The CYSA PrepCast is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
…
continue reading
CompTIA Podcasts
The Network Plus PrepCast is your comprehensive audio training series for mastering the CompTIA Network Plus certification. Designed for learners on the go, this prepcast transforms exam objectives into clear, structured, and engaging episodes tailored for auditory learning. Whether you're walking, commuting, or studying between shifts, each episode breaks down complex networking topics into digestible segments aligned with the official CompTIA blueprint. From OSI layers and IP addressing to ...
…
continue reading
The Biz Tech Podcast focuses on the business of technology and CompTIA corporate membership. Listen in as industry leaders from CompTIA communities and councils discuss challenges and opportunities, strategies for success, leading and emerging technologies, and what it all means for your customers and your business.
…
continue reading
Join Carolyn April and Seth Robinson, from CompTIA's research team, as they serve up the latest topics in tech. A mix of market data and guest appearances sets Volley up for engaging discussions on the technology world, changes in channel business and interesting trends. Subscribe today!
…
continue reading
This is the replay of my monthly CompTIA Network+ Study Group. You can also watch a video version of this podcast from my website at http://www.professormesser.com.
…
continue reading
This is the replay of my monthly CompTIA A+ Study Group. You can also watch a video version of this podcast from my website at http://www.professormesser.com.
…
continue reading
The CompTIA Women TechCast has completed its series. You can now find us on the CompTIA Biz Tech Podcast discussing diversity, women in tech, and the business of technology at https://blubrry.com/comptiabiztechpodcast/
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
This is the replay of my monthly CompTIA Security+ Study Group. You can also watch a video version of this podcast from my website at http://www.professormesser.com.
…
continue reading
Byte-sized tutorials to prepare for Comptia Network+ exam, and for beginners who want to enter into cybersecurity.
…
continue reading
Coffee Break with the CompTIA Councils is short, "Coffee Break" sized podcasts around topics of interest in the technology industry. Join us as we talk to thought leaders from across the technology industry about current trends and new and emerging technology.
…
continue reading
Join the CompTIA Emerging Technology Community as we talk to the pioneers bringing new technology to the market. Gain important insights on emerging tech, how it will impact businesses and society, and what are the far-reaching implications for our digital future. If you’re not already part of the CompTIA Emerging Technology Community, join here (https://bit.ly/2pEvTEP) and help Identity emerging technologies that can help transform business operations, create business opportunities, overcom ...
…
continue reading
Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecurity author and educa ...
…
continue reading
Technology Services Success is sponsored by CompTIA’s Technology Lifecycle Services Community which provides a forum for business executives to discuss commonality within the technology service industry. This collaborative group engages in thought leadership which drives industry-specific education/tools and promotes innovation and business excellence in the service industry. If you’re not already part of the CompTIA Technology Lifecycle Services community, join here (https://bit.ly/2P7bQtx) ...
…
continue reading
This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
…
continue reading

1
CompTIA Breaking Barriers with CompTIA's Managed Services Community
CompTIA's Managed Service Community
Join the Managed Services Community as we talk to experts and peers to help break barriers in your business. We’ll talk about ways to improve your business operations, new services and solutions, how to capitalize on opportunities and find that next million. If you’re not already part of the CompTIA Managed Services Community, join here (https://bit.ly/2JbURST) to support the managed IT services industry through the promotion of best practices, the development of tools and templates and the ...
…
continue reading
The Podcast of the CompTIA UK Channel Community. Aimed at UK IT Solution Providers, MSP's, Vendors and Distributors. Richard Tubb interviews members to learn about their businesses, the lessons they've learned, and their thoughts on current IT industry trends.
…
continue reading
A podcast on all things related to IT Security from the CompTIA IT Security Community. If you’re not already part of the CompTIA IT Security Community, join here (https://bit.ly/2Pat2OD) and be on the forefront of new technologies in IT security and evaluate new opportunities and challenges for businesses in the security space.
…
continue reading
🌟 **Unlock the Power of the Cloud! 🚀** Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. Whether you are a novice or seeking to deepen your understanding, this program is tailored for you. Season 1 Episodes 1-14: CompTIA Security+ 601 Episodes 15-52: Certified Cloud Security Professional (CCSP) Season 2 Epis ...
…
continue reading
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
…
continue reading
Technologist Tales, an award-winning podcast produced by R.Clement.Creative, shares profiles of people from an array of backgrounds who discovered and shaped successful careers working with technology – and, now, help others do the same.
…
continue reading
Just an IT professional talking about anything technology like working an entry level helpdesk position, learning new tech skills, obtaining certs, building PCs, cool devices, voice assistant, VR, and more.
…
continue reading
The audio version of videos from my popular YouTube channel (JonGoodCyber).
…
continue reading

