1. EachPod

Certified: The Security+ Prepcast - Podcast

Certified: The Security+ Prepcast

Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence.

Created by cybersecurity author and educator Dr. Jason Edwards, this podcast is designed for learners who seek practical explanations, effective study strategies, and a structured path to certification. If you're serious about passing the Security+ exam—and launching your cybersecurity career—this podcast is your edge.

For a deeper study experience, grab a copy of Achieve CompTIA Security+ SY0-701 Exam Success by Dr. Jason Edwards. It’s the most concise and comprehensive Security+ guide available—built for busy professionals who want to pass the exam quickly and on their first attempt. You’ll also find additional resources, practice questions, and tools at BareMetalCyber.com.

Technology Training Education Courses
Update frequency
every day
Average duration
19 minutes
Episodes
221
Years Active
2025
Share to:
Episode 61: Patching and Encryption (Domain 2)

Episode 61: Patching and Encryption (Domain 2)

Patching and encryption are two of the most basic yet essential components of any security strategy—one protects against known vulnerabilities, the other safeguards data from unauthorized access. In …

00:16:00  |   Sun 15 Jun 2025
Episode 60: Application Allow Lists and Isolation (Domain 2)

Episode 60: Application Allow Lists and Isolation (Domain 2)

Controlling what software is allowed to run—and isolating it when needed—is a fundamental principle of endpoint security. In this episode, we examine application allow lists, which explicitly define …

00:20:47  |   Sun 15 Jun 2025
Episode 59: Segmentation and Access Control (Domain 2)

Episode 59: Segmentation and Access Control (Domain 2)

Network segmentation and access control are two of the most powerful tools for limiting the scope and impact of an attack, especially once a threat actor gains initial access. In this episode, we exp…

00:20:07  |   Sun 15 Jun 2025
Episode 58: General Indicators of Malicious Activity (Domain 2)

Episode 58: General Indicators of Malicious Activity (Domain 2)

Not every security breach begins with a smoking gun—many start with subtle shifts in system behavior that point to something being off. This episode explores general indicators of malicious activity,…

00:19:42  |   Sun 15 Jun 2025
Episode 57: Password Attack Indicators (Domain 2)

Episode 57: Password Attack Indicators (Domain 2)

Password attacks are among the most common initial access vectors, and recognizing their early indicators is key to stopping intrusions before they escalate. In this episode, we focus on signs of bru…

00:20:56  |   Sun 15 Jun 2025
Episode 56: Cryptographic Attack Indicators (Domain 2)

Episode 56: Cryptographic Attack Indicators (Domain 2)

Even strong encryption systems can be undermined by poor implementation, weak configurations, or direct cryptographic attacks—and recognizing the signs is vital. In this episode, we cover indicators …

00:20:49  |   Sun 15 Jun 2025
Episode 55: Application-Level Attack Indicators (Domain 2)

Episode 55: Application-Level Attack Indicators (Domain 2)

Applications are often targeted because they represent the gateway to sensitive data and services, and attackers leave behind subtle but detectable signs when they exploit them. In this episode, we l…

00:19:42  |   Sun 15 Jun 2025
Episode 54: Network-Based Indicators (Part 2) (Domain 2)

Episode 54: Network-Based Indicators (Part 2) (Domain 2)

Continuing our focus on network-based threats, this episode explores wireless-specific attacks and credential replay tactics that compromise network integrity and user accounts. Wireless threats ofte…

00:21:43  |   Sun 15 Jun 2025
Episode 53: Network-Based Indicators (Part 1) (Domain 2)

Episode 53: Network-Based Indicators (Part 1) (Domain 2)

The network is often where the first signs of an attack emerge—if you know what to look for. In this episode, we examine key indicators of network-based threats, starting with Distributed Denial-of-S…

00:19:55  |   Sun 15 Jun 2025
Episode 52: Physical Security Attacks and Indicators (Domain 2)

Episode 52: Physical Security Attacks and Indicators (Domain 2)

