Certify – CompTIA Security+ 701 Audio Course is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecu ...
…
continue reading
A podcast on all things related to IT Security from the CompTIA IT Security Community. If you’re not already part of the CompTIA IT Security Community, join here (https://bit.ly/2Pat2OD) and be on the forefront of new technologies in IT security and evaluate new opportunities and challenges for businesses in the security space.
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading

1
Episode 221: Developing and Executing Security Awareness Programs (Domain 5)
18:41
18:41
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:41Security awareness programs don’t happen by accident—they’re built with intent, tested with feedback, and refined over time. In this final episode of the series, we walk through how to develop and execute a successful awareness program, from defining goals and identifying target audiences to choosing content formats and delivery methods. We discuss…
…
continue reading

1
Episode 220: Security Reporting and Monitoring (Domain 5)
18:01
18:01
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:01A well-informed workforce should be empowered not just to avoid risk—but to report it. In this episode, we explore how organizations build clear, accessible reporting channels that encourage employees to share suspicious activity, policy violations, or near misses without fear of reprisal. We also examine how recurring reports—like monthly phishing…
…
continue reading

1
Episode 219: Hybrid and Remote Work Security Awareness (Domain 5)
17:16
17:16
나중에 재생
나중에 재생
리스트
좋아요
좋아요
17:16Remote and hybrid work models create new layers of security complexity—blending corporate environments with home networks, personal devices, and cloud-first workflows. In this episode, we explore the core topics of remote work security awareness, starting with safe home Wi-Fi configurations, strong authentication, and VPN use for secure connections…
…
continue reading

1
Episode 218: User Guidance and Training (Part 3) (Domain 5)
17:32
17:32
나중에 재생
나중에 재생
리스트
좋아요
좋아요
17:32Security training must evolve with the threat landscape—and that means addressing common but high-risk topics like removable media, social engineering, and operational security (OPSEC). In this episode, we explain how removable media—like USB drives and external hard drives—pose significant threats when plugged into unmanaged or infected systems. W…
…
continue reading

1
Episode 217: User Guidance and Training (Part 2) (Domain 5)
17:38
17:38
나중에 재생
나중에 재생
리스트
좋아요
좋아요
17:38Beyond basic policy understanding, users need targeted training in key risk areas that attackers frequently exploit—especially insiders, passwords, and privileged access. In this episode, we focus on insider threat awareness, teaching employees how to recognize red flags like excessive access, unusual behavior, or data hoarding by peers. We also co…
…
continue reading

1
Episode 216: User Guidance and Training (Part 1) (Domain 5)
17:33
17:33
나중에 재생
나중에 재생
리스트
좋아요
좋아요
17:33Users are often the first and last line of defense in cybersecurity, and their success depends on clear guidance and ongoing training. In this episode, we focus on policy awareness and handbooks, which provide employees with a foundational understanding of acceptable use, access controls, device handling, and reporting expectations. We explore how …
…
continue reading

1
Episode 215: Anomalous Behavior Recognition (Domain 5)
18:18
18:18
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:18Cyber threats often hide in plain sight, masquerading as normal user activity until they trigger something unexpected—and that’s why recognizing anomalous behavior is such a valuable skill. In this episode, we explore how to identify risky, unexpected, or unintentional actions that may indicate insider threats, compromised accounts, or social engin…
…
continue reading
Phishing remains one of the most effective—and dangerous—forms of cyberattack because it targets people, not systems. In this episode, we explore how to build an effective phishing awareness program that trains employees to recognize and report suspicious messages before damage is done. We discuss how simulated phishing campaigns help reinforce tra…
…
continue reading
Reconnaissance is the first phase of any attack—and the first opportunity for defenders to detect malicious intent. In this episode, we break down both passive and active reconnaissance techniques used by ethical hackers and adversaries alike. Passive recon relies on publicly available data, such as DNS records, social media, job postings, WHOIS da…
…
continue reading

1
Episode 212: Penetration Testing Environments (Domain 5)
17:25
17:25
나중에 재생
나중에 재생
리스트
좋아요
좋아요
17:25The value of a penetration test is closely tied to how realistic the environment is—and in this episode, we examine the types of environments in which pen tests are conducted: known, partially known, and unknown. A known environment test, also called white-box testing, gives the tester full knowledge of systems, code, or architecture—allowing them …
…
continue reading

1
Episode 211: Fundamentals of Penetration Testing (Domain 5)
18:14
18:14
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:14Penetration testing goes beyond identifying vulnerabilities—it simulates real-world attacks to see how systems, defenses, and teams hold up under pressure. In this episode, we explore the foundational concepts of penetration testing, starting with physical tests that assess physical security through social engineering, badge cloning, or simulated i…
…
continue reading

1
Episode 210: External Audits and Assessments (Domain 5)
18:40
18:40
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:40External audits provide an independent review of an organization’s security and compliance posture, often driven by regulatory mandates, certification requirements, or contractual obligations. In this episode, we explore different types of external audits and assessments, starting with regulatory audits that evaluate adherence to laws like HIPAA, P…
…
continue reading
The effectiveness of internal audits depends not just on what’s reviewed, but on how the audit function is structured within the organization. In this episode, we examine audit committees—teams responsible for planning, conducting, and overseeing internal audits to ensure objectivity and alignment with organizational goals. We discuss how committee…
…
continue reading

1
Episode 208: Attestation and Internal Audits (Domain 5)
18:25
18:25
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:25Attestation and internal audits are two of the most powerful tools for ensuring your security program is functioning as intended. In this episode, we start by exploring attestation—formal declarations that certify compliance with policies, procedures, or external frameworks. Attestations are used in vendor contracts, employee training, and system c…
…
continue reading

1
Episode 207: Data Management and Compliance (Domain 5)
17:24
17:24
나중에 재생
나중에 재생
리스트
좋아요
좋아요
17:24Effective data management is critical for both operational success and regulatory compliance, and in this episode, we explore how organizations maintain control over what they collect, where it’s stored, and how long it’s retained. We begin with the concept of data ownership—assigning clear accountability for specific datasets to ensure someone is …
…
continue reading

1
Episode 206: Privacy and Legal Implications of Compliance (Domain 5)
20:19
20:19
나중에 재생
나중에 재생
리스트
좋아요
좋아요
20:19Privacy and compliance are deeply intertwined, especially as global regulations push organizations to safeguard personal data across jurisdictions. In this episode, we examine how privacy laws operate at local, national, and international levels—highlighting frameworks like GDPR in Europe and CCPA in California, and exploring how they shape data co…
…
continue reading

1
Episode 205: Data Inventory, Retention, and the Right to Be Forgotten (Domain 5)
18:43
18:43
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:43Managing personal data effectively starts with knowing exactly what you have, where it lives, how long you keep it, and what rights users have over it. In this final episode, we explore how to build and maintain a data inventory that tracks types of data collected, processing activities, access permissions, and storage locations. We also discuss re…
…
continue reading

1
Episode 204: Privacy Laws and Global Compliance (Domain 5)
18:01
18:01
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:01Data privacy is no longer just a legal issue—it’s a global business imperative, and this episode explores the complex and evolving landscape of privacy laws. We cover key regulations such as the European Union’s GDPR, California’s CCPA, Brazil’s LGPD, and other region-specific rules that govern how personal data is collected, processed, stored, and…
…
continue reading

1
Episode 203: Attestation and Acknowledgement in Compliance (Domain 5)
19:08
19:08
나중에 재생
나중에 재생
리스트
좋아요
좋아요
19:08Attestation and acknowledgement are critical for ensuring that individuals and third parties formally understand and accept their roles in maintaining security and compliance. In this episode, we explain how attestation involves signing a formal statement that certifies understanding or adherence—used in contexts like security training, policy acce…
…
continue reading

