Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence.
Created by cybersecurity author and educator Dr. Jason Edwards, this podcast is designed for learners who seek practical explanations, effective study strategies, and a structured path to certification. If you're serious about passing the Security+ exam—and launching your cybersecurity career—this podcast is your edge.
For a deeper study experience, grab a copy of Achieve CompTIA Security+ SY0-701 Exam Success by Dr. Jason Edwards. It’s the most concise and comprehensive Security+ guide available—built for busy professionals who want to pass the exam quickly and on their first attempt. You’ll also find additional resources, practice questions, and tools at BareMetalCyber.com.
Firewalls are one of the oldest and most trusted tools in network defense, but today’s environments require more than just simple packet filtering. In this episode, we dive into the evolution of fire…
Every port on your network is a potential doorway, and port security ensures those doors stay locked unless explicitly authorized. In this episode, we examine how technologies like 802.1X enforce por…
Load balancers and network sensors are often associated with performance and visibility—but they are just as critical to your security architecture. In this episode, we explore how load balancers not…
Security isn’t just about policies and firewalls—it’s also about the capabilities and placement of the physical and virtual devices enforcing them. In this episode, we explore key device attributes s…
Connectivity powers modern organizations, but with it comes risk—especially when failure modes are not considered in the security design. In this episode, we explore what happens when devices or serv…
Securing infrastructure starts with design decisions about where and how devices are placed, how data flows, and where trust boundaries begin and end. In this episode, we focus on device placement an…
In this final installment on architectural considerations, we focus on risk transference, ease of recovery, and the practical realities of patch availability and compute resources. Risk transference …
Responsiveness, scalability, and ease of deployment are three more pillars that heavily influence secure architecture decisions, especially in environments where adaptability is key. In this episode,…
Designing secure systems means weighing a variety of architectural considerations, and in this episode, we begin by focusing on availability, resilience, and cost. We explain how availability is main…
Availability is one of the core tenets of cybersecurity, and in mission-critical environments, downtime is simply not an option. In this episode, we focus on high availability (HA) architectures—desi…
Some systems require specialized architectural models due to their operational roles, legacy constraints, or real-time performance needs. In this episode, we examine security implications for environ…
Security must adapt to the architecture of the environment it protects, and that starts with understanding how infrastructure is organized. In this episode, we compare on-premises, centralized, and d…
Modern networks are no longer simple, flat environments—they are segmented, layered, and increasingly software-defined. In this episode, we explore different infrastructure security models, beginning…
Cloud computing changes the game for infrastructure design and security responsibility, requiring organizations to understand not just how services work—but who is accountable for securing them. In t…
Cybersecurity isn’t just about stopping threats as they happen—it’s also about designing systems that are harder to attack in the first place. And that’s the focus of Domain Three: Security Architect…
In the final part of our system hardening series, we tackle some of the most overlooked but impactful practices: disabling unnecessary ports and services, replacing default credentials, and removing …
Continuing our exploration of system hardening, this episode focuses on host-based firewalls and intrusion prevention systems (HIPS), which defend individual devices by monitoring and controlling inb…
System hardening is about reducing the attack surface by eliminating unnecessary features, closing open ports, and enforcing strict policies across endpoints, servers, and network devices. In this ep…
Keeping systems secure isn’t just about building them right—it’s about making sure they stay that way, and knowing how to shut them down properly when they’re no longer needed. In this episode, we fo…
Monitoring and the principle of least privilege are two complementary pillars of proactive cybersecurity, enabling both visibility and access limitation. In this episode, we discuss how effective mon…