Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cybersecurity Fundamentals Podcasts

show episodes
 
The CompTIA IT Fundamentals+ Audio Course is your step-by-step guide to building a rock-solid foundation in IT, covering hardware, software, networking, databases, and security in a way that’s clear and approachable. Designed for beginners and those looking to prepare for more advanced certifications, each episode turns exam objectives into practical lessons you can follow with confidence. Produced by BareMetalCyber.com, this series gives you the knowledge and momentum to pass the exam and l ...
  continue reading
 
Artwork

1
Simply ICS Cyber

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork

4
Hacker Valley Studio

Hacker Valley Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Artwork

1
The Security Brief

Hound Security Systems

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
In a world where security threats evolve daily, staying informed isn't just smart—it's essential. Welcome to the security breif, the podcast that cuts through the noise of the security industry. Each episode, we dive deep into the latest articles, trends, and expert insights, breaking down complex topics into clear, actionable advice. From the future of CCTV and AI-powered analytics to the fundamentals of access control and cybersecurity, we use real-world blog posts as our launchpad for dis ...
  continue reading
 
The Tech+ Audio Course is your complete, on-demand study companion for mastering the CompTIA Tech+ (FC0-U71) certification exam. Designed for those beginning their journey into information technology, it guides you step by step through every domain and objective of the official exam blueprint. Each episode transforms complex IT concepts into clear, relatable lessons filled with practical examples, definitions, and real-world applications. Whether you’re learning about hardware components, so ...
  continue reading
 
The A+ Audio Course is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this Audio Course breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most, helping you understand, retain, and apply essential IT concepts—from hardware and networking to operating systems, security, troubleshooting, and professi ...
  continue reading
 
Artwork

1
Tech Tasty

Megan and Jackson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
This podcast is about the news and events surrounding the tech industry. It will also talk about jobs like but not limited to Cybersecurity, Web Development, and Network Fundamentals.
  continue reading
 
Artwork

1
Manufacturing Hub

Vlad Romanov & Dave Griffith

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We bring you manufacturing news, insights, discuss opportunities, and cutting edge technologies. Our goal is to inform, educate, and inspire leaders and workers in manufacturing, automation, and related fields.
  continue reading
 
Artwork

1
The Legal Department

Stacy Bratcher

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Practical, efficient and fun, The Legal Department podcast delivers the bottom line of what busy in-house attorneys need to know to level up their career. Whether you’re the general counsel or just starting a career in a corporate law department, The Legal Department podcast is the place to get real world advice from leading legal executives, executive coaches, and other thought leaders on how to grow your career and deliver more value to your clients. Through conversations with prominent ge ...
  continue reading
 
Artwork
 
Welcome to ”Cyber Survivor,” where host Dan Dodson uncovers the stories of resilience and innovation in healthcare cybersecurity. Explore real-world insights from doctors, administrators, and IT professionals on safeguarding data and privacy amid modern digital challenges. Join us for essential strategies and tales of triumph in the fight against cyber threats.
  continue reading
 
Artwork

1
Ahead of the Threat

Federal Bureau of Investigation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
  continue reading
 
Artwork

1
Techstrong Unplugged

Techstrong Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to Techstrong Unplugged, the go-to podcast for young adults stepping into the immersive world of technology. Brought to you by Techstrong, this series demystifies the tech industry and empowers the next generation. Whether you’re a digital native looking to expand your knowledge or a tech enthusiast eager to explore new trends, Techstrong Unplugged is your bridge to understanding the fundamentals and beyond. In each episode, we’ll dive into the latest in tech, from AI breakthroughs t ...
  continue reading
 
If you’re concerned about revenue at your hospital, then The Hospital Finance podcast is your go-to source for information and insights that can help you protect and enhance the revenue your hospital has earned. From regulatory changes to revenue cycle optimization, readmissions to bundled payments, you’ll get important perspectives, news and strategies from leading experts in healthcare finance. For show notes and additional resources from BESLER, visit https://www.besler.com/podcasts
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Loading …
show series
 
A comprehensive overview of Microsoft 365 and related cloud concepts. The text thoroughly explains cloud computing fundamentals, including the benefits, economic models, and types like IaaS, PaaS, and SaaS. A significant portion details the diverse Microsoft 365 services covering productivity, collaboration (Teams, Viva, SharePoint), endpoint manag…
  continue reading
 
[email protected] Security that actually holds under pressure starts long before passwords and antivirus. We pull back the rack door and walk through the parts that make a network resilient: switches that enforce port security, routers that block spoofed traffic, servers that stay patched and locked down, and load balancers that keep services…
  continue reading
 
