Automating tasks and supporting systems remotely are part of modern IT workflows. In this episode, we begin with scripting—specifically .bat and PowerShell scripts—and explain how they’re used to automate routine tasks like file transfers, user creation, or system reboots. Then we introduce remote access tools like R D P and S S H, showing how they allow technicians to manage systems without being physically present.
We also explore the risks involved with remote access—such as unsecured ports, weak passwords, or man-in-the-middle attacks—and how to mitigate them through encryption, access control, and logging. CompTIA expects you to identify secure and insecure remote management practices, especially in troubleshooting and policy scenarios. Brought to you by BareMetalCyber.com.
Protecting sensitive data requires not only digital safeguards but also physical and procedural awareness. This episode teaches you how to properly handle confidential information, whether it's on printed documents, storage devices, or screens. We cover methods like locked cabinets, badge-restricted rooms, and screen privacy filters to prevent unauthorized access.
You’ll also learn about secure printing, shredding, and transporting sensitive materials between locations. These practices are often part of organizational policy and may be legally required in regulated industries. Expect exam questions that test your ability to recognize when extra precautions are needed and which techniques to apply. Brought to you by BareMetalCyber.com.
Technical skills are vital, but soft skills are what turn technicians into trusted professionals. This episode focuses on communication techniques that improve user experiences and foster trust. We start with active listening—how to give users your full attention and confirm your understanding through paraphrasing and clarification. Then we cover tone and professionalism, especially when users are frustrated or confused.
We also discuss documentation and follow-up, including how to set clear expectations, provide written summaries, and avoid technical jargon when communicating with non-technical users. The A Plus exam includes questions about interpersonal behavior and professionalism, so mastering these skills is essential. Brought to you by BareMetalCyber.com.
This episode explores the legal and ethical responsibilities of handling data and software in IT environments. We start with licensing—understanding the difference between OEM, volume, and subscription licenses, and how misuse can result in compliance violations. Then we discuss Digital Rights Management (DRM), which limits copying or modifying media and software based on licensing terms.
We also explore chain of custody procedures, especially for incidents involving stolen devices, legal evidence, or internal investigations. Maintaining a documented path of who accessed what, when, and how is essential for both legal and security purposes. CompTIA expects technicians to know not just how to use tools, but how to do so within legal boundaries. Brought to you by BareMetalCyber.com.
Maintaining the physical environment around IT systems is just as important as managing the systems themselves. This episode begins with ventilation and cooling requirements—how airflow affects server performance, what happens when heat builds up, and how to monitor environmental thresholds. We explain how to position equipment in racks, monitor for overheating, and implement failover systems like redundant fans or power supplies.
We also cover proper disposal methods for batteries, toner cartridges, and electronic waste in compliance with environmental regulations. Lastly, we introduce the Material Safety Data Sheet (MSDS), which provides safety information for handling chemicals and components. These details may appear in both compliance- and scenario-based exam questions. Brought to you by BareMetalCyber.com.
Keeping yourself and your equipment safe is foundational to effective IT work. This episode covers essential safety practices beginning with Electrostatic Discharge (E S D) prevention—why grounding matters and how to properly use wrist straps, mats, and anti-static bags. We explain how improper handling can damage sensitive components like CPUs, RAM, and storage devices even before they’re installed.
We also walk through best practices for lifting heavy equipment, handling tools in tight environments, and managing fire safety with the correct type of extinguisher for electrical equipment. CompTIA expects you to identify safe behavior in support scenarios, and this episode ensures you’re prepared to answer those questions accurately. Brought to you by BareMetalCyber.com.
This episode focuses on the backup strategies and data recovery techniques that every IT professional must know. We begin with the Grandfather-Father-Son (GFS) backup rotation model, explaining how it balances data redundancy and storage space. Then we dive into the 3-2-1 rule—keeping three copies of your data, on two different media types, with one copy off-site.
We also explore full, incremental, and differential backups, as well as the importance of regularly testing restores to ensure recovery plans actually work when needed. These strategies often appear in scenario-based exam questions, where you’ll need to select the best approach for business continuity or disaster recovery. Brought to you by BareMetalCyber.com.
