Certified: The GIAC GCCC Audio Course cover art

Certified: The GIAC GCCC Audio Course

Certified: The GIAC GCCC Audio Course

By: Jason Edwards
Listen for free

About this listen

GCCC is a control-first security course built for busy professionals who want practical mastery of the CIS Controls v8 and the real-world workflows that make them stick. You’ll learn how to inventory assets and software with confidence, harden configurations without breaking operations, manage vulnerabilities with proof-based closure, and turn logging into outcomes through centralized collection, correlation, and sustainable alerting. The course also covers malware defense as layered prevention plus rapid containment, data protection through classification, access boundaries, and safe retention, and recovery readiness with RPO/RTO planning, backup isolation, and restore testing. You’ll strengthen governance across identity and access management, change control, third-party risk, awareness programs that drive behavior change, incident response readiness and execution, and how to use testing results to improve controls over time. Every lesson stays exam-focused while keeping the emphasis on operational evidence, measurable effectiveness, and decision-making under pressure—so you’re not just memorizing terms, you’re learning how to run the controls in production with confidence.2026 Bare Metal Cyber Education
Episodes
  • Welcome to the GIAC GCCC Audio Course
    Feb 9 2026

    If you build, run, or defend systems for a living, you already know the truth: security isn’t one thing you do. It’s a chain of decisions—design, build, deploy, operate, recover—under real constraints.

    This 90-second trailer is for an audio course that treats cybersecurity like an operational discipline, not a buzzword. You’ll learn how to set recovery objectives that match business reality, protect backups like high-value targets, and prove recoverability with restore tests and closure evidence. You’ll hear how to harden the software lifecycle end-to-end, manage dependencies and patch weak components fast, and turn pen test findings into measurable control improvements instead of one-time cleanup. You’ll also get practical guidance for third-party risk, from due diligence through contract enforcement and continuous monitoring, and you’ll build incident response readiness that holds up under pressure—clear roles, reliable playbooks, and communications discipline.

    Every episode is designed for busy professionals: plain language, real-world decision points, and repeatable habits you can apply immediately.

    If you want security that actually survives production and incident reality, start here.

    Developed by BareMetalCyber.com.

    Show More Show Less
    1 min
  • Episode 59 — Validate resilience after fixes with retesting and durable closure evidence
    Feb 9 2026

    This final episode focuses on validating resilience after fixes, emphasizing retesting and durable closure evidence so improvements persist beyond a single remediation sprint. You’ll define retesting as confirming that exploited paths are no longer feasible and that compensating controls work as intended, then connect it to exam expectations about verification, continuous control validation, and defensible evidence. We’ll cover retesting methods such as targeted re-exploitation attempts, configuration verification, vulnerability rescans, and detection validation to ensure monitoring now catches the behaviors that previously slipped through. Real-world scenarios include confirming ransomware containment controls hold after segmentation changes, validating that privileged access controls prevent repeat abuse, and ensuring patch and hardening changes did not introduce new operational fragility. Troubleshooting includes partial fixes that leave alternate attack paths open, environment changes that invalidate earlier assumptions, and weak evidence practices that cannot demonstrate closure; you’ll learn how to document outcomes with timestamps, scope, artifacts, and follow-up checks so closure is credible and long-lasting. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Show More Show Less
    10 mins
  • Episode 58 — Translate pen test findings into remediation priorities and measurable control improvements
    Feb 9 2026

    This episode focuses on turning penetration test findings into remediation priorities and measurable improvements, because the real value of testing is how it strengthens controls and reduces future risk. You’ll define the difference between findings that show a specific vulnerability and findings that reveal systemic control gaps, then connect this to exam logic about prioritization, ownership, and verification. We’ll cover how to triage findings using exploitability, exposure, business impact, and control relevance, and how to convert results into work items with clear owners, deadlines, and success criteria. Real-world examples include addressing credential abuse paths by tightening privileged access and monitoring, fixing segmentation weaknesses that enabled lateral movement, and improving secure configuration baselines when default settings made exploitation easy. Troubleshooting includes remediation that treats symptoms without root cause, teams that dispute findings due to environment drift, and programs that close tickets without validating results; you’ll learn how to tie fixes to control statements, create evidence artifacts, and show measurable improvement over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

    Show More Show Less
    9 mins
No reviews yet