1. EachPod

Certified: The Security+ Prepcast - Podcast

Certified: The Security+ Prepcast

Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence.

Created by cybersecurity author and educator Dr. Jason Edwards, this podcast is designed for learners who seek practical explanations, effective study strategies, and a structured path to certification. If you're serious about passing the Security+ exam—and launching your cybersecurity career—this podcast is your edge.

For a deeper study experience, grab a copy of Achieve CompTIA Security+ SY0-701 Exam Success by Dr. Jason Edwards. It’s the most concise and comprehensive Security+ guide available—built for busy professionals who want to pass the exam quickly and on their first attempt. You’ll also find additional resources, practice questions, and tools at BareMetalCyber.com.

Technology Training Education Courses
Update frequency
every day
Average duration
19 minutes
Episodes
221
Years Active
2025
Share to:
Episode 81: Firewalls and Security Gateways (Domain 3)

Episode 81: Firewalls and Security Gateways (Domain 3)

Firewalls are one of the oldest and most trusted tools in network defense, but today’s environments require more than just simple packet filtering. In this episode, we dive into the evolution of fire…

00:19:31  |   Sun 15 Jun 2025
Episode 80: Port Security and Authentication Protocols (Domain 3)

Episode 80: Port Security and Authentication Protocols (Domain 3)

Every port on your network is a potential doorway, and port security ensures those doors stay locked unless explicitly authorized. In this episode, we examine how technologies like 802.1X enforce por…

00:20:19  |   Sun 15 Jun 2025
Episode 79: Load Balancers and Sensors (Domain 3)

Episode 79: Load Balancers and Sensors (Domain 3)

Load balancers and network sensors are often associated with performance and visibility—but they are just as critical to your security architecture. In this episode, we explore how load balancers not…

00:19:24  |   Sun 15 Jun 2025
Episode 78: Device Attributes and Network Appliances (Domain 3)

Episode 78: Device Attributes and Network Appliances (Domain 3)

Security isn’t just about policies and firewalls—it’s also about the capabilities and placement of the physical and virtual devices enforcing them. In this episode, we explore key device attributes s…

00:20:27  |   Sun 15 Jun 2025
Episode 77: Connectivity and Failure Modes (Domain 3)

Episode 77: Connectivity and Failure Modes (Domain 3)

Connectivity powers modern organizations, but with it comes risk—especially when failure modes are not considered in the security design. In this episode, we explore what happens when devices or serv…

00:21:04  |   Sun 15 Jun 2025
Episode 76: Infrastructure Security Foundations (Domain 3)

Episode 76: Infrastructure Security Foundations (Domain 3)

Securing infrastructure starts with design decisions about where and how devices are placed, how data flows, and where trust boundaries begin and end. In this episode, we focus on device placement an…

00:21:32  |   Sun 15 Jun 2025
Episode 75: Architecture Security Considerations (Part 3) (Domain 3)

Episode 75: Architecture Security Considerations (Part 3) (Domain 3)

In this final installment on architectural considerations, we focus on risk transference, ease of recovery, and the practical realities of patch availability and compute resources. Risk transference …

00:21:33  |   Sun 15 Jun 2025
Episode 74: Architecture Security Considerations (Part 2) (Domain 3)

Episode 74: Architecture Security Considerations (Part 2) (Domain 3)

Responsiveness, scalability, and ease of deployment are three more pillars that heavily influence secure architecture decisions, especially in environments where adaptability is key. In this episode,…

00:21:37  |   Sun 15 Jun 2025
Episode 73: Architecture Security Considerations (Part 1) (Domain 3)

Episode 73: Architecture Security Considerations (Part 1) (Domain 3)

Designing secure systems means weighing a variety of architectural considerations, and in this episode, we begin by focusing on availability, resilience, and cost. We explain how availability is main…

00:20:19  |   Sun 15 Jun 2025
Episode 72: High Availability Architectures (Domain 3)

Episode 72: High Availability Architectures (Domain 3)

Availability is one of the core tenets of cybersecurity, and in mission-critical environments, downtime is simply not an option. In this episode, we focus on high availability (HA) architectures—desi…

00:20:47  |   Sun 15 Jun 2025
Episode 71: Specialized Architecture Models (Domain 3)

Episode 71: Specialized Architecture Models (Domain 3)

Some systems require specialized architectural models due to their operational roles, legacy constraints, or real-time performance needs. In this episode, we examine security implications for environ…

00:22:17  |   Sun 15 Jun 2025
Episode 70: On-Premises, Centralized, and Decentralized Architectures (Domain 3)

Episode 70: On-Premises, Centralized, and Decentralized Architectures (Domain 3)

Security must adapt to the architecture of the environment it protects, and that starts with understanding how infrastructure is organized. In this episode, we compare on-premises, centralized, and d…

00:20:43  |   Sun 15 Jun 2025
Episode 69: Network Infrastructure Security Models (Domain 3)

Episode 69: Network Infrastructure Security Models (Domain 3)

Modern networks are no longer simple, flat environments—they are segmented, layered, and increasingly software-defined. In this episode, we explore different infrastructure security models, beginning…

00:19:59  |   Sun 15 Jun 2025
Episode 68: Cloud Architecture and Responsibilities (Domain 3)

Episode 68: Cloud Architecture and Responsibilities (Domain 3)

Cloud computing changes the game for infrastructure design and security responsibility, requiring organizations to understand not just how services work—but who is accountable for securing them. In t…

00:21:28  |   Sun 15 Jun 2025
Episode 67: Introduction to Domain Three — Security Architecture

Episode 67: Introduction to Domain Three — Security Architecture

Cybersecurity isn’t just about stopping threats as they happen—it’s also about designing systems that are harder to attack in the first place. And that’s the focus of Domain Three: Security Architect…

00:20:06  |   Sun 15 Jun 2025
Episode 66: System Hardening Techniques (Part 3) (Domain 2)

Episode 66: System Hardening Techniques (Part 3) (Domain 2)

In the final part of our system hardening series, we tackle some of the most overlooked but impactful practices: disabling unnecessary ports and services, replacing default credentials, and removing …

00:21:11  |   Sun 15 Jun 2025
Episode 65: System Hardening Techniques (Part 2) (Domain 2)

Episode 65: System Hardening Techniques (Part 2) (Domain 2)

Continuing our exploration of system hardening, this episode focuses on host-based firewalls and intrusion prevention systems (HIPS), which defend individual devices by monitoring and controlling inb…

00:19:18  |   Sun 15 Jun 2025
Episode 64: System Hardening Techniques (Part 1) (Domain 2)

Episode 64: System Hardening Techniques (Part 1) (Domain 2)

System hardening is about reducing the attack surface by eliminating unnecessary features, closing open ports, and enforcing strict policies across endpoints, servers, and network devices. In this ep…

00:19:07  |   Sun 15 Jun 2025
Episode 63: Configuration Enforcement and Decommissioning (Domain 2)

Episode 63: Configuration Enforcement and Decommissioning (Domain 2)

Keeping systems secure isn’t just about building them right—it’s about making sure they stay that way, and knowing how to shut them down properly when they’re no longer needed. In this episode, we fo…

00:18:33  |   Sun 15 Jun 2025
Episode 62: Monitoring and Least Privilege (Domain 2)

Episode 62: Monitoring and Least Privilege (Domain 2)

Monitoring and the principle of least privilege are two complementary pillars of proactive cybersecurity, enabling both visibility and access limitation. In this episode, we discuss how effective mon…

00:20:45  |   Sun 15 Jun 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Dr. Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.