Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Certified: The CompTIA Security+ Audio Course

Technology Education

Activity Overview

Episode publication activity over the past year

Episodes

Showing 1-100 of 222
Page 1 of 3 Next → »»

Welcome to the SEC+ Audio Course

14 Oct 2025

Contributed by Lukas

Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world ...

Episode 221: Developing and Executing Security Awareness Programs (Domain 5)

16 Jun 2025

Contributed by Lukas

Security awareness programs don’t happen by accident—they’re built with intent, tested with feedback, and refined over time. In this final episo...

Episode 220: Security Reporting and Monitoring (Domain 5)

16 Jun 2025

Contributed by Lukas

A well-informed workforce should be empowered not just to avoid risk—but to report it. In this episode, we explore how organizations build clear, ac...

Episode 219: Hybrid and Remote Work Security Awareness (Domain 5)

16 Jun 2025

Contributed by Lukas

Remote and hybrid work models create new layers of security complexity—blending corporate environments with home networks, personal devices, and clo...

Episode 218: User Guidance and Training (Part 3) (Domain 5)

16 Jun 2025

Contributed by Lukas

Security training must evolve with the threat landscape—and that means addressing common but high-risk topics like removable media, social engineeri...

Episode 217: User Guidance and Training (Part 2) (Domain 5)

16 Jun 2025

Contributed by Lukas

Beyond basic policy understanding, users need targeted training in key risk areas that attackers frequently exploit—especially insiders, passwords, ...

Episode 216: User Guidance and Training (Part 1) (Domain 5)

16 Jun 2025

Contributed by Lukas

Users are often the first and last line of defense in cybersecurity, and their success depends on clear guidance and ongoing training. In this episode...

Episode 215: Anomalous Behavior Recognition (Domain 5)

16 Jun 2025

Contributed by Lukas

Cyber threats often hide in plain sight, masquerading as normal user activity until they trigger something unexpected—and that’s why recognizing a...

Episode 214: Effective Phishing Awareness (Domain 5)

16 Jun 2025

Contributed by Lukas

Phishing remains one of the most effective—and dangerous—forms of cyberattack because it targets people, not systems. In this episode, we explore ...

Episode 213: Reconnaissance Techniques (Domain 5)

16 Jun 2025

Contributed by Lukas

Reconnaissance is the first phase of any attack—and the first opportunity for defenders to detect malicious intent. In this episode, we break down b...

Episode 212: Penetration Testing Environments (Domain 5)

16 Jun 2025

Contributed by Lukas

The value of a penetration test is closely tied to how realistic the environment is—and in this episode, we examine the types of environments in whi...

Episode 211: Fundamentals of Penetration Testing (Domain 5)

16 Jun 2025

Contributed by Lukas

Penetration testing goes beyond identifying vulnerabilities—it simulates real-world attacks to see how systems, defenses, and teams hold up under pr...

Episode 210: External Audits and Assessments (Domain 5)

16 Jun 2025

Contributed by Lukas

External audits provide an independent review of an organization’s security and compliance posture, often driven by regulatory mandates, certificati...

Episode 209: Internal Audit Structures (Domain 5)

16 Jun 2025

Contributed by Lukas

The effectiveness of internal audits depends not just on what’s reviewed, but on how the audit function is structured within the organization. In th...

Episode 208: Attestation and Internal Audits (Domain 5)

16 Jun 2025

Contributed by Lukas

Attestation and internal audits are two of the most powerful tools for ensuring your security program is functioning as intended. In this episode, we ...

Episode 207: Data Management and Compliance (Domain 5)

16 Jun 2025

Contributed by Lukas

Effective data management is critical for both operational success and regulatory compliance, and in this episode, we explore how organizations mainta...

Episode 206: Privacy and Legal Implications of Compliance (Domain 5)

16 Jun 2025

Contributed by Lukas

Privacy and compliance are deeply intertwined, especially as global regulations push organizations to safeguard personal data across jurisdictions. In...

Episode 205: Data Inventory, Retention, and the Right to Be Forgotten (Domain 5)

16 Jun 2025

Contributed by Lukas

Managing personal data effectively starts with knowing exactly what you have, where it lives, how long you keep it, and what rights users have over it...

Episode 204: Privacy Laws and Global Compliance (Domain 5)

16 Jun 2025

Contributed by Lukas

Data privacy is no longer just a legal issue—it’s a global business imperative, and this episode explores the complex and evolving landscape of pr...

Episode 203: Attestation and Acknowledgement in Compliance (Domain 5)

16 Jun 2025

Contributed by Lukas

Attestation and acknowledgement are critical for ensuring that individuals and third parties formally understand and accept their roles in maintaining...

Episode 202: Consequences of Non-Compliance (Domain 5)

16 Jun 2025

Contributed by Lukas

Failing to meet regulatory or contractual obligations can carry severe consequences, both financially and reputationally. In this episode, we break do...

Episode 201: Effective Compliance Reporting (Domain 5)

16 Jun 2025

Contributed by Lukas

Compliance reporting ensures that an organization can demonstrate adherence to regulatory, contractual, and internal security requirements—and in th...

Episode 200: Ongoing Vendor Monitoring and Engagement (Domain 5)

16 Jun 2025

Contributed by Lukas

Vendor risk doesn’t stop after the contract is signed—ongoing monitoring and relationship management are critical for maintaining visibility and a...

Episode 199: Agreement Types and Contractual Security (Domain 5)

16 Jun 2025

Contributed by Lukas

Contracts are one of the most powerful tools in managing cybersecurity obligations, and in this episode, we break down the types of agreements that de...

Episode 198: Vendor Risk and Supply Chain Considerations (Domain 5)

16 Jun 2025

Contributed by Lukas

A growing portion of cybersecurity risk now comes from outside the organization—specifically, through third-party vendors, suppliers, and service pr...

Episode 197: Mean Time Metrics and System Resilience (Domain 5)

16 Jun 2025

Contributed by Lukas

System resilience depends not only on planning but on measurable performance—and in this episode, we explore four key metrics that define how system...

Episode 196: Understanding Recovery Objectives (Domain 5)

16 Jun 2025

Contributed by Lukas

Recovery objectives define how quickly and how completely a system must return to functionality after a disruption—and in this episode, we explore t...

Episode 195: Business Impact Analysis (Domain 5)

16 Jun 2025

Contributed by Lukas

Business Impact Analysis (BIA) is the foundation of business continuity and disaster recovery planning, helping organizations understand which process...

Episode 194: Risk Reporting and Communication (Domain 5)

16 Jun 2025

Contributed by Lukas

Risk is meaningless if it isn’t communicated effectively—and in this episode, we focus on how risk reporting bridges the gap between technical fin...

Episode 193: Risk Management Strategies (Domain 5)

16 Jun 2025

Contributed by Lukas

Once risks are identified and analyzed, organizations must decide how to respond—and in this episode, we examine the five primary risk management st...

Episode 192: Risk Appetite, Tolerance, and Thresholds (Domain 5)

16 Jun 2025

Contributed by Lukas

Every organization must decide how much risk it is willing to accept in pursuit of its goals—and this decision informs every security investment, po...

Episode 191: Risk Registers and Key Risk Indicators (Domain 5)

16 Jun 2025

Contributed by Lukas

Managing risk at scale requires tools that provide structure and visibility, and in this episode, we examine two of the most important: risk registers...

Episode 190: Risk Analysis and Scoring (Domain 5)

16 Jun 2025

Contributed by Lukas

After risks are identified, they need to be analyzed and prioritized—and that’s where risk scoring comes in. In this episode, we break down both q...

Episode 189: Conducting Risk Assessments (Domain 5)

16 Jun 2025

Contributed by Lukas

Risk assessments provide the data organizations need to make informed security decisions, and in this episode, we explore the different types of asses...

Episode 188: Risk Management Fundamentals (Domain 5)

16 Jun 2025

Contributed by Lukas

Risk management is the engine that drives strategic decision-making in security, helping organizations focus their efforts on what matters most. In th...

Episode 187: Governance Structures and Roles (Part 2) (Domain 5)

16 Jun 2025

Contributed by Lukas

Having a governance structure is only the beginning—the real value comes from clearly defining roles and responsibilities within that structure. In ...

Episode 186: Governance Structures and Roles (Part 1) (Domain 5)

16 Jun 2025

Contributed by Lukas

Security governance relies on a clear structure that defines how decisions are made, who enforces them, and how oversight is maintained. In this episo...

Episode 185: Monitoring and Revising Governance Policies (Domain 5)

16 Jun 2025

Contributed by Lukas

Security policies must evolve with technology, threat landscapes, and business goals—and that’s why continuous monitoring and revision are essenti...

Episode 184: External Security Governance Considerations (Domain 5)

16 Jun 2025

Contributed by Lukas

Security doesn't operate in a vacuum—organizations must navigate a complex web of external considerations that shape how security is governed. In th...

Episode 183: Procedures and Playbooks (Domain 5)

16 Jun 2025

Contributed by Lukas

Procedures and playbooks are the operational backbone of a mature security program—translating policy into detailed, repeatable steps for responding...

Episode 182: Security Standards and Physical Controls (Domain 5)

16 Jun 2025

Contributed by Lukas

Standards and controls turn high-level policy into actionable, enforceable security, and in this episode, we explore how physical controls and documen...

Episode 181: Incident Response Policies and Procedures (Domain 5)

16 Jun 2025

Contributed by Lukas

An effective incident response program starts with well-defined policies and procedures that guide every action, role, and escalation during a securit...

Episode 180: Key Security Policies and Standards (Domain 5)

16 Jun 2025

Contributed by Lukas

Policies and standards are the written expression of an organization’s security expectations—and in this episode, we explore how they’re develop...

Episode 179: Introduction to Security Governance (Domain 5)

16 Jun 2025

Contributed by Lukas

Security governance is the blueprint for how an organization manages its security strategy, aligns it with business goals, and ensures accountability ...

Episode 178: Introduction to Domain Five — Security Program Management and Oversight

16 Jun 2025

Contributed by Lukas

Cybersecurity isn’t just about blocking attacks and managing firewalls. It’s also about building policies, assessing risk, managing vendors, and a...

Episode 177: Packet Captures in Investigations (Domain 4)

16 Jun 2025

Contributed by Lukas

Packet captures are the most detailed and revealing form of network data available to defenders—showing not just what happened, but exactly how it h...

Episode 176: Dashboards and Visualization Tools (Domain 4)

16 Jun 2025

Contributed by Lukas

A well-designed dashboard can turn complex security data into fast, actionable insight—and in this episode, we explore how visualization tools help ...

Episode 175: Vulnerability Scan Data and Automated Reporting (Domain 4)

16 Jun 2025

Contributed by Lukas

Vulnerability scan data is only useful when it’s collected, organized, and presented in a way that drives action—and this episode explains how aut...

Episode 174: Leveraging Log Data (Part 2) (Domain 4)

16 Jun 2025

Contributed by Lukas

In this continuation of our log analysis discussion, we shift from collection to interpretation—examining how different data sources support threat ...

Episode 173: Leveraging Log Data (Part 1) (Domain 4)

16 Jun 2025

Contributed by Lukas

Logs are the record books of your infrastructure, capturing who did what, when, and where—and in this episode, we explore how to extract value from ...

Episode 172: Forensic Evidence Preservation and E-Discovery (Domain 4)

16 Jun 2025

Contributed by Lukas

Once digital evidence is collected, preserving it and producing it responsibly are the next critical steps—and in this episode, we focus on maintain...