Focuses on building, designing, and deploying cloud-native applications and microservices. The book covers foundational concepts like cloud computing basics, major cloud providers (AWS, Azure, Google Cloud), and cloud-native design principles, including the shift from monolithic to microservices architecture. Significant attention is paid to Jakart…
  continue reading
 
You’ve invested thousands in a state-of-the-art intruder alarm. You see the keypads and sensors every day, so you assume you're protected. But what if that system has a hidden fault? In this critical episode of The Security Brief, we investigate the single most overlooked factor in security: ongoing professional maintenance. We reveal how a "false …
  continue reading
 
In this deep-dive episode of The Security Brief, we are exploring the definitive rulebook for professional intruder alarms in the UK. What is the real difference between a certified, police-responsive system and one that an insurer won't even recognize? The answer lies in a complex web of standards, urgent deadlines, and strict operational rules. T…
  continue reading
 
Are you a business owner in 2025 wondering if your security cameras are up to the job? The world of CCTV has split in two: the reliable, old-school Analogue systems versus the smart, high-tech IP network cameras. Sticking with what's cheap and simple might seem smart, but could it be costing you more in the long run? In this episode, we cut through…
  continue reading
 
In this conversation recorded at the Ignition Community Conference, Vlad, Dave, and their guest David Grussenmeyer from Inductive Automation explore one of the most important and inspiring stories in the world of industrial automation education. David leads the Educational Engagement Program at Inductive Automation and has spent the last several ye…
  continue reading
 
What if your security team never missed a single alert and actually had time to think strategically? In this episode, Ahmed Achchak, CEO and Co-Founder of Qevlar AI, reveals how autonomous SOCs are reshaping security operations worldwide. From tackling alert fatigue to empowering analysts with intelligent AI-driven investigations, Ahmed shares the …
  continue reading
 
A comprehensive overview of cloud computing concepts, including its history, characteristics, advantages, and disadvantages. The book extensively details the cloud service models (SaaS, PaaS, IaaS) and deployment models (public, private, hybrid, and community), along with a comparative study of the latter. Furthermore, the source material explores …
  continue reading
 
Cyber threats don’t just steal data—they halt care, cancel clinics, and shake trust. I sat down with Brent Yax, founder and CEO of Aweccom Technologies to unpack the hard truth: today’s attackers are profit-driven, organized, and focused on disrupting operations until we pay. We trace how the threat landscape shifted from amateur mischief to a matu…
  continue reading
 
This technical resource is intended for experienced users like embedded engineers and kernel hackers and requires prior knowledge of C programming and Linux commands. The content offers comprehensive instruction on developing Linux drivers for kernel version v5.10 and embedded Linux systems, covering essential topics such as setting up the developm…
  continue reading
 
A comprehensive guide for architects and engineers on implementing and scaling modern DevOps practices within large enterprises, focusing heavily on automation, quality assurance, and security. Key topics covered include defining DevOps architecture, managing IT delivery in sourcing models, leveraging AIOps (Artificial Intelligence for IT Operation…
  continue reading
 
A comprehensive guide for migrating and optimizing Linux environments in cloud architectures, with a specific focus on Microsoft Azure but also referencing AWS and other cloud vendors. The content is structured around five core principles, addressing critical topics such as cloud readiness assessment, high availability, performance monitoring, secu…
  continue reading
 
https://integratedpwm.com/ ------------------- For our listeners, use the code 'EYECODEMEDIA22' for 10% off at check out for our Premiere Billing & Coding bundle or our EyeCode Billing & Coding course. Sharpen your billing and coding skills today and leave no money on the table! [email protected] https://docs.google.com/forms/d/e/…
  continue reading
 
A practical implementation guide for information technology administrators seeking to plan, design, and deploy Always On VPN using current best practices and various Microsoft technologies. Key technical topics covered include infrastructure prerequisites such as certificate management with PKI and Intune, network configuration with Routing and Rem…
  continue reading
 
A comprehensive guide for individuals aiming to become Security Operations Center (SOC) analysts, covering the essential knowledge, prerequisite technical skills like networking and endpoint security, and the tools critical to the role, such as SIEM and SOAR platforms. The chapters discuss the high demand and career trajectory within the cybersecur…
  continue reading
 
A fundamental shift in cybersecurity strategy toward a Zero Trust architecture. The author, an experienced former CIO, identifies five critical battlefields where defenders are currently disadvantaged: Education, Technology, Information, Economics, and Leadership. Testimonials and content previews affirm that the book details the history of this di…
  continue reading
 
