Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence.
Created by cybersecurity author and educator Dr. Jason Edwards, this podcast is designed for learners who seek practical explanations, effective study strategies, and a structured path to certification. If you're serious about passing the Security+ exam—and launching your cybersecurity career—this podcast is your edge.
For a deeper study experience, grab a copy of Achieve CompTIA Security+ SY0-701 Exam Success by Dr. Jason Edwards. It’s the most concise and comprehensive Security+ guide available—built for busy professionals who want to pass the exam quickly and on their first attempt. You’ll also find additional resources, practice questions, and tools at BareMetalCyber.com.
Continuing our discussion on backups, this episode explores encryption, snapshots, and backup lifecycle management—three critical components of a secure, efficient, and resilient backup system. Encry…
Backups form the last line of defense when everything else fails, and a good strategy turns potential disaster into a recoverable event. In this episode, we discuss core backup principles and best pr…
Preparation is only as good as its ability to withstand the unexpected, and resilience testing is how you find out whether your systems, processes, and people are truly ready. In this episode, we exp…
Even the most secure systems are useless if they can’t operate under pressure, and this episode explores the intersection of cybersecurity with business resilience through Continuity of Operations Pl…
Relying on a single technology stack or vendor can introduce systemic risk, and in this episode, we explore how platform diversity and multi-cloud strategies enhance both security and resilience. Pla…
Disaster recovery planning ensures that when critical infrastructure goes offline—whether due to cyberattack, natural disaster, or hardware failure—business operations can resume with minimal disrupt…
Security isn’t just about keeping attackers out—it’s also about keeping services running when they try to bring you down. In this episode, we examine high availability (HA) and resilience strategies …
In this final installment on data protection methods, we focus on segmentation and permission restrictions—two strategic approaches that limit both exposure and access. Segmentation involves dividing…
Beyond encryption, organizations have additional tools to secure data in contexts where usability, compliance, or performance requirements call for alternatives. In this episode, we explore hashing, …
Beyond encryption, organizations have additional tools to secure data in contexts where usability, compliance, or performance requirements call for alternatives. In this episode, we explore hashing, …
Protecting data effectively starts with strong core methods that control access and visibility, and in this episode, we focus on geographic restrictions and encryption as frontline tools. Geographic …
Where data physically resides has become a legal and operational priority for organizations operating in an increasingly globalized and regulated world. In this episode, we examine data sovereignty—t…
Data security isn’t just about what kind of data you’re protecting—it’s also about when and where that data is at any given time. In this episode, we explore the three states of data: at rest, in tra…
Building on the foundation from part one, this episode explores public and private data categories, the importance of policy-driven classification, and how to implement classification effectively acr…
Data classification provides the foundation for applying security controls based on risk and sensitivity, and in this episode, we examine the first part of a two-part discussion on classification str…
Not all data is meant for human eyes, and in cybersecurity, understanding the distinction between human-readable and non-human-readable data formats is vital for applying the right protection. This e…
Data is not monolithic—its classification and context determine how it should be secured. In this episode, we explore different types of data, including regulated data like personal health informatio…
Choosing the right security controls is not about applying everything—it’s about applying the right things, in the right places, at the right time. This episode guides you through the process of sele…
Traditional perimeter security isn’t enough in a world of mobile users, cloud resources, and third-party integrations. In this episode, we explore advanced secure access solutions, starting with Soft…
As remote work and distributed systems become the norm, securing communication across potentially hostile networks is more important than ever. In this episode, we explore secure communication method…