Episode 171: Forensics – Data Acquisition and Reporting (Domain 4)

16 Jun 2025

Contributed by Lukas

Capturing and reporting digital evidence is a delicate process that must be repeatable, verifiable, and legally defensible. In this episode, we focus ...

Episode 170: Digital Forensics Foundations (Domain 4)

16 Jun 2025

Contributed by Lukas

When a security incident occurs, understanding what happened—and proving it—requires digital forensics. In this episode, we cover foundational con...

Episode 169: Root Cause Analysis and Threat Hunting (Domain 4)

16 Jun 2025

Contributed by Lukas

Stopping an incident isn’t enough—you have to understand how it happened and whether something deeper is still lurking. This episode explores root...

Episode 168: Incident Response Training and Testing (Domain 4)

16 Jun 2025

Contributed by Lukas

A well-written incident response plan is only useful if your team knows how to execute it—and the best way to build that confidence is through train...

Episode 167: Incident Response – Lessons Learned (Domain 4)

16 Jun 2025

Contributed by Lukas

Every incident is a learning opportunity, and the final step of the response lifecycle—lessons learned—ensures that your team emerges stronger, sm...

Episode 166: Incident Response Process (Part 2) (Domain 4)

16 Jun 2025

Contributed by Lukas

Following detection and analysis, the next phases in an incident response plan are containment, eradication, and recovery—critical steps that stop t...

Episode 165: Incident Response Process (Part 1) (Domain 4)

16 Jun 2025

Contributed by Lukas

A strong incident response process can mean the difference between a contained event and a catastrophic breach—and in this episode, we break down th...

Episode 164: Considerations for Security Automation (Part 2) (Domain 4)

16 Jun 2025

Contributed by Lukas

Continuing our discussion on automation pitfalls, this episode focuses on the risk of single points of failure, technical debt, and long-term support ...

Episode 163: Considerations for Security Automation (Part 1) (Domain 4)

16 Jun 2025

Contributed by Lukas

As powerful as automation is, it’s not without challenges—and in this episode, we dive into the complexity and cost considerations that come with ...

Episode 162: Benefits of Security Automation (Part 2) (Domain 4)

16 Jun 2025

Contributed by Lukas

Building on the first part of our automation series, this episode explores how security automation improves scalability, incident reaction time, and t...

Episode 161: Benefits of Security Automation (Part 1) (Domain 4)

16 Jun 2025

Contributed by Lukas

Security automation offers more than just saved time—it fundamentally transforms how teams operate by embedding consistency, speed, and scalability ...

Episode 160: Continuous Integration and API Automation (Domain 4)

16 Jun 2025

Contributed by Lukas

Security needs to move at the speed of development, and that’s where continuous integration (CI) and API-driven automation come in. In this episode,...

Episode 159: Technical Debt in Automation (Domain 4)

16 Jun 2025

Contributed by Lukas

As security teams automate more of their operations, they often accumulate technical debt—shortcuts, fragile code, or undocumented scripts that crea...

Episode 158: Automation and Scripting in Security (Domain 4)

16 Jun 2025

Contributed by Lukas

In modern cybersecurity, manual processes can’t keep up with the scale and speed of threats—making automation and scripting essential for operatio...

Episode 157: Privileged Access Management (PAM) (Domain 4)

16 Jun 2025

Contributed by Lukas

Privileged accounts are the crown jewels of any IT environment, and their misuse—whether accidental or malicious—can lead to devastating breaches....

Episode 156: Secure Password Management (Domain 4)

16 Jun 2025

Contributed by Lukas

Passwords continue to serve as a primary access method for many systems, and in this episode, we examine what secure password management really looks ...

Episode 155: MFA Authentication Factors (Domain 4)

16 Jun 2025

Contributed by Lukas

Multifactor authentication is only as strong as the diversity and reliability of the factors it uses. In this episode, we explore each authentication ...