Who said cybersecurity had to be serious? The future of cyber is creative, human, and even a little sexy. In this special 400th episode, Ron Eddings celebrates six incredible years of Hacker Valley Studio with one of cyber’s most creative voices, Maria Velasquez, Co-Founder of the Cybersecurity Marketing Society and Co-Host of Breaking Through in C…
  continue reading
 
An extensive overview of the Go programming language. It introduces fundamental concepts such as variables, functions, packages, program flow control, and data types like arrays and slices. Advanced topics covered include Go concurrency with goroutines and channels, systems programming, file I/O, networking (TCP/IP, HTTP, WebSockets, RESTful APIs),…
  continue reading
 
The growing need for visibility and response in industrial environments is driving more organizations to consider ICS/OT Security Operations Centers — but what does that actually look like for small and medium-sized operations? In this episode of Simply ICS Cyber, Don and Tom sit down with Dan Gunter, CEO and founder of Insane Cyber, to discuss how…
  continue reading
 
[email protected] Ever wonder how your phone grabs an IP address the instant you join Wi‑Fi? We break down the invisible handshake that makes it happen: DORA. From discovery to acknowledgement, we map each step of the DHCP exchange, explain lease timers, and show how networks hand out addresses at scale without stepping on their own toes. Alo…
  continue reading
 
Attention all legal operations professionals! This episode is for you. Legal Ops consultant Lyndsey Cain of LegalEng is in The Legal Department to talk about how to make your legal tech implementation a success. From identifying a non-IT leader, knowing your goals, having a comms plan, and an ongoing governance structure, Lyndsey shares that succes…
  continue reading
 
A comprehensive career guide for individuals in or entering the cybersecurity field. The book structures its advice around common career stages, addressing topics such as finding one's "why" for pursuing a security role, developing necessary technical and soft skills like emotional intelligence and effective communication, and strategies for managi…
  continue reading
 
As 2025 winds down, Aaron sits down with Refractional CFO’s Jackson Pace and Kevin Dang to break down the major tax changes from the “One Big Beautiful Bill.” They unpack what practice owners need to know about bonus depreciation, Section 179, QBI updates, ERC audits, and new deductions and credits—from child tax to senior benefits. Whether you lov…
  continue reading
 
A comprehensive guide for Red Hat Enterprise Linux 8 (RHEL8) administration, detailing various system management topics. The sources cover initial RHEL8 installation on both physical and virtual machines, including advanced options like cloud deployments and automated installation techniques. A significant portion focuses on core administration ski…
  continue reading
 
Dr. Chris Wolfe examines how dry eye disease became linked with aesthetic treatments like IPL and radiofrequency. While these light-based therapies show real benefits for inflammation and gland function, marketing them as cosmetic services blurs the line between medical care and elective treatment. ------------------- For our listeners, use the cod…
  continue reading
 
[email protected] A census solved with cardboard, a company remade by a $5 billion gamble, and a tiny firmware layer that cracked open the PC market—this is the human story behind how computing became a platform, not a product. We go from Hermann Hollerith’s 1890 insight to IBM’s sales-first system that taught the world to think in fields and…
  continue reading
 
A comprehensive overview of the role and responsibilities of a Solutions Architect, focusing heavily on cloud computing environments. The text explores various architectural principles, including the importance of scalability and elasticity, security and compliance, and operational excellence in solution design. It details several architectural pat…
  continue reading
 
Focused on mastering the Secure Shell (SSH) protocol, primarily using OpenSSH and the Windows client PuTTY. The book is designed to guide both system administrators and general users beyond basic command-line usage, covering advanced topics such as encryption fundamentals, server and client configuration (including specific files like sshd_config a…
  continue reading
 
Aims to teach the Go programming language through an engaging, "brain-friendly" approach. It covers fundamental Go concepts such as variables, data types (including arrays, slices, maps, and structs), functions, packages, and control flow (conditionals and loops). The text also introduces advanced topics like pointers, methods, interfaces, error ha…
  continue reading
 
In this episode of Manufacturing Hub, hosts Vladimir Romanov and Dave Griffith sit down with Davide (David) Pascucci, founder of Bright IA (https://brightiatx.com/), for an in-depth conversation about what it truly takes to build, grow, and succeed in the world of robotics integration and industrial automation. Davide shares his incredible journey …
  continue reading
 
