Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

CompTIA Podcasts

show episodes
 
Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecurity author and educa ...
  continue reading
 
Artwork

1
CompTIA Biz Tech Podcast

CompTIA Communities

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Biz Tech Podcast focuses on the business of technology and CompTIA corporate membership. Listen in as industry leaders from CompTIA communities and councils discuss challenges and opportunities, strategies for success, leading and emerging technologies, and what it all means for your customers and your business.
  continue reading
 
Artwork
 
Join Carolyn April and Seth Robinson, from CompTIA's research team, as they serve up the latest topics in tech. A mix of market data and guest appearances sets Volley up for engaging discussions on the technology world, changes in channel business and interesting trends. Subscribe today!
  continue reading
 
Artwork

1
CompTIA Women TechCast

CompTIA's AWIT Community

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The CompTIA Women TechCast has completed its series. You can now find us on the CompTIA Biz Tech Podcast discussing diversity, women in tech, and the business of technology at https://blubrry.com/comptiabiztechpodcast/
  continue reading
 
Artwork

1
Cyber Work

Infosec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork

1
CompTIA Industry Advisory Councils

CompTIA's IT Advisory Councils

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Coffee Break with the CompTIA Councils is short, "Coffee Break" sized podcasts around topics of interest in the technology industry. Join us as we talk to thought leaders from across the technology industry about current trends and new and emerging technology.
  continue reading
 
Artwork

1
CompTIA EmTechCast

CompTIA's EmTech Community

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join the CompTIA Emerging Technology Community as we talk to the pioneers bringing new technology to the market. Gain important insights on emerging tech, how it will impact businesses and society, and what are the far-reaching implications for our digital future. If you’re not already part of the CompTIA Emerging Technology Community, join here (https://bit.ly/2pEvTEP) and help Identity emerging technologies that can help transform business operations, create business opportunities, overcom ...
  continue reading
 
Artwork

1
CompTIA TechServicesSuccess

CompTIA's TLS Community

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology Services Success is sponsored by CompTIA’s Technology Lifecycle Services Community which provides a forum for business executives to discuss commonality within the technology service industry. This collaborative group engages in thought leadership which drives industry-specific education/tools and promotes innovation and business excellence in the service industry. If you’re not already part of the CompTIA Technology Lifecycle Services community, join here (https://bit.ly/2P7bQtx) ...
  continue reading
 
Join the Managed Services Community as we talk to experts and peers to help break barriers in your business. We’ll talk about ways to improve your business operations, new services and solutions, how to capitalize on opportunities and find that next million. If you’re not already part of the CompTIA Managed Services Community, join here (https://bit.ly/2JbURST) to support the managed IT services industry through the promotion of best practices, the development of tools and templates and the ...
  continue reading
 
Artwork
 
A podcast on all things related to IT Security from the CompTIA IT Security Community. If you’re not already part of the CompTIA IT Security Community, join here (https://bit.ly/2Pat2OD) and be on the forefront of new technologies in IT security and evaluate new opportunities and challenges for businesses in the security space.
  continue reading
 
🌟 **Unlock the Power of the Cloud! 🚀** Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. Whether you are a novice or seeking to deepen your understanding, this program is tailored for you. Season 1 Episodes 1-14: CompTIA Security+ 601 Episodes 15-52: Certified Cloud Security Professional (CCSP) Season 2 Epis ...
  continue reading
 
Artwork

1
The TechTual Talk

Henri Davis, The Radcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
  continue reading
 
Artwork
 
Technologist Tales, an award-winning podcast produced by R.Clement.Creative, shares profiles of people from an array of backgrounds who discovered and shaped successful careers working with technology – and, now, help others do the same.
  continue reading
 
Loading …
show series
 
Go to our sponsor https://aura.com/techtualchatter to get a 14- day FREE trial and see if your personal information has been leaked online ------------------------------------------------------------------------------------ In episode 179 of The TechTual Talk, hosts HD and Cybershortieee discuss real-world cybersecurity threats, including AI-powere…
  continue reading
 
🌟 Unlock the Power of the Cloud! 🚀 Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. In this episode, I cover topics such as recertification of Security+ and the o…
  continue reading
 
This episode kicks off the Certify – Security Plus podcast series by introducing the CompTIA Security+ certification. You’ll learn what this credential is, why it's such a popular choice for cybersecurity beginners, and what makes it a foundational part of many career paths. Whether you're a student, a career switcher, or someone trying to understa…
  continue reading
 
Learn how you can work with me one on one to secure a $90K+ cybersecurity role: https://techtualconsulting.tech/video-training ------------------------------------------------------------------------------------ In this episode of The TechTual Talk, hosts HD interviews Shalaya Morissette, a leader in the energy sector. Shalaya shares her journey fr…
  continue reading
 