Change is a constant in IT, but managing that change responsibly is what keeps systems stable. This episode introduces the formal change management process, starting with the identification of proposed changes and their potential impact on systems, users, and business operations. You’ll learn about documentation requirements, stakeholder approvals, and the importance of scheduling changes during maintenance windows to minimize disruption.
We also cover the post-implementation review process—verifying success, collecting feedback, and updating related documentation. CompTIA expects you to recognize not just technical solutions, but the policies and workflows that govern responsible IT behavior. Whether you're replacing equipment, upgrading software, or rolling out patches, understanding change management ensures smooth transitions. Brought to you by BareMetalCyber.com.
There’s more than one kind of documentation in I T, and this episode explains the major types that appear on the A Plus exam. We start with Acceptable Use Policies (AUPs), which define what users are permitted to do with company devices and networks. These documents are key to setting boundaries and providing grounds for enforcement.
Next, we cover Standard Operating Procedures (SOPs), which describe routine tasks and ensure consistency in system administration, user onboarding, or backup operations. Finally, we explore the use of network diagrams, wiring charts, and configuration maps to visualize systems and support faster diagnostics. These documents not only support daily operations but also play an important role in onboarding and audits. Brought to you by BareMetalCyber.com.
Keeping track of hardware, software, and configuration data is vital for organizations of all sizes, and this episode explores how asset and inventory management supports that effort. We begin with physical asset tracking—using labels, barcodes, and location databases to monitor laptops, desktops, and peripherals. Then we move into software inventory, including how to track licenses, subscription renewals, and version compliance.
We also discuss the importance of documenting configuration changes, warranty dates, and decommissioning procedures. These processes ensure proper lifecycle management and help enforce security policies. CompTIA may test your ability to select or explain asset tracking methods in support or audit scenarios. Brought to you by BareMetalCyber.com.
This episode focuses on the importance of clear, consistent documentation in every phase of IT support. We begin by explaining ticketing systems—how they track user requests, service histories, resolutions, and follow-up actions. You’ll learn what makes a good ticket entry, including timestamps, concise descriptions, and links to previous cases.
We also cover other forms of documentation, such as change logs, asset inventories, and support knowledge bases. These resources help create continuity across shifts, teams, and long-term projects. The A Plus exam includes questions that require choosing the most appropriate documentation method for a given situation, and this episode prepares you to do that with confidence. Brought to you by BareMetalCyber.com.
The final domain in the Core 2 exam is Operational Procedures, and this episode introduces its wide-ranging content. You’ll learn what this domain includes: documentation standards, safety procedures, communication skills, licensing and privacy concerns, and basic scripting. While these topics may seem non-technical, they are just as important for a well-rounded technician as knowing how to fix hardware or configure systems.
We explain how this domain emphasizes professionalism, user interaction, workplace policies, and secure handling of information. CompTIA expects you to demonstrate soft skills as well as technical ones, and this episode sets the stage for understanding how to balance both effectively. Brought to you by BareMetalCyber.com.
Malware isn’t limited to desktops. In this episode, we explore the types of malicious threats that target mobile devices. We begin with adware, spyware, and malicious apps that gain access to sensitive permissions—like camera, microphone, or SMS—without the user’s knowledge. Then we explain the concept of rooting or jailbreaking, which removes manufacturer restrictions and increases exposure to security risks.
We also discuss data leakage—where personal or business data is exfiltrated through unauthorized apps—and how to recognize suspicious behavior like sudden battery drain, popups, or background data usage. Understanding these threats helps you respond effectively to user complaints and enforce mobile security policies. CompTIA may test your ability to distinguish normal from compromised behavior, and this episode prepares you to do just that. Brought to you by BareMetalCyber.com.
Mobile devices introduce their own unique troubleshooting challenges, particularly when it comes to application behavior. In this episode, we start with app crashes—why they happen, how to review logs or force close misbehaving apps, and what steps to take before uninstalling. Then we examine connectivity issues within apps, such as those that rely on Wi-Fi or cellular data and behave erratically when those connections are unstable.