1
Professor Messer's CompTIA 220-1202 A+ Study Group After Show - August 2025
1:01:25
1:01:25
Play later
Play later
Lists
Like
Liked
1:01:25Your questions and more!By Professor Messer
…
continue reading

1
Episode 184: Network Troubleshooting Methodology Recap and Exam Readiness
13:04
13:04
Play later
Play later
Lists
Like
Liked
13:04To wrap up the series, this episode reviews the full troubleshooting methodology—from identifying the problem to documenting the fix. We walk through common scenarios, showing how the steps apply in real life and what tools are best suited for each phase. You’ll revisit techniques for isolating symptoms, confirming theories, and verifying solutions…
…
continue reading

1
Professor Messer's N10-009 Network+ Study Group After Show - August 2025
1:11:59
1:11:59
Play later
Play later
Lists
Like
Liked
1:11:59We take your questions about certifications, technology, and anything else!By Professor Messer
…
continue reading

1
Professor Messer's N10-009 Network+ Study Group - August
1:13:38
1:13:38
Play later
Play later
Lists
Like
Liked
1:13:38Are you ready to get Network+ certified? Watch our free N10-009 training course. In this month's Network+ Study Group, you'll learn about: Troubleshooting at the command line Working with SC connectors Equipment in an MDF Walking a MIB New employees and AD groups Keep the study process going! Watch additional Network+ Study Group video replays on t…
…
continue reading

1
Why Hackers Are Stealing Encrypted Data Now To Decrypt Later | David Close
44:27
44:27
Play later
Play later
Lists
Like
Liked
44:27Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast David Close, Chief Solutions Architect at Futurex, discusses the reality facing our digital world: quantum computing will soon break the encryption protecting everything from …
…
continue reading

1
Professor Messer's CompTIA 220-1202 A+ Study Group - August 2025
1:14:01
1:14:01
Play later
Play later
Lists
Like
Liked
1:14:01Join me for CompTIA 220-1202 A+ Q&A, your questions, and more!By Professor Messer
…
continue reading

1
Professor Messer's CompTIA 220-1201 A+ Study Group After Show - August 2025
57:27
57:27
Play later
Play later
Lists
Like
Liked
57:27Your questions and more!By Professor Messer
…
continue reading

1
Professor Messer's CompTIA 220-1201 A+ Study Group - August 2025
1:11:38
1:11:38
Play later
Play later
Lists
Like
Liked
1:11:38Join me for CompTIA 220-1201 A+ Q&A, your questions, and more!By Professor Messer
…
continue reading

1
Ep.184 Cyber News: PaloAlto buys CyberArk,Tea App Hacked again, Tech Women leave TikTok
1:08:07
1:08:07
Play later
Play later
Lists
Like
Liked
1:08:07Book a call here: https://calendly.com/techtuaulconsulting ------------------------------------------------------------------------------------ In this episode of The TechTual Talk HD and Cybershortieee cover the Tea app new hack, where private messages were leaked. They also discuss paloalto $25 billion acquisition of CyberArk, St. Paul suffered a…
…
continue reading

1
Ep. 183 The Tea App Data Breach: Millenial Managers, Sam Altman on ChatGPT Legal Protection
2:04:16
2:04:16
Play later
Play later
Lists
Like
Liked
2:04:16Go to our sponsor https://aura.com/techtualchatter to get a 14- day FREE trial and see if your personal information has been leaked online ------------------------------------------------------------------------------------ Welcome back to another episode of The TechTual Talk! In today’s episode, hosts HD and CyberShortiee dive deep into some hot-b…
…
continue reading

1
Working in ransomware response, investigation and recovery | John Price
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast John Price of SubRosa joins today's Cyber Work Podcast to share insights from his unique career path spanning UK military counterintelligence, banking cybersecurity and foundi…
…
continue reading

1
Ep. 182 Mastering Cloud Careers: Real Talk on Help Desk, DevOps, and Tech Interview Strategies
1:41:41
1:41:41
Play later
Play later
Lists
Like
Liked
1:41:41Learn how to get into the cloud here https://skool.com/cloudtechexec ------------------------------------------------------------------------------------ In this episode of The TechTual Talk, host HD interviews Mr. CJ (CloudTech Exec), who shares his journey from the Virgin Islands to a career in cloud engineering and DevOps. They discuss breaking …
…
continue reading

1
Professor Messer's Security+ Study Group After Show - July 2025
48:21
48:21
Play later
Play later
Lists
Like
Liked
48:21It's open Q&A on the Security+ After Show!By Professor Messer
…
continue reading

1
Professor Messer's Security+ Study Group - July 2025
1:14:25
1:14:25
Play later
Play later
Lists
Like
Liked
1:14:25Are you ready to get Security+ certified? Watch our free training course: In this month's Security+ Study Group, you'll learn about: The benefits of NetFlow The danger of redirected websites More cloud infrastructures and uptime Working with DKIM And more Keep the study process going! Watch additional Security+ Study Group video replays on the Prof…
…
continue reading

1
From security audits to privacy consulting: Building a GRC practice | Will Sweeney
42:20
42:20
Play later
Play later
Lists
Like
Liked
42:20Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Will Sweeney, founding and managing partner of Zaviant, joins the Cyber Work Podcast to discuss the evolving landscape of data privacy and GRC (governance, risk and compliance…
…
continue reading

1
Episode 183: BYOD, Licensing Issues, and Troubleshooting Oddities
18:10
18:10
Play later
Play later
Lists
Like
Liked
18:10Not every issue fits into neat categories. In this episode, we address edge-case problems like Bring Your Own Device (BYOD) compatibility, expired licenses on security appliances, and odd client behaviors that defy conventional logic. You’ll learn how mobile OS updates, unsupported encryption protocols, or insufficient license capacity can cause my…
…
continue reading

1
Episode 182: Optical, Hardware, and Performance Issues — Identifying and Resolving Problems
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23This episode revisits advanced troubleshooting at the hardware and optical layer. We cover transceiver problems, dirty fiber connectors, power mismatches, and switch backplane limitations. You'll learn how to read interface stats for clues, test suspect links, and isolate faults in a complex network environment. We also explain how hardware limits—…
…
continue reading

1
Episode 181: DNS and NTP Failures — Troubleshooting Name and Time Resolution
15:15
15:15
Play later
Play later
Lists
Like
Liked
15:15DNS and NTP are often invisible—until they fail. This episode shows how to diagnose and fix issues with domain name resolution and time synchronization, both of which affect authentication, connectivity, and performance. You’ll learn how to use nslookup, dig, and ntpq to troubleshoot problems and interpret server behavior. We also cover how expired…
…
continue reading

1
Episode 180: Asymmetric Routing, Multicast Flooding, and ACL Misconfigurations
14:54
14:54
Play later
Play later
Lists
Like
Liked
14:54Some network issues are subtle, involving advanced concepts like asymmetric routing, multicast flooding, and access control list (ACL) errors. This episode explains how asymmetric routing—where traffic returns on a different path than it arrived—can confuse firewalls and lead to dropped packets. We discuss how to diagnose and design around this beh…
…
continue reading

1
Episode 179: Collision Domains, Broadcast Storms, and Routing Loops
14:32
14:32
Play later
Play later
Lists
Like
Liked
14:32Poor network segmentation can lead to serious Layer 2 and Layer 3 problems. In this episode, we explain how excessive collision domains on legacy hubs or poorly configured switches can slow performance and cause retransmissions. We also dive into broadcast storms—where unchecked broadcast traffic floods the network—and routing loops, which occur wh…
…
continue reading

1
Episode 178: Routing Troubleshooting — Missing Routes, DHCP, and Address Conflicts
14:58
14:58
Play later
Play later
Lists
Like
Liked
14:58Routing issues can silently break connectivity—even if everything looks fine at Layer 2. In this episode, we diagnose common routing problems, including missing default routes, misconfigured static routes, and incorrectly advertised subnets. You'll learn how to use ping, traceroute, and routing tables to spot when traffic is being dropped or misrou…
…
continue reading

1
Episode 177: Network Foundations — VLAN, Interface, and Configuration Checks
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23Sometimes network issues stem from the basics: incorrect VLAN assignment, disabled interfaces, or outdated configurations. This episode walks through foundational network checks that resolve a surprising number of connectivity issues. You'll learn how to verify trunk ports, check interface status, review MAC address tables, and ensure endpoints are…
…
continue reading

1
Episode 176: Wireless Configuration Problems — SSID, Encryption, and Client Issues
14:40
14:40
Play later
Play later
Lists
Like
Liked
14:40Even if the signal is strong, configuration mistakes can block connectivity. This episode addresses common wireless configuration errors such as mismatched SSIDs, incorrect security settings, or outdated drivers on client devices. You’ll learn how WPA2 vs. WPA3 affects compatibility, how authentication failures are logged, and what to check when cl…
…
continue reading

