1. EachPod
EachPod
Certified - CCSP Audio Course - Podcast

Certified - CCSP Audio Course

The Certified Cloud Security Professional (CCSP) Audio Course is your complete audio-first guide to mastering the world’s leading cloud security certification. Across dozens of structured episodes, we break down every CCSP exam domain, from cloud concepts and architecture to legal, risk, and compliance. Whether you are building foundational knowledge or sharpening advanced skills, this course helps you design, manage, and secure cloud environments with confidence. Learn at your own pace and get exam-ready with clear, vendor-neutral insights designed for today’s cloud security leaders.

Education Courses Technology
Update frequency
every day
Average duration
28 minutes
Episodes
99
Years Active
2025
Share to:
Episode 80 — Vulnerability Operations: Prioritization and Remediation at Scale

Episode 80 — Vulnerability Operations: Prioritization and Remediation at Scale

Vulnerability operations extend beyond scanning, focusing on how findings are prioritized, tracked, and remediated across thousands of resources. This episode covers how risk-based prioritization ens…

00:28:32  |   Mon 08 Sep 2025
Episode 79 — Configuration Management: Baselines and Continuous Compliance

Episode 79 — Configuration Management: Baselines and Continuous Compliance

Configuration management goes hand in hand with posture and change management, ensuring systems remain aligned with secure baselines. This episode discusses how baselines are established, how continu…

00:28:07  |   Mon 08 Sep 2025
Episode 78 — Change Management: Guardrails, Approvals and Exceptions

Episode 78 — Change Management: Guardrails, Approvals and Exceptions

Change management ensures that updates to cloud environments are controlled, predictable, and secure. In this episode, we explore how guardrails, approval workflows, and documented exceptions keep sy…

00:27:41  |   Mon 08 Sep 2025
Episode 77 — Forensics in Cloud: Acquisition, Chain of Custody and Tools

Episode 77 — Forensics in Cloud: Acquisition, Chain of Custody and Tools

Forensics in the cloud is complicated by lack of physical access, but it remains essential for investigations. This episode examines how evidence is acquired from cloud platforms, how chain of custod…

00:29:04  |   Mon 08 Sep 2025
Episode 76 — Incident Response: Cloud-Specific Triage and Containment

Episode 76 — Incident Response: Cloud-Specific Triage and Containment

Incident response in the cloud requires adapting traditional processes to dynamic, distributed environments. This episode covers how cloud-specific triage differs from on-premises, emphasizing challe…

00:22:04  |   Mon 08 Sep 2025
Episode 75 — SOAR Playbooks: Automation for Detection and Response

Episode 75 — SOAR Playbooks: Automation for Detection and Response

Security Orchestration, Automation, and Response (SOAR) platforms transform operations by codifying response actions into playbooks. This episode explains how triggers from SIEMs or monitoring system…

00:33:25  |   Mon 08 Sep 2025
Episode 74 — Cloud Posture Management: Misconfiguration Detection and Drift

Episode 74 — Cloud Posture Management: Misconfiguration Detection and Drift

Cloud Security Posture Management (CSPM) addresses one of the leading causes of breaches: misconfiguration. In this episode, we explore how CSPM tools automatically detect weaknesses, enforce baselin…

00:21:54  |   Mon 08 Sep 2025
Episode 73 — SIEM & Analytics: Ingesting and Correlating Cloud Telemetry

Episode 73 — SIEM & Analytics: Ingesting and Correlating Cloud Telemetry

Security Information and Event Management (SIEM) systems remain a cornerstone of security operations, but in the cloud, they must adapt to ingest vast amounts of telemetry from distributed sources. T…

00:21:02  |   Mon 08 Sep 2025
Episode 72 — Monitoring Strategies: Metrics, Logs and Traces in Cloud

Episode 72 — Monitoring Strategies: Metrics, Logs and Traces in Cloud

Effective monitoring is at the heart of cloud security operations, providing the visibility required to detect, analyze, and respond to threats. In this episode, we discuss monitoring strategies that…

