Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence.
Created by cybersecurity author and educator Dr. Jason Edwards, this podcast is designed for learners who seek practical explanations, effective study strategies, and a structured path to certification. If you're serious about passing the Security+ exam—and launching your cybersecurity career—this podcast is your edge.
For a deeper study experience, grab a copy of Achieve CompTIA Security+ SY0-701 Exam Success by Dr. Jason Edwards. It’s the most concise and comprehensive Security+ guide available—built for busy professionals who want to pass the exam quickly and on their first attempt. You’ll also find additional resources, practice questions, and tools at BareMetalCyber.com.
Patching and encryption are two of the most basic yet essential components of any security strategy—one protects against known vulnerabilities, the other safeguards data from unauthorized access. In …
Controlling what software is allowed to run—and isolating it when needed—is a fundamental principle of endpoint security. In this episode, we examine application allow lists, which explicitly define …
Network segmentation and access control are two of the most powerful tools for limiting the scope and impact of an attack, especially once a threat actor gains initial access. In this episode, we exp…
Not every security breach begins with a smoking gun—many start with subtle shifts in system behavior that point to something being off. This episode explores general indicators of malicious activity,…
Password attacks are among the most common initial access vectors, and recognizing their early indicators is key to stopping intrusions before they escalate. In this episode, we focus on signs of bru…
Even strong encryption systems can be undermined by poor implementation, weak configurations, or direct cryptographic attacks—and recognizing the signs is vital. In this episode, we cover indicators …
Applications are often targeted because they represent the gateway to sensitive data and services, and attackers leave behind subtle but detectable signs when they exploit them. In this episode, we l…
Continuing our focus on network-based threats, this episode explores wireless-specific attacks and credential replay tactics that compromise network integrity and user accounts. Wireless threats ofte…
The network is often where the first signs of an attack emerge—if you know what to look for. In this episode, we examine key indicators of network-based threats, starting with Distributed Denial-of-S…
While cybersecurity often focuses on virtual threats, physical attacks on facilities, hardware, and access points remain a serious and sometimes overlooked risk. In this episode, we explore how physi…
Malware comes in many forms—ransomware, spyware, trojans, worms—and each leaves behind unique indicators that can help defenders detect infections early and respond effectively. In this episode, we b…
Zero-day vulnerabilities are software flaws that are unknown to the vendor and, critically, to defenders—giving attackers a window of opportunity to exploit systems with no available patch or signatu…
Misconfiguration is one of the most common and preventable causes of security breaches, and mobile devices amplify this risk due to their ubiquity and inconsistent management. In this episode, we exa…
Modern cybersecurity is deeply interconnected, and vulnerabilities in your vendors, partners, or third-party software can easily become vulnerabilities in your own environment. In this episode, we ex…
Virtualization and cloud computing introduce powerful efficiencies—but they also open up new categories of vulnerabilities that traditional security models often fail to address. In this episode, we …
Cybersecurity doesn’t stop at software—hardware and firmware vulnerabilities can offer attackers deep, long-term access to systems in ways that are difficult to detect and even harder to fix. In this…
Operating systems and web applications form the backbone of IT infrastructure, and when left unpatched or misconfigured, they present rich targets for exploitation. In this episode, we look at vulner…
Applications serve as the user-facing layer of most digital environments, and they are frequently targeted by attackers exploiting poor coding practices and flawed design. In this episode, we dive in…
While basic social engineering relies on message-based deception, more advanced techniques target identity, credibility, and digital presence through impersonation, pretexting, and domain spoofing. I…
People are often the weakest link in cybersecurity, and attackers exploit this through carefully crafted manipulation tactics known as social engineering. In this episode, we focus on phishing, vishi…