Rephonic
Artwork for CISSP Cyber Training Podcast

CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
CISSP Exam
Cybersecurity
Cryptography
CISSP Certification
API Security
Data Breaches
Account Provisioning
CISSP
Access Reviews
Credential Management
Cybersecurity Awareness Training
Remote Access Security
User Access Control
Role-Based Access Control (RBAC)
Risk Management
Software Development
Computer Incident Response Team
End-Of-Life Assets
Quantum Computing
Atlassian Confluence

Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translat... more

PublishesTwice weeklyEpisodes315Founded3 years ago
Number of ListenersCategories
EducationCourses

Listen to this Podcast

Artwork for CISSP Cyber Training Podcast

Latest Episodes

Send us a text

Check us out at:  www.cisspcybertraining.com/

Get access to 360 FREE CISSP Questions:  www.cisspcybertraining.com/offers/dzHKVcDB/checkout

Get access to my FREE CISSP Self-Study Essentials Videos:  www.cisspc... more

Send us a text

Ready to turn CISSP Domain 3.5 into practical moves you can deploy on Monday? We unpack how real SOC teams apply microsegmentation, identity-aware controls, and targeted inspection to crush lateral movement without dragging performanc... more

YouTube

Send us a text

A neighboring Wi‑Fi, a handful of stolen credentials, and a quiet leap into a high‑value network—the kind of pivot that sounds cinematic until you realize how practical it is. We unpack that playbook and turn it into concrete defenses... more

YouTube

Send us a text

One unauthenticated request should not be all it takes to compromise your app—but with React-To-Shell, that’s the reality many teams are facing. We unpack what this vulnerability hits across React server components and Next.js app rou... more

YouTube

Key Facts

Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Recent Guests

Clint Stevens
Founder of Phycyx, a cybersecurity consulting company
Phycyx
Episode: CCT Vendor 03: From Bomb Loader to Hacker - A Journey in Cybersecurity with Clint Steven (Phycyx.com)
Casey Rash
Cybersecurity professional with a background in military service and expertise in physical security solutions
Secure Passage
Episode: CCT Vendor 01: The Blurry Line: Where Physical Security Meets Cybersecurity - SecurePassage.com

Host

Shon Gerber
Shon Gerber is a seasoned cybersecurity expert with over 23 years of experience spanning corporate, government, and academic roles. He is a CISSP credential holder since 2009, sharing his extensive knowledge through actionable insights in the CISSP Cyber Training Podcast.

Reviews

4.5 out of 5 stars from 65 ratings
  • Awesome Stuff

    This podcast was essential in helping me pass the CISSP exam Shon is entertaining and explains everything so well. Thank you, Shon!

    Apple Podcasts
    5
    AndrewCISSP
    United Statesa month ago
  • Good content

    Good content and demonstration of the required mindset.

    My feedback would be please slow down your presentation, just sightly for accents and EASL listeners.

    Apple Podcasts
    5
    alex-swift
    Australia3 months ago
  • Great CISSP preparation course with lots of real-world connections!

    The CISSP Cyber Training helped me to pass the CISSP exam on the first try. Shon’s lectures include a lot of real-world connections which help learners understand various difficult cybersecurity concepts smoothly, especially in domains with less familiarity.

    Also, depending on the course package, students can have mentoring sessions with Shon who has abundant experience in cybersecurity and who can even help them with the endorsement process.

    Apple Podcasts
    5
    lscptz
    Japan7 months ago
  • Very informative Podcast

    I have been listening to your podcast over the past nine months while preparing for the CISSP exam, and I wanted to express my gratitude. Your clear and effective explanations of key concepts were incredibly helpful and played a significant role in my ability to pass the exam on my first attempt.

    Apple Podcasts
    5
    alithebest79
    United Kingdom7 months ago
  • Shon does a great job of breaking down topics for the CISSP exam and explaining them. He also highlights a recent cybersecurity news story and explains its relevance. Great podcast to listen to if you are studying for the CISSP exam. I used his material and passed on the first attempted at the 100 question mark! Highly recommend.

    Audible
    5
    Amazon Customer
    United States8 months ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Listeners appreciate the practical and actionable insights that make complex cybersecurity topics more understandable.
Critiques focus on pacing and delivery, suggesting improvements to make the content more engaging for diverse audiences.
The host's real-world anecdotes and expertise are repeatedly praised for enhancing the learning experience.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Talking Points

Recent interactions between the hosts and their guests.

CCT 307: Practice CISSP Questions - Security Policies and Procedures
Q: Which of the following is a challenge associated with implementing a zero trust security model?
Increased complexity is a challenge associated with implementing a zero trust security model.
CCT 307: Practice CISSP Questions - Security Policies and Procedures
Q: Which of the following is the best practice for managing privileged accounts?
Implementing least privilege access controls minimizes potential damage from an account compromise.
CCT 307: Practice CISSP Questions - Security Policies and Procedures
Q: Which of the following is a disadvantage of using single sign-on solution?
The main disadvantage is it reduces security, as it can expose a single point of failure.
CCT 307: Practice CISSP Questions - Security Policies and Procedures
Q: Which of the following is the best method for ensuring that employees are aware of and comply with the organization's security policies?
Providing security awareness training is the best method for ensuring that employees comply.
CCT 307: Practice CISSP Questions - Security Policies and Procedures
Q: Which of the following is a common weakness in the role-based access controls?
The common weakness in role-based access controls is overlapping roles or credential creep.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About CISSP Cyber Training Podcast

What is CISSP Cyber Training Podcast about and what kind of topics does it cover?

The series offers comprehensive training resources tailored to those preparing for the CISSP exam, integrating practical insights from the cybersecurity field. With a focus on diverse topics such as software development security, data protection measures, and compliance requirements, listeners gain a thorough understanding of critical concepts necessary for both the certification and everyday cybersecurity practices. Unique to this series is the combination of detailed exam prep content alongside real-world anecdotes from the host, who brings over two decades of industry experience, enriching the educational journey for aspiring cybersecurity professionals. Whether through practice questions or deep dives into specific domains, each episode... more

Where can I find podcast stats for CISSP Cyber Training Podcast?

Rephonic provides a wide range of podcast stats for CISSP Cyber Training Podcast. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to CISSP Cyber Training Podcast and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does CISSP Cyber Training Podcast get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for CISSP Cyber Training Podcast, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for CISSP Cyber Training Podcast?

Rephonic provides comprehensive predictive audience data for CISSP Cyber Training Podcast, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does CISSP Cyber Training Podcast have?

To see how many followers or subscribers CISSP Cyber Training Podcast has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to CISSP Cyber Training Podcast?

These podcasts share a similar audience with CISSP Cyber Training Podcast:

1. Cybersecurity Today
2. Cybersecurity Headlines
3. CyberWire Daily
4. Hacking Humans
5. Hacked

How many episodes of CISSP Cyber Training Podcast are there?

CISSP Cyber Training Podcast launched 3 years ago and published 315 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact CISSP Cyber Training Podcast?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for CISSP Cyber Training Podcast?

Rephonic pulls ratings and reviews for CISSP Cyber Training Podcast from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for CISSP Cyber Training Podcast?

Rephonic provides full transcripts for episodes of CISSP Cyber Training Podcast. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on CISSP Cyber Training Podcast?

Recent guests on CISSP Cyber Training Podcast include:

1. Clint Stevens
2. Casey Rash

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days