Are you ready to get Security+ certified? Watch our free training course: In this month's Security+ Study Group, you'll learn about: Finding the right Security device Maintaining uptime during a failure The benefits of NetFlow Documentation and agreement types Securely storing private keys And more Keep the study process going! Watch additional Sec…
  continue reading
 
Are you ready to get Network+ certified? Watch our free N10-009 training course. In this month's Network+ Study Group, you'll learn about: Network troubleshooting at the command line Access point configurations Finding an FQDN NAC implementations Automatic IP address assignments Keep the study process going! Watch additional Network+ Study Group vi…
  continue reading
 
Check out our Sponsor SNHU to learn more about their cybersecurity degree program https://snhu.edu/techtual ------------------------------------------------------------------------------------ In this episode of The TechTual Talk, HD covers the Google Cloud outage, hackers exploiting Discord invite links, and a cyberattack on grocery distributor UN…
  continue reading
 
Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast Andre McGregor of ForceMetrics shares his incredible journey from reluctant FBI recruit to cybersecurity entrepreneur. Despite initially declining the FBI's recruitment call, Andre went on to beco…
  continue reading
 
Security awareness programs don’t happen by accident—they’re built with intent, tested with feedback, and refined over time. In this final episode of the series, we walk through how to develop and execute a successful awareness program, from defining goals and identifying target audiences to choosing content formats and delivery methods. We discuss…
  continue reading
 
A well-informed workforce should be empowered not just to avoid risk—but to report it. In this episode, we explore how organizations build clear, accessible reporting channels that encourage employees to share suspicious activity, policy violations, or near misses without fear of reprisal. We also examine how recurring reports—like monthly phishing…
  continue reading
 
Remote and hybrid work models create new layers of security complexity—blending corporate environments with home networks, personal devices, and cloud-first workflows. In this episode, we explore the core topics of remote work security awareness, starting with safe home Wi-Fi configurations, strong authentication, and VPN use for secure connections…
  continue reading
 
Security training must evolve with the threat landscape—and that means addressing common but high-risk topics like removable media, social engineering, and operational security (OPSEC). In this episode, we explain how removable media—like USB drives and external hard drives—pose significant threats when plugged into unmanaged or infected systems. W…
  continue reading
 
Beyond basic policy understanding, users need targeted training in key risk areas that attackers frequently exploit—especially insiders, passwords, and privileged access. In this episode, we focus on insider threat awareness, teaching employees how to recognize red flags like excessive access, unusual behavior, or data hoarding by peers. We also co…
  continue reading
 
Users are often the first and last line of defense in cybersecurity, and their success depends on clear guidance and ongoing training. In this episode, we focus on policy awareness and handbooks, which provide employees with a foundational understanding of acceptable use, access controls, device handling, and reporting expectations. We explore how …
  continue reading
 
Cyber threats often hide in plain sight, masquerading as normal user activity until they trigger something unexpected—and that’s why recognizing anomalous behavior is such a valuable skill. In this episode, we explore how to identify risky, unexpected, or unintentional actions that may indicate insider threats, compromised accounts, or social engin…
  continue reading
 
Phishing remains one of the most effective—and dangerous—forms of cyberattack because it targets people, not systems. In this episode, we explore how to build an effective phishing awareness program that trains employees to recognize and report suspicious messages before damage is done. We discuss how simulated phishing campaigns help reinforce tra…
  continue reading
 
Reconnaissance is the first phase of any attack—and the first opportunity for defenders to detect malicious intent. In this episode, we break down both passive and active reconnaissance techniques used by ethical hackers and adversaries alike. Passive recon relies on publicly available data, such as DNS records, social media, job postings, WHOIS da…
  continue reading
 
The value of a penetration test is closely tied to how realistic the environment is—and in this episode, we examine the types of environments in which pen tests are conducted: known, partially known, and unknown. A known environment test, also called white-box testing, gives the tester full knowledge of systems, code, or architecture—allowing them …
  continue reading
 
Penetration testing goes beyond identifying vulnerabilities—it simulates real-world attacks to see how systems, defenses, and teams hold up under pressure. In this episode, we explore the foundational concepts of penetration testing, starting with physical tests that assess physical security through social engineering, badge cloning, or simulated i…
  continue reading
 
External audits provide an independent review of an organization’s security and compliance posture, often driven by regulatory mandates, certification requirements, or contractual obligations. In this episode, we explore different types of external audits and assessments, starting with regulatory audits that evaluate adherence to laws like HIPAA, P…
  continue reading
 
The effectiveness of internal audits depends not just on what’s reviewed, but on how the audit function is structured within the organization. In this episode, we examine audit committees—teams responsible for planning, conducting, and overseeing internal audits to ensure objectivity and alignment with organizational goals. We discuss how committee…
  continue reading
 