While cybersecurity often focuses on virtual threats, physical attacks on facilities, hardware, and access points remain a serious and sometimes overlooked risk. In this episode, we explore how physi…

00:20:45  |   Sun 15 Jun 2025
Episode 51: Indicators of Malware Attacks (Domain 2)

Episode 51: Indicators of Malware Attacks (Domain 2)

Malware comes in many forms—ransomware, spyware, trojans, worms—and each leaves behind unique indicators that can help defenders detect infections early and respond effectively. In this episode, we b…

00:21:15  |   Sun 15 Jun 2025
Episode 50: Understanding Zero-Day Vulnerabilities (Domain 2)

Episode 50: Understanding Zero-Day Vulnerabilities (Domain 2)

Zero-day vulnerabilities are software flaws that are unknown to the vendor and, critically, to defenders—giving attackers a window of opportunity to exploit systems with no available patch or signatu…

00:20:21  |   Sun 15 Jun 2025
Episode 49: Misconfiguration and Mobile Device Vulnerabilities (Domain 2)

Episode 49: Misconfiguration and Mobile Device Vulnerabilities (Domain 2)

Misconfiguration is one of the most common and preventable causes of security breaches, and mobile devices amplify this risk due to their ubiquity and inconsistent management. In this episode, we exa…

00:20:54  |   Sun 15 Jun 2025
Episode 48: Supply Chain and Cryptographic Vulnerabilities (Domain 2)

Episode 48: Supply Chain and Cryptographic Vulnerabilities (Domain 2)

Modern cybersecurity is deeply interconnected, and vulnerabilities in your vendors, partners, or third-party software can easily become vulnerabilities in your own environment. In this episode, we ex…

00:21:23  |   Sun 15 Jun 2025
Episode 47: Virtualization and Cloud-Specific Vulnerabilities (Domain 2)

Episode 47: Virtualization and Cloud-Specific Vulnerabilities (Domain 2)

Virtualization and cloud computing introduce powerful efficiencies—but they also open up new categories of vulnerabilities that traditional security models often fail to address. In this episode, we …

00:20:59  |   Sun 15 Jun 2025
Episode 46: Hardware and Firmware Vulnerabilities (Domain 2)

Episode 46: Hardware and Firmware Vulnerabilities (Domain 2)

Cybersecurity doesn’t stop at software—hardware and firmware vulnerabilities can offer attackers deep, long-term access to systems in ways that are difficult to detect and even harder to fix. In this…

00:20:24  |   Sun 15 Jun 2025
Episode 45: Operating System and Web-Based Vulnerabilities (Domain 2)

Episode 45: Operating System and Web-Based Vulnerabilities (Domain 2)

Operating systems and web applications form the backbone of IT infrastructure, and when left unpatched or misconfigured, they present rich targets for exploitation. In this episode, we look at vulner…

00:21:06  |   Sun 15 Jun 2025
Episode 44: Application-Level Vulnerabilities (Domain 2)

Episode 44: Application-Level Vulnerabilities (Domain 2)

Applications serve as the user-facing layer of most digital environments, and they are frequently targeted by attackers exploiting poor coding practices and flawed design. In this episode, we dive in…

00:20:37  |   Sun 15 Jun 2025
Episode 43: Human Vectors and Social Engineering (Part 2) (Domain 2)

Episode 43: Human Vectors and Social Engineering (Part 2) (Domain 2)

While basic social engineering relies on message-based deception, more advanced techniques target identity, credibility, and digital presence through impersonation, pretexting, and domain spoofing. I…

00:19:57  |   Sun 15 Jun 2025
Episode 42: Human Vectors and Social Engineering (Part 1) (Domain 2)

Episode 42: Human Vectors and Social Engineering (Part 1) (Domain 2)

People are often the weakest link in cybersecurity, and attackers exploit this through carefully crafted manipulation tactics known as social engineering. In this episode, we focus on phishing, vishi…

00:19:46  |   Sun 15 Jun 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Dr. Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.