1. EachPod
EachPod
Certified - CompTIA CYSA+ Audio Course - Podcast

Certified - CompTIA CYSA+ Audio Course

The CYSA Audio Course is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.

Education Technology Courses
Update frequency
every day
Average duration
14 minutes
Episodes
130
Years Active
2025
Share to:
Episode 70: Multipurpose Tools for Advanced Analysts (Nmap, MSF, Recon-ng)

Episode 70: Multipurpose Tools for Advanced Analysts (Nmap, MSF, Recon-ng)

Some tools do it all—and analysts rely on them for everything from scanning to exploitation to open-source intelligence gathering. In this episode, we examine three powerful multipurpose tools: Nmap …

00:15:30  |   Tue 15 Jul 2025
Episode 69: Debugging Tools for Vulnerability Analysts

Episode 69: Debugging Tools for Vulnerability Analysts

Not every vulnerability is easy to spot—some require stepping into the execution environment itself. This episode introduces you to common debugging tools like Immunity Debugger and GNU Debugger (GDB…

00:14:49  |   Tue 15 Jul 2025
Episode 68: Vulnerability Scanners Explained (Nessus, OpenVAS)

Episode 68: Vulnerability Scanners Explained (Nessus, OpenVAS)

At the heart of vulnerability management lies automated vulnerability scanners—and few are more widely used than Nessus and OpenVAS. In this episode, we break down how these scanners work, what they …

00:14:06  |   Tue 15 Jul 2025
Episode 67: Web Application Scanning Tools

Episode 67: Web Application Scanning Tools

Web applications are among the most targeted assets in modern enterprises—and automated scanning tools are the first line of defense. In this episode, we take a close look at Burp Suite, ZAP (Zed Att…

00:15:01  |   Tue 15 Jul 2025
Episode 66: Network Scanning and Mapping Tools

Episode 66: Network Scanning and Mapping Tools

Understanding your network begins with visibility—and that visibility is powered by scanning and mapping tools. In this episode, we introduce key network discovery tools such as Angry IP Scanner and …

00:13:47  |   Tue 15 Jul 2025
Episode 65: Industry Frameworks for Vulnerability Management

Episode 65: Industry Frameworks for Vulnerability Management

Many vulnerability scanning strategies are guided by established frameworks. In this episode, we break down the most widely recognized standards referenced throughout the CySA+ exam and in real-world…

00:14:25  |   Tue 15 Jul 2025
Episode 64: Security Baseline Scanning Techniques

Episode 64: Security Baseline Scanning Techniques

Before you can identify deviations, you need a baseline. This episode focuses on how security baseline scans compare systems and configurations against established security policies and industry benc…

00:14:34  |   Tue 15 Jul 2025
Episode 63: Scanning Critical Infrastructure Systems (OT/ICS/SCADA)

Episode 63: Scanning Critical Infrastructure Systems (OT/ICS/SCADA)

Operational technology (OT) environments—such as industrial control systems (ICS) and SCADA platforms—pose unique challenges for vulnerability management. In this episode, we explore the risks of sca…

00:14:43  |   Tue 15 Jul 2025
Episode 62: Static vs. Dynamic Analysis Techniques

Episode 62: Static vs. Dynamic Analysis Techniques

Some vulnerabilities are embedded in code—others appear only at runtime. In this episode, we unpack the distinction between static and dynamic vulnerability analysis. You’ll learn how static analysis…

00:15:18  |   Tue 15 Jul 2025
Episode 61: Passive vs. Active Vulnerability Detection

Episode 61: Passive vs. Active Vulnerability Detection

Not all scanning involves direct interaction. In this episode, we explore the differences between passive and active vulnerability detection techniques. You'll learn how active scanning probes device…

00:15:07  |   Tue 15 Jul 2025
Episode 60: Credentialed vs. Non-Credentialed Scans

Episode 60: Credentialed vs. Non-Credentialed Scans

Credentials can change everything. In this episode, we explore the differences between credentialed and non-credentialed scans—and why access matters when identifying vulnerabilities accurately. You’…

00:14:28  |   Tue 15 Jul 2025
Episode 59: Agent-Based vs. Agentless Scanning

Episode 59: Agent-Based vs. Agentless Scanning

Should you deploy agents on every device, or scan remotely without them? In this episode, we compare agent-based and agentless vulnerability scanning approaches and explore their respective strengths…

00:14:48  |   Tue 15 Jul 2025
Episode 58: Internal vs. External Scanning Strategies

Episode 58: Internal vs. External Scanning Strategies

Where you scan from is just as important as what you’re scanning. This episode breaks down the difference between internal and external vulnerability scans—what each one reveals, why both are necessa…

00:14:43  |   Tue 15 Jul 2025
Episode 57: Vulnerability Scanning – Special Considerations

Episode 57: Vulnerability Scanning – Special Considerations

Not all scans are created equal. In this episode, we explore the many considerations that go into planning and executing a vulnerability scan without disrupting business operations. You’ll learn abou…

00:16:17  |   Tue 15 Jul 2025
Episode 56: Asset Discovery in the Wild

Episode 56: Asset Discovery in the Wild

Before you can scan for vulnerabilities, you need to know what assets you’re protecting. In this episode, we focus on the first step of the vulnerability management lifecycle: asset discovery. You’ll…

00:15:18  |   Tue 15 Jul 2025
Episode 55: Domain 2 Overview – Vulnerability Management in Practice

Episode 55: Domain 2 Overview – Vulnerability Management in Practice

Welcome to Domain 2: Vulnerability Management. In this foundational episode, we set the stage for everything you’ll learn in the coming sessions—from scanning tools and techniques to validation, prio…

00:15:20  |   Tue 15 Jul 2025
Episode 54: Single Pane of Glass: Visibility in the SOC

Episode 54: Single Pane of Glass: Visibility in the SOC

In complex environments, visibility is everything. But when your tools are spread across different dashboards and platforms, critical context can be lost. This episode introduces the concept of a “si…

00:14:54  |   Tue 15 Jul 2025
Episode 53: Integrating APIs and Plugins for Efficiency

Episode 53: Integrating APIs and Plugins for Efficiency

Modern security platforms rarely operate in silos. In this episode, we explore how APIs, webhooks, and plugins allow your tools to communicate—enabling integrations that speed up investigation, autom…

00:16:16  |   Tue 15 Jul 2025
Episode 52: Streamlining with SOAR and Threat Feed Enrichment

Episode 52: Streamlining with SOAR and Threat Feed Enrichment

Security Orchestration, Automation, and Response (SOAR) platforms help security teams move faster and more intelligently. In this episode, we go deeper into how SOAR solutions connect with your SIEM …

00:16:18  |   Tue 15 Jul 2025
Episode 51: Standardizing and Automating Security Processes

Episode 51: Standardizing and Automating Security Processes

Consistency is key in security operations, especially when teams are responding to high volumes of alerts under time pressure. In this episode, we dive into the benefits of standardizing and automati…

00:16:02  |   Tue 15 Jul 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Dr. Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.