1. EachPod

Certified: The Security+ Prepcast - Podcast

Certified: The Security+ Prepcast

Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence.

Created by cybersecurity author and educator Dr. Jason Edwards, this podcast is designed for learners who seek practical explanations, effective study strategies, and a structured path to certification. If you're serious about passing the Security+ exam—and launching your cybersecurity career—this podcast is your edge.

For a deeper study experience, grab a copy of Achieve CompTIA Security+ SY0-701 Exam Success by Dr. Jason Edwards. It’s the most concise and comprehensive Security+ guide available—built for busy professionals who want to pass the exam quickly and on their first attempt. You’ll also find additional resources, practice questions, and tools at BareMetalCyber.com.

Technology Training Education Courses
Update frequency
every day
Average duration
19 minutes
Episodes
221
Years Active
2025
Share to:
Episode 161: Benefits of Security Automation (Part 1) (Domain 4)

Episode 161: Benefits of Security Automation (Part 1) (Domain 4)

Security automation offers more than just saved time—it fundamentally transforms how teams operate by embedding consistency, speed, and scalability into their daily processes. In this episode, we cov…

00:27:28  |   Mon 16 Jun 2025
Episode 160: Continuous Integration and API Automation (Domain 4)

Episode 160: Continuous Integration and API Automation (Domain 4)

Security needs to move at the speed of development, and that’s where continuous integration (CI) and API-driven automation come in. In this episode, we explore how CI pipelines integrate security tes…

00:27:41  |   Mon 16 Jun 2025
Episode 159: Technical Debt in Automation (Domain 4)

Episode 159: Technical Debt in Automation (Domain 4)

As security teams automate more of their operations, they often accumulate technical debt—shortcuts, fragile code, or undocumented scripts that create long-term risk. In this episode, we explore how …

00:27:32  |   Mon 16 Jun 2025
Episode 158: Automation and Scripting in Security (Domain 4)

Episode 158: Automation and Scripting in Security (Domain 4)

In modern cybersecurity, manual processes can’t keep up with the scale and speed of threats—making automation and scripting essential for operational success. In this episode, we explore how security…

00:28:12  |   Mon 16 Jun 2025
Episode 157: Privileged Access Management (PAM) (Domain 4)

Episode 157: Privileged Access Management (PAM) (Domain 4)

Privileged accounts are the crown jewels of any IT environment, and their misuse—whether accidental or malicious—can lead to devastating breaches. This episode focuses on Privileged Access Management…

00:26:38  |   Mon 16 Jun 2025
Episode 156: Secure Password Management (Domain 4)

Episode 156: Secure Password Management (Domain 4)

Passwords continue to serve as a primary access method for many systems, and in this episode, we examine what secure password management really looks like—from user behavior to backend storage. We be…

00:28:56  |   Mon 16 Jun 2025
Episode 155: MFA Authentication Factors (Domain 4)

Episode 155: MFA Authentication Factors (Domain 4)

Multifactor authentication is only as strong as the diversity and reliability of the factors it uses. In this episode, we explore each authentication factor category in depth: something you know (suc…

00:26:44  |   Mon 16 Jun 2025
Episode 154: Multifactor Authentication (MFA) Implementations (Domain 4)

Episode 154: Multifactor Authentication (MFA) Implementations (Domain 4)

Multifactor Authentication (MFA) is one of the most effective ways to prevent unauthorized access, and in this episode, we break down how to implement it effectively across different environments. We…

00:25:03  |   Mon 16 Jun 2025
Episode 153: Advanced Access Controls and Least Privilege (Domain 4)

Episode 153: Advanced Access Controls and Least Privilege (Domain 4)

Access controls must go beyond static roles to enforce the principle of least privilege in real time, and this episode explores how to implement more advanced models that do just that. We cover conte…

00:25:07  |   Mon 16 Jun 2025
Episode 152: Access Control Models (Part 2) (Domain 4)

Episode 152: Access Control Models (Part 2) (Domain 4)

In this second installment on access control models, we focus on more adaptive and scalable approaches: Role-Based Access Control (RBAC), Rule-Based Access Control, and Attribute-Based Access Control…

00:23:17  |   Mon 16 Jun 2025
Episode 151: Access Control Models (Part 1) (Domain 4)

Episode 151: Access Control Models (Part 1) (Domain 4)

Access control models define who can access what, under which conditions—and in this episode, we begin our exploration with Mandatory Access Control (MAC) and Discretionary Access Control (DAC). MAC …

00:18:26  |   Mon 16 Jun 2025
Episode 150: Interoperability and Attestation (Domain 4)

Episode 150: Interoperability and Attestation (Domain 4)

As organizations adopt more diverse platforms, cloud services, and third-party integrations, the ability for systems to work together securely—known as interoperability—becomes mission-critical. In t…

00:21:57  |   Mon 16 Jun 2025
Episode 149: Single Sign-On (SSO) and Protocols (Domain 4)

Episode 149: Single Sign-On (SSO) and Protocols (Domain 4)

Single Sign-On (SSO) allows users to access multiple systems with a single set of credentials, enhancing both convenience and security when implemented with care. In this episode, we explain how SSO …

00:15:29  |   Mon 16 Jun 2025
Episode 148: Identity Proofing and Federation (Domain 4)

Episode 148: Identity Proofing and Federation (Domain 4)

Before you can secure access, you have to know who’s requesting it—and identity proofing ensures that the person behind a login is who they claim to be. In this episode, we explore identity proofing …

00:19:44  |   Mon 16 Jun 2025
Episode 147: User Account Provisioning and Permission Management (Domain 4)

Episode 147: User Account Provisioning and Permission Management (Domain 4)

Creating, modifying, and revoking user accounts may sound like routine IT work—but it’s a fundamental part of security control. In this episode, we examine account provisioning processes that align a…

00:16:41  |   Mon 16 Jun 2025
Episode 146: User Behavior Analytics (Domain 4)

Episode 146: User Behavior Analytics (Domain 4)

User Behavior Analytics (UBA) shifts the security paradigm from rules-based alerts to behavioral baselines, allowing defenders to spot anomalies that signal potential insider threats, account comprom…

00:16:16  |   Mon 16 Jun 2025
Episode 145: Network Access Control and Endpoint Protection (Domain 4)

Episode 145: Network Access Control and Endpoint Protection (Domain 4)

Controlling access at the point of connection is one of the most effective ways to prevent unauthorized entry, and in this episode, we explore the implementation of Network Access Control (NAC) and e…

00:16:06  |   Mon 16 Jun 2025
Episode 144: File Integrity Monitoring and Data Loss Prevention (Domain 4)

Episode 144: File Integrity Monitoring and Data Loss Prevention (Domain 4)

File Integrity Monitoring (FIM) and Data Loss Prevention (DLP) tools are essential for detecting tampering and protecting sensitive data from unauthorized exfiltration. In this episode, we explain ho…

00:16:59  |   Mon 16 Jun 2025
Episode 143: DNS Filtering and Email Security Enhancements (Domain 4)

Episode 143: DNS Filtering and Email Security Enhancements (Domain 4)

DNS and email are two of the most commonly exploited services in cyberattacks—and securing them requires layered, policy-driven controls. In this episode, we explore DNS filtering, which allows organ…

00:15:50  |   Mon 16 Jun 2025
Episode 142: Secure Protocol Implementation (Domain 4)

Episode 142: Secure Protocol Implementation (Domain 4)

Not all protocols are created equal—and using the wrong one can open a serious security hole in your environment. In this episode, we examine the implementation of secure communication protocols like…

00:17:13  |   Mon 16 Jun 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Dr. Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.