Episode 154: Multifactor Authentication (MFA) Implementations (Domain 4)

16 Jun 2025

Contributed by Lukas

Multifactor Authentication (MFA) is one of the most effective ways to prevent unauthorized access, and in this episode, we break down how to implement...

Episode 153: Advanced Access Controls and Least Privilege (Domain 4)

16 Jun 2025

Contributed by Lukas

Access controls must go beyond static roles to enforce the principle of least privilege in real time, and this episode explores how to implement more ...

Episode 152: Access Control Models (Part 2) (Domain 4)

16 Jun 2025

Contributed by Lukas

In this second installment on access control models, we focus on more adaptive and scalable approaches: Role-Based Access Control (RBAC), Rule-Based A...

Episode 151: Access Control Models (Part 1) (Domain 4)

16 Jun 2025

Contributed by Lukas

Access control models define who can access what, under which conditions—and in this episode, we begin our exploration with Mandatory Access Control...

Episode 150: Interoperability and Attestation (Domain 4)

16 Jun 2025

Contributed by Lukas

As organizations adopt more diverse platforms, cloud services, and third-party integrations, the ability for systems to work together securely—known...

Episode 149: Single Sign-On (SSO) and Protocols (Domain 4)

16 Jun 2025

Contributed by Lukas

Single Sign-On (SSO) allows users to access multiple systems with a single set of credentials, enhancing both convenience and security when implemente...

Episode 148: Identity Proofing and Federation (Domain 4)

16 Jun 2025

Contributed by Lukas

Before you can secure access, you have to know who’s requesting it—and identity proofing ensures that the person behind a login is who they claim ...

Episode 147: User Account Provisioning and Permission Management (Domain 4)

16 Jun 2025

Contributed by Lukas

Creating, modifying, and revoking user accounts may sound like routine IT work—but it’s a fundamental part of security control. In this episode, w...

Episode 146: User Behavior Analytics (Domain 4)

16 Jun 2025

Contributed by Lukas

User Behavior Analytics (UBA) shifts the security paradigm from rules-based alerts to behavioral baselines, allowing defenders to spot anomalies that ...

Episode 145: Network Access Control and Endpoint Protection (Domain 4)

16 Jun 2025

Contributed by Lukas

Controlling access at the point of connection is one of the most effective ways to prevent unauthorized entry, and in this episode, we explore the imp...

Episode 144: File Integrity Monitoring and Data Loss Prevention (Domain 4)

16 Jun 2025

Contributed by Lukas

File Integrity Monitoring (FIM) and Data Loss Prevention (DLP) tools are essential for detecting tampering and protecting sensitive data from unauthor...

Episode 143: DNS Filtering and Email Security Enhancements (Domain 4)

16 Jun 2025

Contributed by Lukas

DNS and email are two of the most commonly exploited services in cyberattacks—and securing them requires layered, policy-driven controls. In this ep...

Episode 142: Secure Protocol Implementation (Domain 4)

16 Jun 2025

Contributed by Lukas

Not all protocols are created equal—and using the wrong one can open a serious security hole in your environment. In this episode, we examine the im...

Episode 141: Operating System Security Enhancements (Domain 4)

16 Jun 2025

Contributed by Lukas

The operating system is the beating heart of any computing device—and securing it properly lays the groundwork for all other defenses. In this episo...

Episode 140: Web Filtering and Content Security (Domain 4)

16 Jun 2025

Contributed by Lukas

Web filtering and content security are essential for managing user behavior and blocking malicious or inappropriate content before it ever reaches the...

Episode 139: Enhancing IDS/IPS Effectiveness (Domain 4)

16 Jun 2025

Contributed by Lukas

Intrusion Detection and Prevention Systems (IDS/IPS) are powerful tools—but their effectiveness depends entirely on tuning, context, and visibility....

