1. EachPod

Certified: The Security+ Prepcast - Podcast

Certified: The Security+ Prepcast

Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence.

Created by cybersecurity author and educator Dr. Jason Edwards, this podcast is designed for learners who seek practical explanations, effective study strategies, and a structured path to certification. If you're serious about passing the Security+ exam—and launching your cybersecurity career—this podcast is your edge.

For a deeper study experience, grab a copy of Achieve CompTIA Security+ SY0-701 Exam Success by Dr. Jason Edwards. It’s the most concise and comprehensive Security+ guide available—built for busy professionals who want to pass the exam quickly and on their first attempt. You’ll also find additional resources, practice questions, and tools at BareMetalCyber.com.

Technology Training Education Courses
Update frequency
every day
Average duration
19 minutes
Episodes
221
Years Active
2025
Share to:
Episode 121: Vulnerability Identification Methods (Part 2) (Domain 4)

Episode 121: Vulnerability Identification Methods (Part 2) (Domain 4)

Continuing our exploration of how vulnerabilities are identified, this episode focuses on external and community-driven methods, including penetration testing, bug bounty programs, responsible disclo…

00:17:40  |   Sun 15 Jun 2025
Episode 120: Vulnerability Identification Methods (Part 1) (Domain 4)

Episode 120: Vulnerability Identification Methods (Part 1) (Domain 4)

Finding vulnerabilities before attackers do is a core function of modern cybersecurity, and this episode explores the technical methods used to identify them early and accurately. We begin with vulne…

00:18:25  |   Sun 15 Jun 2025
Episode 119: Data Retention and Secure Management Practices (Domain 4)

Episode 119: Data Retention and Secure Management Practices (Domain 4)

Data retention policies define what data must be kept, for how long, and under what security controls—and when they’re done right, they strike a balance between legal obligations, operational needs, …

00:18:15  |   Sun 15 Jun 2025
Episode 118: Secure Asset Disposal and Decommissioning (Domain 4)

Episode 118: Secure Asset Disposal and Decommissioning (Domain 4)

When assets reach the end of their lifecycle, they don’t just disappear—they become potential liabilities if not securely decommissioned. In this episode, we explore the processes and tools used for …

00:17:09  |   Sun 15 Jun 2025
Episode 117: Asset Monitoring and Tracking (Domain 4)

Episode 117: Asset Monitoring and Tracking (Domain 4)

Security begins with visibility, and that means knowing what devices, systems, and software exist within your environment at all times. In this episode, we dive into asset monitoring and tracking, em…

00:17:28  |   Sun 15 Jun 2025
Episode 116: Assignment, Ownership, and Classification (Domain 4)

Episode 116: Assignment, Ownership, and Classification (Domain 4)

To manage risk effectively, organizations must know what they own, who is responsible for it, and how critical it is—this is the basis of asset assignment, ownership, and classification. In this epis…

00:18:01  |   Sun 15 Jun 2025
Episode 115: Acquisition and Procurement Security (Domain 4)

Episode 115: Acquisition and Procurement Security (Domain 4)

Security doesn’t start when a system is installed—it begins during the procurement process. In this episode, we examine how secure acquisition strategies reduce long-term risk by vetting vendors, est…

00:17:53  |   Sun 15 Jun 2025
Episode 114: Isolation and Monitoring Techniques (Domain 4)

Episode 114: Isolation and Monitoring Techniques (Domain 4)

Isolation and monitoring form a defensive pairing that not only limits the spread of threats but enables rapid detection and response. In this episode, we discuss isolation technologies like sandboxi…

00:17:38  |   Sun 15 Jun 2025
Episode 113: Application Security Essentials (Domain 4)

Episode 113: Application Security Essentials (Domain 4)

Applications are often the most exposed layer of an organization’s attack surface, and defending them requires both proactive development practices and reactive protection mechanisms. In this episode…

00:18:19  |   Sun 15 Jun 2025
Episode 112: Advanced Wireless Security Techniques (Domain 4)

Episode 112: Advanced Wireless Security Techniques (Domain 4)

As wireless threats become more sophisticated, organizations must move beyond basic security measures and implement advanced techniques to protect access points and users. In this episode, we cover t…

00:18:49  |   Sun 15 Jun 2025
Episode 111: Securing Mobile Connectivity (Domain 4)

Episode 111: Securing Mobile Connectivity (Domain 4)

Mobile devices connect through a variety of channels—cellular networks, Wi-Fi, and Bluetooth—each with its own risks and requirements for secure operation. In this episode, we examine the vulnerabili…

00:19:37  |   Sun 15 Jun 2025
Episode 110: Securing Mobile Solutions (Domain 4)

Episode 110: Securing Mobile Solutions (Domain 4)

Mobile devices have become indispensable for productivity, but they also introduce unique security challenges due to their portability, connectivity, and often personal ownership. In this episode, we…

00:18:38  |   Sun 15 Jun 2025
Episode 109: Securing Wireless Networks (Part 1) (Domain 4)

Episode 109: Securing Wireless Networks (Part 1) (Domain 4)

Wireless networks offer convenience, but they also expand the attack surface by broadcasting connectivity beyond physical boundaries, making them inherently riskier than wired alternatives. In this e…

00:18:28  |   Sun 15 Jun 2025
Episode 108: Hardening Embedded Systems and IoT Devices (Domain 4)

Episode 108: Hardening Embedded Systems and IoT Devices (Domain 4)

Embedded systems and IoT devices often operate in environments where security is either underprioritized or extremely difficult to implement, making them prime targets for persistent threats. In this…

00:18:16  |   Sun 15 Jun 2025
Episode 107: Hardening Computing Resources (Part 2) (Domain 4)

Episode 107: Hardening Computing Resources (Part 2) (Domain 4)

Continuing our discussion on hardening, this episode shifts focus to cloud infrastructure, servers, and industrial systems—each of which requires a tailored approach based on operational roles, archi…

00:18:07  |   Sun 15 Jun 2025
Episode 106: Hardening Computing Resources (Part 1) (Domain 4)

Episode 106: Hardening Computing Resources (Part 1) (Domain 4)

Hardening is the practice of stripping down systems to only what they need to function securely, and this episode focuses on doing just that for mobile devices, workstations, switches, and routers. T…

00:18:51  |   Sun 15 Jun 2025
Episode 105: Secure Baselines and System Management (Domain 4)

Episode 105: Secure Baselines and System Management (Domain 4)

Establishing a secure baseline is one of the most fundamental—and often overlooked—steps in managing system security. In this episode, we explain how baselines define the minimum acceptable security …

00:22:33  |   Sun 15 Jun 2025
Episode 104: Introduction to Domain Four — Security Operations

Episode 104: Introduction to Domain Four — Security Operations

If Domains One through Three are about understanding the principles and design of cybersecurity, then Domain Four is about the actual day-to-day work that keeps systems secure. This is where cybersec…

00:17:29  |   Sun 15 Jun 2025
Episode 103: Power Resilience and Continuity (Domain 3)

Episode 103: Power Resilience and Continuity (Domain 3)

Without reliable power, even the most secure systems are at risk of failure—and in many environments, loss of power is both a security and safety issue. In this episode, we explore how power resilien…

00:17:06  |   Sun 15 Jun 2025
Episode 102: Data Recovery Techniques (Domain 3)

Episode 102: Data Recovery Techniques (Domain 3)

Backups are only half of the story—the other half is how effectively you can recover from them. In this episode, we focus on data recovery techniques that turn dormant backups into operational system…

00:27:17  |   Sun 15 Jun 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Dr. Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.