<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/certified-the-isc-2-cc-audio-course" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Certified: The ISC(2) CC Audio Course</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/certified-the-isc-2-cc-audio-course</itunes:new-feed-url>
    <description>Certified: The ISC(2) CC Certification Audio Course is an audio-first study program built for people who want a clean, practical path into cybersecurity without getting buried in jargon. It’s designed for beginners and career changers, as well as IT and business professionals who need a solid security foundation. If you’re aiming for the ISC(2) Certified in Cybersecurity (CC) credential, this course gives you a structured way to learn the concepts the exam expects, using plain language and real-world framing. You do not need a deep technical background to start. You need consistency, curiosity, and a willingness to practice thinking like a security professional.

Across Certified: The ISC(2) CC Certification Audio Course, you’ll learn core security principles, basic risk thinking, security operations fundamentals, access and identity concepts, network and endpoint basics, and the purpose behind common controls. The teaching style is built for audio: short, focused explanations, repeatable definitions, and quick mental checkpoints that help you remember what matters. You can learn during commutes, workouts, chores, or quiet time—anywhere you can listen. Because the format is voice-driven, it also helps you get comfortable with security vocabulary, which makes exam questions feel less like a foreign language.

What makes Certified: The ISC(2) CC Certification Audio Course different is the editorial approach: it respects your time, stays focused, and keeps every episode tied to outcomes you can use. Instead of treating security as a pile of terms, it connects ideas to decisions you’ll actually make—what to protect, why it matters, and how to reduce risk without breaking the business. Success looks like this: you can explain key concepts in your own words, recognize what a question is really asking, and choose the best answer with confidence. By the end, you should feel ready to sit the CC exam—and ready to have smarter security conversations at work.</description>
    <copyright>2026 Bare Metal Cyber</copyright>
    <podcast:guid>59a7a86f-8132-5418-8ab6-7180a2d97440</podcast:guid>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="9af25f2f-f465-5c56-8635-fc5e831ff06a" feedUrl="https://feeds.transistor.fm/bare-metal-cyber-a725a484-8216-4f80-9a32-2bfd5efcc240"/>
      <podcast:remoteItem feedGuid="ac645ca7-7469-50bf-9010-f13c165e3e14" feedUrl="https://feeds.transistor.fm/baremetalcyber-dot-one"/>
      <podcast:remoteItem feedGuid="6db4ca42-cabd-5be7-9227-8cc2bdfeb416" feedUrl="https://feeds.transistor.fm/certified-the-giac-gisf-audio-course"/>
      <podcast:remoteItem feedGuid="87bf537c-1835-5155-8c6a-c3ea7b92fc57" feedUrl="https://feeds.transistor.fm/certified-the-comptia-pentest-plus-audio-course"/>
      <podcast:remoteItem feedGuid="6ad73685-a446-5ab3-8b2c-c25af99834f6" feedUrl="https://feeds.transistor.fm/certified-the-security-prepcast"/>
      <podcast:remoteItem feedGuid="8fb26813-bdb7-5678-85b7-f8b5206137a4" feedUrl="https://feeds.transistor.fm/certified-sans-giac-gsec-audio-course"/>
      <podcast:remoteItem feedGuid="6b60b84f-86ab-58f7-9e86-6b3111b823c2" feedUrl="https://feeds.transistor.fm/certified-comptia-cysa"/>
      <podcast:remoteItem feedGuid="143fc9c4-74e3-506c-8f6a-319fe2cb366d" feedUrl="https://feeds.transistor.fm/certified-the-cissp-prepcast"/>
      <podcast:remoteItem feedGuid="c872c288-3152-5604-8936-4ed20b602dac" feedUrl="https://feeds.transistor.fm/certified-the-sscp-audio-course"/>
    </podcast:podroll>
    <podcast:locked>yes</podcast:locked>
    <itunes:applepodcastsverify>79c2b490-2c82-11f1-8981-2769783e3c24</itunes:applepodcastsverify>
    <podcast:trailer pubdate="Wed, 11 Mar 2026 00:19:03 -0500" url="https://media.transistor.fm/2a7cd759/4a69f0b5.mp3" length="406065" type="audio/mpeg">Welcome to the ISC2 Certified in Cybersecurity Audio Course!</podcast:trailer>
    <language>en</language>
    <pubDate>Mon, 30 Mar 2026 16:50:39 -0500</pubDate>
    <lastBuildDate>Fri, 10 Apr 2026 00:03:55 -0500</lastBuildDate>
    <image>
      <url>https://img.transistorcdn.com/s145IHasOB21pvCV7yrzN4kr98EEoC7oAjg_AEmxqW4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hYTA2/YTBmY2EzNjU5MTEw/NmQwNTI3ZTY4YjQy/YzRiOS5wbmc.jpg</url>
      <title>Certified: The ISC(2) CC Audio Course</title>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Education">
      <itunes:category text="Courses"/>
    </itunes:category>
    <itunes:type>serial</itunes:type>
    <itunes:author>Jason Edwards</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/s145IHasOB21pvCV7yrzN4kr98EEoC7oAjg_AEmxqW4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hYTA2/YTBmY2EzNjU5MTEw/NmQwNTI3ZTY4YjQy/YzRiOS5wbmc.jpg"/>
    <itunes:summary>Certified: The ISC(2) CC Certification Audio Course is an audio-first study program built for people who want a clean, practical path into cybersecurity without getting buried in jargon. It’s designed for beginners and career changers, as well as IT and business professionals who need a solid security foundation. If you’re aiming for the ISC(2) Certified in Cybersecurity (CC) credential, this course gives you a structured way to learn the concepts the exam expects, using plain language and real-world framing. You do not need a deep technical background to start. You need consistency, curiosity, and a willingness to practice thinking like a security professional.