1
Episode 175: Wireless Issues — Antenna Placement, Channels, and Signal Loss
14:53
14:53
Play later
Play later
Lists
Like
Liked
14:53Signal problems are among the most common wireless complaints—and many stem from poor antenna planning. This episode examines how antenna placement, orientation, and environment affect signal propagation. You'll learn the difference between omnidirectional and directional antennas and how line-of-sight, reflection, and absorption affect coverage. W…
…
continue reading

1
Episode 174: Wireless Limitations — Throughput, Signal Strength, and Power
14:32
14:32
Play later
Play later
Lists
Like
Liked
14:32Wireless technology is incredibly convenient—but also limited by physical and environmental factors. In this episode, we explore the inherent constraints of wireless communication, such as reduced throughput compared to wired networks, signal degradation over distance, and interference from walls, other devices, or even weather. You’ll learn how to…
…
continue reading

1
Episode 173: Interface, Routing, and Platform-Specific Diagnostics
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51Every device platform—whether Cisco, Juniper, or another—has its own diagnostic approach. In this episode, we explore common troubleshooting techniques across routers and switches, focusing on interface states, routing tables, and platform-specific commands. You’ll learn how to interpret “up/down” messages, diagnose err-disabled ports, and use comm…
…
continue reading

1
Episode 172: Infrastructure Tools — TFTP, Terminal Emulators, and Basic Commands
14:28
14:28
Play later
Play later
Lists
Like
Liked
14:28Some of the most essential network management tools are also the most overlooked. This episode covers infrastructure tools such as TFTP servers for file transfers, terminal emulators like PuTTY and SecureCRT for CLI access, and core diagnostic commands including ping, traceroute, ipconfig, and netstat. You’ll learn how these tools assist with confi…
…
continue reading

1
Episode 171: Network Discovery and Performance Monitoring
14:12
14:12
Play later
Play later
Lists
Like
Liked
14:12Network visibility starts with knowing what’s on your network. In this episode, we explain network discovery techniques using tools like ping sweeps, SNMP queries, and Nmap scans to identify devices, operating systems, and open services. You’ll learn how to distinguish active vs. passive discovery methods, the importance of using up-to-date invento…
…
continue reading

1
Episode 170: Packet Inspection and Traffic Analysis Tools
15:17
15:17
Play later
Play later
Lists
Like
Liked
15:17To truly understand what’s happening on the network, you need to inspect the packets themselves. This episode introduces tools like Wireshark, tcpdump, and protocol analyzers that allow you to capture and analyze live traffic. You’ll learn how to filter by IP, port, or protocol, and how to identify patterns like retransmissions, failed handshakes, …
…
continue reading

1
Episode 169: Wireless Troubleshooting — Tools and Bandwidth Analysis
15:04
15:04
Play later
Play later
Lists
Like
Liked
15:04Wireless networks introduce a layer of complexity that often demands specialized tools for visibility. In this episode, we cover wireless troubleshooting utilities including site survey tools, spectrum analyzers, and signal heatmaps. These help you diagnose issues like dead zones, co-channel interference, and excessive client density. We also explo…
…
continue reading

1
Episode 168: Advanced Tools for Fiber Optics and Signal Testing
15:41
15:41
Play later
Play later
Lists
Like
Liked
15:41Fiber requires a different class of diagnostic tools due to its precision and sensitivity. In this episode, we cover devices like OTDRs (Optical Time Domain Reflectometers), power meters, and visual fault locators. You’ll learn how these tools detect breaks, signal loss, and connector issues with pinpoint accuracy. OTDRs, for example, send pulses o…
…
continue reading

1
Episode 167: Cable Testing Tools — Crimpers, Punchdowns, and Locators
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20Troubleshooting starts with the right tools. In this episode, we walk through the essential cable testing and installation tools you’ll use on the job. These include crimpers for RJ-45 connectors, punchdown tools for keystone jacks and patch panels, and continuity testers for verifying wire maps. You’ll also learn how cable locators and tone genera…
…
continue reading

1
Episode 166: Link Layer Diagnostics — Duplexing, Transceivers, and LEDs
14:54
14:54
Play later
Play later
Lists
Like
Liked
14:54Link-level problems are easy to overlook but frequently cause intermittent issues. This episode explores duplex mismatches—where one device is set to full duplex and the other to half—leading to collisions, retransmissions, and degraded performance. We explain how to spot and correct these mismatches using port configuration and interface statistic…
…
continue reading