1
Episode 202: Consequences of Non-Compliance (Domain 5)
19:31
19:31
나중에 재생
나중에 재생
리스트
좋아요
좋아요
19:31Failing to meet regulatory or contractual obligations can carry severe consequences, both financially and reputationally. In this episode, we break down the real-world impacts of non-compliance—including fines, sanctions, lawsuits, contract termination, and loss of certifications or business licenses. We examine examples where organizations were pe…
…
continue reading

1
Episode 201: Effective Compliance Reporting (Domain 5)
18:34
18:34
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:34Compliance reporting ensures that an organization can demonstrate adherence to regulatory, contractual, and internal security requirements—and in this episode, we explore how to make it both accurate and efficient. We cover internal reporting practices, such as monthly compliance dashboards and policy enforcement summaries, as well as external repo…
…
continue reading

1
Episode 200: Ongoing Vendor Monitoring and Engagement (Domain 5)
18:58
18:58
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:58Vendor risk doesn’t stop after the contract is signed—ongoing monitoring and relationship management are critical for maintaining visibility and accountability. In this episode, we explore how organizations track vendor performance through periodic assessments, SLA reviews, compliance reports, and security questionnaires. We highlight how to use co…
…
continue reading

1
Episode 199: Agreement Types and Contractual Security (Domain 5)
18:08
18:08
나중에 재생
나중에 재생
리스트
좋아요
좋아요
18:08Contracts are one of the most powerful tools in managing cybersecurity obligations, and in this episode, we break down the types of agreements that define roles, responsibilities, and expectations with external parties. We cover Service-Level Agreements (SLAs), which outline performance and availability targets; Memorandums of Understanding (MOUs) …
…
continue reading

1
Episode 198: Vendor Risk and Supply Chain Considerations (Domain 5)
19:11
19:11
나중에 재생
나중에 재생
리스트
좋아요
좋아요
19:11A growing portion of cybersecurity risk now comes from outside the organization—specifically, through third-party vendors, suppliers, and service providers. In this episode, we examine how to assess and manage vendor risk across the full lifecycle, starting with due diligence during procurement and continuing through onboarding, monitoring, and off…
…
continue reading

1
Episode 197: Mean Time Metrics and System Resilience (Domain 5)
20:03
20:03
나중에 재생
나중에 재생
리스트
좋아요
좋아요
20:03System resilience depends not only on planning but on measurable performance—and in this episode, we explore four key metrics that define how systems behave under failure: Mean Time to Repair (MTTR), Mean Time Between Failures (MTBF), Mean Time to Detect (MTTD), and Mean Time to Respond (MTTR—the other one). MTTR (repair) reflects how long it takes…
…
continue reading

1
Episode 196: Understanding Recovery Objectives (Domain 5)
17:48
17:48
나중에 재생
나중에 재생
리스트
좋아요
좋아요
17:48Recovery objectives define how quickly and how completely a system must return to functionality after a disruption—and in this episode, we explore two of the most critical metrics: Recovery Time Objective (RTO) and Recovery Point Objective (RPO). RTO sets the maximum allowable downtime before business operations suffer unacceptable consequences, wh…
…
continue reading
Business Impact Analysis (BIA) is the foundation of business continuity and disaster recovery planning, helping organizations understand which processes matter most and how downtime affects operations. In this episode, we break down how BIAs identify critical systems, estimate recovery time objectives (RTOs) and recovery point objectives (RPOs), an…
…
continue reading

1
Episode 194: Risk Reporting and Communication (Domain 5)
19:23
19:23
나중에 재생
나중에 재생
리스트
좋아요
좋아요
19:23Risk is meaningless if it isn’t communicated effectively—and in this episode, we focus on how risk reporting bridges the gap between technical findings and business leadership. We explore how to craft reports that align with the audience: dashboards and trend lines for executives, technical remediation plans for IT, and regulatory compliance summar…
…
continue reading
Once risks are identified and analyzed, organizations must decide how to respond—and in this episode, we examine the five primary risk management strategies: mitigate, transfer, accept, avoid, and exempt. Mitigation involves applying controls to reduce risk impact or likelihood, such as enabling MFA or installing endpoint protection. Transferring r…
…
continue reading

1
Episode 192: Risk Appetite, Tolerance, and Thresholds (Domain 5)
19:12
19:12
나중에 재생
나중에 재생
리스트
좋아요
좋아요
19:12Every organization must decide how much risk it is willing to accept in pursuit of its goals—and this decision informs every security investment, policy, and control. In this episode, we break down the concepts of risk appetite (what you’re willing to pursue), risk tolerance (what you’re willing to withstand), and risk thresholds (the hard lines th…
…
continue reading

1
Episode 191: Risk Registers and Key Risk Indicators (Domain 5)
19:42
19:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
19:42Managing risk at scale requires tools that provide structure and visibility, and in this episode, we examine two of the most important: risk registers and key risk indicators (KRIs). A risk register is a living document that catalogs identified risks, their likelihood, potential impact, status, ownership, and mitigation plans. It enables organizati…
…
continue reading
After risks are identified, they need to be analyzed and prioritized—and that’s where risk scoring comes in. In this episode, we break down both qualitative methods (like high/medium/low ratings and heat maps) and quantitative techniques (like Single Loss Expectancy, Annualized Loss Expectancy, and Annualized Rate of Occurrence). We explain how the…
…
continue reading
Risk assessments provide the data organizations need to make informed security decisions, and in this episode, we explore the different types of assessments and how they’re conducted. We start by comparing ad hoc, recurring, one-time, and continuous assessments, each of which serves different operational or compliance needs. We explain how to scope…
…
continue reading
Risk management is the engine that drives strategic decision-making in security, helping organizations focus their efforts on what matters most. In this episode, we explain how to identify risks, evaluate their likelihood and impact, and decide whether to accept, avoid, mitigate, or transfer them. We cover key concepts like threat, vulnerability, a…
…
continue reading

1
Episode 187: Governance Structures and Roles (Part 2) (Domain 5)
20:53
20:53
나중에 재생
나중에 재생
리스트
좋아요
좋아요
20:53Having a governance structure is only the beginning—the real value comes from clearly defining roles and responsibilities within that structure. In this episode, we examine the key roles involved in managing data and systems securely, including data owners, custodians, stewards, processors, and controllers. Data owners are responsible for setting c…
…
continue reading

1
Episode 186: Governance Structures and Roles (Part 1) (Domain 5)
20:36
20:36
나중에 재생
나중에 재생
리스트
좋아요
좋아요
20:36Security governance relies on a clear structure that defines how decisions are made, who enforces them, and how oversight is maintained. In this episode, we explore governance structures such as boards, steering committees, and cross-functional security councils, each playing a role in shaping strategy, prioritizing risks, and allocating resources.…
…
continue reading

1
Episode 185: Monitoring and Revising Governance Policies (Domain 5)
21:02
21:02
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:02Security policies must evolve with technology, threat landscapes, and business goals—and that’s why continuous monitoring and revision are essential. In this episode, we explore how organizations maintain governance effectiveness by regularly reviewing policies, tracking their implementation, and auditing their relevance. We cover methods like poli…
…
continue reading

1
Episode 184: External Security Governance Considerations (Domain 5)
20:59
20:59
나중에 재생
나중에 재생
리스트
좋아요
좋아요
20:59Security doesn't operate in a vacuum—organizations must navigate a complex web of external considerations that shape how security is governed. In this episode, we explore regulatory requirements (like GDPR, HIPAA, and PCI-DSS), industry standards, and legal obligations that influence security architecture, policies, and practices. We also cover how…
…
continue reading
Procedures and playbooks are the operational backbone of a mature security program—translating policy into detailed, repeatable steps for responding to specific threats or performing security tasks. In this episode, we explain the difference between general procedures (e.g., user onboarding or access review) and incident-specific playbooks (e.g., m…
…
continue reading