Across Certified: The ISC(2) CC Certification Audio Course, you’ll learn core security principles, basic risk thinking, security operations fundamentals, access and identity concepts, network and endpoint basics, and the purpose behind common controls. The teaching style is built for audio: short, focused explanations, repeatable definitions, and quick mental checkpoints that help you remember what matters. You can learn during commutes, workouts, chores, or quiet time—anywhere you can listen. Because the format is voice-driven, it also helps you get comfortable with security vocabulary, which makes exam questions feel less like a foreign language.

What makes Certified: The ISC(2) CC Certification Audio Course different is the editorial approach: it respects your time, stays focused, and keeps every episode tied to outcomes you can use. Instead of treating security as a pile of terms, it connects ideas to decisions you’ll actually make—what to protect, why it matters, and how to reduce risk without breaking the business. Success looks like this: you can explain key concepts in your own words, recognize what a question is really asking, and choose the best answer with confidence. By the end, you should feel ready to sit the CC exam—and ready to have smarter security conversations at work.</itunes:summary>
    <itunes:subtitle>Certified: The ISC(2) CC Certification Audio Course is an audio-first study program built for people who want a clean, practical path into cybersecurity without getting buried in jargon.</itunes:subtitle>
    <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
    <itunes:owner>
      <itunes:name>Jason Edwards</itunes:name>
      <itunes:email>baremetalcyber@outlook.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Episode 1 — Decode the ISC2 CC CAT Exam: Structure, Scoring, Policies, Tactics</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Episode 1 — Decode the ISC2 CC CAT Exam: Structure, Scoring, Policies, Tactics</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0f76be79-aa98-4c92-ad35-73a4f95d9b5d</guid>
      <link>https://share.transistor.fm/s/e7357b4a</link>
      <description>
        <![CDATA[<p>This episode explains how the ISC2 Certified in Cybersecurity (CC) exam is delivered as a computer-adaptive test (CAT), what that means for question selection, and how to think about pacing when the test adapts to you. You will connect exam rules and policies to practical decisions, like when to move on, how to handle uncertainty, and why consistent reasoning matters more than “tricks.” We will clarify what “scoring” represents at a high level, how test security and policies affect your conduct, and why staying within the rules protects both your result and your professional credibility. You will also hear a simple approach for reading questions carefully, eliminating distractors, and avoiding common mistakes that cost points even when you know the concept. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how the ISC2 Certified in Cybersecurity (CC) exam is delivered as a computer-adaptive test (CAT), what that means for question selection, and how to think about pacing when the test adapts to you. You will connect exam rules and policies to practical decisions, like when to move on, how to handle uncertainty, and why consistent reasoning matters more than “tricks.” We will clarify what “scoring” represents at a high level, how test security and policies affect your conduct, and why staying within the rules protects both your result and your professional credibility. You will also hear a simple approach for reading questions carefully, eliminating distractors, and avoiding common mistakes that cost points even when you know the concept. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 19:57:02 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e7357b4a/9e8f9fc1.mp3" length="34271448" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>855</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how the ISC2 Certified in Cybersecurity (CC) exam is delivered as a computer-adaptive test (CAT), what that means for question selection, and how to think about pacing when the test adapts to you. You will connect exam rules and policies to practical decisions, like when to move on, how to handle uncertainty, and why consistent reasoning matters more than “tricks.” We will clarify what “scoring” represents at a high level, how test security and policies affect your conduct, and why staying within the rules protects both your result and your professional credibility. You will also hear a simple approach for reading questions carefully, eliminating distractors, and avoiding common mistakes that cost points even when you know the concept. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e7357b4a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 2 — Build a Spoken Study Plan That Matches the Official CC Objectives</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode 2 — Build a Spoken Study Plan That Matches the Official CC Objectives</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c040d5a0-f6b9-42e0-adcf-992e7f04670d</guid>
      <link>https://share.transistor.fm/s/308a52f5</link>
      <description>
        <![CDATA[<p>This episode turns the CC objectives into a realistic, audio-friendly study plan that prioritizes comprehension, repetition, and exam-relevant recall instead of passive listening. You will learn how to pace your study across domains, how to revisit foundational concepts like confidentiality, integrity, and availability, and how to tie each new topic to a small set of “must-remember” definitions. We will cover practical routines for spaced review, short daily sessions, and quick self-checks you can do without notes, including recalling key terms out loud and explaining concepts in your own words. You will also learn how to recognize weak areas early, how to correct misunderstandings before they harden into habits, and how to build confidence by practicing the same reasoning style the exam expects. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode turns the CC objectives into a realistic, audio-friendly study plan that prioritizes comprehension, repetition, and exam-relevant recall instead of passive listening. You will learn how to pace your study across domains, how to revisit foundational concepts like confidentiality, integrity, and availability, and how to tie each new topic to a small set of “must-remember” definitions. We will cover practical routines for spaced review, short daily sessions, and quick self-checks you can do without notes, including recalling key terms out loud and explaining concepts in your own words. You will also learn how to recognize weak areas early, how to correct misunderstandings before they harden into habits, and how to build confidence by practicing the same reasoning style the exam expects. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 19:58:29 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/308a52f5/f3feb179.mp3" length="34446989" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>860</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode turns the CC objectives into a realistic, audio-friendly study plan that prioritizes comprehension, repetition, and exam-relevant recall instead of passive listening. You will learn how to pace your study across domains, how to revisit foundational concepts like confidentiality, integrity, and availability, and how to tie each new topic to a small set of “must-remember” definitions. We will cover practical routines for spaced review, short daily sessions, and quick self-checks you can do without notes, including recalling key terms out loud and explaining concepts in your own words. You will also learn how to recognize weak areas early, how to correct misunderstandings before they harden into habits, and how to build confidence by practicing the same reasoning style the exam expects. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/308a52f5/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 3 — Exam-Day Execution Without Panic: Time, Guessing, and CAT Decision Rules</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Episode 3 — Exam-Day Execution Without Panic: Time, Guessing, and CAT Decision Rules</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0741dfe3-b93b-4bf1-9d89-69484891bb71</guid>
      <link>https://share.transistor.fm/s/f33e7674</link>
      <description>
        <![CDATA[<p>This episode focuses on an exam-day operating model you can run in your head: manage time, handle uncertainty, and make consistent decisions under pressure. You will learn how CAT changes the value of each question and why you should treat every question as important, even when one feels “too easy” or “too hard.” We will cover practical methods for controlling anxiety, keeping your reading disciplined, and using a repeatable elimination approach when you cannot fully prove the correct answer. You will also practice a mental checklist for catching common traps such as absolute language, scope creep, and answers that are true in general but wrong for the specific prompt. By the end, you will have a calm routine for starting strong, recovering from doubts, and finishing with steady accuracy. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on an exam-day operating model you can run in your head: manage time, handle uncertainty, and make consistent decisions under pressure. You will learn how CAT changes the value of each question and why you should treat every question as important, even when one feels “too easy” or “too hard.” We will cover practical methods for controlling anxiety, keeping your reading disciplined, and using a repeatable elimination approach when you cannot fully prove the correct answer. You will also practice a mental checklist for catching common traps such as absolute language, scope creep, and answers that are true in general but wrong for the specific prompt. By the end, you will have a calm routine for starting strong, recovering from doubts, and finishing with steady accuracy. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 19:59:02 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f33e7674/bf868f8e.mp3" length="31460684" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>785</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on an exam-day operating model you can run in your head: manage time, handle uncertainty, and make consistent decisions under pressure. You will learn how CAT changes the value of each question and why you should treat every question as important, even when one feels “too easy” or “too hard.” We will cover practical methods for controlling anxiety, keeping your reading disciplined, and using a repeatable elimination approach when you cannot fully prove the correct answer. You will also practice a mental checklist for catching common traps such as absolute language, scope creep, and answers that are true in general but wrong for the specific prompt. By the end, you will have a calm routine for starting strong, recovering from doubts, and finishing with steady accuracy. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f33e7674/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 4 — Master Confidentiality: Prevent Data Exposure Through Practical Security Thinking</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Episode 4 — Master Confidentiality: Prevent Data Exposure Through Practical Security Thinking</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">558ee2d9-bcb4-4553-b202-d0cb6eec8f7d</guid>
      <link>https://share.transistor.fm/s/5a7e81c7</link>
      <description>
        <![CDATA[<p>This episode builds a clear, exam-ready understanding of confidentiality as the goal of preventing unauthorized disclosure of information. You will learn how confidentiality applies to data at rest, in transit, and in use, and how everyday mistakes—oversharing, misaddressed emails, weak access controls, and insecure storage—create real exposure. We will connect confidentiality to common safeguards such as access control, encryption, least privilege, and data classification, while emphasizing the difference between policy intent and technical enforcement. You will also practice distinguishing confidentiality problems from integrity or availability problems, because the exam often tests whether you can identify the primary objective being violated. Real-world examples will include handling sensitive customer data, restricting internal access based on job need, and reducing “blast radius” when something leaks. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode builds a clear, exam-ready understanding of confidentiality as the goal of preventing unauthorized disclosure of information. You will learn how confidentiality applies to data at rest, in transit, and in use, and how everyday mistakes—oversharing, misaddressed emails, weak access controls, and insecure storage—create real exposure. We will connect confidentiality to common safeguards such as access control, encryption, least privilege, and data classification, while emphasizing the difference between policy intent and technical enforcement. You will also practice distinguishing confidentiality problems from integrity or availability problems, because the exam often tests whether you can identify the primary objective being violated. Real-world examples will include handling sensitive customer data, restricting internal access based on job need, and reducing “blast radius” when something leaks. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 19:59:29 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5a7e81c7/c9585b3f.mp3" length="35194123" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>879</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode builds a clear, exam-ready understanding of confidentiality as the goal of preventing unauthorized disclosure of information. You will learn how confidentiality applies to data at rest, in transit, and in use, and how everyday mistakes—oversharing, misaddressed emails, weak access controls, and insecure storage—create real exposure. We will connect confidentiality to common safeguards such as access control, encryption, least privilege, and data classification, while emphasizing the difference between policy intent and technical enforcement. You will also practice distinguishing confidentiality problems from integrity or availability problems, because the exam often tests whether you can identify the primary objective being violated. Real-world examples will include handling sensitive customer data, restricting internal access based on job need, and reducing “blast radius” when something leaks. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5a7e81c7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 6 — Safeguard Availability: Keep Systems Reliable Through Disruptions and Failures</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Episode 6 — Safeguard Availability: Keep Systems Reliable Through Disruptions and Failures</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">592a41d8-b056-42ba-9b3c-c6448565ad6c</guid>
