Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecurity author and educa ...
…
continue reading
CompTIA Podcasts
The Biz Tech Podcast focuses on the business of technology and CompTIA corporate membership. Listen in as industry leaders from CompTIA communities and councils discuss challenges and opportunities, strategies for success, leading and emerging technologies, and what it all means for your customers and your business.
…
continue reading
Join Carolyn April and Seth Robinson, from CompTIA's research team, as they serve up the latest topics in tech. A mix of market data and guest appearances sets Volley up for engaging discussions on the technology world, changes in channel business and interesting trends. Subscribe today!
…
continue reading
This is the replay of my monthly CompTIA Security+ Study Group. You can also watch a video version of this podcast from my website at http://www.professormesser.com.
…
continue reading
This is the replay of my monthly CompTIA A+ Study Group. You can also watch a video version of this podcast from my website at http://www.professormesser.com.
…
continue reading
The CompTIA Women TechCast has completed its series. You can now find us on the CompTIA Biz Tech Podcast discussing diversity, women in tech, and the business of technology at https://blubrry.com/comptiabiztechpodcast/
…
continue reading
This is the replay of my monthly CompTIA Network+ Study Group. You can also watch a video version of this podcast from my website at http://www.professormesser.com.
…
continue reading
Byte-sized tutorials to prepare for Comptia Network+ exam, and for beginners who want to enter into cybersecurity.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Coffee Break with the CompTIA Councils is short, "Coffee Break" sized podcasts around topics of interest in the technology industry. Join us as we talk to thought leaders from across the technology industry about current trends and new and emerging technology.
…
continue reading
Join the CompTIA Emerging Technology Community as we talk to the pioneers bringing new technology to the market. Gain important insights on emerging tech, how it will impact businesses and society, and what are the far-reaching implications for our digital future. If you’re not already part of the CompTIA Emerging Technology Community, join here (https://bit.ly/2pEvTEP) and help Identity emerging technologies that can help transform business operations, create business opportunities, overcom ...
…
continue reading
Technology Services Success is sponsored by CompTIA’s Technology Lifecycle Services Community which provides a forum for business executives to discuss commonality within the technology service industry. This collaborative group engages in thought leadership which drives industry-specific education/tools and promotes innovation and business excellence in the service industry. If you’re not already part of the CompTIA Technology Lifecycle Services community, join here (https://bit.ly/2P7bQtx) ...
…
continue reading
This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
…
continue reading

4
CompTIA Breaking Barriers with CompTIA's Managed Services Community
CompTIA's Managed Service Community
Join the Managed Services Community as we talk to experts and peers to help break barriers in your business. We’ll talk about ways to improve your business operations, new services and solutions, how to capitalize on opportunities and find that next million. If you’re not already part of the CompTIA Managed Services Community, join here (https://bit.ly/2JbURST) to support the managed IT services industry through the promotion of best practices, the development of tools and templates and the ...
…
continue reading
The Podcast of the CompTIA UK Channel Community. Aimed at UK IT Solution Providers, MSP's, Vendors and Distributors. Richard Tubb interviews members to learn about their businesses, the lessons they've learned, and their thoughts on current IT industry trends.
…
continue reading
A podcast on all things related to IT Security from the CompTIA IT Security Community. If you’re not already part of the CompTIA IT Security Community, join here (https://bit.ly/2Pat2OD) and be on the forefront of new technologies in IT security and evaluate new opportunities and challenges for businesses in the security space.
…
continue reading
🌟 **Unlock the Power of the Cloud! 🚀** Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. Whether you are a novice or seeking to deepen your understanding, this program is tailored for you. Season 1 Episodes 1-14: CompTIA Security+ 601 Episodes 15-52: Certified Cloud Security Professional (CCSP) Season 2 Epis ...
…
continue reading
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
…
continue reading
Technologist Tales, an award-winning podcast produced by R.Clement.Creative, shares profiles of people from an array of backgrounds who discovered and shaped successful careers working with technology – and, now, help others do the same.
…
continue reading
Just an IT professional talking about anything technology like working an entry level helpdesk position, learning new tech skills, obtaining certs, building PCs, cool devices, voice assistant, VR, and more.
…
continue reading
The audio version of videos from my popular YouTube channel (JonGoodCyber).
…
continue reading

1
Professor Messer's CompTIA 220-1202 A+ Study Group After Show - July 2025
57:24
57:24
Play later
Play later
Lists
Like
Liked
57:24Your questions and more!By Professor Messer
…
continue reading

1
Ep. 179 Will CompTIA Sec+ land you a SOC Analyst role?
1:35:15
1:35:15
Play later
Play later
Lists
Like
Liked
1:35:15Go to our sponsor https://aura.com/techtualchatter to get a 14- day FREE trial and see if your personal information has been leaked online ------------------------------------------------------------------------------------ In episode 179 of The TechTual Talk, hosts HD and Cybershortieee discuss real-world cybersecurity threats, including AI-powere…
…
continue reading

1
CompTia Security+ Recertification and AWS's Operational Excellence Pillar
24:19
24:19
Play later
Play later
Lists
Like
Liked
24:19🌟 Unlock the Power of the Cloud! 🚀 Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. In this episode, I cover topics such as recertification of Security+ and the o…
…
continue reading

1
Episode 1: What Is the CompTIA Security Plus Certification?
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07This episode kicks off the Certify – Security Plus podcast series by introducing the CompTIA Security+ certification. You’ll learn what this credential is, why it's such a popular choice for cybersecurity beginners, and what makes it a foundational part of many career paths. Whether you're a student, a career switcher, or someone trying to understa…
…
continue reading

1
Professor Messer's CompTIA 220-1202 A+ Study Group - July 2025
1:15:45
1:15:45
Play later
Play later
Lists
Like
Liked
1:15:45Join me for CompTIA 220-1202 A+ Q&A, your questions, and more!By Professor Messer
…
continue reading

1
Professor Messer's CompTIA 220-1201 A+ Study Group After Show - July 2025
1:04:09
1:04:09
Play later
Play later
Lists
Like
Liked
1:04:09Your questions and more!By Professor Messer
…
continue reading

1
Professor Messer's CompTIA 220-1201 A+ Study Group - July 2025
1:13:48
1:13:48
Play later
Play later
Lists
Like
Liked
1:13:48Join me for CompTIA 220-1201 A+ Q&A, your questions, and more!By Professor Messer
…
continue reading

1
Ep. 180 Discover Six-Figure Career Opportunities in Energy (Pivot Now)
1:19:09
1:19:09
Play later
Play later
Lists
Like
Liked
1:19:09Learn how you can work with me one on one to secure a $90K+ cybersecurity role: https://techtualconsulting.tech/video-training ------------------------------------------------------------------------------------ In this episode of The TechTual Talk, hosts HD interviews Shalaya Morissette, a leader in the energy sector. Shalaya shares her journey fr…
…
continue reading

1
Ep. 178 The $200k Big 4 GRC Cyber Security Consultant
1:35:46
1:35:46
Play later
Play later
Lists
Like
Liked
1:35:46See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
…
continue reading

1
Professor Messer's Security+ Study Group After Show - June 2025
1:07:30
1:07:30
Play later
Play later
Lists
Like
Liked
1:07:30It's open Q&A on the Security+ After Show!By Professor Messer
…
continue reading

1
Professor Messer's Security+ Study Group - June 2025
1:14:22
1:14:22
Play later
Play later
Lists
Like
Liked
1:14:22Are you ready to get Security+ certified? Watch our free training course: In this month's Security+ Study Group, you'll learn about: Finding the right Security device Maintaining uptime during a failure The benefits of NetFlow Documentation and agreement types Securely storing private keys And more Keep the study process going! Watch additional Sec…
…
continue reading

1
Professor Messer's N10-009 Network+ Study Group After Show - June 2025
1:03:25
1:03:25
Play later
Play later
Lists
Like
Liked
1:03:25We take your questions about certifications, technology, and anything else!By Professor Messer
…
continue reading

1
Professor Messer's N10-009 Network+ Study Group - June 2025
1:16:43
1:16:43
Play later
Play later
Lists
Like
Liked
1:16:43Are you ready to get Network+ certified? Watch our free N10-009 training course. In this month's Network+ Study Group, you'll learn about: Network troubleshooting at the command line Access point configurations Finding an FQDN NAC implementations Automatic IP address assignments Keep the study process going! Watch additional Network+ Study Group vi…
…
continue reading

1
Ep. 177 iOS 26, Google Cloud Outage, Android 16, & Discord Invite Link Exploits
53:47
53:47
Play later
Play later
Lists
Like
Liked
53:47Check out our Sponsor SNHU to learn more about their cybersecurity degree program https://snhu.edu/techtual ------------------------------------------------------------------------------------ In this episode of The TechTual Talk, HD covers the Google Cloud outage, hackers exploiting Discord invite links, and a cyberattack on grocery distributor UN…
…
continue reading

1
From FBI Cyber Agent to Police Tech Innovator | Andre McGregor
52:39
52:39
Play later
Play later
Lists
Like
Liked
52:39Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast Andre McGregor of ForceMetrics shares his incredible journey from reluctant FBI recruit to cybersecurity entrepreneur. Despite initially declining the FBI's recruitment call, Andre went on to beco…
…
continue reading

1
Episode 221: Developing and Executing Security Awareness Programs (Domain 5)
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Security awareness programs don’t happen by accident—they’re built with intent, tested with feedback, and refined over time. In this final episode of the series, we walk through how to develop and execute a successful awareness program, from defining goals and identifying target audiences to choosing content formats and delivery methods. We discuss…
…
continue reading

1
Episode 220: Security Reporting and Monitoring (Domain 5)
8:56
8:56
Play later
Play later
Lists
Like
Liked
8:56A well-informed workforce should be empowered not just to avoid risk—but to report it. In this episode, we explore how organizations build clear, accessible reporting channels that encourage employees to share suspicious activity, policy violations, or near misses without fear of reprisal. We also examine how recurring reports—like monthly phishing…
…
continue reading

1
Episode 219: Hybrid and Remote Work Security Awareness (Domain 5)
9:31
9:31
Play later
Play later
Lists
Like
Liked
9:31Remote and hybrid work models create new layers of security complexity—blending corporate environments with home networks, personal devices, and cloud-first workflows. In this episode, we explore the core topics of remote work security awareness, starting with safe home Wi-Fi configurations, strong authentication, and VPN use for secure connections…
…
continue reading

1
Episode 218: User Guidance and Training (Part 3) (Domain 5)
8:50
8:50
Play later
Play later
Lists
Like
Liked
8:50Security training must evolve with the threat landscape—and that means addressing common but high-risk topics like removable media, social engineering, and operational security (OPSEC). In this episode, we explain how removable media—like USB drives and external hard drives—pose significant threats when plugged into unmanaged or infected systems. W…
…
continue reading

1
Episode 217: User Guidance and Training (Part 2) (Domain 5)
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Beyond basic policy understanding, users need targeted training in key risk areas that attackers frequently exploit—especially insiders, passwords, and privileged access. In this episode, we focus on insider threat awareness, teaching employees how to recognize red flags like excessive access, unusual behavior, or data hoarding by peers. We also co…
…
continue reading

1
Episode 216: User Guidance and Training (Part 1) (Domain 5)
8:44
8:44
Play later
Play later
Lists
Like
Liked
8:44Users are often the first and last line of defense in cybersecurity, and their success depends on clear guidance and ongoing training. In this episode, we focus on policy awareness and handbooks, which provide employees with a foundational understanding of acceptable use, access controls, device handling, and reporting expectations. We explore how …
…
continue reading

1
Episode 215: Anomalous Behavior Recognition (Domain 5)
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Cyber threats often hide in plain sight, masquerading as normal user activity until they trigger something unexpected—and that’s why recognizing anomalous behavior is such a valuable skill. In this episode, we explore how to identify risky, unexpected, or unintentional actions that may indicate insider threats, compromised accounts, or social engin…
…
continue reading

1
Episode 214: Effective Phishing Awareness (Domain 5)
8:59
8:59
Play later
Play later
Lists
Like
Liked
8:59Phishing remains one of the most effective—and dangerous—forms of cyberattack because it targets people, not systems. In this episode, we explore how to build an effective phishing awareness program that trains employees to recognize and report suspicious messages before damage is done. We discuss how simulated phishing campaigns help reinforce tra…
…
continue reading

1
Episode 213: Reconnaissance Techniques (Domain 5)
8:33
8:33
Play later
Play later
Lists
Like
Liked
8:33Reconnaissance is the first phase of any attack—and the first opportunity for defenders to detect malicious intent. In this episode, we break down both passive and active reconnaissance techniques used by ethical hackers and adversaries alike. Passive recon relies on publicly available data, such as DNS records, social media, job postings, WHOIS da…
…
continue reading

