Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/bf/8b/06/bf8b060a-66f8-1f3b-77af-573451f039c0/mza_6172341089823690659.jpg/600x600bb.jpg
Surviving the 9 to 5
Dead Inside by 9:05
64 episodes
2 days ago
“Surviving the 9 to 5” isn’t about hustling harder or chasing the next big thing—it’s a raw, no-bull guide for anyone stuck in the daily grind. Each episode delivers real-life hacks to protect your energy, reclaim tiny bursts of sanity, and make it through workday hell without losing yourself. No pep talks. No sugarcoating. Just straight-up survival tips for worn-out souls who refuse to disappear behind their desks.
Show more...
Self-Improvement
Education
RSS
All content for Surviving the 9 to 5 is the property of Dead Inside by 9:05 and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
“Surviving the 9 to 5” isn’t about hustling harder or chasing the next big thing—it’s a raw, no-bull guide for anyone stuck in the daily grind. Each episode delivers real-life hacks to protect your energy, reclaim tiny bursts of sanity, and make it through workday hell without losing yourself. No pep talks. No sugarcoating. Just straight-up survival tips for worn-out souls who refuse to disappear behind their desks.
Show more...
Self-Improvement
Education
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/43760002/43760002-1748355233471-cfc8c271c28be.jpg
Foundations of Cybersecurity and Security Analyst Roles
Surviving the 9 to 5
19 minutes 41 seconds
3 weeks ago
Foundations of Cybersecurity and Security Analyst Roles

These combined audio episodes introduce the Google Cybersecurity Certificate program, emphasizing the high demand for security professionals, with projected growth exceeding 30% by 2030. The course aims to equip students from diverse backgrounds with the necessary knowledge and skills to become security analysts, focusing on the core objective of protecting organizations and people from both external and internal threats. The curriculum covers foundational concepts like the CIA Triad (Confidentiality, Integrity, and Availability), risk management frameworks such as NIST CSF, and the ethical principles guiding the profession. Students will also gain hands-on experience with essential security tools and technologies, including SIEM (Security Information and Event Management) tools, Linux, SQL, and Python, all taught by current Google experts.

Surviving the 9 to 5
“Surviving the 9 to 5” isn’t about hustling harder or chasing the next big thing—it’s a raw, no-bull guide for anyone stuck in the daily grind. Each episode delivers real-life hacks to protect your energy, reclaim tiny bursts of sanity, and make it through workday hell without losing yourself. No pep talks. No sugarcoating. Just straight-up survival tips for worn-out souls who refuse to disappear behind their desks.