      <link>https://share.transistor.fm/s/3900240c</link>
      <description>
        <![CDATA[<p>This episode covers availability as the security goal of keeping systems and data accessible to authorized users when needed, even during failures, attacks, or unexpected spikes in demand. You will learn how availability problems show up in real operations, from outages and degraded performance to capacity exhaustion and denial-of-service conditions. We will connect availability to practical strategies such as redundancy, fault tolerance, backups, disaster recovery planning, patching to prevent exploitation, and monitoring that detects trouble early. You will also practice separating availability issues from confidentiality and integrity issues, because exam questions often present outages alongside secondary concerns. Real-world examples will include designing resilient services, planning maintenance windows, handling ransomware impact on business operations, and making smart tradeoffs when perfect uptime is too expensive. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers availability as the security goal of keeping systems and data accessible to authorized users when needed, even during failures, attacks, or unexpected spikes in demand. You will learn how availability problems show up in real operations, from outages and degraded performance to capacity exhaustion and denial-of-service conditions. We will connect availability to practical strategies such as redundancy, fault tolerance, backups, disaster recovery planning, patching to prevent exploitation, and monitoring that detects trouble early. You will also practice separating availability issues from confidentiality and integrity issues, because exam questions often present outages alongside secondary concerns. Real-world examples will include designing resilient services, planning maintenance windows, handling ransomware impact on business operations, and making smart tradeoffs when perfect uptime is too expensive. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:00:32 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3900240c/02014c9b.mp3" length="34166982" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>853</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers availability as the security goal of keeping systems and data accessible to authorized users when needed, even during failures, attacks, or unexpected spikes in demand. You will learn how availability problems show up in real operations, from outages and degraded performance to capacity exhaustion and denial-of-service conditions. We will connect availability to practical strategies such as redundancy, fault tolerance, backups, disaster recovery planning, patching to prevent exploitation, and monitoring that detects trouble early. You will also practice separating availability issues from confidentiality and integrity issues, because exam questions often present outages alongside secondary concerns. Real-world examples will include designing resilient services, planning maintenance windows, handling ransomware impact on business operations, and making smart tradeoffs when perfect uptime is too expensive. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3900240c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 7 — Choose Authentication Methods Wisely: Factors, Strengths, and Common Mistakes</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Episode 7 — Choose Authentication Methods Wisely: Factors, Strengths, and Common Mistakes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">94e94af2-6a06-4fcc-9285-b1006b778e23</guid>
      <link>https://share.transistor.fm/s/cc49ddc9</link>
      <description>
        <![CDATA[<p>This episode explains authentication as the process of proving identity, and it prepares you to recognize common authentication methods and their strengths and weaknesses for the CC exam. You will review authentication factors—something you know, something you have, something you are—and learn how different methods map to those factors in real systems. We will cover why password-only authentication is fragile, how shared secrets fail in predictable ways, and why device-based and biometric factors change both security and usability considerations. You will also practice distinguishing authentication from authorization, because the exam often tests whether you understand “who you are” versus “what you’re allowed to do.” Practical examples will include secure login design, account lockout considerations, and troubleshooting scenarios where authentication fails due to configuration, time drift, or compromised credentials. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains authentication as the process of proving identity, and it prepares you to recognize common authentication methods and their strengths and weaknesses for the CC exam. You will review authentication factors—something you know, something you have, something you are—and learn how different methods map to those factors in real systems. We will cover why password-only authentication is fragile, how shared secrets fail in predictable ways, and why device-based and biometric factors change both security and usability considerations. You will also practice distinguishing authentication from authorization, because the exam often tests whether you understand “who you are” versus “what you’re allowed to do.” Practical examples will include secure login design, account lockout considerations, and troubleshooting scenarios where authentication fails due to configuration, time drift, or compromised credentials. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:01:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cc49ddc9/5c7e5da1.mp3" length="32039568" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>800</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains authentication as the process of proving identity, and it prepares you to recognize common authentication methods and their strengths and weaknesses for the CC exam. You will review authentication factors—something you know, something you have, something you are—and learn how different methods map to those factors in real systems. We will cover why password-only authentication is fragile, how shared secrets fail in predictable ways, and why device-based and biometric factors change both security and usability considerations. You will also practice distinguishing authentication from authorization, because the exam often tests whether you understand “who you are” versus “what you’re allowed to do.” Practical examples will include secure login design, account lockout considerations, and troubleshooting scenarios where authentication fails due to configuration, time drift, or compromised credentials. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cc49ddc9/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 8 — Make MFA Make Sense: When to Require It and How It Fails</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Episode 8 — Make MFA Make Sense: When to Require It and How It Fails</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5ccd4fc7-796f-4526-991f-f0d034aa3c45</guid>
      <link>https://share.transistor.fm/s/4c369664</link>
      <description>
        <![CDATA[<p>This episode focuses on multi-factor authentication (MFA) and why it is a high-value control for reducing account takeover risk, a concept that shows up frequently in entry-level security exams. You will learn what counts as a factor, what does not, and how “two-step” can still be weak if it relies on the same underlying factor. We will discuss common MFA methods—authenticator apps, push approvals, hardware tokens, SMS codes—and compare them in terms of phishing resistance, reliability, and user friction. You will also learn how MFA can fail operationally through fatigue attacks, social engineering, lost devices, backup codes stored badly, or poor enrollment processes. Real-world best practices will include strong enrollment identity proofing, recovery planning, and choosing MFA methods appropriate to the sensitivity of the system and the threat model. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on multi-factor authentication (MFA) and why it is a high-value control for reducing account takeover risk, a concept that shows up frequently in entry-level security exams. You will learn what counts as a factor, what does not, and how “two-step” can still be weak if it relies on the same underlying factor. We will discuss common MFA methods—authenticator apps, push approvals, hardware tokens, SMS codes—and compare them in terms of phishing resistance, reliability, and user friction. You will also learn how MFA can fail operationally through fatigue attacks, social engineering, lost devices, backup codes stored badly, or poor enrollment processes. Real-world best practices will include strong enrollment identity proofing, recovery planning, and choosing MFA methods appropriate to the sensitivity of the system and the threat model. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:01:29 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4c369664/ed01aaf1.mp3" length="30994628" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>774</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on multi-factor authentication (MFA) and why it is a high-value control for reducing account takeover risk, a concept that shows up frequently in entry-level security exams. You will learn what counts as a factor, what does not, and how “two-step” can still be weak if it relies on the same underlying factor. We will discuss common MFA methods—authenticator apps, push approvals, hardware tokens, SMS codes—and compare them in terms of phishing resistance, reliability, and user friction. You will also learn how MFA can fail operationally through fatigue attacks, social engineering, lost devices, backup codes stored badly, or poor enrollment processes. Real-world best practices will include strong enrollment identity proofing, recovery planning, and choosing MFA methods appropriate to the sensitivity of the system and the threat model. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4c369664/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 9 — Non-Repudiation Explained Clearly: Proof, Accountability, and Digital Assurance</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Episode 9 — Non-Repudiation Explained Clearly: Proof, Accountability, and Digital Assurance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3bcde766-1150-498f-9775-16b9d71f2a12</guid>
      <link>https://share.transistor.fm/s/d72c3d40</link>
      <description>
        <![CDATA[<p>This episode explains non-repudiation as the ability to prove that a specific action occurred and that a specific party performed it, which supports accountability and trustworthy records. You will learn how non-repudiation differs from authentication and integrity, and why it often relies on mechanisms like digital signatures, strong identity binding, and reliable logging. We will discuss what “proof” means in practical security terms: evidence that can be validated later, tied to an identity, and protected from tampering. You will also practice recognizing non-repudiation cues in exam questions, such as disputes over who approved a transaction, who sent a message, or who accessed a system. Real-world examples will include signed documents, signed code, transaction authorization records, and audit trails that hold up during investigations or compliance reviews. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains non-repudiation as the ability to prove that a specific action occurred and that a specific party performed it, which supports accountability and trustworthy records. You will learn how non-repudiation differs from authentication and integrity, and why it often relies on mechanisms like digital signatures, strong identity binding, and reliable logging. We will discuss what “proof” means in practical security terms: evidence that can be validated later, tied to an identity, and protected from tampering. You will also practice recognizing non-repudiation cues in exam questions, such as disputes over who approved a transaction, who sent a message, or who accessed a system. Real-world examples will include signed documents, signed code, transaction authorization records, and audit trails that hold up during investigations or compliance reviews. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:01:52 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d72c3d40/be74e2d7.mp3" length="33597515" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>839</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains non-repudiation as the ability to prove that a specific action occurred and that a specific party performed it, which supports accountability and trustworthy records. You will learn how non-repudiation differs from authentication and integrity, and why it often relies on mechanisms like digital signatures, strong identity binding, and reliable logging. We will discuss what “proof” means in practical security terms: evidence that can be validated later, tied to an identity, and protected from tampering. You will also practice recognizing non-repudiation cues in exam questions, such as disputes over who approved a transaction, who sent a message, or who accessed a system. Real-world examples will include signed documents, signed code, transaction authorization records, and audit trails that hold up during investigations or compliance reviews. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d72c3d40/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 10 — Understand Privacy as a Security Concept: Data Use, Consent, and Minimization</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Episode 10 — Understand Privacy as a Security Concept: Data Use, Consent, and Minimization</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bf1e3aea-1822-4b96-b529-23a98fa3fbdb</guid>
