes.