Discover
Certified: The CompTIA Security+ Audio Course

Certified: The CompTIA Security+ Audio Course
Author: Dr. Jason Edwards
Subscribed: 4Played: 61Subscribe
Share
© 2025 BareMetalCyber.com
Description
Certify – CompTIA Security+ 701 Audio Course is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence.
Created by cybersecurity author and educator Dr. Jason Edwards, this podcast is designed for learners who seek practical explanations, effective study strategies, and a structured path to certification. If you're serious about passing the Security+ exam—and launching your cybersecurity career—this podcast is your edge.
For a deeper study experience, grab a copy of Achieve CompTIA Security+ SY0-701 Exam Success by Dr. Jason Edwards. It’s the most concise and comprehensive Security+ guide available—built for busy professionals who want to pass the exam quickly and on their first attempt. You’ll also find additional resources, practice questions, and tools at BareMetalCyber.com.
Created by cybersecurity author and educator Dr. Jason Edwards, this podcast is designed for learners who seek practical explanations, effective study strategies, and a structured path to certification. If you're serious about passing the Security+ exam—and launching your cybersecurity career—this podcast is your edge.
For a deeper study experience, grab a copy of Achieve CompTIA Security+ SY0-701 Exam Success by Dr. Jason Edwards. It’s the most concise and comprehensive Security+ guide available—built for busy professionals who want to pass the exam quickly and on their first attempt. You’ll also find additional resources, practice questions, and tools at BareMetalCyber.com.
221 Episodes
Reverse
This episode kicks off the Certify – Security Plus podcast series by introducing the CompTIA Security+ certification. You’ll learn what this credential is, why it's such a popular choice for cybersecurity beginners, and what makes it a foundational part of many career paths. Whether you're a student, a career switcher, or someone trying to understand where to begin in cybersecurity, this episode lays the groundwork with clarity and motivation. We also explore who should consider earning the certification and what kind of career advantages it brings in both the public and private sectors.We’ll discuss how Security+ fits into the broader CompTIA certification track and how it builds essential knowledge in risk management, threat detection, architecture, operations, and governance. You’ll also get a sense of what to expect from the rest of the series and how this podcast, alongside the book Achieve CompTIA Security Plus SY0-701 Exam Success, can support your study journey from beginning to end.
Understanding the structure of the SY0-701 exam is crucial before you dive into study mode. This episode provides a domain-by-domain walkthrough of the Security+ certification exam layout. We break down the five main domains, explaining the weight each one holds and what it means for your study priorities. From general concepts to security program management, this overview helps you understand not just what’s on the test, but how to build your prep plan accordingly.We’ll also cover how question types—including performance-based formats—challenge you to apply knowledge in real-world scenarios. The episode finishes with actionable advice on tailoring your study schedule to match the domain weights so you can prepare smarter, not just harder.
In this episode, we tackle the biggest early challenge: how to study for the Security+ exam effectively. We'll guide you through building a realistic, sustainable study plan that adapts to your personal schedule and learning style. From resource selection—books, video courses, flashcards, and labs—to balancing reading, review, and hands-on practice, this episode helps you cut through the noise and focus on what really matters for success.We also address the importance of self-assessment, how to manage test anxiety, and when to schedule your exam. Whether you’re starting from scratch or already deep in your studies, you’ll walk away with practical strategies and confidence to keep going strong.
Exam day can be nerve-wracking, but this episode prepares you for everything you’ll face—from check-in to the final click of the mouse. We walk through the logistics of both online and in-person testing environments, what documents you’ll need, and how to handle performance-based questions without panicking. You’ll learn pacing techniques and how to interpret result feedback so you know what comes next.Then, we shift to what happens after you pass. Learn how to claim your digital badge, how to maintain your certification with CEUs, and what career doors start to open once Security+ is under your belt. This episode sets the tone for confident exam execution and smart next steps.
Domain One sets the tone for the entire Security+ exam, introducing key cybersecurity principles like confidentiality, integrity, and availability. This episode breaks down control types, the CIA triad, authentication models, and concepts like Zero Trust and AAA. You'll also explore the different categories of security controls and see how foundational thinking supports higher-level problem solving throughout the test.By the end of this episode, you’ll have a mental model of how cybersecurity works from a high level—and how to apply that model to real environments. This domain may be the lightest by percentage, but mastering it will make every other domain easier to understand and apply.
Security controls are the foundation of every cybersecurity strategy, providing the rules, tools, and enforcement mechanisms that protect data, systems, and operations from internal and external threats. In this episode, we introduce the concept of security controls and explain their importance in reducing risk, enforcing compliance, and maintaining the overall security posture of an organization. We explore how controls are implemented across technical, managerial, operational, and physical categories, and how they support core security goals like confidentiality, integrity, and availability. Listeners will learn how security controls intersect with risk management frameworks and serve as the backbone of a layered defense model. Understanding the purpose and structure of security controls is essential for anyone pursuing Security+, as it lays the groundwork for deeper discussions in later episodes.
Security controls can be grouped into several major categories—technical, managerial, and operational—each playing a distinct but complementary role in securing modern enterprise environments. This episode takes a deeper dive into these categories, explaining how technical controls like firewalls and encryption mechanisms enforce security at the system level, while managerial controls such as policies, procedures, and risk assessments provide the strategic direction behind a security program. Operational controls focus on daily activities like user training, incident response, and access provisioning, ensuring that human and procedural elements align with policy and technical enforcement. We use practical examples and scenarios to illustrate how each category supports the other, creating a cohesive and robust defense. Mastering these distinctions helps learners not only understand the exam material, but also apply it in real-world security planning.
While cybersecurity often emphasizes digital threats, physical security controls are just as vital, forming the first line of defense against unauthorized access to systems, data centers, and critical infrastructure. This episode explores physical security measures such as access control vestibules, security guards, fencing, bollards, surveillance systems, and lighting—all designed to deter, detect, and delay unauthorized individuals from breaching secure areas. We also discuss how physical controls complement digital safeguards by protecting hardware, enforcing policy boundaries, and ensuring the environmental stability needed for digital operations to function reliably. Implementation strategies must consider cost, facility layout, integration with electronic systems, and response capabilities. Physical controls may be low-tech compared to firewalls and encryption, but they are fundamental to protecting high-value assets from theft, sabotage, and physical tampering.
Security controls are not only categorized by function, but also by the role they play in the security lifecycle—specifically, whether they are preventive, deterrent, detective, corrective, compensating, or directive. In this first part of a two-part breakdown, we focus on preventive and deterrent controls. Preventive controls are designed to stop threats before they occur, such as through encryption, security awareness training, or access control lists (ACLs). Deterrent controls, on the other hand, aim to discourage malicious behavior by increasing perceived risk, using methods like visible surveillance cameras, signage, and motion-activated lighting. We explain how these control types operate in practical environments, highlight examples from corporate and government settings, and show how they integrate into a larger risk management strategy. Understanding the intent behind each control type gives learners the ability to apply them strategically in real-world architectures.
In the second half of our discussion on control types, we explore detective, corrective, compensating, and directive controls—each of which plays a crucial role in identifying and responding to security incidents. Detective controls, such as intrusion detection systems and log monitoring, help uncover ongoing or completed attacks, while corrective controls like system patches or incident response procedures are designed to remediate damage and restore operations. Compensating controls serve as alternative safeguards when standard controls are not feasible, often used in compliance-driven environments to meet regulatory requirements. Directive controls provide formal guidance through policies, security handbooks, and posted procedures, reinforcing desired behavior and institutional accountability. These control types work together to create resilience, adaptability, and enforcement continuity across complex IT environments. Knowing how and when to apply them is key to effective risk mitigation and compliance.
Compensating and directive controls often serve as the bridge between policy and practice, offering essential flexibility and guidance in environments where standard controls may not be viable. This episode explains compensating controls as alternative safeguards—deployed when ideal solutions, such as specific encryption technologies or access enforcement mechanisms, are not available due to technical, financial, or operational constraints. These controls must meet the intent and rigor of the original requirement and are often used in compliance frameworks to maintain equivalency. Directive controls, meanwhile, are focused on driving user behavior through written policies, signage, procedures, and security briefings, helping to instill a culture of security awareness and accountability. We explore real-world use cases for both control types, emphasizing how they support security posture without introducing unnecessary friction. Whether it's replacing a physical access system with a manual logging procedure or issuing formal instructions during security onboarding, these control types reinforce structure and intent where direct enforcement may not be possible.
The CIA Triad—Confidentiality, Integrity, and Availability—forms the foundational model upon which nearly all cybersecurity principles and practices are built. In this episode, we explore each pillar of the triad in detail, beginning with confidentiality, which ensures that sensitive data is accessible only to authorized individuals through controls like encryption, access management, and classification. Integrity focuses on maintaining the accuracy and trustworthiness of data through techniques like hashing, checksums, and secure change control, while availability ensures that systems and data are accessible when needed by implementing redundancy, failover systems, and denial-of-service protections. We provide real-world examples of how these three elements can be in tension—such as a highly confidential system that limits availability—and how organizations must prioritize them based on mission requirements. Understanding how to balance and enforce the CIA Triad is essential for Security+ candidates, as it underpins every major decision in cybersecurity architecture and policy.
Cybersecurity is not only about prevention—it’s also about proof, accountability, and enforcement. In this episode, we examine non-repudiation and the AAA model—Authentication, Authorization, and Accounting—as cornerstones of digital trust. Non-repudiation ensures that users cannot deny actions they’ve taken, supported by mechanisms such as digital signatures, system logging, and secure timestamps. Authentication verifies identity through usernames, passwords, biometrics, or tokens, while authorization determines what that identity is allowed to do based on roles or policies. Accounting (or auditing) captures activity logs, tracking actions for analysis, compliance, and incident response. Together, AAA creates a framework for managing access, enforcing accountability, and providing traceability in both user and system interactions. We break down each element using case scenarios from enterprise environments to illustrate how they’re implemented and monitored for effectiveness.