      <link>https://share.transistor.fm/s/c3438185</link>
      <description>
        <![CDATA[<p>This episode frames privacy as a core security-adjacent concept focused on appropriate collection, use, sharing, and protection of personal data, which the CC exam expects you to understand at a foundational level. You will learn the practical meaning of data minimization, purpose limitation, consent, and transparency, and how these ideas influence system design and everyday handling decisions. We will connect privacy risks to common security controls like access restrictions, encryption, logging, and retention limits, while emphasizing that privacy also includes governance and policy decisions about what should be collected in the first place. You will practice identifying privacy failures such as excessive data collection, unnecessary retention, improper sharing, and unclear notices that lead to misuse. Real-world examples will include customer records, employee data, and the operational challenges of balancing business needs with responsible data handling. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode frames privacy as a core security-adjacent concept focused on appropriate collection, use, sharing, and protection of personal data, which the CC exam expects you to understand at a foundational level. You will learn the practical meaning of data minimization, purpose limitation, consent, and transparency, and how these ideas influence system design and everyday handling decisions. We will connect privacy risks to common security controls like access restrictions, encryption, logging, and retention limits, while emphasizing that privacy also includes governance and policy decisions about what should be collected in the first place. You will practice identifying privacy failures such as excessive data collection, unnecessary retention, improper sharing, and unclear notices that lead to misuse. Real-world examples will include customer records, employee data, and the operational challenges of balancing business needs with responsible data handling. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:02:29 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c3438185/ff561c9a.mp3" length="41254526" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1030</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode frames privacy as a core security-adjacent concept focused on appropriate collection, use, sharing, and protection of personal data, which the CC exam expects you to understand at a foundational level. You will learn the practical meaning of data minimization, purpose limitation, consent, and transparency, and how these ideas influence system design and everyday handling decisions. We will connect privacy risks to common security controls like access restrictions, encryption, logging, and retention limits, while emphasizing that privacy also includes governance and policy decisions about what should be collected in the first place. You will practice identifying privacy failures such as excessive data collection, unnecessary retention, improper sharing, and unclear notices that lead to misuse. Real-world examples will include customer records, employee data, and the operational challenges of balancing business needs with responsible data handling. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c3438185/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 11 — Set Risk Priorities That Match the Business Mission and Real Constraints</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Episode 11 — Set Risk Priorities That Match the Business Mission and Real Constraints</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2979c84d-32aa-4373-80f9-596c744243ab</guid>
      <link>https://share.transistor.fm/s/0e26dc42</link>
      <description>
        <![CDATA[<p>This episode explains how risk prioritization works in a practical security program, and why the CC exam expects you to connect technical issues to business impact instead of treating every finding as equal. You will learn how organizations decide what matters most by looking at mission objectives, critical services, legal obligations, and the consequences of downtime or data exposure. We will define key terms such as asset, threat, vulnerability, likelihood, and impact, then show how those ideas combine into a clear priority list that guides real decisions. You will also hear common prioritization mistakes, like chasing the loudest alert, ignoring systemic weaknesses, or prioritizing based on fear rather than evidence. Real-world examples will include triaging vulnerabilities, choosing which systems get hardened first, and explaining why a moderate technical flaw can be urgent when it touches critical data or operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how risk prioritization works in a practical security program, and why the CC exam expects you to connect technical issues to business impact instead of treating every finding as equal. You will learn how organizations decide what matters most by looking at mission objectives, critical services, legal obligations, and the consequences of downtime or data exposure. We will define key terms such as asset, threat, vulnerability, likelihood, and impact, then show how those ideas combine into a clear priority list that guides real decisions. You will also hear common prioritization mistakes, like chasing the loudest alert, ignoring systemic weaknesses, or prioritizing based on fear rather than evidence. Real-world examples will include triaging vulnerabilities, choosing which systems get hardened first, and explaining why a moderate technical flaw can be urgent when it touches critical data or operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:03:20 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0e26dc42/4ff5b62b.mp3" length="42104018" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1051</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how risk prioritization works in a practical security program, and why the CC exam expects you to connect technical issues to business impact instead of treating every finding as equal. You will learn how organizations decide what matters most by looking at mission objectives, critical services, legal obligations, and the consequences of downtime or data exposure. We will define key terms such as asset, threat, vulnerability, likelihood, and impact, then show how those ideas combine into a clear priority list that guides real decisions. You will also hear common prioritization mistakes, like chasing the loudest alert, ignoring systemic weaknesses, or prioritizing based on fear rather than evidence. Real-world examples will include triaging vulnerabilities, choosing which systems get hardened first, and explaining why a moderate technical flaw can be urgent when it touches critical data or operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0e26dc42/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 12 — Define Risk Tolerance Clearly: What the Organization Will Live With</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Episode 12 — Define Risk Tolerance Clearly: What the Organization Will Live With</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3b16a096-b66d-4d0f-86ee-2a1a8885018f</guid>
