Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/9b/59/19/9b5919e9-7c3b-32ff-5f06-6648f203aa25/mza_16520034167168333282.jpg/600x600bb.jpg
Certified: The CompTIA Security+ Audio Course
Dr. Jason Edwards
222 episodes
3 days ago
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and help you pass on your first attempt. Structured for busy professionals and new learners alike, the series provides a complete, flexible way to prepare for certification success without relying on slides or handouts. The CompTIA Security+ certification is the global benchmark for validating essential cybersecurity knowledge and hands-on skills. It covers critical areas including threat identification, risk management, network security, identity and access control, incident response, and cryptography. Designed to meet the latest industry and Department of Defense (DoD) requirements, Security+ ensures you can assess environments, implement controls, and secure systems in real-world settings. It serves as the perfect foundation for cybersecurity careers and advanced credentials like CySA+, CASP+, and C I S S P. Recognized by employers worldwide, Security+ demonstrates your readiness to protect data, defend networks, and operate confidently in modern cyber defense roles. For a deeper study experience, pair this Audio Course with the companion textbook Achieve CompTIA Security+ SY0-701 Exam Success—the concise and complete guide designed for busy professionals preparing to earn their certification. Together, they form a powerful toolkit to help you understand, retain, and apply cybersecurity principles from day one through exam day.
Show more...
Technology
Education,
Courses
RSS
All content for Certified: The CompTIA Security+ Audio Course is the property of Dr. Jason Edwards and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and help you pass on your first attempt. Structured for busy professionals and new learners alike, the series provides a complete, flexible way to prepare for certification success without relying on slides or handouts. The CompTIA Security+ certification is the global benchmark for validating essential cybersecurity knowledge and hands-on skills. It covers critical areas including threat identification, risk management, network security, identity and access control, incident response, and cryptography. Designed to meet the latest industry and Department of Defense (DoD) requirements, Security+ ensures you can assess environments, implement controls, and secure systems in real-world settings. It serves as the perfect foundation for cybersecurity careers and advanced credentials like CySA+, CASP+, and C I S S P. Recognized by employers worldwide, Security+ demonstrates your readiness to protect data, defend networks, and operate confidently in modern cyber defense roles. For a deeper study experience, pair this Audio Course with the companion textbook Achieve CompTIA Security+ SY0-701 Exam Success—the concise and complete guide designed for busy professionals preparing to earn their certification. Together, they form a powerful toolkit to help you understand, retain, and apply cybersecurity principles from day one through exam day.
Show more...
Technology
Education,
Courses
Episodes (20/222)
Certified: The CompTIA Security+ Audio Course
Welcome to the SEC+ Audio Course

Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes as they drop and start listening smarter from day one.

Show more...
3 weeks ago
1 minute

Certified: The CompTIA Security+ Audio Course
Episode 221: Developing and Executing Security Awareness Programs (Domain 5)

Security awareness programs don’t happen by accident—they’re built with intent, tested with feedback, and refined over time. In this final episode of the series, we walk through how to develop and execute a successful awareness program, from defining goals and identifying target audiences to choosing content formats and delivery methods. We discuss how to incorporate phishing simulations, microlearning modules, video training, and role-specific content to meet learners where they are. Execution involves not just delivery, but reinforcement through regular communication, gamification, and leadership engagement. We also cover program measurement—tracking participation, testing knowledge, and adjusting campaigns based on results. A strong awareness program turns passive users into active defenders, extending your security posture across every click, login, and decision.

Show more...
4 months ago
8 minutes

Certified: The CompTIA Security+ Audio Course
Episode 220: Security Reporting and Monitoring (Domain 5)

A well-informed workforce should be empowered not just to avoid risk—but to report it. In this episode, we explore how organizations build clear, accessible reporting channels that encourage employees to share suspicious activity, policy violations, or near misses without fear of reprisal. We also examine how recurring reports—like monthly phishing metrics or training completion rates—can help monitor the effectiveness of your awareness program and adjust content accordingly. Beyond individual reports, monitoring systems track broader trends in user behavior, risk exposure, and incident volume, providing insight into where further training may be needed. Reporting and monitoring aren’t just reactive tools—they’re indicators of a healthy security culture. The more people contribute, the stronger your human firewall becomes.

