Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Security Certifications Podcasts

show episodes
 
Artwork

1
Cyber Work

Infosec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
  continue reading
 
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
  continue reading
 
Artwork

1
THEOS Cybernova

Theos CyberNova

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
  continue reading
 
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
  continue reading
 
Artwork
 
The CYSA PrepCast is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
  continue reading
 
The Bare Metal Cyber CISM Prepcast is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series offers ...
  continue reading
 
Artwork
 
The A+ PrepCast is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this podcast breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most—helping you understand, retain, and apply essential IT concepts, from hardware and networking to operating systems, security, troubleshooting, and professional proc ...
  continue reading
 
Artwork

1
Cyber Security Grey Beard®

Cyber Security Grey Beard®

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession.
  continue reading
 
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
  continue reading
 
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
  continue reading
 
Artwork

1
ISC2LA Beyond the Certificate

ISC2 Los Angeles Chapter

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security certificates are a great way to show you know your stuff, but now what? You want to get into the field, and it seems impossible at times to even get to the prescreening phase of an interview when you've never had a security role you're chasing. In this podcast, local professionals in the industry spill all to the tips and shortcuts they've used in securing their roles. https://isc2la.org/joinus The ISC2 Los Angeles chapter wants to see you succeed as the security professional you we ...
  continue reading
 
Artwork

1
Secure Ninja TV

secureninja.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Secure Ninja TV is a weekly source of updates, insights, opinions and overviews of the Information Security and IT industry. Through interviews with industry leaders and cutting-edge IT instructors, Secure Ninja TV will empower you to attack network threats and security vulnerabilities with the most valuable tool at your disposal...knowledge.
  continue reading
 
Artwork

1
GDPR Now!

Karen Heaton/Data Protection 4 Business

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
  continue reading
 
Artwork

1
Cables2Clouds

Cables2Clouds

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
  continue reading
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
  continue reading
 
Loading …
show series
 
This special supercut edition combines all 70 episodes of The Bare Metal Cyber CCISO PrepCast into one comprehensive audio experience—perfect for immersive review, travel listening, or last-minute exam prep. From certification basics and domain overviews to deep dives into governance, controls, risk, and leadership strategy, this complete episode d…
  continue reading
 
Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Jim Broome of Direct Defense has been doing red teaming since before it became a term — back when a "pentest" meant $25,000, no questions asked and walking out with a server u…
  continue reading
 
The Supercut of the A Plus PrepCast covers every topic in the CompTIA A+ exam blueprint, offering focused audio instruction on hardware, mobile devices, networking, virtualization, and troubleshooting. Each episode is crafted for clarity and retention, making even complex topics like RAID, Wi-Fi standards, and printer diagnostics approachable and p…
  continue reading
 
The Supercut of the A Plus PrepCast covers every topic in the CompTIA A+ exam blueprint, offering focused audio instruction on hardware, mobile devices, networking, virtualization, and troubleshooting. Each episode is crafted for clarity and retention, making even complex topics like RAID, Wi-Fi standards, and printer diagnostics approachable and p…
  continue reading
 
Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor ~ Watch Now ~ In this episode of DailyCyber, I’m joined by Craig M. Taylor, Co-Founder & CISO at CyberHoot, who has spent nearly three decades building and leading security programs for organizations of all sizes. Craig believes cybersecurity awareness should be short, engaging, …
  continue reading
 
Automating tasks and supporting systems remotely are part of modern IT workflows. In this episode, we begin with scripting—specifically .bat and PowerShell scripts—and explain how they’re used to automate routine tasks like file transfers, user creation, or system reboots. Then we introduce remote access tools like R D P and S S H, showing how they…
  continue reading
 
Protecting sensitive data requires not only digital safeguards but also physical and procedural awareness. This episode teaches you how to properly handle confidential information, whether it's on printed documents, storage devices, or screens. We cover methods like locked cabinets, badge-restricted rooms, and screen privacy filters to prevent unau…
  continue reading
 
Technical skills are vital, but soft skills are what turn technicians into trusted professionals. This episode focuses on communication techniques that improve user experiences and foster trust. We start with active listening—how to give users your full attention and confirm your understanding through paraphrasing and clarification. Then we cover t…
  continue reading
 
This episode explores the legal and ethical responsibilities of handling data and software in IT environments. We start with licensing—understanding the difference between OEM, volume, and subscription licenses, and how misuse can result in compliance violations. Then we discuss Digital Rights Management (DRM), which limits copying or modifying med…
  continue reading
 
Maintaining the physical environment around IT systems is just as important as managing the systems themselves. This episode begins with ventilation and cooling requirements—how airflow affects server performance, what happens when heat builds up, and how to monitor environmental thresholds. We explain how to position equipment in racks, monitor fo…
  continue reading
 
Keeping yourself and your equipment safe is foundational to effective IT work. This episode covers essential safety practices beginning with Electrostatic Discharge (E S D) prevention—why grounding matters and how to properly use wrist straps, mats, and anti-static bags. We explain how improper handling can damage sensitive components like CPUs, RA…
  continue reading
 
This episode focuses on the backup strategies and data recovery techniques that every IT professional must know. We begin with the Grandfather-Father-Son (GFS) backup rotation model, explaining how it balances data redundancy and storage space. Then we dive into the 3-2-1 rule—keeping three copies of your data, on two different media types, with on…
  continue reading
 
Change is a constant in IT, but managing that change responsibly is what keeps systems stable. This episode introduces the formal change management process, starting with the identification of proposed changes and their potential impact on systems, users, and business operations. You’ll learn about documentation requirements, stakeholder approvals,…
  continue reading
 
There’s more than one kind of documentation in I T, and this episode explains the major types that appear on the A Plus exam. We start with Acceptable Use Policies (AUPs), which define what users are permitted to do with company devices and networks. These documents are key to setting boundaries and providing grounds for enforcement. Next, we cover…
  continue reading
 
Keeping track of hardware, software, and configuration data is vital for organizations of all sizes, and this episode explores how asset and inventory management supports that effort. We begin with physical asset tracking—using labels, barcodes, and location databases to monitor laptops, desktops, and peripherals. Then we move into software invento…
  continue reading
 
This episode focuses on the importance of clear, consistent documentation in every phase of IT support. We begin by explaining ticketing systems—how they track user requests, service histories, resolutions, and follow-up actions. You’ll learn what makes a good ticket entry, including timestamps, concise descriptions, and links to previous cases. We…
  continue reading
 
The final domain in the Core 2 exam is Operational Procedures, and this episode introduces its wide-ranging content. You’ll learn what this domain includes: documentation standards, safety procedures, communication skills, licensing and privacy concerns, and basic scripting. While these topics may seem non-technical, they are just as important for …
  continue reading
 
Malware isn’t limited to desktops. In this episode, we explore the types of malicious threats that target mobile devices. We begin with adware, spyware, and malicious apps that gain access to sensitive permissions—like camera, microphone, or SMS—without the user’s knowledge. Then we explain the concept of rooting or jailbreaking, which removes manu…
  continue reading
 
Mobile devices introduce their own unique troubleshooting challenges, particularly when it comes to application behavior. In this episode, we start with app crashes—why they happen, how to review logs or force close misbehaving apps, and what steps to take before uninstalling. Then we examine connectivity issues within apps, such as those that rely…
  continue reading
 
Successfully removing malware requires following the right sequence, and this episode lays out that process according to CompTIA’s expectations. We begin with identification—recognizing that malware is present—followed by isolating the system from the network to prevent spread. Then we quarantine the malicious files using antimalware software and p…
  continue reading
 
Security issues don’t always come with flashing warnings—sometimes they hide behind subtle behavior. This episode helps you identify the symptoms that often indicate malware or unauthorized access. We begin with security alerts—both real and fake—and how to distinguish between legitimate warnings and scareware popups. Then we cover unexplained file…
  continue reading
 
When something breaks in Windows, there are several tools you can use to restore functionality, and this episode breaks them down step by step. We begin with the System File Checker (SFC), which scans and repairs corrupted or missing system files using known-good versions. Next, we explain DISM and when to use it alongside or instead of SFC to fix …
  continue reading
 
This episode covers some of the most common and dramatic symptoms you'll face when troubleshooting Windows systems. We begin with the infamous Blue Screen of Death—also known as BSOD—explaining what causes it, how to interpret error codes, and what logs or tools to use when diagnosing the issue. Then we move into boot problems, such as systems gett…
  continue reading
 
Troubleshooting software problems is a core responsibility in IT, and this episode introduces Domain 3.0 of the Core 2 exam. You’ll learn what kinds of software issues are covered, including application crashes, boot problems, security alerts, and general OS instability. We explain how this domain connects to others, such as security and user suppo…
  continue reading
 
Properly disposing of storage media is a critical part of data security, and this episode outlines the methods you need to know. We begin with data wiping—using software to overwrite existing files—and explain why a single delete or format isn’t enough. Then we move on to degaussing, which uses magnetic fields to scramble data on hard drives and ma…
  continue reading
 
Mobile and embedded devices require a tailored approach to security, and this episode explains how to apply protections without compromising usability. We begin with passcodes, biometrics, and auto-lock timers as primary defenses. Next, we explore mobile device management (MDM), including how organizations use it to enforce encryption, remotely wip…
  continue reading
 
Securing a user’s workstation is about more than antivirus—it involves a full spectrum of proactive configurations. This episode outlines best practices for maintaining a secure endpoint. We begin with patch management, including automatic updates and reboot scheduling, then move to account management, such as disabling unused accounts and enforcin…
  continue reading
 
In this episode, we cover two important mechanisms for managing user access and security: User Account Control (UAC) and Single Sign-On (SSO). We begin with UAC—how it prompts users before executing administrative tasks, how to configure its sensitivity level, and what role it plays in limiting malware execution. Understanding UAC’s purpose and beh…
  continue reading
 
Securing a system starts with built-in operating system tools, and this episode walks you through three key Windows security features. First is Windows Defender, which provides real-time protection against malware, network attacks, and unwanted software changes. We explain how to configure scanning, quarantines, and exclusion lists. Next is BitLock…
  continue reading
 
This episode explains the technical underpinnings of some of the most dangerous threats and vulnerabilities in modern systems. We start with zero-day exploits, where attackers take advantage of unknown software flaws before patches can be released. These are especially damaging because traditional defenses often can’t detect them. Next, we explore …
  continue reading
 
Not all threats are technical—some are psychological. This episode focuses on social engineering attacks, which trick users into revealing information or granting access through manipulation rather than code. We start with phishing, covering both traditional email attacks and newer variants like spear phishing and smishing. You’ll learn what signs …
  continue reading
 
Preventing malware infections involves more than just scanning files—it’s about layering multiple defenses. In this episode, we start with antivirus and antimalware software, explaining how they use signature detection, heuristic analysis, and behavioral monitoring to stop threats. We describe how these tools are managed, updated, and configured fo…
  continue reading
 
This episode dives into the various types of malicious software, or malware, that technicians must be able to recognize and address. We begin with viruses, which attach to legitimate files and require user interaction to spread, then move into worms, which self-replicate across networks and can bring down systems without any user action. We explain…
  continue reading
 
Authentication protocols ensure that users are who they say they are, and this episode covers three of the most important ones for the A Plus exam. We begin with RADIUS—Remote Authentication Dial-In User Service—and explain how it centralizes authentication for wireless and VPN access. Next, we look at TACACS Plus, a Cisco-designed protocol that se…
  continue reading
 
Wireless security standards are a frequent source of exam questions, and this episode breaks down the differences between key protocols. We start with WPA2 and WPA3, explaining how each provides encryption and authentication for wireless traffic, and why WPA3 is considered more secure with protections like forward secrecy and better brute-force res…
  continue reading
 