Attestation and internal audits are two of the most powerful tools for ensuring your security program is functioning as intended. In this episode, we start by exploring attestation—formal declarations that certify compliance with policies, procedures, or external frameworks. Attestations are used in vendor contracts, employee training, and system c…
  continue reading
 
Effective data management is critical for both operational success and regulatory compliance, and in this episode, we explore how organizations maintain control over what they collect, where it’s stored, and how long it’s retained. We begin with the concept of data ownership—assigning clear accountability for specific datasets to ensure someone is …
  continue reading
 
Privacy and compliance are deeply intertwined, especially as global regulations push organizations to safeguard personal data across jurisdictions. In this episode, we examine how privacy laws operate at local, national, and international levels—highlighting frameworks like GDPR in Europe and CCPA in California, and exploring how they shape data co…
  continue reading
 
Managing personal data effectively starts with knowing exactly what you have, where it lives, how long you keep it, and what rights users have over it. In this final episode, we explore how to build and maintain a data inventory that tracks types of data collected, processing activities, access permissions, and storage locations. We also discuss re…
  continue reading
 
Data privacy is no longer just a legal issue—it’s a global business imperative, and this episode explores the complex and evolving landscape of privacy laws. We cover key regulations such as the European Union’s GDPR, California’s CCPA, Brazil’s LGPD, and other region-specific rules that govern how personal data is collected, processed, stored, and…
  continue reading
 
Attestation and acknowledgement are critical for ensuring that individuals and third parties formally understand and accept their roles in maintaining security and compliance. In this episode, we explain how attestation involves signing a formal statement that certifies understanding or adherence—used in contexts like security training, policy acce…
  continue reading
 
Failing to meet regulatory or contractual obligations can carry severe consequences, both financially and reputationally. In this episode, we break down the real-world impacts of non-compliance—including fines, sanctions, lawsuits, contract termination, and loss of certifications or business licenses. We examine examples where organizations were pe…
  continue reading
 
Compliance reporting ensures that an organization can demonstrate adherence to regulatory, contractual, and internal security requirements—and in this episode, we explore how to make it both accurate and efficient. We cover internal reporting practices, such as monthly compliance dashboards and policy enforcement summaries, as well as external repo…
  continue reading
 
Vendor risk doesn’t stop after the contract is signed—ongoing monitoring and relationship management are critical for maintaining visibility and accountability. In this episode, we explore how organizations track vendor performance through periodic assessments, SLA reviews, compliance reports, and security questionnaires. We highlight how to use co…
  continue reading
 
Contracts are one of the most powerful tools in managing cybersecurity obligations, and in this episode, we break down the types of agreements that define roles, responsibilities, and expectations with external parties. We cover Service-Level Agreements (SLAs), which outline performance and availability targets; Memorandums of Understanding (MOUs) …
  continue reading
 
A growing portion of cybersecurity risk now comes from outside the organization—specifically, through third-party vendors, suppliers, and service providers. In this episode, we examine how to assess and manage vendor risk across the full lifecycle, starting with due diligence during procurement and continuing through onboarding, monitoring, and off…
  continue reading
 
System resilience depends not only on planning but on measurable performance—and in this episode, we explore four key metrics that define how systems behave under failure: Mean Time to Repair (MTTR), Mean Time Between Failures (MTBF), Mean Time to Detect (MTTD), and Mean Time to Respond (MTTR—the other one). MTTR (repair) reflects how long it takes…
  continue reading
 
Recovery objectives define how quickly and how completely a system must return to functionality after a disruption—and in this episode, we explore two of the most critical metrics: Recovery Time Objective (RTO) and Recovery Point Objective (RPO). RTO sets the maximum allowable downtime before business operations suffer unacceptable consequences, wh…
  continue reading
 
Business Impact Analysis (BIA) is the foundation of business continuity and disaster recovery planning, helping organizations understand which processes matter most and how downtime affects operations. In this episode, we break down how BIAs identify critical systems, estimate recovery time objectives (RTOs) and recovery point objectives (RPOs), an…
  continue reading
 
Risk is meaningless if it isn’t communicated effectively—and in this episode, we focus on how risk reporting bridges the gap between technical findings and business leadership. We explore how to craft reports that align with the audience: dashboards and trend lines for executives, technical remediation plans for IT, and regulatory compliance summar…
  continue reading
 
Once risks are identified and analyzed, organizations must decide how to respond—and in this episode, we examine the five primary risk management strategies: mitigate, transfer, accept, avoid, and exempt. Mitigation involves applying controls to reduce risk impact or likelihood, such as enabling MFA or installing endpoint protection. Transferring r…
  continue reading
 
Every organization must decide how much risk it is willing to accept in pursuit of its goals—and this decision informs every security investment, policy, and control. In this episode, we break down the concepts of risk appetite (what you’re willing to pursue), risk tolerance (what you’re willing to withstand), and risk thresholds (the hard lines th…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play