1. EachPod

Certified: The Security+ Prepcast - Podcast

Certified: The Security+ Prepcast

Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence.

Created by cybersecurity author and educator Dr. Jason Edwards, this podcast is designed for learners who seek practical explanations, effective study strategies, and a structured path to certification. If you're serious about passing the Security+ exam—and launching your cybersecurity career—this podcast is your edge.

For a deeper study experience, grab a copy of Achieve CompTIA Security+ SY0-701 Exam Success by Dr. Jason Edwards. It’s the most concise and comprehensive Security+ guide available—built for busy professionals who want to pass the exam quickly and on their first attempt. You’ll also find additional resources, practice questions, and tools at BareMetalCyber.com.

Technology Training Education Courses
Update frequency
every day
Average duration
19 minutes
Episodes
221
Years Active
2025
Share to:
Episode 41: Open Ports, Default Credentials, and Supply Chain Risks (Domain 2)

Episode 41: Open Ports, Default Credentials, and Supply Chain Risks (Domain 2)

Even the best-configured systems can fall victim to the most basic security oversights—like open ports and unchanged default passwords. In this episode, we focus on how these simple but dangerous mis…

00:20:09  |   Sun 15 Jun 2025
Episode 40: Network-Based Attack Surfaces (Domain 2)

Episode 40: Network-Based Attack Surfaces (Domain 2)

Your network is the digital highway that connects everything in your organization—and if not properly secured, it becomes the perfect path for attackers. In this episode, we explore the many ways tha…

00:20:10  |   Sun 15 Jun 2025
Episode 39: Vulnerable Systems, Software, and Devices (Domain 2)

Episode 39: Vulnerable Systems, Software, and Devices (Domain 2)

Many attacks succeed not because of advanced hacking techniques, but because of outdated, misconfigured, or unsupported systems that haven’t been properly maintained. This episode addresses the vulne…

00:18:26  |   Sun 15 Jun 2025
Episode 38: Image, File, and Voice-Based Threats (Domain 2)

Episode 38: Image, File, and Voice-Based Threats (Domain 2)

While emails and text messages are well-known vectors, attackers also exploit images, file attachments, and voice communication to bypass traditional security controls. In this episode, we explore st…

00:20:37  |   Sun 15 Jun 2025
Episode 37: Message-Based and Communication Threat Vectors (Domain 2)

Episode 37: Message-Based and Communication Threat Vectors (Domain 2)

Attackers frequently exploit messaging channels—email, SMS, and instant messaging—to deliver payloads, harvest credentials, or manipulate users into making harmful decisions. In this episode, we expl…

00:20:50  |   Sun 15 Jun 2025
Episode 36: Introduction to Threat Vectors and Attack Surfaces (Domain 2)

Episode 36: Introduction to Threat Vectors and Attack Surfaces (Domain 2)

Cybersecurity is not just about knowing your enemy—it’s about understanding the paths they take to reach you. This episode introduces threat vectors and attack surfaces, two essential concepts for id…

00:23:13  |   Sun 15 Jun 2025
Episode 35: Motivations Behind Cyber Attacks (Part 3) (Domain 2)

Episode 35: Motivations Behind Cyber Attacks (Part 3) (Domain 2)

Not all cyberattacks are launched for money or politics—some are driven by emotion, chaos, or war. In this episode, we examine three additional motivations: revenge, disruption, and warfare. Revenge-…

00:16:57  |   Sun 15 Jun 2025
Episode 34: Motivations Behind Cyber Attacks (Part 2) (Domain 2)

Episode 34: Motivations Behind Cyber Attacks (Part 2) (Domain 2)

Cyber threats aren’t always driven by stealth or sophistication—sometimes they are fueled by money, ideology, or ethics. In this episode, we continue our exploration of attacker motivations by examin…

00:23:54  |   Sun 15 Jun 2025
Episode 33: Motivations Behind Cyber Attacks (Part 1) (Domain 2)

Episode 33: Motivations Behind Cyber Attacks (Part 1) (Domain 2)