Show more...
4 months ago
8 minutes

Certified: The CompTIA Security+ Audio Course
Episode 219: Hybrid and Remote Work Security Awareness (Domain 5)

Remote and hybrid work models create new layers of security complexity—blending corporate environments with home networks, personal devices, and cloud-first workflows. In this episode, we explore the core topics of remote work security awareness, starting with safe home Wi-Fi configurations, strong authentication, and VPN use for secure connections. We then discuss endpoint hardening for laptops and mobile devices, including encryption, screen locking, and secure backup practices. Hybrid workers also need guidance on physical security—like preventing shoulder surfing in public places or securing devices during commutes. Training should also cover secure transitions between environments, cloud data handling, and how to report incidents while working remotely. As the office perimeter disappears, awareness becomes the frontline.

Show more...
4 months ago
9 minutes

Certified: The CompTIA Security+ Audio Course
Episode 218: User Guidance and Training (Part 3) (Domain 5)

Security training must evolve with the threat landscape—and that means addressing common but high-risk topics like removable media, social engineering, and operational security (OPSEC). In this episode, we explain how removable media—like USB drives and external hard drives—pose significant threats when plugged into unmanaged or infected systems. We also explore how cables, chargers, and other seemingly harmless peripherals can be weaponized to deliver malware or steal data. Social engineering training teaches users how to resist psychological manipulation—whether it’s through pretexting, impersonation, or urgency tactics. Finally, we dive into OPSEC, helping employees understand how casual conversations, unsecured devices, or oversharing on social media can inadvertently expose sensitive operations. This part of training connects behavior to consequence—turning security into a daily awareness practice, not just a quarterly presentation.

Show more...
4 months ago
8 minutes

Certified: The CompTIA Security+ Audio Course
Episode 217: User Guidance and Training (Part 2) (Domain 5)

Beyond basic policy understanding, users need targeted training in key risk areas that attackers frequently exploit—especially insiders, passwords, and privileged access. In this episode, we focus on insider threat awareness, teaching employees how to recognize red flags like excessive access, unusual behavior, or data hoarding by peers. We also cover password management best practices: creating complex passphrases, using password managers, and understanding why reuse is dangerous. Many incidents begin with a weak or compromised password—making training a top defense. Finally, we emphasize tailoring training for different roles, with higher emphasis on privileged users who have elevated access to sensitive systems and data. The more your users understand the risks tied to their behavior, the better positioned they are to act as allies in defense.

Show more...
4 months ago
8 minutes

Certified: The CompTIA Security+ Audio Course
Episode 216: User Guidance and Training (Part 1) (Domain 5)

Users are often the first and last line of defense in cybersecurity, and their success depends on clear guidance and ongoing training. In this episode, we focus on policy awareness and handbooks, which provide employees with a foundational understanding of acceptable use, access controls, device handling, and reporting expectations. We explore how to develop and distribute effective security handbooks, integrate policies into onboarding, and require digital acknowledgment for compliance tracking. We also highlight the value of situational awareness training—helping users recognize when something feels off, such as unexpected emails, strange device behavior, or suspicious requests. Well-informed users make better security decisions and are more likely to report anomalies before they escalate into incidents. Training isn’t just a checkbox—it’s a mindset shift, and it starts with accessible, relevant, and engaging resources.

Show more...
4 months ago
8 minutes

Certified: The CompTIA Security+ Audio Course
Episode 215: Anomalous Behavior Recognition (Domain 5)

Cyber threats often hide in plain sight, masquerading as normal user activity until they trigger something unexpected—and that’s why recognizing anomalous behavior is such a valuable skill. In this episode, we explore how to identify risky, unexpected, or unintentional actions that may indicate insider threats, compromised accounts, or social engineering in progress. Examples include unusual file transfers, logins at strange hours, elevated privilege requests, or repeated access to sensitive resources outside normal job roles. We discuss how behavior-based tools like User and Entity Behavior Analytics (UEBA) establish baselines and detect deviations without relying solely on predefined rules. We also touch on the importance of cultural awareness, since not all anomalies are malicious—some reflect confusion, poor training, or misunderstood policy. Recognizing anomalies early can stop breaches before they escalate—and create opportunities for education and prevention.

