This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
…
  continue reading
Comptia Security Podcasts
The CYSA+ Audio Course is your complete, exam-focused companion for mastering the CompTIA Cybersecurity Analyst (CYSA+) certification. Designed for learners who are always on the move, this Audio Course transforms the official exam objectives into clear, structured, and easy-to-follow lessons. Each episode helps you understand, retain, and apply key cybersecurity analysis skills—covering threat detection, vulnerability management, security architecture, and incident response. Whether you’re  ...
…
  continue reading
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and he ...
…
  continue reading
Master the CompTIA Server+ exam with the Server+ Audio Course—your complete audio companion for learning server hardware, administration, security, storage, and troubleshooting. Each episode breaks down the official exam objectives into clear, practical lessons designed for listening and learning on the go. You’ll gain a deep understanding of physical and virtual server environments, network integration, performance monitoring, and disaster recovery planning—all explained in simple, direct l ...
…
  continue reading
Get exam-ready with the BareMetalCyber Audio Course, your on-demand guide to conquering the CompTIA Cloud+ (CV0-003). Each episode transforms complex topics like cloud design, deployment, security, and troubleshooting into clear, engaging lessons you can apply immediately. Produced by BareMetalCyber.com, where you’ll also find more prepcasts, books, and tools to fuel your certification success.
…
  continue reading
The Project+ Audio Course is a complete, on-demand learning series built around the CompTIA Project+ (PK0-005) certification exam objectives. Each episode transforms key project management concepts into clear, practical, and easy-to-follow lessons you can absorb anytime, anywhere. Covering topics such as project life cycles, scheduling, budgeting, communication, risk management, and IT governance, this Audio Course helps you develop the knowledge and confidence to lead and support projects e ...
…
  continue reading
The Tech+ Audio Course is your complete, on-demand study companion for mastering the CompTIA Tech+ (FC0-U71) certification exam. Designed for those beginning their journey into information technology, it guides you step by step through every domain and objective of the official exam blueprint. Each episode transforms complex IT concepts into clear, relatable lessons filled with practical examples, definitions, and real-world applications. Whether you’re learning about hardware components, so ...
…
  continue reading
A podcast on all things related to IT Security from the CompTIA IT Security Community. If you’re not already part of the CompTIA IT Security Community, join here (https://bit.ly/2Pat2OD) and be on the forefront of new technologies in IT security and evaluate new opportunities and challenges for businesses in the security space.
…
  continue reading
The CompTIA IT Fundamentals+ Audio Course is your step-by-step guide to building a rock-solid foundation in IT, covering hardware, software, networking, databases, and security in a way that’s clear and approachable. Designed for beginners and those looking to prepare for more advanced certifications, each episode turns exam objectives into practical lessons you can follow with confidence. Produced by BareMetalCyber.com, this series gives you the knowledge and momentum to pass the exam and l ...
…
  continue reading
This is the replay of my monthly CompTIA Security+ Study Group. You can also watch a video version of this podcast from my website at http://www.professormesser.com.
…
  continue reading
🌟 **Unlock the Power of the Cloud! 🚀** Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. Whether you are a novice or seeking to deepen your understanding, this program is tailored for you. Season 1 Episodes 1-14: CompTIA Security+ 601 Episodes 15-52: Certified Cloud Security Professional (CCSP) Season 2 Epis ...
…
  continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
  continue reading
The audio version of videos from my popular YouTube channel (JonGoodCyber).
…
  continue reading
Just an IT professional talking about anything technology like working an entry level helpdesk position, learning new tech skills, obtaining certs, building PCs, cool devices, voice assistant, VR, and more.
…
  continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
  continue reading

1
Cybersecurity Fundamentals. Inside The Locks And Gates Of The Network Chapter 9
24:58
24:58
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
24:58[email protected] Security that actually holds under pressure starts long before passwords and antivirus. We pull back the rack door and walk through the parts that make a network resilient: switches that enforce port security, routers that block spoofed traffic, servers that stay patched and locked down, and load balancers that keep services…
…
  continue reading
[email protected] The mic feels heavier at 100—not from gear, but from history. We started with a doctoral dare, a $40 class, and a shaky first recording. We built a library that helped learners pass A+, Network+, and Security+ while connecting the dots between hardware, operating systems, storage, networking, and the human choices behind eve…
…
  continue reading

