1. EachPod
EachPod
Certified - CCSP Audio Course - Podcast

Certified - CCSP Audio Course

The Certified Cloud Security Professional (CCSP) Audio Course is your complete audio-first guide to mastering the world’s leading cloud security certification. Across dozens of structured episodes, we break down every CCSP exam domain, from cloud concepts and architecture to legal, risk, and compliance. Whether you are building foundational knowledge or sharpening advanced skills, this course helps you design, manage, and secure cloud environments with confidence. Learn at your own pace and get exam-ready with clear, vendor-neutral insights designed for today’s cloud security leaders.

Education Courses Technology
Update frequency
every day
Average duration
28 minutes
Episodes
99
Years Active
2025
Share to:
Episode 40 — E-Discovery & Legal Holds: Cloud Storage Implications

Episode 40 — E-Discovery & Legal Holds: Cloud Storage Implications

E-Discovery and legal holds present unique challenges in the cloud, where data may be distributed across services and regions. This episode explains how organizations must preserve, collect, and prod…

00:37:58  |   Mon 08 Sep 2025
Episode 39 — Privacy by Design: Minimization, Consent and DPIAs

Episode 39 — Privacy by Design: Minimization, Consent and DPIAs

Privacy by design integrates data protection principles into every stage of system development. This episode covers key practices such as data minimization, consent management, and Data Protection Im…

00:27:30  |   Mon 08 Sep 2025
Episode 38 — Data Sovereignty: Residency, Localization and Transfer Controls

Episode 38 — Data Sovereignty: Residency, Localization and Transfer Controls

Where data resides can be just as important as how it is secured. This episode explores sovereignty issues, including residency requirements, localization mandates, and cross-border transfer controls…

00:28:49  |   Mon 08 Sep 2025
Episode 37 — Secure Data Deletion: Sanitization and Crypto-Erase in Cloud

Episode 37 — Secure Data Deletion: Sanitization and Crypto-Erase in Cloud

Secure deletion is essential to prevent residual data exposure when storage is repurposed or decommissioned. This episode explains sanitization methods, from overwriting and degaussing to crypto-eras…

00:28:07  |   Mon 08 Sep 2025
Episode 36 — Data Retention: Backup, Archival and Versioning in Cloud

Episode 36 — Data Retention: Backup, Archival and Versioning in Cloud

Retention policies dictate how long data must be preserved and in what form. This episode covers how cloud platforms implement backup, archival storage, and versioning features to meet these requirem…

00:27:44  |   Mon 08 Sep 2025
Episode 35 — Data Loss Prevention: Patterns, Policies and Tuning

Episode 35 — Data Loss Prevention: Patterns, Policies and Tuning

Data Loss Prevention (DLP) systems help prevent sensitive information from leaving controlled environments. In this episode, we describe how DLP works through pattern recognition, policy enforcement,…

00:28:16  |   Mon 08 Sep 2025
Episode 34 — Tokenization & Masking: Protecting Sensitive Fields

Episode 34 — Tokenization & Masking: Protecting Sensitive Fields

Tokenization and masking are techniques for reducing risk by substituting sensitive values with safe alternatives. This episode explains how tokenization preserves format for data such as credit card…

00:28:19  |   Mon 08 Sep 2025
Episode 33 — Access to Data: ABAC, RBAC and Least Privilege Enforcement

Episode 33 — Access to Data: ABAC, RBAC and Least Privilege Enforcement

Controlling access to data is as important as protecting it. This episode introduces Attribute-Based Access Control (ABAC), Role-Based Access Control (RBAC), and the principle of least privilege as a…

00:28:50  |   Mon 08 Sep 2025
Episode 32 — Key Management: KMS, HSM, BYOK and HYOK Considerations

Episode 32 — Key Management: KMS, HSM, BYOK and HYOK Considerations

Effective key management is critical to making encryption usable and trustworthy. In this episode, we dive into concepts such as Key Management Systems (KMS), Hardware Security Modules (HSMs), Bring …