Show more...
4 months ago
8 minutes

Certified: The CompTIA Security+ Audio Course
Episode 214: Effective Phishing Awareness (Domain 5)

Phishing remains one of the most effective—and dangerous—forms of cyberattack because it targets people, not systems. In this episode, we explore how to build an effective phishing awareness program that trains employees to recognize and report suspicious messages before damage is done. We discuss how simulated phishing campaigns help reinforce training through experiential learning, and how metrics such as click rates and report rates can guide program improvement. Key indicators of phishing—like mismatched sender addresses, urgent language, fake login pages, or unexpected attachments—must be taught clearly and revisited often. We also cover response strategies when phishing is suspected, including internal reporting procedures, containment, and incident escalation. Awareness isn’t a one-time presentation—it’s a continuous process of vigilance, reinforcement, and empowerment that helps turn your workforce into your first line of defense.

Show more...
4 months ago
8 minutes

Certified: The CompTIA Security+ Audio Course
Episode 213: Reconnaissance Techniques (Domain 5)

Reconnaissance is the first phase of any attack—and the first opportunity for defenders to detect malicious intent. In this episode, we break down both passive and active reconnaissance techniques used by ethical hackers and adversaries alike. Passive recon relies on publicly available data, such as DNS records, social media, job postings, WHOIS data, or open-source intelligence (OSINT), to build a picture of a target without direct interaction. Active recon, by contrast, involves probing systems through port scans, service enumeration, or banner grabbing to uncover exploitable information. We explore how to identify when recon is taking place through network monitoring, anomaly detection, and early-warning alerts. By understanding recon techniques, defenders can better identify precursors to attack—and attackers can refine their assessments before launching a payload. Knowledge is power—and in recon, it’s the first move.

Show more...
4 months ago
8 minutes

Certified: The CompTIA Security+ Audio Course
Episode 212: Penetration Testing Environments (Domain 5)

The value of a penetration test is closely tied to how realistic the environment is—and in this episode, we examine the types of environments in which pen tests are conducted: known, partially known, and unknown. A known environment test, also called white-box testing, gives the tester full knowledge of systems, code, or architecture—allowing them to focus on deep technical vulnerabilities. In partially known or gray-box testing, the tester has limited information, simulating an internal threat or a moderately informed attacker. Unknown, or black-box testing, simulates an external attacker with no insider knowledge, relying on reconnaissance and brute-force discovery to find weak points. We discuss how each testing type serves different goals—technical validation, operational readiness, or exposure modeling—and how to select the right approach based on budget, risk, and maturity. The environment you choose defines what you learn—and how far your testers can go.

Show more...
4 months ago
9 minutes

Certified: The CompTIA Security+ Audio Course
Episode 211: Fundamentals of Penetration Testing (Domain 5)

Penetration testing goes beyond identifying vulnerabilities—it simulates real-world attacks to see how systems, defenses, and teams hold up under pressure. In this episode, we explore the foundational concepts of penetration testing, starting with physical tests that assess physical security through social engineering, badge cloning, or simulated intrusions. We then differentiate offensive testing—where testers proactively look for exploitable flaws—and defensive testing, which focuses on hardening systems in response. Integrated penetration testing combines both, offering a holistic view of security from multiple perspectives, often aligned with red, blue, or purple team exercises. These assessments measure not just technical exposure, but procedural response and detection capabilities. A well-scoped, well-executed pen test is one of the most valuable security assessments an organization can perform—it reveals not only what can go wrong, but how prepared you are when it does.