      <link>https://share.transistor.fm/s/3ddd4007</link>
      <description>
        <![CDATA[<p>This episode focuses on risk tolerance, which is the boundary an organization sets for how much risk it is willing to accept to achieve its goals, and it is a frequent source of confusion on entry-level exams. You will learn the difference between risk appetite and risk tolerance, and how each influences security decisions, budgeting, and control selection. We will discuss why risk tolerance is not a personal opinion, but a management decision shaped by industry, regulations, brand impact, and operational realities. You will practice turning vague statements like “we need to be secure” into measurable expectations, such as acceptable downtime windows, acceptable data exposure thresholds, or acceptable loss levels. Real-world scenarios will include deciding whether to accept a temporary exposure while a patch is tested, choosing compensating controls when perfect security is not feasible, and documenting acceptance in a way that supports accountability and audit needs. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on risk tolerance, which is the boundary an organization sets for how much risk it is willing to accept to achieve its goals, and it is a frequent source of confusion on entry-level exams. You will learn the difference between risk appetite and risk tolerance, and how each influences security decisions, budgeting, and control selection. We will discuss why risk tolerance is not a personal opinion, but a management decision shaped by industry, regulations, brand impact, and operational realities. You will practice turning vague statements like “we need to be secure” into measurable expectations, such as acceptable downtime windows, acceptable data exposure thresholds, or acceptable loss levels. Real-world scenarios will include deciding whether to accept a temporary exposure while a patch is tested, choosing compensating controls when perfect security is not feasible, and documenting acceptance in a way that supports accountability and audit needs. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:03:52 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3ddd4007/de193e86.mp3" length="42290000" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1056</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on risk tolerance, which is the boundary an organization sets for how much risk it is willing to accept to achieve its goals, and it is a frequent source of confusion on entry-level exams. You will learn the difference between risk appetite and risk tolerance, and how each influences security decisions, budgeting, and control selection. We will discuss why risk tolerance is not a personal opinion, but a management decision shaped by industry, regulations, brand impact, and operational realities. You will practice turning vague statements like “we need to be secure” into measurable expectations, such as acceptable downtime windows, acceptable data exposure thresholds, or acceptable loss levels. Real-world scenarios will include deciding whether to accept a temporary exposure while a patch is tested, choosing compensating controls when perfect security is not feasible, and documenting acceptance in a way that supports accountability and audit needs. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3ddd4007/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 13 — Identify Risk Inputs: Assets, Threats, Vulnerabilities, and Exposure Pathways</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Episode 13 — Identify Risk Inputs: Assets, Threats, Vulnerabilities, and Exposure Pathways</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e1680574-a230-481f-a374-d8da90d7a748</guid>
      <link>https://share.transistor.fm/s/c7da64c6</link>
      <description>
        <![CDATA[<p>This episode builds the core vocabulary of risk by teaching you how to identify the inputs that create risk, which is essential for answering CC questions that describe messy real-world situations. You will learn how to define assets in terms of value and dependency, how to describe threats as potential causes of harm, and how vulnerabilities represent weaknesses that threats can exploit. We will also explain exposure pathways, meaning the routes an attacker or failure can use to reach an asset, such as poor authentication, open network access, misconfigurations, or human error. You will practice mapping a scenario into these parts so you can reason consistently, even when the exam uses unfamiliar examples. Real-world examples will include cloud storage misconfigurations, lost devices, over-permissioned accounts, and outdated systems that widen the attack surface. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode builds the core vocabulary of risk by teaching you how to identify the inputs that create risk, which is essential for answering CC questions that describe messy real-world situations. You will learn how to define assets in terms of value and dependency, how to describe threats as potential causes of harm, and how vulnerabilities represent weaknesses that threats can exploit. We will also explain exposure pathways, meaning the routes an attacker or failure can use to reach an asset, such as poor authentication, open network access, misconfigurations, or human error. You will practice mapping a scenario into these parts so you can reason consistently, even when the exam uses unfamiliar examples. Real-world examples will include cloud storage misconfigurations, lost devices, over-permissioned accounts, and outdated systems that widen the attack surface. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:04:30 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c7da64c6/34f21179.mp3" length="39474020" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>985</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode builds the core vocabulary of risk by teaching you how to identify the inputs that create risk, which is essential for answering CC questions that describe messy real-world situations. You will learn how to define assets in terms of value and dependency, how to describe threats as potential causes of harm, and how vulnerabilities represent weaknesses that threats can exploit. We will also explain exposure pathways, meaning the routes an attacker or failure can use to reach an asset, such as poor authentication, open network access, misconfigurations, or human error. You will practice mapping a scenario into these parts so you can reason consistently, even when the exam uses unfamiliar examples. Real-world examples will include cloud storage misconfigurations, lost devices, over-permissioned accounts, and outdated systems that widen the attack surface. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c7da64c6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 14 — Assess Risk Properly: Likelihood, Impact, and Meaningful Risk Statements</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Episode 14 — Assess Risk Properly: Likelihood, Impact, and Meaningful Risk Statements</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">42a30e12-624a-4196-b6c3-032643803c6f</guid>
      <link>https://share.transistor.fm/s/5a2894fe</link>
