Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Certified: The CompTIA Security+ Audio Course

Technology Education

Activity Overview

Episode publication activity over the past year

Episodes

Showing 201-222 of 222
«« ← Prev Page 3 of 3

Episode 22: Introduction to Cryptography and PKI (Domain 1)

15 Jun 2025

Contributed by Lukas

Cryptography is the bedrock of secure communication, and understanding its principles is essential for every cybersecurity professional. In this episo...

Episode 21: Documentation and Version Control (Domain 1)

15 Jun 2025

Contributed by Lukas

Documentation is the connective tissue that holds a secure environment together, enabling repeatability, accountability, and informed decision-making ...

Episode 20: Technical Implications of Change Management (Domain 1)

15 Jun 2025

Contributed by Lukas

Change at the technical level affects more than just configurations—it can ripple through applications, dependencies, and user experiences in comple...

Episode 19: Effective Implementation and Maintenance in Change Management (Domain 1)

15 Jun 2025

Contributed by Lukas

A successful change doesn’t end with approval—it must be implemented carefully and maintained with consistency. In this episode, we cover critical...

Episode 18: Business Processes in Change Management (Domain 1)

15 Jun 2025

Contributed by Lukas

Security is not just a technical concern—it’s deeply intertwined with business processes, especially when it comes to change management. In this e...

Episode 17: Introduction to Change Management (Domain 1)

15 Jun 2025

Contributed by Lukas

Change is inevitable in IT environments, but without structure, even small adjustments can introduce security gaps or operational disruptions. This ep...

Episode 16: Deception and Disruption Technologies (Domain 1)

15 Jun 2025

Contributed by Lukas

Deception technologies play a unique and powerful role in cybersecurity by proactively misleading, confusing, or delaying attackers while providing va...

Episode 15: Physical Security Essentials (Domain 1)

15 Jun 2025

Contributed by Lukas

Physical security remains a vital—if sometimes overlooked—component of cybersecurity, especially when protecting facilities, data centers, and phy...

Episode 14: Gap Analysis and Zero Trust Security (Domain 1)

15 Jun 2025

Contributed by Lukas

Security programs are only as strong as their weakest uncovered areas—and that’s where gap analysis and Zero Trust come into play. This episode in...

Episode 13: Non-Repudiation and AAA (Authentication, Authorization, Accounting) (Domain 1)

15 Jun 2025

Contributed by Lukas

Cybersecurity is not only about prevention—it’s also about proof, accountability, and enforcement. In this episode, we examine non-repudiation and...

Episode 12: Confidentiality, Integrity, and Availability (CIA Triad) (Domain 1)

15 Jun 2025

Contributed by Lukas

The CIA Triad—Confidentiality, Integrity, and Availability—forms the foundational model upon which nearly all cybersecurity principles and practic...

Episode 11: Compensating and Directive Controls (Domain 1)

15 Jun 2025

Contributed by Lukas

Compensating and directive controls often serve as the bridge between policy and practice, offering essential flexibility and guidance in environments...

Episode 10: Security Control Types Explained (Part 2) (Domain 1)

15 Jun 2025

Contributed by Lukas

In the second half of our discussion on control types, we explore detective, corrective, compensating, and directive controls—each of which plays a ...

Episode 9: Security Control Types Explained (Part 1) (Domain 1)

15 Jun 2025

Contributed by Lukas

Security controls are not only categorized by function, but also by the role they play in the security lifecycle—specifically, whether they are prev...

Episode 8: Physical Controls and Their Implementation (Domain 1)

15 Jun 2025

Contributed by Lukas

While cybersecurity often emphasizes digital threats, physical security controls are just as vital, forming the first line of defense against unauthor...

Episode 7: Security Control Categories Deep Dive (Domain 1)

15 Jun 2025

Contributed by Lukas

Security controls can be grouped into several major categories—technical, managerial, and operational—each playing a distinct but complementary ro...

Episode 6: Introduction to Security Controls (Domain 1)

15 Jun 2025

Contributed by Lukas

Security controls are the foundation of every cybersecurity strategy, providing the rules, tools, and enforcement mechanisms that protect data, system...

Episode 5: Introduction to Domain One — General Security Concepts

15 Jun 2025

Contributed by Lukas

Domain One sets the tone for the entire Security+ exam, introducing key cybersecurity principles like confidentiality, integrity, and availability. Th...

Episode 4: What to Expect on Exam Day—and Beyond

15 Jun 2025

Contributed by Lukas

Exam day can be nerve-wracking, but this episode prepares you for everything you’ll face—from check-in to the final click of the mouse. We walk th...

Episode 3: Preparing for the Security Plus Exam: Study Strategies That Work

15 Jun 2025

Contributed by Lukas

In this episode, we tackle the biggest early challenge: how to study for the Security+ exam effectively. We'll guide you through building a realistic,...

Episode 2: How the Security Plus SY0-701 Exam Is Organized

15 Jun 2025

Contributed by Lukas

Understanding the structure of the SY0-701 exam is crucial before you dive into study mode. This episode provides a domain-by-domain walkthrough of th...

Episode 1: What Is the CompTIA Security Plus Certification?

15 Jun 2025

Contributed by Lukas

This episode kicks off the Certify – Security Plus podcast series by introducing the CompTIA Security+ certification. You’ll learn what this crede...

«« ← Prev Page 3 of 3