Show more...
4 months ago
9 minutes

Certified: The CompTIA Security+ Audio Course
Episode 210: External Audits and Assessments (Domain 5)

External audits provide an independent review of an organization’s security and compliance posture, often driven by regulatory mandates, certification requirements, or contractual obligations. In this episode, we explore different types of external audits and assessments, starting with regulatory audits that evaluate adherence to laws like HIPAA, PCI-DSS, or SOX. We also cover independent third-party assessments—often required by customers or investors—which validate security controls, governance structures, and risk management practices. Examinations may focus on financial systems, operational resilience, or specific security domains such as encryption or incident response. We highlight how to prepare for audits, including document collection, control testing, and walkthrough interviews with staff. While audits can be stressful, they also provide an opportunity to uncover blind spots, demonstrate accountability, and strengthen trust with external stakeholders.

Show more...
4 months ago
9 minutes

Certified: The CompTIA Security+ Audio Course
Episode 209: Internal Audit Structures (Domain 5)

The effectiveness of internal audits depends not just on what’s reviewed, but on how the audit function is structured within the organization. In this episode, we examine audit committees—teams responsible for planning, conducting, and overseeing internal audits to ensure objectivity and alignment with organizational goals. We discuss how committees bring together expertise from IT, legal, risk, and operations, and how regular meetings, defined charters, and reporting mechanisms support transparency and accountability. We also explore self-assessments, which allow teams to proactively evaluate their own processes using standardized checklists or maturity models. While self-assessments can’t replace formal audits, they provide an early-warning system and help teams stay prepared. Internal audit structures must balance independence with collaboration—ensuring that controls are tested without alienating those responsible for executing them.

Show more...
4 months ago
9 minutes

Certified: The CompTIA Security+ Audio Course
Episode 208: Attestation and Internal Audits (Domain 5)

Attestation and internal audits are two of the most powerful tools for ensuring your security program is functioning as intended. In this episode, we start by exploring attestation—formal declarations that certify compliance with policies, procedures, or external frameworks. Attestations are used in vendor contracts, employee training, and system certifications, and they provide legally binding statements of accountability. We then examine the role of internal audits, which assess whether security policies are properly implemented and identify areas of improvement. These audits evaluate technical controls, review documentation, and verify that daily practices match official standards. Unlike external audits, internal audits allow organizations to self-correct and build maturity over time. Attestation proves intent, but audits test execution—and together, they build confidence inside and outside the organization.

Show more...
4 months ago
10 minutes

Certified: The CompTIA Security+ Audio Course
Episode 207: Data Management and Compliance (Domain 5)

Effective data management is critical for both operational success and regulatory compliance, and in this episode, we explore how organizations maintain control over what they collect, where it’s stored, and how long it’s retained. We begin with the concept of data ownership—assigning clear accountability for specific datasets to ensure someone is responsible for access controls, accuracy, and compliance with privacy policies. We then examine how inventories support transparency and help enforce controls, particularly in identifying sensitive data like health records or financial transactions. Retention strategies are also addressed, emphasizing the need for clear schedules that meet legal obligations without overexposing the organization to unnecessary data risk. Finally, we unpack the “right to be forgotten,” a principle in many privacy laws that allows individuals to request deletion of their personal data—and what it takes to fulfill such requests across systems and backups. Compliance starts with knowing your data—and managing it responsibly.

Show more...
4 months ago
9 minutes

Certified: The CompTIA Security+ Audio Course
Episode 206: Privacy and Legal Implications of Compliance (Domain 5)

Privacy and compliance are deeply intertwined, especially as global regulations push organizations to safeguard personal data across jurisdictions. In this episode, we examine how privacy laws operate at local, national, and international levels—highlighting frameworks like GDPR in Europe and CCPA in California, and exploring how they shape data collection, processing, and sharing practices. We also delve into the legal responsibilities of different roles in the data ecosystem, including data subjects, data controllers, and data processors, each with specific duties and liabilities. Understanding these roles helps clarify who must do what to stay compliant, especially in incident response, vendor management, and breach notification scenarios. We discuss practical examples of compliance failures, such as unauthorized data transfer or retention violations, and the penalties that followed. Legal compliance is no longer just an IT concern—it’s a shared responsibility between security, legal, and operations.