1
A History of Modern Technology: Bletchley To Binary
24:20
24:20
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
24:20[email protected] A quiet country house. A noisy war. And a handful of people who turned logic into a lifeline. We take you inside Bletchley Park to follow the thread from Poland’s algebraic assault on Enigma, through Alan Turing’s audacious vision for the Bombe, to Tommy Flowers’ all‑electronic Colossus that read Germany’s secrets at machine…
…
  continue reading

1
Cybersecurity Fundamentals: Hunting Weak Spots Chapter 8
25:29
25:29
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
25:29[email protected] What’s the weakest link in your world—an old router, a forgotten Windows box, or that “anyone with the link” setting you meant to change? We unpack the real vulnerabilities hiding in small businesses, nonprofits, and home networks, then share a clear playbook to find them early and fix them fast without enterprise budgets. W…
…
  continue reading

1
Professor Messer's Security+ Study Group After Show - October 2025
55:09
55:09
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
55:09It's open Q&A on the Security+ After Show!By Professor Messer
…
  continue reading

1
Professor Messer's Security+ Study Group - October 2025
1:15:07
1:15:07
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:15:07Are you ready to get Security+ certified? Watch our free training course: In this month's Security+ Study Group, you'll learn about: Quantitative risk assessment calculations Web server vulnerabilities Protecting against SQL injections Wireless security configurations Using LinkedIn before a penetration test And more! Keep the study process going! …
…
  continue reading

1
A Plus+ Fundamentals: Network Language, Decoded Chapter 6
25:11
25:11
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
25:11[email protected] Ever wish the network would just explain itself? We walk through the real language of connectivity—how links come alive, how packets choose their paths, and how a few core ideas unlock routers, firewalls, addressing, and the exam questions that test them. It starts with the wire (and the air): DSL over copper, cable scaling …
…
  continue reading

1
History of Modern Computing : Cloud, Unboxed
25:03
25:03
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
25:03[email protected] What if the world’s hard drives merged into one invisible place—and you used it a hundred times today without thinking? We pull back the curtain on cloud storage, tracing its unlikely path from room-sized machines and punch cards to AWS’s game-changing S3, Dropbox’s frictionless sync, and the moment Netflix stopped shipping …
…
  continue reading

1
Cybersecurity Fundamentals : High Availability, Real Resilience Chapter 7
24:45
24:45
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
24:45[email protected] What keeps a business alive when the lights flicker, a server drops, or an ISP blinks? We pull back the curtain on practical resilience—how continuity planning, capacity, and clear runbooks turn chaos into a minor hiccup—then pressure-test the plan with drills, documentation, and ruthless honesty. We start by grounding COOP …
…
  continue reading

1
A + Fundamentals : Networking Unlocked: From LANs to Wi-Fi 7 Chapter 5
26:23
26:23
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
26:23[email protected] What if your “all-in-one” router is doing too much—and your Wi‑Fi “speed” isn’t the real bottleneck? We pull back the rack door and trace the digital bloodstream from SOHO setups to enterprise backbones, translating jargon into choices you can actually make. Starting with LANs, WANs, WLANs, and SANs, we map how scope changes…
…
  continue reading

1
Domain 4 is On, Authentication using AWS IAM
27:25
27:25
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
27:25🌟 Unlock the Power of the Cloud! 🚀 Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. In this episode, I started domain 4 for the AWS Security specialty examination…
…
  continue reading
By Jason Edwards
…
  continue reading

1
Welcome to the CompTIA Server+ Certification
2:08
2:08
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
2:08By Jason Edwards
…
  continue reading
By Jason Edwards
…
  continue reading
By Jason Edwards
…
  continue reading
By Dr. Jason Edwards
…
  continue reading
By Dr. Jason Edwards
…
  continue reading

