Rephonic
Artwork for CISSP Cyber Training Podcast

CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
CISSP Exam
Cybersecurity
Cryptography
CISSP Certification
API Security
Data Breaches
Account Provisioning
CISSP
Credential Management
Access Reviews
Cybersecurity Awareness Training
Remote Access Security
User Access Control
Role-Based Access Control (RBAC)
Risk Management
Security Risks
Software Development
Computer Incident Response Team
End-Of-Life Assets
Quantum Computing

Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translat... more

PublishesTwice weeklyEpisodes340Founded3 years ago
Number of ListenersCategories
EducationCourses

Listen to this Podcast

Artwork for CISSP Cyber Training Podcast

Latest Episodes

Send us Fan Mail

A ransomware headline is easy to ignore until you realize it can shut down a factory line, break supplier networks, and trigger contract penalties that dwarf the original IT cleanup. We start with a real-world manufacturing case stu... more

Send us Fan Mail

Passing the CISSP is a huge win, but the part that quietly ends careers is what comes after: keeping the certification active. I walk you through how to submit ISC2 CPEs in a way that is accurate, defensible, and easy to repeat, so ... more

Send us Fan Mail

A cheap camera on a pole can become a surveillance pipeline, and that’s not a movie plot, it’s a real security problem. I start with a news-driven look at alleged CCTV espionage tied to critical infrastructure and why CISSP Domain 3... more

Send us Fan Mail

The fastest way to lose control of your security program is to ignore the systems that control everything else. I start with a timely CISA warning: attackers went after an endpoint management system, the kind of “one system that tou... more

Key Facts

Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

CISO Series Podcast
CISO Series PodcastDavid Spark, Mike Johnson, and Andy Ellis
CyberWire Daily
CyberWire DailyN2K Networks
Defense in Depth
Defense in DepthDavid Spark, Steve Zalewski, Geoff Belknap

Recent Guests

Clint Stevens
Founder of Phycyx, a cybersecurity consulting company
Phycyx
Episode: CCT Vendor 03: From Bomb Loader to Hacker - A Journey in Cybersecurity with Clint Steven (Phycyx.com)
Casey Rash
Cybersecurity professional with a background in military service and expertise in physical security solutions
Secure Passage
Episode: CCT Vendor 01: The Blurry Line: Where Physical Security Meets Cybersecurity - SecurePassage.com

Host

Shon Gerber
Host of the CISSP Cyber Training Podcast; extensive cybersecurity background and CISSP credentialholder since 2009

Reviews

4.6 out of 5 stars from 67 ratings
  • Awesome Stuff

    This podcast was essential in helping me pass the CISSP exam Shon is entertaining and explains everything so well. Thank you, Shon!

    Apple Podcasts
    5
    AndrewCISSP
    United States4 months ago
  • Good content

    Good content and demonstration of the required mindset.

    My feedback would be please slow down your presentation, just sightly for accents and EASL listeners.

    Apple Podcasts
    5
    alex-swift
    Australia6 months ago
  • Great CISSP preparation course with lots of real-world connections!

    The CISSP Cyber Training helped me to pass the CISSP exam on the first try. Shon’s lectures include a lot of real-world connections which help learners understand various difficult cybersecurity concepts smoothly, especially in domains with less familiarity.

    Also, depending on the course package, students can have mentoring sessions with Shon who has abundant experience in cybersecurity and who can even help them with the endorsement process.

    Apple Podcasts
    5
    lscptz
    Japan10 months ago
  • Very informative Podcast

    I have been listening to your podcast over the past nine months while preparing for the CISSP exam, and I wanted to express my gratitude. Your clear and effective explanations of key concepts were incredibly helpful and played a significant role in my ability to pass the exam on my first attempt.

    Apple Podcasts
    5
    alithebest79
    United Kingdom10 months ago
  • Shon does a great job of breaking down topics for the CISSP exam and explaining them. He also highlights a recent cybersecurity news story and explains its relevance. Great podcast to listen to if you are studying for the CISSP exam. I used his material and passed on the first attempted at the 100 question mark! Highly recommend.