Security programs are only as strong as their weakest uncovered areas—and that’s where gap analysis and Zero Trust come into play. This episode introduces gap analysis as a structured approach to identifying where an organization’s current security posture fails to meet expected or required standards, often using frameworks like NIST or ISO to benchmark practices. We discuss how gap analysis involves comparing existing controls, processes, and risks against desired outcomes or compliance objectives to generate actionable remediation plans. Then we turn to Zero Trust, a transformative security model based on the principle of “never trust, always verify.” Zero Trust assumes breach and requires continuous authentication, authorization, and validation at every access point, regardless of whether a request originates inside or outside the network perimeter. By combining gap analysis with Zero Trust principles, organizations can not only uncover deficiencies, but also redesign their infrastructure to eliminate implicit trust and reduce exposure.
Physical security remains a vital—if sometimes overlooked—component of cybersecurity, especially when protecting facilities, data centers, and physical access points. In this episode, we explore the essential elements of physical security, including barriers like bollards and fencing, access mechanisms such as badge readers and mantraps, and detection systems like video surveillance, infrared motion sensors, and pressure-sensitive flooring. These tools work together to deter unauthorized entry, detect suspicious movement, and delay intruders long enough for a human response. We also cover human-based physical controls such as security guards, escort policies, and visitor logs, which provide additional oversight and context that automated systems may miss. Effective physical security is not just about locking doors—it’s about creating layered defenses that support and enhance digital controls. For any organization with valuable assets or sensitive systems, physical security is as critical as firewalls and encryption.
Deception technologies play a unique and powerful role in cybersecurity by proactively misleading, confusing, or delaying attackers while providing valuable insight into their methods and intentions. In this episode, we explore tools such as honeypots, which simulate vulnerable systems; honeynets, which create entire decoy network environments; and honeytokens, which are fake credentials or files designed to trigger alerts if accessed. These tools are not designed to stop attacks directly, but to detect unauthorized access attempts early and divert adversaries away from critical systems. Deception technologies also serve as intelligence-gathering platforms that help defenders learn attacker behavior, techniques, and lateral movement strategies within an environment. We discuss how to deploy deception tools safely and effectively, including considerations around isolation, monitoring, and legal risk. When implemented correctly, deception adds an invaluable layer to a defense-in-depth strategy—buying time, exposing hidden threats, and turning the tables on the attacker.
Change is inevitable in IT environments, but without structure, even small adjustments can introduce security gaps or operational disruptions. This episode introduces change management as a formalized process for planning, approving, documenting, and verifying changes to systems, configurations, and policies. We discuss why change management is essential to cybersecurity—it ensures that changes are evaluated for risk, properly tested before deployment, and clearly communicated to stakeholders. From deploying software updates to decommissioning legacy equipment, change management supports accountability, rollback capabilities, and traceability. It also protects against insider threats and human error, both of which are among the leading causes of system downtime and security incidents. Effective change management balances the need for agility with the discipline of process control—enabling secure, stable innovation.
Security is not just a technical concern—it’s deeply intertwined with business processes, especially when it comes to change management. In this episode, we examine key business elements that drive secure change: the approval process, stakeholder roles, ownership, and impact analysis. Every change—whether it's a patch, a network update, or a new vendor integration—should be evaluated for how it affects operations, users, dependencies, and risk exposure. We highlight how stakeholder involvement fosters transparency and cross-functional alignment, ensuring that risks are identified early and mitigated before implementation. Ownership defines who is accountable for managing and verifying changes, while impact analysis assesses consequences across performance, security, and compliance dimensions. By incorporating structured business practices into the change process, organizations reduce surprises, increase resilience, and maintain the integrity of both technical systems and strategic goals.
A successful change doesn’t end with approval—it must be implemented carefully and maintained with consistency. In this episode, we cover critical operational elements of change management, including pre-deployment testing, interpreting test results, executing backout plans, and scheduling changes during defined maintenance windows. Testing validates whether changes function as intended and identifies potential side effects, while backout plans provide a safe exit strategy if issues arise. Maintenance windows reduce disruption by aligning changes with low-traffic periods and ensuring support resources are available in case of problems. We also discuss how documentation plays a crucial role post-implementation, allowing teams to update architecture diagrams, support procedures, and incident response plans. Maintenance is more than a task—it’s a security safeguard that ensures long-term reliability and traceability of changes in production environments.
Change at the technical level affects more than just configurations—it can ripple through applications, dependencies, and user experiences in complex and unexpected ways. In this episode, we dive into the technical implications of change management, such as the use of allow lists and deny lists, the handling of restricted activities, and managing service restarts or downtimes associated with legacy applications. We explain how even a minor change—like updating a port configuration or firewall rule—can lead to compatibility issues or break critical workflows if not properly tested and communicated. Legacy applications, in particular, present a significant risk because they may lack documentation, have unpatchable components, or require manual intervention during updates. We also touch on how dependencies between services, APIs, and shared libraries can lead to cascading failures if not tracked and managed. Effective technical change management requires not only engineering knowledge, but also risk foresight and comprehensive documentation.