Behind every cyberattack is a motive, and understanding why attackers do what they do is essential for predicting and preventing their behavior. This episode explores some of the most common motivati…

00:19:19  |   Sun 15 Jun 2025
Episode 32: Attributes and Capabilities of Threat Actors (Domain 2)

Episode 32: Attributes and Capabilities of Threat Actors (Domain 2)

To effectively model risk and defend systems, cybersecurity professionals must understand not just who the attackers are, but what they are capable of. In this episode, we analyze the key attributes …

00:13:55  |   Sun 15 Jun 2025
Episode 31: Insider Threats, Organized Crime, and Shadow IT (Domain 2)

Episode 31: Insider Threats, Organized Crime, and Shadow IT (Domain 2)

Some of the most damaging cybersecurity incidents originate not from unknown hackers, but from within—through employees, vendors, or unmanaged systems operating outside official channels. In this epi…

00:15:36  |   Sun 15 Jun 2025
Episode 30: Understanding Threat Actors (Domain 2)

Episode 30: Understanding Threat Actors (Domain 2)

Cyber threats come in many forms, and to defend effectively, you must understand the adversaries behind the attacks. This episode explores common categories of threat actors, including nation-state g…

00:14:59  |   Sun 15 Jun 2025
Episode 29: Introduction to Domain Two — Threats, Vulnerabilities, and Mitigations

Episode 29: Introduction to Domain Two — Threats, Vulnerabilities, and Mitigations

If Domain One is the foundation of cybersecurity—built on core principles and frameworks—then Domain Two is where we start applying that knowledge to real-world threats. This is the domain where you …

00:15:06  |   Sun 15 Jun 2025
Episode 28: Certificates, Authorities, and Management (Domain 1)

Episode 28: Certificates, Authorities, and Management (Domain 1)

Digital certificates are the backbone of online trust, providing the mechanism for authenticating websites, users, devices, and software in a secure, scalable manner. In this episode, we examine the …

00:15:32  |   Sun 15 Jun 2025
Episode 27: Advanced Cryptographic Techniques (Domain 1)

Episode 27: Advanced Cryptographic Techniques (Domain 1)

Modern threats require advanced cryptographic responses, and in this episode, we explore the techniques that strengthen authentication, protect weak credentials, and secure transactional data at scal…

00:16:13  |   Sun 15 Jun 2025
Episode 26: Hashing, Salting, and Digital Signatures (Domain 1)

Episode 26: Hashing, Salting, and Digital Signatures (Domain 1)

Data integrity and authenticity are two foundational pillars of cybersecurity, and in this episode, we explore how hashing, salting, and digital signatures help uphold both. Hashing generates a fixed…

00:14:53  |   Sun 15 Jun 2025
Episode 25: Obfuscation and Data Protection Techniques (Domain 1)

Episode 25: Obfuscation and Data Protection Techniques (Domain 1)

While encryption is the gold standard for confidentiality, it’s not the only method for protecting sensitive information—especially in use cases like software development, privacy regulation, or frau…

00:15:56  |   Sun 15 Jun 2025
Episode 24: Cryptographic Hardware and Secure Storage (Domain 1)

Episode 24: Cryptographic Hardware and Secure Storage (Domain 1)

Software-based encryption can be effective, but for high-assurance environments, hardware-based cryptography adds critical layers of tamper resistance and performance optimization. This episode explo…

00:17:04  |   Sun 15 Jun 2025
Episode 23: Comprehensive Encryption Techniques (Domain 1)

Episode 23: Comprehensive Encryption Techniques (Domain 1)

Encryption is the most widely used method for ensuring data confidentiality, but its implementation must be tailored to the context in which data exists. In this episode, we break down the many forms…

00:17:14  |   Sun 15 Jun 2025
Episode 22: Introduction to Cryptography and PKI (Domain 1)

Episode 22: Introduction to Cryptography and PKI (Domain 1)

Cryptography is the bedrock of secure communication, and understanding its principles is essential for every cybersecurity professional. In this episode, we introduce core cryptographic concepts incl…

00:17:30  |   Sun 15 Jun 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Dr. Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.