1
Episode 182: Security Standards and Physical Controls (Domain 5)
21:25
21:25
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:25Standards and controls turn high-level policy into actionable, enforceable security, and in this episode, we explore how physical controls and documented standards create consistent, measurable protection. We discuss the value of security standards like password complexity requirements, encryption levels, and access review intervals that ensure sys…
…
continue reading

1
Episode 181: Incident Response Policies and Procedures (Domain 5)
22:32
22:32
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:32An effective incident response program starts with well-defined policies and procedures that guide every action, role, and escalation during a security event. In this episode, we explore the components of an incident response policy—covering scope, roles, definitions, response timelines, and classification levels. We then break down procedures into…
…
continue reading

1
Episode 180: Key Security Policies and Standards (Domain 5)
22:40
22:40
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:40Policies and standards are the written expression of an organization’s security expectations—and in this episode, we explore how they’re developed, communicated, and enforced. We cover essential policies such as Acceptable Use Policies (AUPs), information security policies, disaster recovery policies, and software development lifecycle (SDLC) stand…
…
continue reading

1
Episode 179: Introduction to Security Governance (Domain 5)
22:31
22:31
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:31Security governance is the blueprint for how an organization manages its security strategy, aligns it with business goals, and ensures accountability across all levels of operation. In this episode, we introduce the core elements of effective governance, including the development of security policies, acceptable use standards, change management pro…
…
continue reading

1
Episode 178: Introduction to Domain Five — Security Program Management and Oversight
24:12
24:12
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:12Cybersecurity isn’t just about blocking attacks and managing firewalls. It’s also about building policies, assessing risk, managing vendors, and aligning security with the overall goals of the business. That’s the focus of Domain Five: Security Program Management and Oversight. This domain gives you the big-picture understanding of how security fit…
…
continue reading

1
Episode 177: Packet Captures in Investigations (Domain 4)
22:43
22:43
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:43Packet captures are the most detailed and revealing form of network data available to defenders—showing not just what happened, but exactly how it happened, byte by byte. In this episode, we explain how tools like Wireshark and tcpdump allow analysts to capture and inspect network packets for signs of malicious activity, protocol abuse, data leakag…
…
continue reading

1
Episode 176: Dashboards and Visualization Tools (Domain 4)
22:10
22:10
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:10A well-designed dashboard can turn complex security data into fast, actionable insight—and in this episode, we explore how visualization tools help analysts, engineers, and executives understand the health of their security environments at a glance. We discuss how dashboards consolidate metrics like open vulnerabilities, login anomalies, firewall e…
…
continue reading

1
Episode 175: Vulnerability Scan Data and Automated Reporting (Domain 4)
20:48
20:48
나중에 재생
나중에 재생
리스트
좋아요
좋아요
20:48Vulnerability scan data is only useful when it’s collected, organized, and presented in a way that drives action—and this episode explains how automated reporting transforms raw scan results into operational intelligence. We begin by examining the structure of scan output: severity levels, CVSS scores, affected assets, and remediation recommendatio…
…
continue reading
In this continuation of our log analysis discussion, we shift from collection to interpretation—examining how different data sources support threat detection, forensic investigation, and compliance reporting. We explore how packet capture tools, vulnerability scanners, dashboards, and automated reports enrich raw logs with context, allowing for fas…
…
continue reading
Logs are the record books of your infrastructure, capturing who did what, when, and where—and in this episode, we explore how to extract value from them. We start with common log types including firewall logs, application logs, operating system logs, and security-specific logs like authentication events, audit trails, and IDS alerts. Each source pr…
…
continue reading