1
History of Modern Technology: Pocket Power: The USB Story
25:29
25:29
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
25:29[email protected] A tiny stick changed how we move information—and how attackers move too. We pull back the curtain on the USB flash drive’s quiet takeover: why floppies and CD-Rs failed us, how flash memory and USB converged, and which teams across Singapore, Israel, and China raced to ship the first pocket drive that actually worked. From e…
…
  continue reading

1
Cybersecurity Fundamentals : Cloud, Zero Trust, and You Chapter 6
23:57
23:57
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
23:57[email protected] Cloud perimeters are fading, identities are multiplying, and threats move faster than patches. We dive into the real mechanics of securing a hybrid world—mapping cloud deployment choices, clarifying shared responsibility across SaaS, PaaS, and IaaS, and showing how Zero Trust reshapes defenses around identity, posture, and c…
…
  continue reading

1
A+ Fundamentals: Boot to Brains Chapter 4
24:47
24:47
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
24:47[email protected] A dead PC at the worst moment is a gut punch—unless you have a roadmap. We walk through the exact thinking that turns “no lights, no fans, no display” into a calm, step‑by‑step recovery, starting where every system truly begins: firmware. BIOS and UEFI aren’t trivia; they decide how your machine discovers drives, validates b…
…
  continue reading

1
History of Modern Technology : Zip vs. CD
23:47
23:47
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
23:47[email protected] Storage didn’t just get bigger; it got personal. We rewind to the late ’90s and early 2000s to unpack the clash between Iomega’s Zip drive and the laser-lit world of the CD—two formats that taught a generation how to back up, carry, and truly own their data. From the pain of 30‑floppy installs to the thrill of dropping a 700…
…
  continue reading

1
Cybersecurity Fundamentals : Enterprise Security Architecture Chapter 5
24:27
24:27
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
24:27[email protected] Dive deep into the essential building blocks of secure enterprise networks with Professor J. Rod in this comprehensive exploration of network architecture, security appliances, and remote access solutions. What makes a truly secure organizational network? It's more than just firewalls and fancy equipment—it's thoughtful desi…
…
  continue reading

1
A+ Fundamentals : Power First, Stability Always Chapter 3
25:18
25:18
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
25:18[email protected] What if the real cause of your random reboots isn’t the GPU at all—but the power plan behind it? We take you end to end through a stability-first build, starting with the underrated hero of every system: clean, properly sized power. You’ll learn how to calculate wattage with 25–30% headroom, navigate 80 Plus efficiency tiers…
…
  continue reading
🌟 Unlock the Power of the Cloud! 🚀 Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. In this episode, I planned out which domain to cover first for our journey and…
…
  continue reading

1
The Rise and Fall of Floppy Disks: From 5.25" to 3.5" Storage Revolution
24:40
24:40
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
24:40[email protected] Remember that satisfying click of inserting a floppy disk? The nerve-wracking moments waiting for your term paper to save? The frustration of "Please insert disk 5 of 12" during game installations? Join Professor J-Rod on a nostalgic yet informative deep dive into the technology that defined personal computing for two decade…
…
  continue reading

1
Cybersecurity Fundamentals:  Cracking the Authentication Code Chapter 4
26:48
26:48
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
26:48[email protected] Ever wonder what happens behind the scenes when you tap "Login" on your favorite app? Authentication is the invisible guardian standing between your personal data and potential attackers, and it's more sophisticated than you might think. Authentication systems rely on three critical principles: Confidentiality keeps your cre…
…
  continue reading

1
Professor Messer's Security+ Study Group After Show - September 2025
1:13:07
1:13:07
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:13:07It's open Q&A on the Security+ After Show!By Professor Messer
…
  continue reading

1
Professor Messer's Security+ Study Group - September 2025
1:13:44
1:13:44
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:13:44Are you ready to get Security+ certified? Watch our free training course: In this month's Security+ Study Group, you'll learn about: Choosing the right security controls Change control holds Unusual system activity and power issues Avoiding data corruption Dealing with alerts and alarms And more Keep the study process going! Watch additional Securi…
…
  continue reading

1
Performance, Costing and Sustainability - AWS Well Architected Framework
26:07
26:07
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
26:07🌟 Unlock the Power of the Cloud! 🚀 Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. In this episode, I cover topics such as the Performance, Cost Optimization, an…
…
  continue reading

1
A+ Fundamentals  Chapter 1 and 2: Becoming an IT Specialist: Troubleshooting and Hardware Essentials
23:47
23:47
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
23:47[email protected] The digital world seems like magic to many, but behind every functioning computer is a complex system of hardware components and methodical troubleshooting approaches. In this comprehensive episode, we pull back the curtain on what makes IT specialists effective problem-solvers and explore the physical heart of computing sys…
…
  continue reading

1
Cybersecurity Fundamentals Crypto Keys: Protecting Our Digital World Chapter 3 Part 2
10:02
10:02
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
10:02[email protected] Cryptology isn't just theory—it's the invisible shield protecting your every digital move. This second installment of our cryptology deep dive moves beyond the fundamentals to reveal how these powerful tools operate in real-world systems that safeguard our digital lives. Digital signatures stand as one of cryptology's most p…
…
  continue reading

1
Cybersecurity Fundamentals: Crypto Shields: How Your Data Stays Secret Chapter 3 Part 1
10:26
10:26
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
10:26[email protected] Have you ever wondered what invisible force protects your private messages, banking details, and personal information as they travel across the internet? The answer lies in cryptology—the fascinating science of securing information through mathematical techniques. Cryptology forms the backbone of modern cybersecurity, addres…
…
  continue reading

1
History of Modern Technology : The 8 inch Floppy
9:01
9:01
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
9:01[email protected] Step back in time with Professor JRod as we uncover the remarkable story of the 8-inch floppy disk – the groundbreaking invention that forever changed how we store and transport digital information. Before cloud storage, before USB drives, even before the familiar 3.5-inch diskettes of the 1990s, there was the original 8-inc…
…
  continue reading

1
Cybersecurity Fundamentals : Hacking Humans: The Art of Social Engineering Chapter 2 Part 2
23:49
23:49
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
23:49[email protected] Cybersecurity isn't just about firewalls and antivirus software—it's about understanding the complex interplay between technical systems and human psychology. In this continuation of our Security+ series, we explore the multifaceted world of attack surfaces, threat vectors, and social engineering techniques that cybercrimina…
…
  continue reading

1
Security and Reliability - AWS Well Architected Framework
26:44
26:44
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
26:44🌟 Unlock the Power of the Cloud! 🚀 Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. In this episode, I cover topics such as the Security and Reliability pillar of…
…
  continue reading

1
Cybersecurity Fundamentals: Understanding Threat Actors Chapter 2 Part 1
22:35
22:35
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
22:35[email protected] Dive deep into the world of cybersecurity threat actors with Professor J-Rod as we unpack the essential definitions from Chapter 2 of the Security+ 701 certification exam. This knowledge-packed episode breaks down the critical foundation of information security risk management through clear, actionable explanations. We start…
…
  continue reading
[email protected] What separates career-changing advice from everyday guidance? The difference often lies in both the wisdom itself and the intentions of those sharing it. Professor JRod takes a detour from his usual CompTIA certification topics to explore something equally valuable for tech professionals: the transformative power of mentorsh…
…
  continue reading

1
Episode 90 — Configuring Small Wireless Network Security
12:03
12:03
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
12:03In this episode, we examine wireless network security configurations, an important topic in the CompTIA IT Fundamentals (ITF+) certification exam. You’ll learn how to change default SSIDs and passwords, choose encryption protocols like WPA2 or WPA3, and secure access with pre-shared keys. We’ll also discuss disabling unused services, managing guest…
…
  continue reading

1
Episode 89 — Mobile and Application Encryption Use Cases
11:25
11:25
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
11:25Here, we focus on specific encryption use cases for mobile devices and applications, a topic within the CompTIA IT Fundamentals (ITF+) certification exam. You’ll learn how mobile device encryption protects data if a device is lost or stolen, and how application-level encryption secures sensitive information within apps. We’ll cover examples from se…
…
  continue reading