Episode 138: Enhancing Firewall Capabilities (Domain 4)

16 Jun 2025

Contributed by Lukas

Firewalls are often the first line of defense—but they’re only as effective as the rules, architecture, and tuning behind them. In this episode, w...

Episode 137: Vulnerability Scanning Tools and Practices (Domain 4)

16 Jun 2025

Contributed by Lukas

Proactive security means finding and fixing weaknesses before attackers do, and vulnerability scanning is the tool that makes that possible at scale. ...

Episode 136: Network-Based Monitoring Tools (Domain 4)

16 Jun 2025

Contributed by Lukas

The network is where everything intersects—making it one of the most important vantage points for threat detection. In this episode, we examine key ...

Episode 135: Endpoint and Data Security Monitoring Tools (Domain 4)

16 Jun 2025

Contributed by Lukas

Endpoints—laptops, desktops, mobile devices—are where most cyberattacks begin, making endpoint security monitoring a frontline defense. In this ep...

Episode 134: Security Monitoring Tools (Part 2) (Domain 4)

16 Jun 2025

Contributed by Lukas

Building on our previous discussion, this episode explores more advanced and specialized monitoring tools—starting with Security Information and Eve...

Episode 133: Security Monitoring Tools (Part 1) (Domain 4)

16 Jun 2025

Contributed by Lukas

Choosing the right tools shapes how effectively you can detect, understand, and respond to threats. In this episode, we focus on foundational monitori...

Episode 132: Alert Response and Validation (Domain 4)

16 Jun 2025

Contributed by Lukas

Alerts are only effective when they result in meaningful, timely responses—and this episode explores how organizations structure alert triage, valid...

Episode 131: Key Security Monitoring Activities (Part 2) (Domain 4)

16 Jun 2025

Contributed by Lukas

Beyond real-time alerting, monitoring supports long-term visibility, compliance, and forensics through disciplined reporting and archiving practices. ...

Episode 130: Key Security Monitoring Activities (Part 1) (Domain 4)

16 Jun 2025

Contributed by Lukas

Monitoring is most valuable when it drives action, and in this episode, we explore foundational activities that turn data into defense—starting with...

Episode 129: Monitoring Computing Resources (Domain 4)

16 Jun 2025

Contributed by Lukas

Monitoring is the heartbeat of any modern security operation, providing real-time visibility into systems, applications, and infrastructure. In this e...

Episode 128: Effective Vulnerability Reporting (Domain 4)

16 Jun 2025

Contributed by Lukas

Clear, actionable reporting is the bridge between technical discovery and organizational response, and in this episode, we explore what makes vulnerab...

Episode 127: Validation of Remediation Efforts (Domain 4)

15 Jun 2025

Contributed by Lukas

Fixing a vulnerability doesn’t mean it’s gone—it means it needs to be verified. In this episode, we focus on the importance of validating remedi...

Episode 126: Vulnerability Response and Remediation (Part 2) (Domain 4)

15 Jun 2025

Contributed by Lukas

Not all vulnerabilities can be patched right away, and in these cases, compensating controls, segmentation, and exceptions become essential components...

Episode 125: Vulnerability Response and Remediation (Part 1) (Domain 4)

15 Jun 2025

Contributed by Lukas

Finding vulnerabilities is only useful if you have a plan to fix them—and this episode dives into the critical processes of response and remediation...

Episode 124: Vulnerability Analysis and Prioritization (Part 2) (Domain 4)

15 Jun 2025

Contributed by Lukas

Expanding on the concepts of vulnerability prioritization, this episode introduces industry-standard scoring and classification systems like CVSS (Com...

Episode 123: Vulnerability Analysis and Prioritization (Part 1) (Domain 4)

15 Jun 2025

Contributed by Lukas

Once vulnerabilities are identified, the next challenge is determining which ones require immediate action—and that’s where vulnerability analysis...

Page 1 of 3 Next → »»