To defend like a human, you first have to think like a hacker. In this episode, Ron Eddings sits down with Chris Dale, Co-Founder and Chief Hacking Officer at River Security, to explore the human side of hacking, where curiosity, persistence, and vigilance meet defense. Chris shares how the traditional idea of penetration testing has evolved into a…
  continue reading
 
A comprehensive overview of healthcare information security and privacy for practitioners, focusing on the HCISPP certification. It covers critical areas such as medical coding systems (DRG, ICD, SNOMED CT), revenue cycle management, and workflow management in clinical and business settings. A significant portion addresses the regulatory environmen…
  continue reading
 
Dan Dodson hosts Drex DeFord, a leader in healthcare cybersecurity, to discuss the evolution and current state of cybersecurity in healthcare. Drex shares his career journey from a hospital administrator in the Air Force to leading roles in various healthcare organizations and consulting for tech companies. He describes how the rapid digitization o…
  continue reading
 
20/20 Magazine’s Christine Yeh joins Aaron to unpack Oakley’s 50th, the rise of smart glasses beyond the “fad,” how eyewear became the ultimate accessory, and where print and social media, fashion, and AI are taking optical—while keeping it real for patients. To connect with Christine: 20/20 Magazine Instagram @2020mag LinkedIn --------------------…
  continue reading
 
A beginner's guide to implementing CI/CD pipelines using Jenkins and YAML for various applications, including mobile, hybrid, and web. The author, a DevOps engineer, emphasizes DevOps as a cultural transformation driven by people, processes, and tools. The text introduces Jenkins, its evolution, and different pipeline types like Scripted, Declarati…
  continue reading
 
[email protected] The mic feels heavier at 100—not from gear, but from history. We started with a doctoral dare, a $40 class, and a shaky first recording. We built a library that helped learners pass A+, Network+, and Security+ while connecting the dots between hardware, operating systems, storage, networking, and the human choices behind eve…
  continue reading
 
A structured approach to developing applications using Spring Boot. It covers foundational concepts like building web apps, data access, and developer tools, while also exploring advanced topics such as testing, production operations (including Docker and GraalVM), and building robust APIs. The book further examines messaging solutions and securing…
  continue reading
 
A comprehensive overview of fundamental networking concepts. It introduces various network components like RAM, NICs, hubs, switches, and routers, explaining their functions and interactions within a network. The material also details network topologies, including bus, ring, and star, alongside logical and physical implementations. A significant po…
  continue reading
 
In this episode, Chris discusses the evolving landscape of diabetic eye exams, particularly the shift towards fundus photography and the implications of AI in this space. He emphasizes the importance of comprehensive eye care beyond just fundus imaging, highlighting the limitations of such technology and the need for a holistic approach to patient …
  continue reading
 
[email protected] A quiet country house. A noisy war. And a handful of people who turned logic into a lifeline. We take you inside Bletchley Park to follow the thread from Poland’s algebraic assault on Enigma, through Alan Turing’s audacious vision for the Bombe, to Tommy Flowers’ all‑electronic Colossus that read Germany’s secrets at machine…
  continue reading
 
A comprehensive exploration of mobile network technologies, detailing the evolution from GSM and UMTS to LTE and 5G New Radio. It outlines the intricate architecture, protocols, and operational procedures that underpin these wireless communication systems, including channel structures, mobility management, and call establishment. Furthermore, the t…
  continue reading
 
Provides an extensive overview of modern cybersecurity strategies, emphasizing the evolving role of the Chief Information Security Officer (CISO) from a technical expert to a strategic business leader. It covers critical aspects such as building a culture of security, managing diverse threat actors (nation-states, cybercriminals, hacktivists, and i…
  continue reading
 
When code meets intuition, innovation gets personal. But what happens when we let AI vibe with our ideas? In this episode, Ron Eddings covers the rise of AI-driven development from Vibe Coding, where natural language shapes real code, to the emerging Model Context Protocols (MCPs) that redefine how apps talk to AI. He breaks down the recent Figma M…
  continue reading
 
Serves as an in-depth guide to Secure Access Service Edge (SASE). It explores the evolution of network security from traditional WANs to modern, cloud-centric architectures, emphasizing the need for SASE in today's distributed and dynamic enterprise environments. The source details SASE's foundational components, including SD-WAN, various security …
  continue reading
 
At Automate 2025, Vlad and Dave take Manufacturing Hub inside the Siemens booth to explore how one of the world’s largest industrial technology companies is shaping the future of manufacturing. From the latest S7-1200 G2 PLC to industrial copilots powered by AI, digital twins that simulate entire factories, and virtual PLCs redefining automation, t…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play