1
Episode 88 — Encryption for Data at Rest and In Transit
11:18
11:18
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
11:18Encryption is a fundamental security tool, and this episode explains its role in protecting both data at rest and data in transit for the CompTIA IT Fundamentals (ITF+) certification exam. You’ll learn how file-level, disk-level, and mobile device encryption protect stored data, and how protocols like HTTPS, VPN, and secure email safeguard informat…
…
  continue reading

1
Episode 87 — Password Best Practices and Managers
12:00
12:00
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
12:00In this episode, we cover password best practices as outlined in the CompTIA IT Fundamentals (ITF+) certification exam. You’ll learn about creating strong passwords using length, complexity, and unpredictability, as well as how to avoid common mistakes like password reuse. We’ll also discuss password managers, how they securely store credentials, a…
…
  continue reading

1
Episode 86 — Safe Browsing: Certificates and Website Validity
11:28
11:28
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
11:28Safe browsing is a critical topic in the CompTIA IT Fundamentals (ITF+) certification exam, and this episode shows you how to verify website certificates, identify secure connections, and recognize invalid or suspicious certificates. We’ll explain how HTTPS works, the role of certificate authorities, and why expired or mismatched certificates are r…
…
  continue reading

1
Episode 85 — Safe Software Installation and Licensing Models
13:06
13:06
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
13:06In this episode, we discuss safe software installation practices and licensing models, both of which are covered in the CompTIA IT Fundamentals (ITF+) certification exam. You’ll learn how to verify software sources, check digital signatures, and follow proper installation procedures to avoid introducing malware or vulnerabilities. We’ll also explai…
…
  continue reading

1
Episode 84 — USB and Cable Lock Physical Security Practices
12:12
12:12
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
12:12Physical security is just as important as digital safeguards, and this episode examines USB and cable lock practices for the CompTIA IT Fundamentals (ITF+) certification exam. We’ll explain how USB port locks prevent unauthorized device connections and how cable locks secure laptops, desktops, and other hardware against theft. We’ll also cover scen…
…
  continue reading

1
Episode 83 — Device Security: Firewalls, Patch Management, Anti-Malware
12:17
12:17
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
12:17This episode covers device security measures that are essential knowledge for the CompTIA IT Fundamentals (ITF+) certification exam. You’ll learn how firewalls filter network traffic to block unauthorized access, how patch management ensures systems stay updated against vulnerabilities, and how anti-malware tools detect and remove malicious softwar…
…
  continue reading

1
Episode 82 — Recognizing Social Engineering and Phishing Attacks
11:08
11:08
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
11:08Social engineering and phishing are among the most common threats you’ll need to identify for the CompTIA IT Fundamentals (ITF+) certification exam. In this episode, we’ll explain how attackers manipulate human behavior to gain unauthorized access, from deceptive emails to fraudulent phone calls and fake websites. We’ll cover real-world examples an…
…
  continue reading

1
Episode 81 — Logs, Location Data, and Browser History
12:25
12:25
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
12:25In this episode, we examine how logs, location data, and browser history are used in system monitoring and security, all of which appear in the CompTIA IT Fundamentals (ITF+) certification exam objectives. You’ll learn how system and application logs record activities for troubleshooting, compliance, and forensic investigations. We’ll also discuss …
…
  continue reading

1
Episode 80 — Authorization and Least Privilege Explained
12:50
12:50
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
12:50In this episode, we focus on authorization, which is distinct from authentication, as tested in the CompTIA IT Fundamentals (ITF+) certification exam. Authorization determines what resources a user can access and what actions they can perform after being authenticated. You’ll learn about permission settings, access control lists, and the concept of…
…
  continue reading

1
Episode 79 — Authentication Models: Single, Multi, SSO
13:28
13:28
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
13:28Authentication models are central to IT security, and this episode covers them in detail for the CompTIA IT Fundamentals (ITF+) certification exam. You’ll learn the differences between single-factor authentication, multifactor authentication (MFA), and single sign-on (SSO). We’ll explain how each model works, where it’s most appropriate, and the tr…
…
  continue reading
 
 
 