We also cover app update problems, including how to trigger manual updates, clear cache or storage space, and deal with compatibility issues caused by outdated operating systems. These topics are increasingly relevant as mobile devices become central to business workflows. CompTIA expects you to know how to support apps just as thoroughly as desktops, and this episode ensures you can. Brought to you by BareMetalCyber.com.
Successfully removing malware requires following the right sequence, and this episode lays out that process according to CompTIA’s expectations. We begin with identification—recognizing that malware is present—followed by isolating the system from the network to prevent spread. Then we quarantine the malicious files using antimalware software and proceed with cleaning or deleting the infections.
We explain how to schedule deep scans, remove residual entries, and check for persistent elements like registry changes or scheduled tasks. Finally, we discuss restoring system functionality, applying updates, and improving defenses to prevent re-infection. These steps form the core of several exam questions, especially in simulation or troubleshooting formats. This episode helps you internalize both the logic and the order of operations. Brought to you by BareMetalCyber.com.
Security issues don’t always come with flashing warnings—sometimes they hide behind subtle behavior. This episode helps you identify the symptoms that often indicate malware or unauthorized access. We begin with security alerts—both real and fake—and how to distinguish between legitimate warnings and scareware popups. Then we cover unexplained file changes, such as altered timestamps, missing data, or renamed files.
We also explore browser redirection, where users attempt to access one website and are taken somewhere entirely different—often a sign of hijacked DNS settings or malicious browser extensions. These symptoms are designed to test your pattern recognition and deductive reasoning on the exam. Knowing how to interpret unusual behavior is a key skill for real-world IT professionals, and this episode trains you to do just that. Brought to you by BareMetalCyber.com.
When something breaks in Windows, there are several tools you can use to restore functionality, and this episode breaks them down step by step. We begin with the System File Checker (SFC), which scans and repairs corrupted or missing system files using known-good versions. Next, we explain DISM and when to use it alongside or instead of SFC to fix more deeply embedded issues.
We also discuss more significant recovery options like rolling back updates, restoring system images, and using manufacturer-provided reimage tools to return the device to factory settings. These techniques are tested heavily on the A Plus exam and require not just name recognition but an understanding of when each method is most appropriate. This episode prepares you for questions involving system instability, failed patches, and critical file loss. Brought to you by BareMetalCyber.com.
This episode covers some of the most common and dramatic symptoms you'll face when troubleshooting Windows systems. We begin with the infamous Blue Screen of Death—also known as BSOD—explaining what causes it, how to interpret error codes, and what logs or tools to use when diagnosing the issue. Then we move into boot problems, such as systems getting stuck on the Windows logo, reboot loops, or messages like “Operating System Not Found.”
We also explore low memory symptoms, including system sluggishness, app crashes, and excessive disk swapping. You’ll learn how to identify whether the issue is truly memory-related or if it’s caused by malware, excessive startup programs, or background services. CompTIA loves to present vague error descriptions and ask for the most likely root cause, so this episode will help you connect those dots efficiently. Brought to you by BareMetalCyber.com.
Troubleshooting software problems is a core responsibility in IT, and this episode introduces Domain 3.0 of the Core 2 exam. You’ll learn what kinds of software issues are covered, including application crashes, boot problems, security alerts, and general OS instability. We explain how this domain connects to others, such as security and user support, and how CompTIA expects you to diagnose problems using a methodical approach.
We also preview some of the tools and techniques you’ll use—such as Event Viewer, Safe Mode, system file checking, and recovery tools. Understanding the types of symptoms you may encounter helps frame the lessons that follow. This episode lays the foundation for the focused troubleshooting episodes to come. Brought to you by BareMetalCyber.com.
Properly disposing of storage media is a critical part of data security, and this episode outlines the methods you need to know. We begin with data wiping—using software to overwrite existing files—and explain why a single delete or format isn’t enough. Then we move on to degaussing, which uses magnetic fields to scramble data on hard drives and magnetic tapes.
Physical destruction is also discussed, including shredding, drilling, or incinerating drives, which is often required for high-sensitivity environments. CompTIA expects you to recognize which disposal method is appropriate for a given scenario, and this episode ensures you understand the benefits and limitations of each. Brought to you by BareMetalCyber.com.