1. EachPod

Certified: The Security+ Prepcast - Podcast

Certified: The Security+ Prepcast

Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence.

Created by cybersecurity author and educator Dr. Jason Edwards, this podcast is designed for learners who seek practical explanations, effective study strategies, and a structured path to certification. If you're serious about passing the Security+ exam—and launching your cybersecurity career—this podcast is your edge.

For a deeper study experience, grab a copy of Achieve CompTIA Security+ SY0-701 Exam Success by Dr. Jason Edwards. It’s the most concise and comprehensive Security+ guide available—built for busy professionals who want to pass the exam quickly and on their first attempt. You’ll also find additional resources, practice questions, and tools at BareMetalCyber.com.

Technology Training Education Courses
Update frequency
every day
Average duration
19 minutes
Episodes
221
Years Active
2025
Share to:
Episode 101: Backup Strategies and Best Practices (Part 2) (Domain 3)

Episode 101: Backup Strategies and Best Practices (Part 2) (Domain 3)

Continuing our discussion on backups, this episode explores encryption, snapshots, and backup lifecycle management—three critical components of a secure, efficient, and resilient backup system. Encry…

00:16:24  |   Sun 15 Jun 2025
Episode 100: Backup Strategies and Best Practices (Part 1) (Domain 3)

Episode 100: Backup Strategies and Best Practices (Part 1) (Domain 3)

Backups form the last line of defense when everything else fails, and a good strategy turns potential disaster into a recoverable event. In this episode, we discuss core backup principles and best pr…

00:16:34  |   Sun 15 Jun 2025
Episode 99: Comprehensive Testing for Resilience (Domain 3)

Episode 99: Comprehensive Testing for Resilience (Domain 3)

Preparation is only as good as its ability to withstand the unexpected, and resilience testing is how you find out whether your systems, processes, and people are truly ready. In this episode, we exp…

00:16:49  |   Sun 15 Jun 2025
Episode 98: Continuity of Operations and Capacity Planning (Domain 3)

Episode 98: Continuity of Operations and Capacity Planning (Domain 3)

Even the most secure systems are useless if they can’t operate under pressure, and this episode explores the intersection of cybersecurity with business resilience through Continuity of Operations Pl…

00:17:39  |   Sun 15 Jun 2025
Episode 97: Platform Diversity and Multi-cloud Architecture (Domain 3)

Episode 97: Platform Diversity and Multi-cloud Architecture (Domain 3)

Relying on a single technology stack or vendor can introduce systemic risk, and in this episode, we explore how platform diversity and multi-cloud strategies enhance both security and resilience. Pla…

00:17:30  |   Sun 15 Jun 2025
Episode 96: Disaster Recovery Site Considerations (Domain 3)

Episode 96: Disaster Recovery Site Considerations (Domain 3)

Disaster recovery planning ensures that when critical infrastructure goes offline—whether due to cyberattack, natural disaster, or hardware failure—business operations can resume with minimal disrupt…

00:18:30  |   Sun 15 Jun 2025
Episode 95: High Availability and System Resilience (Domain 3)

Episode 95: High Availability and System Resilience (Domain 3)

Security isn’t just about keeping attackers out—it’s also about keeping services running when they try to bring you down. In this episode, we examine high availability (HA) and resilience strategies …

00:17:26  |   Sun 15 Jun 2025
Episode 94: Methods to Secure Data (Part 3) (Domain 3)

Episode 94: Methods to Secure Data (Part 3) (Domain 3)

In this final installment on data protection methods, we focus on segmentation and permission restrictions—two strategic approaches that limit both exposure and access. Segmentation involves dividing…

00:16:58  |   Sun 15 Jun 2025
Episode 93: Methods to Secure Data (Part 2) (Domain 3)

Episode 93: Methods to Secure Data (Part 2) (Domain 3)

Beyond encryption, organizations have additional tools to secure data in contexts where usability, compliance, or performance requirements call for alternatives. In this episode, we explore hashing, …

00:17:04  |   Sun 15 Jun 2025
Episode 92: Methods to Secure Data (Part 2) (Domain 3)

Episode 92: Methods to Secure Data (Part 2) (Domain 3)

Beyond encryption, organizations have additional tools to secure data in contexts where usability, compliance, or performance requirements call for alternatives. In this episode, we explore hashing, …

00:18:41  |   Sun 15 Jun 2025
Episode 91: Methods to Secure Data (Part 1) (Domain 3)

Episode 91: Methods to Secure Data (Part 1) (Domain 3)

Protecting data effectively starts with strong core methods that control access and visibility, and in this episode, we focus on geographic restrictions and encryption as frontline tools. Geographic …

00:19:11  |   Sun 15 Jun 2025
Episode 90: Data Sovereignty and Geolocation (Domain 3)

Episode 90: Data Sovereignty and Geolocation (Domain 3)

Where data physically resides has become a legal and operational priority for organizations operating in an increasingly globalized and regulated world. In this episode, we examine data sovereignty—t…

00:17:07  |   Sun 15 Jun 2025
Episode 89: General Data Considerations – States of Data (Domain 3)

Episode 89: General Data Considerations – States of Data (Domain 3)

Data security isn’t just about what kind of data you’re protecting—it’s also about when and where that data is at any given time. In this episode, we explore the three states of data: at rest, in tra…

00:19:02  |   Sun 15 Jun 2025
Episode 88: Data Classification Strategies (Part 2) (Domain 3)

Episode 88: Data Classification Strategies (Part 2) (Domain 3)

Building on the foundation from part one, this episode explores public and private data categories, the importance of policy-driven classification, and how to implement classification effectively acr…

00:18:35  |   Sun 15 Jun 2025
Episode 87: Data Classification Strategies (Part 1) (Domain 3)

Episode 87: Data Classification Strategies (Part 1) (Domain 3)

Data classification provides the foundation for applying security controls based on risk and sensitivity, and in this episode, we examine the first part of a two-part discussion on classification str…

00:18:35  |   Sun 15 Jun 2025
Episode 86: Human vs. Non-human Readable Data (Domain 3)

Episode 86: Human vs. Non-human Readable Data (Domain 3)

Not all data is meant for human eyes, and in cybersecurity, understanding the distinction between human-readable and non-human-readable data formats is vital for applying the right protection. This e…

00:17:35  |   Sun 15 Jun 2025
Episode 85: Data Types and Their Protection (Domain 3)

Episode 85: Data Types and Their Protection (Domain 3)

Data is not monolithic—its classification and context determine how it should be secured. In this episode, we explore different types of data, including regulated data like personal health informatio…

00:19:22  |   Sun 15 Jun 2025
Episode 84: Selecting Effective Security Controls (Domain 3)

Episode 84: Selecting Effective Security Controls (Domain 3)

Choosing the right security controls is not about applying everything—it’s about applying the right things, in the right places, at the right time. This episode guides you through the process of sele…

00:18:30  |   Sun 15 Jun 2025
Episode 83: Advanced Secure Access Solutions (Domain 3)

Episode 83: Advanced Secure Access Solutions (Domain 3)

Traditional perimeter security isn’t enough in a world of mobile users, cloud resources, and third-party integrations. In this episode, we explore advanced secure access solutions, starting with Soft…

00:19:48  |   Sun 15 Jun 2025
Episode 82: Secure Communication and Remote Access (Domain 3)

Episode 82: Secure Communication and Remote Access (Domain 3)

As remote work and distributed systems become the norm, securing communication across potentially hostile networks is more important than ever. In this episode, we explore secure communication method…

00:19:24  |   Sun 15 Jun 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Dr. Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.