00:27:14  |   Mon 08 Sep 2025
Episode 31 — Encryption in Use: Confidential Computing and Memory Protections

Episode 31 — Encryption in Use: Confidential Computing and Memory Protections

Encryption isn’t only about data at rest or in transit—today’s cloud technologies also secure data while it is being processed. This episode explains the emerging field of confidential computing, whe…

00:27:40  |   Mon 08 Sep 2025
Episode 30 — Data Protection: Encryption at Rest and In Transit

Episode 30 — Data Protection: Encryption at Rest and In Transit

Encryption is one of the strongest defenses in the cloud, and the CCSP exam devotes significant focus to it. In this episode, we explore encryption at rest and in transit, explaining how different al…

00:27:37  |   Mon 08 Sep 2025
Episode 29 — Data Classification: Sensitivity Labels and Handling Rules

Episode 29 — Data Classification: Sensitivity Labels and Handling Rules

Classification assigns value and handling requirements to data, and it’s central to both exam content and real-world practice. This episode explains the different levels of sensitivity, from public t…

00:26:49  |   Mon 08 Sep 2025
Episode 28 — Data Discovery: Catalogs and Classification at Scale

Episode 28 — Data Discovery: Catalogs and Classification at Scale

Data discovery is a critical step in understanding what information you hold and where it resides. In this episode, we discuss how discovery tools and catalogs are used to map data across complex clo…

00:27:44  |   Mon 08 Sep 2025
Episode 27 — Data Lifecycle: Create, Store, Use, Share, Archive and Destroy

Episode 27 — Data Lifecycle: Create, Store, Use, Share, Archive and Destroy

Understanding the data lifecycle is fundamental to managing information securely in the cloud. This episode walks through each stage—creation, storage, usage, sharing, archival, and destruction—expla…

00:29:00  |   Mon 08 Sep 2025
Episode 26 — Domain 2 Overview: Cloud Data Security

Episode 26 — Domain 2 Overview: Cloud Data Security

Domain 2 focuses on protecting data throughout its lifecycle. In this episode, we provide an overview of what the exam expects in this domain, from classification and labeling to encryption, key mana…

00:32:06  |   Mon 08 Sep 2025
Episode 25 — Governance & Design: Policies, Standards and Guardrails as Code

Episode 25 — Governance & Design: Policies, Standards and Guardrails as Code

Effective governance ensures that cloud adoption aligns with both security and business goals. This episode explores how policies, standards, and design guardrails are codified into the cloud environ…

00:29:29  |   Mon 08 Sep 2025
Episode 24 — Threat Modeling: Cloud-Specific Approaches and Patterns

Episode 24 — Threat Modeling: Cloud-Specific Approaches and Patterns

Threat modeling is a proactive practice for identifying risks before they become incidents. In this episode, we introduce cloud-specific approaches to threat modeling, including how to adapt methods …

00:30:22  |   Mon 08 Sep 2025
Episode 23 — Resilience by Design: Availability, Fault Tolerance and DR Patterns

Episode 23 — Resilience by Design: Availability, Fault Tolerance and DR Patterns

Cloud computing makes resilience both easier to achieve and more complex to manage. This episode focuses on designing for availability, fault tolerance, and disaster recovery from the start. We explo…

00:31:23  |   Mon 08 Sep 2025
Episode 22 — Network Architectures: Virtual Networks, Peering and Segmentation

Episode 22 — Network Architectures: Virtual Networks, Peering and Segmentation

Networking is at the heart of cloud security, and understanding its architecture is essential for success. This episode walks through how cloud platforms implement virtual networks, how peering conne…

00:33:55  |   Mon 08 Sep 2025
Episode 21 — Storage Models: Object, Block and File Design Considerations

Episode 21 — Storage Models: Object, Block and File Design Considerations

Cloud storage comes in several forms, each optimized for different use cases and each carrying unique security considerations. This episode explores the distinctions among object, block, and file sto…

00:34:09  |   Mon 08 Sep 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.