Show more...
4 months ago
10 minutes

Certified: The CompTIA Security+ Audio Course
Episode 205: Data Inventory, Retention, and the Right to Be Forgotten (Domain 5)

Managing personal data effectively starts with knowing exactly what you have, where it lives, how long you keep it, and what rights users have over it. In this final episode, we explore how to build and maintain a data inventory that tracks types of data collected, processing activities, access permissions, and storage locations. We also discuss retention policies that define how long different categories of data must be kept to satisfy legal, business, or regulatory requirements—balanced against the need to minimize risk and reduce unnecessary data storage. Central to privacy compliance is honoring data subject rights, including the right to be forgotten, which allows individuals to request deletion of their personal data under laws like GDPR. Implementing these rights requires technical and procedural coordination to ensure timely, complete, and verified data removal across systems and backups. Done correctly, data governance becomes not only a compliance tool—but a demonstration of respect and transparency to users and stakeholders.

Show more...
4 months ago
10 minutes

Certified: The CompTIA Security+ Audio Course
Episode 204: Privacy Laws and Global Compliance (Domain 5)

Data privacy is no longer just a legal issue—it’s a global business imperative, and this episode explores the complex and evolving landscape of privacy laws. We cover key regulations such as the European Union’s GDPR, California’s CCPA, Brazil’s LGPD, and other region-specific rules that govern how personal data is collected, processed, stored, and transferred. These laws define roles like data controller and data processor, outline user rights such as data access or deletion, and impose significant penalties for non-compliance. We also explain how organizations can align with multiple frameworks through data mapping, retention controls, breach notification protocols, and privacy-by-design principles. Global compliance requires a coordinated effort across legal, technical, and operational teams to respect regional boundaries while supporting a global business model. Ignoring privacy regulations isn’t just risky—it’s unsustainable in today’s data-driven world.

Show more...
4 months ago
10 minutes

Certified: The CompTIA Security+ Audio Course
Episode 203: Attestation and Acknowledgement in Compliance (Domain 5)

Attestation and acknowledgement are critical for ensuring that individuals and third parties formally understand and accept their roles in maintaining security and compliance. In this episode, we explain how attestation involves signing a formal statement that certifies understanding or adherence—used in contexts like security training, policy acceptance, or vendor contract obligations. Acknowledgement, often required in policy rollouts or onboarding, verifies that a user has received and read a required document, even if no certification is implied. These processes are especially important in regulated industries where proving that staff are aware of their obligations is as important as the policies themselves. We explore how digital signatures, audit trails, and centralized records make these acknowledgments trackable and legally defensible. They may seem administrative, but in a legal or compliance investigation, properly captured attestations often serve as critical evidence of due diligence.

Show more...
4 months ago
9 minutes

Certified: The CompTIA Security+ Audio Course
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and help you pass on your first attempt. Structured for busy professionals and new learners alike, the series provides a complete, flexible way to prepare for certification success without relying on slides or handouts. The CompTIA Security+ certification is the global benchmark for validating essential cybersecurity knowledge and hands-on skills. It covers critical areas including threat identification, risk management, network security, identity and access control, incident response, and cryptography. Designed to meet the latest industry and Department of Defense (DoD) requirements, Security+ ensures you can assess environments, implement controls, and secure systems in real-world settings. It serves as the perfect foundation for cybersecurity careers and advanced credentials like CySA+, CASP+, and C I S S P. Recognized by employers worldwide, Security+ demonstrates your readiness to protect data, defend networks, and operate confidently in modern cyber defense roles. For a deeper study experience, pair this Audio Course with the companion textbook Achieve CompTIA Security+ SY0-701 Exam Success—the concise and complete guide designed for busy professionals preparing to earn their certification. Together, they form a powerful toolkit to help you understand, retain, and apply cybersecurity principles from day one through exam day.