1. EachPod

Certified: The Security+ Prepcast - Podcast

Certified: The Security+ Prepcast

Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence.

Created by cybersecurity author and educator Dr. Jason Edwards, this podcast is designed for learners who seek practical explanations, effective study strategies, and a structured path to certification. If you're serious about passing the Security+ exam—and launching your cybersecurity career—this podcast is your edge.

For a deeper study experience, grab a copy of Achieve CompTIA Security+ SY0-701 Exam Success by Dr. Jason Edwards. It’s the most concise and comprehensive Security+ guide available—built for busy professionals who want to pass the exam quickly and on their first attempt. You’ll also find additional resources, practice questions, and tools at BareMetalCyber.com.

Technology Training Education Courses
Update frequency
every day
Average duration
19 minutes
Episodes
221
Years Active
2025
Share to:
Episode 221: Developing and Executing Security Awareness Programs (Domain 5)

Episode 221: Developing and Executing Security Awareness Programs (Domain 5)

Security awareness programs don’t happen by accident—they’re built with intent, tested with feedback, and refined over time. In this final episode of the series, we walk through how to develop and ex…

00:18:41  |   Mon 16 Jun 2025
Episode 220: Security Reporting and Monitoring (Domain 5)

Episode 220: Security Reporting and Monitoring (Domain 5)

A well-informed workforce should be empowered not just to avoid risk—but to report it. In this episode, we explore how organizations build clear, accessible reporting channels that encourage employee…

00:18:01  |   Mon 16 Jun 2025
Episode 219: Hybrid and Remote Work Security Awareness (Domain 5)

Episode 219: Hybrid and Remote Work Security Awareness (Domain 5)

Remote and hybrid work models create new layers of security complexity—blending corporate environments with home networks, personal devices, and cloud-first workflows. In this episode, we explore the…

00:17:16  |   Mon 16 Jun 2025
Episode 218: User Guidance and Training (Part 3) (Domain 5)

Episode 218: User Guidance and Training (Part 3) (Domain 5)

Security training must evolve with the threat landscape—and that means addressing common but high-risk topics like removable media, social engineering, and operational security (OPSEC). In this episo…

00:17:32  |   Mon 16 Jun 2025
Episode 217: User Guidance and Training (Part 2) (Domain 5)

Episode 217: User Guidance and Training (Part 2) (Domain 5)

Beyond basic policy understanding, users need targeted training in key risk areas that attackers frequently exploit—especially insiders, passwords, and privileged access. In this episode, we focus on…

00:17:38  |   Mon 16 Jun 2025
Episode 216: User Guidance and Training (Part 1) (Domain 5)

Episode 216: User Guidance and Training (Part 1) (Domain 5)

Users are often the first and last line of defense in cybersecurity, and their success depends on clear guidance and ongoing training. In this episode, we focus on policy awareness and handbooks, whi…

00:17:33  |   Mon 16 Jun 2025
Episode 215: Anomalous Behavior Recognition (Domain 5)

Episode 215: Anomalous Behavior Recognition (Domain 5)

Cyber threats often hide in plain sight, masquerading as normal user activity until they trigger something unexpected—and that’s why recognizing anomalous behavior is such a valuable skill. In this e…

00:18:18  |   Mon 16 Jun 2025
Episode 214: Effective Phishing Awareness (Domain 5)

Episode 214: Effective Phishing Awareness (Domain 5)

Phishing remains one of the most effective—and dangerous—forms of cyberattack because it targets people, not systems. In this episode, we explore how to build an effective phishing awareness program …

00:18:17  |   Mon 16 Jun 2025
Episode 213: Reconnaissance Techniques (Domain 5)

Episode 213: Reconnaissance Techniques (Domain 5)

Reconnaissance is the first phase of any attack—and the first opportunity for defenders to detect malicious intent. In this episode, we break down both passive and active reconnaissance techniques us…

00:17:59  |   Mon 16 Jun 2025
Episode 212: Penetration Testing Environments (Domain 5)

Episode 212: Penetration Testing Environments (Domain 5)

The value of a penetration test is closely tied to how realistic the environment is—and in this episode, we examine the types of environments in which pen tests are conducted: known, partially known,…

00:17:25  |   Mon 16 Jun 2025
Episode 211: Fundamentals of Penetration Testing (Domain 5)

Episode 211: Fundamentals of Penetration Testing (Domain 5)

Penetration testing goes beyond identifying vulnerabilities—it simulates real-world attacks to see how systems, defenses, and teams hold up under pressure. In this episode, we explore the foundationa…

00:18:14  |   Mon 16 Jun 2025
Episode 210: External Audits and Assessments (Domain 5)

Episode 210: External Audits and Assessments (Domain 5)

External audits provide an independent review of an organization’s security and compliance posture, often driven by regulatory mandates, certification requirements, or contractual obligations. In thi…

00:18:40  |   Mon 16 Jun 2025
Episode 209: Internal Audit Structures (Domain 5)

Episode 209: Internal Audit Structures (Domain 5)

The effectiveness of internal audits depends not just on what’s reviewed, but on how the audit function is structured within the organization. In this episode, we examine audit committees—teams respo…

00:18:43  |   Mon 16 Jun 2025
Episode 208: Attestation and Internal Audits (Domain 5)

Episode 208: Attestation and Internal Audits (Domain 5)

Attestation and internal audits are two of the most powerful tools for ensuring your security program is functioning as intended. In this episode, we start by exploring attestation—formal declaration…

00:18:25  |   Mon 16 Jun 2025
Episode 207: Data Management and Compliance (Domain 5)

Episode 207: Data Management and Compliance (Domain 5)

Effective data management is critical for both operational success and regulatory compliance, and in this episode, we explore how organizations maintain control over what they collect, where it’s sto…

00:17:24  |   Mon 16 Jun 2025
Episode 206: Privacy and Legal Implications of Compliance (Domain 5)

Episode 206: Privacy and Legal Implications of Compliance (Domain 5)

Privacy and compliance are deeply intertwined, especially as global regulations push organizations to safeguard personal data across jurisdictions. In this episode, we examine how privacy laws operat…

00:20:19  |   Mon 16 Jun 2025
Episode 205: Data Inventory, Retention, and the Right to Be Forgotten (Domain 5)

Episode 205: Data Inventory, Retention, and the Right to Be Forgotten (Domain 5)

Managing personal data effectively starts with knowing exactly what you have, where it lives, how long you keep it, and what rights users have over it. In this final episode, we explore how to build …

00:18:43  |   Mon 16 Jun 2025
Episode 204: Privacy Laws and Global Compliance (Domain 5)

Episode 204: Privacy Laws and Global Compliance (Domain 5)

Data privacy is no longer just a legal issue—it’s a global business imperative, and this episode explores the complex and evolving landscape of privacy laws. We cover key regulations such as the Euro…

00:18:01  |   Mon 16 Jun 2025
Episode 203: Attestation and Acknowledgement in Compliance (Domain 5)

Episode 203: Attestation and Acknowledgement in Compliance (Domain 5)

Attestation and acknowledgement are critical for ensuring that individuals and third parties formally understand and accept their roles in maintaining security and compliance. In this episode, we exp…

00:19:08  |   Mon 16 Jun 2025
Episode 202: Consequences of Non-Compliance (Domain 5)

Episode 202: Consequences of Non-Compliance (Domain 5)

Failing to meet regulatory or contractual obligations can carry severe consequences, both financially and reputationally. In this episode, we break down the real-world impacts of non-compliance—inclu…

00:19:31  |   Mon 16 Jun 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Dr. Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.