1. EachPod
EachPod
Certified - CompTIA CYSA+ Audio Course - Podcast

Certified - CompTIA CYSA+ Audio Course

The CYSA Audio Course is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.

Education Technology Courses
Update frequency
every day
Average duration
14 minutes
Episodes
130
Years Active
2025
Share to:
Episode 90: Remote Code Execution (RCE) Threats

Episode 90: Remote Code Execution (RCE) Threats

Few vulnerabilities are as critical—or as devastating—as remote code execution. In this episode, we explore how RCE vulnerabilities allow attackers to run arbitrary code on target systems, often with…

00:14:59  |   Tue 15 Jul 2025
Episode 89: Server-Side Request Forgery (SSRF)

Episode 89: Server-Side Request Forgery (SSRF)

Some of the most dangerous requests come from inside the house. In this episode, we unpack Server-Side Request Forgery (SSRF), a vulnerability that allows attackers to trick a server into sending req…

00:14:59  |   Tue 15 Jul 2025
Episode 88: Identification and Authentication Failures

Episode 88: Identification and Authentication Failures

If attackers can bypass your login system, the rest of your defenses may not matter. In this episode, we explore identification and authentication failures such as broken login flows, weak password p…

00:14:28  |   Tue 15 Jul 2025
Episode 87: End-of-Life and Legacy Component Risk

Episode 87: End-of-Life and Legacy Component Risk

Running outdated software isn't just inconvenient—it’s dangerous. In this episode, we explore the risks posed by end-of-life (EOL) systems and unsupported components, which often lack vendor patches,…

00:13:36  |   Tue 15 Jul 2025
Episode 86: Security Misconfiguration Issues

Episode 86: Security Misconfiguration Issues

Even the strongest tools can be rendered useless by poor configuration. In this episode, we explore how security misconfigurations—ranging from default credentials and exposed directories to verbose …

00:14:15  |   Tue 15 Jul 2025
Episode 85: Insecure Design Patterns

Episode 85: Insecure Design Patterns

Not all vulnerabilities are bugs—some are architectural. In this episode, we explore the concept of insecure design, a growing concern recognized in recent OWASP rankings. You’ll learn how poor desig…

00:13:01  |   Tue 15 Jul 2025
Episode 84: Directory Traversal Vulnerabilities

Episode 84: Directory Traversal Vulnerabilities

When input isn’t properly restricted, users can end up accessing far more than intended. In this episode, we break down directory traversal vulnerabilities—flaws that allow attackers to manipulate fi…

00:14:09  |   Tue 15 Jul 2025
Episode 83: Cross-Site Request Forgery (CSRF)

Episode 83: Cross-Site Request Forgery (CSRF)

In this episode, we examine Cross-Site Request Forgery, or CSRF—a vulnerability that tricks authenticated users into executing unwanted actions on a web application. You’ll learn how attackers exploi…

00:15:18  |   Tue 15 Jul 2025
Episode 82: Injection Flaws Explained

Episode 82: Injection Flaws Explained

Injection vulnerabilities have been on the OWASP Top Ten for years—and for good reason. In this episode, we explain how SQL, command-line, and LDAP injection flaws allow attackers to manipulate input…

00:13:37  |   Tue 15 Jul 2025
Episode 81: Cryptographic Failures

Episode 81: Cryptographic Failures

When encryption fails, the consequences can be catastrophic. In this episode, we explore cryptographic failures—formerly called "Sensitive Data Exposure" in the OWASP Top Ten—and why they continue to…

00:14:30  |   Tue 15 Jul 2025
Episode 80: Broken Access Control Flaws

Episode 80: Broken Access Control Flaws

Access control determines who can do what—and when it breaks, attackers often find a clear path in. In this episode, we take a deep dive into broken access control vulnerabilities, one of the most se…

00:13:29  |   Tue 15 Jul 2025
Episode 79: Data Poisoning Risks

Episode 79: Data Poisoning Risks

When attackers manipulate training data or trusted inputs, they can corrupt the very systems meant to defend against them. In this episode, we explore data poisoning—a type of vulnerability where att…

00:13:45  |   Tue 15 Jul 2025
Episode 78: Overflow Vulnerabilities

Episode 78: Overflow Vulnerabilities

When a program doesn’t control how much data it processes, memory can be overwritten—and attackers can take control. In this episode, we explore the mechanics and consequences of overflow vulnerabili…

00:14:15  |   Tue 15 Jul 2025
Episode 77: Cross-Site Scripting Vulnerabilities (XSS)

Episode 77: Cross-Site Scripting Vulnerabilities (XSS)

Cross-site scripting, or XSS, is one of the most common and dangerous web application vulnerabilities. In this episode, we break down the three primary types—reflected, persistent, and DOM-based XSS—…

00:13:20  |   Tue 15 Jul 2025
Episode 76: Asset Value and Business Impact

Episode 76: Asset Value and Business Impact

Every vulnerability exists in the context of what it could damage—and that’s where asset valuation comes in. In this episode, we explore how security analysts assess the value of an asset and how tha…

00:13:44  |   Tue 15 Jul 2025
Episode 75: Weaponization and Exploitability Considerations

Episode 75: Weaponization and Exploitability Considerations

A vulnerability doesn’t become a threat until someone weaponizes it—and that’s when it becomes truly urgent. In this episode, we explore the concepts of exploitability and weaponization in depth. You…

00:14:18  |   Tue 15 Jul 2025
Episode 74: Context-Aware Vulnerability Analysis

Episode 74: Context-Aware Vulnerability Analysis

Sometimes the same vulnerability poses very different risks depending on the environment. This episode teaches you how to analyze vulnerabilities in context—a crucial CySA+ concept and a daily respon…

00:15:01  |   Tue 15 Jul 2025
Episode 73: Validating Scanner Results – Reducing False Positives and Negatives

Episode 73: Validating Scanner Results – Reducing False Positives and Negatives

Automated scanners are powerful—but they’re not perfect. In this episode, we explore the analyst’s role in validating scan results, filtering out false positives, and identifying dangerous false nega…

00:13:56  |   Tue 15 Jul 2025
Episode 72: Understanding CVSS and Scoring Vulnerabilities

Episode 72: Understanding CVSS and Scoring Vulnerabilities

Not all vulnerabilities are created equal—and CVSS helps quantify just how severe they are. In this episode, we provide an in-depth breakdown of the Common Vulnerability Scoring System (CVSS), which …

00:14:41  |   Tue 15 Jul 2025
Episode 71: Cloud Vulnerability Assessment Tools (Scout Suite, Prowler)

Episode 71: Cloud Vulnerability Assessment Tools (Scout Suite, Prowler)

The move to the cloud has redefined how organizations think about security—and how analysts perform assessments. In this episode, we explore cloud-native vulnerability assessment tools like Scout Sui…

00:14:37  |   Tue 15 Jul 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Dr. Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.