This episode introduces Active Directory (AD), Microsoft’s central system for managing users, computers, and security in domain-based environments. We explain how AD organizes resources into domains, trees, and forests, and how Group Policy Objects (GPOs) are used to enforce settings across multiple systems automatically. You'll learn about domain …
  continue reading
 
In this episode, we move into the digital layer of defense, exploring logical security techniques that help ensure users access only what they’re authorized to. We start with multi-factor authentication (MFA), detailing its components—something you know, have, or are—and why it’s so effective. Then we look at access control lists (ACLs), which defi…
  continue reading
 
Protecting physical assets is the first line of defense in cybersecurity, and this episode explores the methods used to safeguard devices and facilities. We begin with door locks, cable locks, and biometric scanners—tools used to restrict access to equipment and data. Then we move into mantraps and security guards, which provide controlled entry to…
  continue reading
 
This episode introduces Domain 2.0 of the Core 2 exam: Security. We provide an overview of the key areas covered, including physical security measures, logical access controls, malware prevention, authentication protocols, and data destruction practices. You’ll hear how CompTIA frames security as both a technical and procedural discipline that must…
  continue reading
 
This episode focuses on disk setup and system maintenance—key areas tested on the A Plus exam and vital for support professionals. We begin with partitioning: the process of dividing a physical disk into logical sections. You’ll learn the difference between MBR and GPT partitioning, and how to configure primary, extended, and logical partitions usi…
  continue reading
 
Installing an operating system requires choosing the right method for the environment, and this episode explores all the major approaches. We start with the most familiar: bootable USB drives created using tools like Rufus or the Windows Media Creation Tool. Then we introduce PXE booting, which allows network-based installations using a centralized…
  continue reading
 
Operating systems, like all software, go through a defined life cycle—from launch to end of support—and this episode walks you through what each stage means. We begin by outlining the general stages: mainstream support, extended support, and end of life. You’ll learn how these stages affect security updates, driver support, and vendor troubleshooti…
  continue reading
 
This episode explores the filesystems used by various operating systems, each with its own capabilities and use cases. We begin with NTFS, the default for Windows, explaining its support for file permissions, compression, encryption, and large volume sizes. Then we cover exFAT, which bridges compatibility between Windows and macOS, and is commonly …
  continue reading
 
Not all operating systems are created equal, and this episode explores the strengths, purposes, and distinctions among the most common ones. We start with Windows—still the dominant OS in enterprise environments—and explore its versatility, support base, and administration tools. Next, we cover macOS, highlighting its tight hardware integration and…
  continue reading
 
This episode focuses on the broader implications of application use and performance in business environments. We begin by analyzing how resource-hungry applications can affect system performance—leading to slow response times, overheating, or reduced battery life. We also examine how apps may consume excessive network bandwidth, resulting in conges…
  continue reading
 
Installing software isn’t just about double-clicking an installer anymore—it can come from a wide range of sources and methods. In this episode, we explore the most common installation types: local setup files, network shares, Group Policy deployment, and web-based installers. We also discuss digital storefronts like the Microsoft Store and their a…
  continue reading
 
Before installing software, it’s essential to confirm that a system meets the application’s requirements. This episode explains how to assess compatibility based on OS version, architecture, memory, storage, and graphics capabilities. We also cover how to interpret software documentation and compare it against system specs to avoid installation fai…
  continue reading
 
This episode explores a variety of network connection types and how they're configured or supported within a Windows environment. We begin with Virtual Private Networks (VPNs)—how they provide secure tunneling for remote access and what authentication methods are commonly used. Next, we explain proxy settings and their effect on web access and appl…
  continue reading
 
IP addressing is the foundation of network communication, and this episode provides a deep dive into how it's configured on Windows systems. We explain how to assign a static I P address manually, including setting the subnet mask, default gateway, and primary and secondary DNS servers. Then we show how to switch back to dynamic addressing using DH…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play