1
Episode 212: Penetration Testing Environments (Domain 5)
9:11
9:11
Play later
Play later
Lists
Like
Liked
9:11The value of a penetration test is closely tied to how realistic the environment is—and in this episode, we examine the types of environments in which pen tests are conducted: known, partially known, and unknown. A known environment test, also called white-box testing, gives the tester full knowledge of systems, code, or architecture—allowing them …
…
continue reading

1
Episode 211: Fundamentals of Penetration Testing (Domain 5)
9:53
9:53
Play later
Play later
Lists
Like
Liked
9:53Penetration testing goes beyond identifying vulnerabilities—it simulates real-world attacks to see how systems, defenses, and teams hold up under pressure. In this episode, we explore the foundational concepts of penetration testing, starting with physical tests that assess physical security through social engineering, badge cloning, or simulated i…
…
continue reading

1
Episode 210: External Audits and Assessments (Domain 5)
9:56
9:56
Play later
Play later
Lists
Like
Liked
9:56External audits provide an independent review of an organization’s security and compliance posture, often driven by regulatory mandates, certification requirements, or contractual obligations. In this episode, we explore different types of external audits and assessments, starting with regulatory audits that evaluate adherence to laws like HIPAA, P…
…
continue reading

1
Episode 209: Internal Audit Structures (Domain 5)
9:54
9:54
Play later
Play later
Lists
Like
Liked
9:54The effectiveness of internal audits depends not just on what’s reviewed, but on how the audit function is structured within the organization. In this episode, we examine audit committees—teams responsible for planning, conducting, and overseeing internal audits to ensure objectivity and alignment with organizational goals. We discuss how committee…
…
continue reading

1
Episode 208: Attestation and Internal Audits (Domain 5)
10:10
10:10
Play later
Play later
Lists
Like
Liked
10:10Attestation and internal audits are two of the most powerful tools for ensuring your security program is functioning as intended. In this episode, we start by exploring attestation—formal declarations that certify compliance with policies, procedures, or external frameworks. Attestations are used in vendor contracts, employee training, and system c…
…
continue reading

1
Episode 207: Data Management and Compliance (Domain 5)
9:14
9:14
Play later
Play later
Lists
Like
Liked
9:14Effective data management is critical for both operational success and regulatory compliance, and in this episode, we explore how organizations maintain control over what they collect, where it’s stored, and how long it’s retained. We begin with the concept of data ownership—assigning clear accountability for specific datasets to ensure someone is …
…
continue reading

1
Episode 206: Privacy and Legal Implications of Compliance (Domain 5)
10:14
10:14
Play later
Play later
Lists
Like
Liked
10:14Privacy and compliance are deeply intertwined, especially as global regulations push organizations to safeguard personal data across jurisdictions. In this episode, we examine how privacy laws operate at local, national, and international levels—highlighting frameworks like GDPR in Europe and CCPA in California, and exploring how they shape data co…
…
continue reading

1
Episode 205: Data Inventory, Retention, and the Right to Be Forgotten (Domain 5)
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48Managing personal data effectively starts with knowing exactly what you have, where it lives, how long you keep it, and what rights users have over it. In this final episode, we explore how to build and maintain a data inventory that tracks types of data collected, processing activities, access permissions, and storage locations. We also discuss re…
…
continue reading

1
Episode 204: Privacy Laws and Global Compliance (Domain 5)
10:14
10:14
Play later
Play later
Lists
Like
Liked
10:14Data privacy is no longer just a legal issue—it’s a global business imperative, and this episode explores the complex and evolving landscape of privacy laws. We cover key regulations such as the European Union’s GDPR, California’s CCPA, Brazil’s LGPD, and other region-specific rules that govern how personal data is collected, processed, stored, and…
…
continue reading

1
Episode 203: Attestation and Acknowledgement in Compliance (Domain 5)
9:47
9:47
Play later
Play later
Lists
Like
Liked
9:47Attestation and acknowledgement are critical for ensuring that individuals and third parties formally understand and accept their roles in maintaining security and compliance. In this episode, we explain how attestation involves signing a formal statement that certifies understanding or adherence—used in contexts like security training, policy acce…
…
continue reading

1
Episode 202: Consequences of Non-Compliance (Domain 5)
9:31
9:31
Play later
Play later
Lists
Like
Liked
9:31Failing to meet regulatory or contractual obligations can carry severe consequences, both financially and reputationally. In this episode, we break down the real-world impacts of non-compliance—including fines, sanctions, lawsuits, contract termination, and loss of certifications or business licenses. We examine examples where organizations were pe…
…
continue reading

