1. EachPod
EachPod
Certified - CCSP Audio Course - Podcast

Certified - CCSP Audio Course

The Certified Cloud Security Professional (CCSP) Audio Course is your complete audio-first guide to mastering the world’s leading cloud security certification. Across dozens of structured episodes, we break down every CCSP exam domain, from cloud concepts and architecture to legal, risk, and compliance. Whether you are building foundational knowledge or sharpening advanced skills, this course helps you design, manage, and secure cloud environments with confidence. Learn at your own pace and get exam-ready with clear, vendor-neutral insights designed for today’s cloud security leaders.

Education Courses Technology
Update frequency
every day
Average duration
28 minutes
Episodes
99
Years Active
2025
Share to:
Episode 60 — Identity for Apps: OAuth 2.0, OIDC and Token Handling

Episode 60 — Identity for Apps: OAuth 2.0, OIDC and Token Handling

Application identity is critical to securing interactions between services, users, and cloud providers. This episode covers OAuth 2.0 as the leading framework for delegated authorization, OpenID Conn…

00:24:07  |   Mon 08 Sep 2025
Episode 59 — API Security: Authentication, Authorization and Rate Limiting

Episode 59 — API Security: Authentication, Authorization and Rate Limiting

APIs are the glue of modern cloud applications, and their security is a top priority. In this episode, we explore how authentication and authorization work for APIs, highlighting practices such as OA…

00:23:47  |   Mon 08 Sep 2025
Episode 58 — Threat Modeling for Apps: Microservices and APIs

Episode 58 — Threat Modeling for Apps: Microservices and APIs

Applications today are increasingly built on microservices and APIs, and each component introduces potential vulnerabilities. This episode focuses on threat modeling at the application level, showing…

00:23:52  |   Mon 08 Sep 2025
Episode 57 — Secure SDLC: Requirements, Design and Verification in Cloud

Episode 57 — Secure SDLC: Requirements, Design and Verification in Cloud

The Secure Software Development Lifecycle (SDLC) provides the structure for building applications that remain resilient under attack. In this episode, we explore how secure requirements, design pract…

00:26:15  |   Mon 08 Sep 2025
Episode 56 — Domain 4 Overview: Cloud Application Security

Episode 56 — Domain 4 Overview: Cloud Application Security

Domain 4 shifts focus to application security, addressing how cloud-hosted and cloud-native applications are designed, built, and secured. This episode introduces the scope of the domain, including s…

00:26:23  |   Mon 08 Sep 2025
Episode 55 — Edge & Hybrid: Securing Cloud Gateways and On-Prem Links

Episode 55 — Edge & Hybrid: Securing Cloud Gateways and On-Prem Links

Cloud adoption rarely happens in isolation—most organizations operate hybrid models that bridge on-premises infrastructure with cloud services. In this episode, we explore the role of edge gateways, …

00:25:36  |   Mon 08 Sep 2025
Episode 54 — Backup & Recovery: Snapshots, Replication and DR in Cloud

Episode 54 — Backup & Recovery: Snapshots, Replication and DR in Cloud

Backup and recovery strategies have evolved dramatically in the cloud, where snapshots, replication, and disaster recovery services are built into most platforms. This episode explores these options …

00:25:55  |   Mon 08 Sep 2025
Episode 53 — Resilience Engineering: Auto-Scaling, Self-Healing and Chaos

Episode 53 — Resilience Engineering: Auto-Scaling, Self-Healing and Chaos

Resilience is more than availability; it is about designing systems that anticipate failure and adapt automatically. In this episode, we cover resilience engineering concepts such as auto-scaling, se…

00:28:09  |   Mon 08 Sep 2025
Episode 52 — Vulnerability Management: Scanning Cloud-Native Hosts

Episode 52 — Vulnerability Management: Scanning Cloud-Native Hosts

Vulnerability management remains a cornerstone of security, but in the cloud, it requires specialized tools and approaches. This episode examines how vulnerability scanning applies to cloud-native ho…