    Audible
    5
    Amazon Customer
    United Statesa year ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Listeners appreciate real-world connections and mentoring options tied to training materials.
A few critiques mention promotional content can feel overbearing at times, but overall value for exam prep is high.
Mostly positive feedback on clarity and practical CISSP guidance, with some noting long intros as a drawback.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Talking Points

Recent interactions between the hosts and their guests.

CCT 331: AI And Cyber Insurance Risk & CISSP Deep Dive Questions (Domain 1)
Q: Question 2: Why does a cloud data breach still render the institution liable despite risk transfer via contract?
Because liability for protecting customer data cannot be fully transferred; the organization retains ultimate accountability for regulatory compliance even when outsourcing to cloud providers.
CCT 331: AI And Cyber Insurance Risk & CISSP Deep Dive Questions (Domain 1)
Q: Question 1: An organization is implementing a new data classification policy. Which security model best aligns with allowing data owners to determine how data should be protected?
Discretionary access controls, where data owners define access permissions for their resources, best aligns with empowering data owners rather than IT to determine protection measures.
CCT 327: Anthropic Claude Code Crashes Stocks - AI/LLM CISSP Questions
Q: Question 5: An ML engineer proposes federated learning across a hospital system; an architect raises concerns about privacy risk. Which risk is most likely threatened by gradient updates revealing patient data?
Re-identification of individual patients through gradient updates shared during training, which federated learning can expose, making differential privacy and careful auditing essential.
CCT 327: Anthropic Claude Code Crashes Stocks - AI/LLM CISSP Questions
Q: Question 4: Under the NIST AI RMF, evaluating whether AI outputs could disproportionately harm a protected class aligns with which core function?
Measure (the diagnosis and quantification of risk) is the correct function here, as it involves assessing potential harm to protected classes; other functions govern governance, mapping, or management of risks.
CCT 327: Anthropic Claude Code Crashes Stocks - AI/LLM CISSP Questions
Q: Question 3: A company uses a third-party language model API to power an internal legal document assistant. An attacker crafts a document that when summarized causes exfiltration to an external URL. Which vulnerability is being exploited?
Indirect prompt injection, where hidden instructions within the input cause the model to reveal information; other options involve training data poisoning, supply chain backdoors, or insecure deserialization which do not fit this scenario.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About CISSP Cyber Training Podcast

What is CISSP Cyber Training Podcast about and what kind of topics does it cover?

A practical CISSP-focused training program hosted by Shon Gerber that guides listeners through exam-style questions, domain deep-dives, and real-world security scenarios. Episodes consistently link concepts to business risk, budgeting, and governance, often pairing instruction with actionable study strategies and promotional content for training materials. The show stands out for its emphasis on applying CISSP knowledge to management and decision-making, not just theory, and for weaving AI, cloud, and vendor discussions into exam prep. This mix appeals to exam-focused learners who value structured practice, real-world relevance, and opportunities for mentoring or deeper dives through paid resources.

Where can I find podcast stats for CISSP Cyber Training Podcast?

Rephonic provides a wide range of podcast stats for CISSP Cyber Training Podcast. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to CISSP Cyber Training Podcast and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does CISSP Cyber Training Podcast get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for CISSP Cyber Training Podcast, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for CISSP Cyber Training Podcast?

Rephonic provides comprehensive predictive audience data for CISSP Cyber Training Podcast, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does CISSP Cyber Training Podcast have?

To see how many followers or subscribers CISSP Cyber Training Podcast has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to CISSP Cyber Training Podcast?

These podcasts share a similar audience with CISSP Cyber Training Podcast:

1. Cybersecurity Today
2. Cybersecurity Headlines
3. CISO Series Podcast
4. CyberWire Daily
5. Defense in Depth

How many episodes of CISSP Cyber Training Podcast are there?

CISSP Cyber Training Podcast launched 3 years ago and published 340 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact CISSP Cyber Training Podcast?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for CISSP Cyber Training Podcast?

Rephonic pulls ratings and reviews for CISSP Cyber Training Podcast from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for CISSP Cyber Training Podcast?

Rephonic provides full transcripts for episodes of CISSP Cyber Training Podcast. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on CISSP Cyber Training Podcast?

Recent guests on CISSP Cyber Training Podcast include:

1. Clint Stevens
2. Casey Rash

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days