All Episodes
Displaying 1 - 20 of 55 in total
Welcome to Certified: The ISC(2) ISSEP Audio Course
Certified: The ISC(2) ISSEP Certification Audio Course is built for security professionals who already speak the language of systems and risk, and now need to prove th...
Episode 1 — Decode the ISSEP Exam Blueprint: timing, scoring, item types, rules
This episode breaks down how the ISSEP exam is structured so you can study with the test in mind instead of guessing what matters. We cover common item types, how time...
Episode 2 — Build a Listener-Only Study Strategy That Matches Every ISSEP Domain
This episode helps you build an audio-first study system that still covers the full ISSEP scope with discipline and traceability. We translate the exam domains into a ...
Episode 3 — Master Exam Tactics Without Memorizing: how to think like ISSEP
This episode focuses on how ISSEP questions reward systems-level reasoning, not memorized fact lists, and it teaches you a repeatable way to think through design decis...
Episode 4 — Exam Acronyms: High-Yield Audio Reference for Instant Recognition
This episode is a high-yield acronym refresher designed to reduce cognitive friction during the exam so you can focus on reasoning instead of decoding shorthand. We co...
Episode 5 — Essential Terms: Plain-Language Glossary for Fast Security Engineering Recall
This episode builds a plain-language glossary of security engineering terms that ISSEP expects you to use precisely, especially when questions hinge on small wording d...
Episode 6 — Apply Trust Concepts and Hierarchies to Real System Security Boundaries
This episode teaches trust as an engineering property you deliberately assign and continuously verify, not a vibe you assume because a component is “internal.” We defi...
Episode 7 — Connect Systems Engineering and Security Engineering Processes Without Gaps
This episode explains how security engineering should integrate into systems engineering so security requirements, design choices, and verification evidence stay conne...
Episode 8 — Use Structural Security Design Principles to Prevent Predictable Failure Modes
This episode focuses on structural design principles that reduce predictable security failures before you get to control lists or tooling choices. We define principles...
Episode 9 — Translate NIST and ISO 27001 Thinking into Practical Engineering Decisions
This episode bridges the gap between framework language and engineering action, so you can move from “we should” statements to system decisions that can be implemented...
Episode 10 — Execute Security Engineering Across Hardware, Software, and Data Lifecycles
This episode explains how security engineering changes as you move across hardware, software, and data lifecycles, and why treating them as one generic “system lifecyc...
Episode 11 — Choose Open, Proprietary, and Modular Design Concepts for Secure Outcomes
This episode explains how architectural choices like open versus proprietary approaches and modular versus tightly coupled designs change your security posture, your a...
Episode 12 — Work With Organizational Security Authorities to Drive Accountable Decisions
This episode focuses on how security engineering succeeds inside real governance structures, where multiple authorities influence risk decisions, approvals, and accoun...
Episode 13 — Engineer Governance and Compliance Into Systems Without Killing Delivery
This episode shows how to design governance and compliance as part of the system lifecycle so teams can move fast without creating unmanaged risk, a key theme in ISSEP...
Episode 14 — Integrate Security Tasks and Activities Into Any Development Methodology
This episode teaches how to embed security engineering into different delivery models, from traditional waterfall lifecycles to Agile and hybrid approaches, because th...
Episode 15 — Verify Security Requirements Continuously Across SDLC and Modern Delivery
This episode explains how security verification should be continuous and intentional, not a one-time event at the end of a project, and it connects verification discip...
Episode 16 — Select Assurance Methods Across Software, Hardware, Virtual, and Cloud Systems
This episode walks through assurance as the confidence you can justify, based on evidence, that security objectives are met across different technology types, which ma...
Episode 17 — Use SDLC and Model-Based Systems Engineering to Keep Security Traceable
This episode explains how SDLC practices and model-based systems engineering support traceability, consistency, and repeatable security decisions, which aligns directl...
Episode 18 — Participate in Project Management Processes Without Losing Security Intent
This episode shows how security engineers stay effective inside project management realities like schedules, scope changes, resource constraints, and stakeholder commu...
Episode 19 — Operationalize Configuration Management and Quality Assurance for Secure Systems
This episode covers configuration management and quality assurance as security-critical processes that prevent drift, reduce surprise behavior, and protect the integri...