00:22:56  |   Mon 08 Sep 2025
Episode 71 — Domain 5 Overview: Cloud Security Operations

Episode 71 — Domain 5 Overview: Cloud Security Operations

Domain 5 introduces the operational side of cloud security, where the focus shifts from architecture and design to the day-to-day activities that ensure systems remain secure, resilient, and complian…

00:24:18  |   Mon 08 Sep 2025
Episode 70 — Secure Delivery: Blue/Green, Canary and Rollback Safety

Episode 70 — Secure Delivery: Blue/Green, Canary and Rollback Safety

Delivery strategies determine how applications are released into production, and security must be considered at every step. In this episode, we compare blue/green deployments, canary releases, and ro…

00:22:24  |   Mon 08 Sep 2025
Episode 69 — DevSecOps: Pipelines, Gates and Automated Policy

Episode 69 — DevSecOps: Pipelines, Gates and Automated Policy

DevSecOps integrates security into every stage of the development and delivery process. This episode explains how pipelines enforce security gates, how automated policies validate code and infrastruc…

00:22:46  |   Mon 08 Sep 2025
Episode 68 — Configuration Management: Feature Flags and Secure Defaults

Episode 68 — Configuration Management: Feature Flags and Secure Defaults

Configuration management ensures that applications run consistently and securely across environments. In this episode, we explore how feature flags, environment variables, and default settings play c…

00:24:11  |   Mon 08 Sep 2025
Episode 67 — Containerized Apps: Image, Registry and Runtime Controls

Episode 67 — Containerized Apps: Image, Registry and Runtime Controls

Containers bundle applications and dependencies, but their security depends on careful control across the lifecycle. This episode examines how images are built, stored in registries, and deployed in …

00:24:20  |   Mon 08 Sep 2025
Episode 66 — Serverless Apps: Event Injection and Least Privilege Design

Episode 66 — Serverless Apps: Event Injection and Least Privilege Design

Serverless applications offer scalability and efficiency but bring unique risks. In this episode, we explore how event-driven models introduce vulnerabilities such as event injection, where malformed…

00:22:58  |   Mon 08 Sep 2025
Episode 65 — Runtime Protections: Behavior Monitoring and Application Shielding

Episode 65 — Runtime Protections: Behavior Monitoring and Application Shielding

Even well-tested applications face threats once deployed, making runtime protection essential. This episode covers technologies that monitor application behavior in real time, including runtime appli…

00:23:38  |   Mon 08 Sep 2025
Episode 64 — Dynamic & Interactive Testing: DAST and IAST in CI/CD

Episode 64 — Dynamic & Interactive Testing: DAST and IAST in CI/CD

Dynamic Application Security Testing (DAST) examines applications while they are running, simulating external attacks to uncover vulnerabilities that may not appear in source code. Interactive Applic…

00:24:58  |   Mon 08 Sep 2025
Episode 63 — Static Analysis: SAST Practices for Cloud Apps

Episode 63 — Static Analysis: SAST Practices for Cloud Apps

Static Application Security Testing (SAST) analyzes source code or binaries to identify vulnerabilities before software is deployed. In this episode, we explain how SAST fits into cloud application d…

00:24:34  |   Mon 08 Sep 2025
Episode 62 — Open-Source Dependencies: Risk Management and Updates

Episode 62 — Open-Source Dependencies: Risk Management and Updates

Modern applications rely heavily on open-source libraries and frameworks, which can accelerate innovation but also expand the attack surface. In this episode, we analyze the risks associated with ope…

00:26:41  |   Mon 08 Sep 2025
Episode 61 — Secrets in Code: Management and Injection Avoidance

Episode 61 — Secrets in Code: Management and Injection Avoidance

Embedding secrets directly in code is one of the most common and dangerous mistakes developers make. In this episode, we examine why hardcoding credentials, API keys, or tokens creates significant ri…

00:26:38  |   Mon 08 Sep 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.