1
Episode 165: Common Cable Faults, Errors, and Hardware Issues
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39Even a well-designed network can experience hardware or cabling faults over time. This episode breaks down common problems such as broken connectors, bent pins, cable kinks, and worn insulation. We explain how these physical issues translate into dropped packets, CRC errors, and link flapping. Recognizing these symptoms early helps prevent widespre…
…
continue reading

1
Episode 164: Cable Performance Specifications and Specialized Applications
15:32
15:32
Play later
Play later
Lists
Like
Liked
15:32Cable problems can often look like application issues, but they require a different kind of troubleshooting. In this episode, we review cable specifications like length limits, signal loss, impedance, and interference resistance. You'll learn how to recognize mismatches between cable category and intended use, such as trying to run 10 Gbps over Cat…
…
continue reading

1
Episode 163: Troubleshooting Methodology — Implementing Solutions and Documentation
15:43
15:43
Play later
Play later
Lists
Like
Liked
15:43Once you’ve confirmed the cause of a network issue, it's time to solve it. This episode covers the final stages of the troubleshooting methodology: establishing a plan of action, implementing the solution, verifying functionality, and documenting everything. You’ll learn how to evaluate risk before making changes, how to plan rollback strategies, a…
…
continue reading

1
Episode 162: Troubleshooting Methodology — Identifying Problems and Probable Causes
15:51
15:51
Play later
Play later
Lists
Like
Liked
15:51The foundation of effective troubleshooting is a structured approach. In this episode, we introduce the CompTIA troubleshooting methodology, focusing on the first few steps: identifying the problem, establishing a theory of probable cause, and testing that theory. You'll learn how to ask the right questions, collect information from logs and users,…
…
continue reading

1
Episode 161: Welcome to Domain 5 — Network Troubleshooting
16:15
16:15
Play later
Play later
Lists
Like
Liked
16:15In this final domain, we turn our focus to troubleshooting—a skill that ties together everything you’ve learned so far. This episode introduces Domain 5 and outlines the key areas it covers, including troubleshooting methodology, cable testing, routing diagnostics, wireless issues, and performance analysis. Unlike previous domains that focused on s…
…
continue reading

1
Episode 160: Detection Methods and Prevention through Training
15:01
15:01
Play later
Play later
Lists
Like
Liked
15:01Security tools can’t catch every threat—but informed users often can. This episode looks at the balance between technical detection methods and user-driven prevention. We start by examining detection tools like antivirus, IDS/IPS, SIEM platforms, and anomaly-based monitoring. You’ll learn how these systems generate alerts, how tuning reduces false …
…
continue reading

1
Episode 159: Physical Security Fundamentals — Access Control and Asset Disposal
17:09
17:09
Play later
Play later
Lists
Like
Liked
17:09While cyber defenses are critical, physical security is just as important. In this episode, we explain how physical access controls protect infrastructure from unauthorized tampering, theft, or sabotage. You’ll learn about badge systems, biometrics, mantraps, camera placement, and hardware locks. These controls help restrict access to wiring closet…
…
continue reading

1
Episode 158: Advanced Wireless Security — MAC Filters, Client Isolation, and Captive Portals
13:21
13:21
Play later
Play later
Lists
Like
Liked
13:21Wireless networks require layered security controls to keep unauthorized users out and ensure a clean client experience. In this episode, we cover advanced wireless protections including MAC filtering, client isolation, and captive portals. MAC filtering adds a basic layer of access control by allowing or denying clients based on their hardware add…
…
continue reading

1
Episode 157: Firewall Rules and ACL Management
13:56
13:56
Play later
Play later
Lists
Like
Liked
13:56Firewalls and access control lists are the gatekeepers of your network, and understanding how to configure them correctly is essential. This episode explains how to structure firewall rules and ACLs (Access Control Lists) using principles like implicit deny, least privilege, and rule order. You'll learn how rules are evaluated top-down and why a mi…
…
continue reading

1
Episode 156: Hardening Network Devices — Interfaces, Passwords, and Firmware Management
9:28
9:28
Play later
Play later
Lists
Like
Liked
9:28Securing the network starts with securing its devices. In this episode, we focus on hardening best practices for routers, switches, and firewalls. This includes disabling unused interfaces, enforcing strong password policies, and limiting access with ACLs and administrative timeouts. We also explore remote access security—ensuring SSH replaces Teln…
…
continue reading