1
Episode 201: Effective Compliance Reporting (Domain 5)
10:08
10:08
Play later
Play later
Lists
Like
Liked
10:08Compliance reporting ensures that an organization can demonstrate adherence to regulatory, contractual, and internal security requirements—and in this episode, we explore how to make it both accurate and efficient. We cover internal reporting practices, such as monthly compliance dashboards and policy enforcement summaries, as well as external repo…
…
continue reading

1
Episode 200: Ongoing Vendor Monitoring and Engagement (Domain 5)
9:13
9:13
Play later
Play later
Lists
Like
Liked
9:13Vendor risk doesn’t stop after the contract is signed—ongoing monitoring and relationship management are critical for maintaining visibility and accountability. In this episode, we explore how organizations track vendor performance through periodic assessments, SLA reviews, compliance reports, and security questionnaires. We highlight how to use co…
…
continue reading

1
Episode 199: Agreement Types and Contractual Security (Domain 5)
9:22
9:22
Play later
Play later
Lists
Like
Liked
9:22Contracts are one of the most powerful tools in managing cybersecurity obligations, and in this episode, we break down the types of agreements that define roles, responsibilities, and expectations with external parties. We cover Service-Level Agreements (SLAs), which outline performance and availability targets; Memorandums of Understanding (MOUs) …
…
continue reading

1
Episode 198: Vendor Risk and Supply Chain Considerations (Domain 5)
10:00
10:00
Play later
Play later
Lists
Like
Liked
10:00A growing portion of cybersecurity risk now comes from outside the organization—specifically, through third-party vendors, suppliers, and service providers. In this episode, we examine how to assess and manage vendor risk across the full lifecycle, starting with due diligence during procurement and continuing through onboarding, monitoring, and off…
…
continue reading

1
Episode 197: Mean Time Metrics and System Resilience (Domain 5)
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09System resilience depends not only on planning but on measurable performance—and in this episode, we explore four key metrics that define how systems behave under failure: Mean Time to Repair (MTTR), Mean Time Between Failures (MTBF), Mean Time to Detect (MTTD), and Mean Time to Respond (MTTR—the other one). MTTR (repair) reflects how long it takes…
…
continue reading

1
Episode 196: Understanding Recovery Objectives (Domain 5)
9:08
9:08
Play later
Play later
Lists
Like
Liked
9:08Recovery objectives define how quickly and how completely a system must return to functionality after a disruption—and in this episode, we explore two of the most critical metrics: Recovery Time Objective (RTO) and Recovery Point Objective (RPO). RTO sets the maximum allowable downtime before business operations suffer unacceptable consequences, wh…
…
continue reading

1
Episode 195: Business Impact Analysis (Domain 5)
9:16
9:16
Play later
Play later
Lists
Like
Liked
9:16Business Impact Analysis (BIA) is the foundation of business continuity and disaster recovery planning, helping organizations understand which processes matter most and how downtime affects operations. In this episode, we break down how BIAs identify critical systems, estimate recovery time objectives (RTOs) and recovery point objectives (RPOs), an…
…
continue reading

1
Episode 194: Risk Reporting and Communication (Domain 5)
9:47
9:47
Play later
Play later
Lists
Like
Liked
9:47Risk is meaningless if it isn’t communicated effectively—and in this episode, we focus on how risk reporting bridges the gap between technical findings and business leadership. We explore how to craft reports that align with the audience: dashboards and trend lines for executives, technical remediation plans for IT, and regulatory compliance summar…
…
continue reading

1
Episode 193: Risk Management Strategies (Domain 5)
10:17
10:17
Play later
Play later
Lists
Like
Liked
10:17Once risks are identified and analyzed, organizations must decide how to respond—and in this episode, we examine the five primary risk management strategies: mitigate, transfer, accept, avoid, and exempt. Mitigation involves applying controls to reduce risk impact or likelihood, such as enabling MFA or installing endpoint protection. Transferring r…
…
continue reading

1
Episode 192: Risk Appetite, Tolerance, and Thresholds (Domain 5)
9:43
9:43
Play later
Play later
Lists
Like
Liked
9:43Every organization must decide how much risk it is willing to accept in pursuit of its goals—and this decision informs every security investment, policy, and control. In this episode, we break down the concepts of risk appetite (what you’re willing to pursue), risk tolerance (what you’re willing to withstand), and risk thresholds (the hard lines th…
…
continue reading