00:29:03  |   Mon 08 Sep 2025
Episode 51 — Logging Foundations: Control Plane and Data Plane Telemetry

Episode 51 — Logging Foundations: Control Plane and Data Plane Telemetry

Logging is one of the most critical enablers of visibility in the cloud, yet it is often misunderstood or underutilized. In this episode, we begin by distinguishing between control plane logs, which …

00:30:17  |   Mon 08 Sep 2025
Episode 50 — Software Supply Chain: Provenance, SBOMs and Signing

Episode 50 — Software Supply Chain: Provenance, SBOMs and Signing

Supply chain security has become one of the most urgent issues in cloud and IT. This episode explores how software provenance, Software Bills of Materials (SBOMs), and code-signing ensure integrity i…

00:30:59  |   Mon 08 Sep 2025
Episode 49 — Infrastructure as Code: Secure Templates and Policy Guardrails

Episode 49 — Infrastructure as Code: Secure Templates and Policy Guardrails

Infrastructure as Code (IaC) makes cloud environments reproducible and scalable, but insecure templates can replicate vulnerabilities at speed. This episode explains how to secure IaC through validat…

00:31:09  |   Mon 08 Sep 2025
Episode 48 — Secrets Management: Vaulting and Rotation for Infrastructure

Episode 48 — Secrets Management: Vaulting and Rotation for Infrastructure

Secrets such as passwords, tokens, and keys are among the most sensitive assets in cloud infrastructure. This episode examines best practices for managing secrets, including vaulting solutions, autom…

00:35:27  |   Mon 08 Sep 2025
Episode 47 — Identity Integration: Federated Access to Cloud Control Planes

Episode 47 — Identity Integration: Federated Access to Cloud Control Planes

Identity is the new perimeter in cloud, and integrating it correctly is critical. This episode explores federated identity, single sign-on, and the use of identity providers to manage access to cloud…

00:32:31  |   Mon 08 Sep 2025
Episode 46 — Network Controls: Segmentation, Firewalls and Microsegmentation

Episode 46 — Network Controls: Segmentation, Firewalls and Microsegmentation

Cloud networks are virtual, but the principles of segmentation remain as important as ever. In this episode, we cover traditional controls such as firewalls alongside modern practices like microsegme…

00:34:57  |   Mon 08 Sep 2025
Episode 45 — Serverless Platforms: Event Models and Security Controls

Episode 45 — Serverless Platforms: Event Models and Security Controls

Serverless computing abstracts away servers, but it does not remove security responsibilities. In this episode, we explain how serverless platforms work through event-driven models and highlight the …

00:34:53  |   Mon 08 Sep 2025
Episode 44 — Container Platforms: Orchestrator and Container Hardening

Episode 44 — Container Platforms: Orchestrator and Container Hardening

Containers have transformed application delivery by making software portable and efficient, but they introduce unique risks. This episode explores container platforms in depth, focusing on orchestrat…

00:35:20  |   Mon 08 Sep 2025
Episode 43 — Compute Workloads: Baselines, Patching and Golden Images

Episode 43 — Compute Workloads: Baselines, Patching and Golden Images

When deploying workloads in the cloud, consistency and control are vital. This episode examines the use of security baselines, patch management, and golden images as techniques for building strong co…

00:35:26  |   Mon 08 Sep 2025
Episode 42 — Virtualization Stack: Hypervisors, VM Security and Hardening

Episode 42 — Virtualization Stack: Hypervisors, VM Security and Hardening

Virtualization is the foundation of cloud computing, and understanding its stack is essential for both exam readiness and real-world practice. In this episode, we explore how hypervisors create isola…

00:37:56  |   Mon 08 Sep 2025
Episode 41 — Domain 3 Overview: Cloud Platform & Infrastructure Security

Episode 41 — Domain 3 Overview: Cloud Platform & Infrastructure Security

Domain 3 of the CCSP exam takes us into the technical backbone of the cloud: platforms and infrastructure. In this episode, we establish the scope of the domain, including compute, storage, networkin…

00:39:16  |   Mon 08 Sep 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.