      <description>
        <![CDATA[<p>This episode teaches you how to assess risk in a way that produces a meaningful risk statement, which is what security teams use to communicate clearly and what the CC exam often tests through scenario-style questions. You will learn how likelihood reflects probability based on conditions and history, while impact reflects the severity of consequences to operations, finances, safety, and reputation. We will discuss why “high” and “low” labels are not magic words, and how a structured approach helps you avoid exaggeration or minimization. You will practice writing simple risk statements that connect a vulnerability and threat to a specific asset and business outcome, because that form makes it easier to select the right control later. Real-world examples will include estimating the risk of weak passwords on administrative accounts, assessing the impact of downtime on a customer-facing service, and comparing two risks to decide which should be handled first. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches you how to assess risk in a way that produces a meaningful risk statement, which is what security teams use to communicate clearly and what the CC exam often tests through scenario-style questions. You will learn how likelihood reflects probability based on conditions and history, while impact reflects the severity of consequences to operations, finances, safety, and reputation. We will discuss why “high” and “low” labels are not magic words, and how a structured approach helps you avoid exaggeration or minimization. You will practice writing simple risk statements that connect a vulnerability and threat to a specific asset and business outcome, because that form makes it easier to select the right control later. Real-world examples will include estimating the risk of weak passwords on administrative accounts, assessing the impact of downtime on a customer-facing service, and comparing two risks to decide which should be handled first. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:05:01 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5a2894fe/f0f5d0e0.mp3" length="45894908" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1146</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches you how to assess risk in a way that produces a meaningful risk statement, which is what security teams use to communicate clearly and what the CC exam often tests through scenario-style questions. You will learn how likelihood reflects probability based on conditions and history, while impact reflects the severity of consequences to operations, finances, safety, and reputation. We will discuss why “high” and “low” labels are not magic words, and how a structured approach helps you avoid exaggeration or minimization. You will practice writing simple risk statements that connect a vulnerability and threat to a specific asset and business outcome, because that form makes it easier to select the right control later. Real-world examples will include estimating the risk of weak passwords on administrative accounts, assessing the impact of downtime on a customer-facing service, and comparing two risks to decide which should be handled first. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5a2894fe/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 15 — Treat Risk Confidently: Avoid, Mitigate, Transfer, or Accept With Rationale</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Episode 15 — Treat Risk Confidently: Avoid, Mitigate, Transfer, or Accept With Rationale</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">433314bb-e0cb-4420-80ee-0a1b3c44ce1d</guid>
      <link>https://share.transistor.fm/s/6fd128ad</link>
      <description>
        <![CDATA[<p>This episode explains the four classic risk treatment options—avoid, mitigate, transfer, and accept—and prepares you to choose the best response when an exam question asks what an organization should do next. You will learn that avoidance removes the risky activity, mitigation reduces likelihood or impact through controls, transfer shifts financial consequences through mechanisms like insurance or contracts, and acceptance acknowledges the risk while documenting the decision. We will discuss why “accept” is not the same as ignoring, and why transferring risk does not remove the underlying vulnerability. You will practice selecting treatments based on business requirements, risk tolerance, and cost-benefit considerations, not just technical preference. Real-world examples will include decommissioning an obsolete system, adding MFA to reduce account takeover risk, using cyber insurance as part of a broader strategy, and documenting risk acceptance when immediate remediation would harm mission-critical availability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains the four classic risk treatment options—avoid, mitigate, transfer, and accept—and prepares you to choose the best response when an exam question asks what an organization should do next. You will learn that avoidance removes the risky activity, mitigation reduces likelihood or impact through controls, transfer shifts financial consequences through mechanisms like insurance or contracts, and acceptance acknowledges the risk while documenting the decision. We will discuss why “accept” is not the same as ignoring, and why transferring risk does not remove the underlying vulnerability. You will practice selecting treatments based on business requirements, risk tolerance, and cost-benefit considerations, not just technical preference. Real-world examples will include decommissioning an obsolete system, adding MFA to reduce account takeover risk, using cyber insurance as part of a broader strategy, and documenting risk acceptance when immediate remediation would harm mission-critical availability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:10:27 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6fd128ad/758f853a.mp3" length="45242898" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1130</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains the four classic risk treatment options—avoid, mitigate, transfer, and accept—and prepares you to choose the best response when an exam question asks what an organization should do next. You will learn that avoidance removes the risky activity, mitigation reduces likelihood or impact through controls, transfer shifts financial consequences through mechanisms like insurance or contracts, and acceptance acknowledges the risk while documenting the decision. We will discuss why “accept” is not the same as ignoring, and why transferring risk does not remove the underlying vulnerability. You will practice selecting treatments based on business requirements, risk tolerance, and cost-benefit considerations, not just technical preference. Real-world examples will include decommissioning an obsolete system, adding MFA to reduce account takeover risk, using cyber insurance as part of a broader strategy, and documenting risk acceptance when immediate remediation would harm mission-critical availability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6fd128ad/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 16 — Apply Technical Controls That Reduce Risk Without Breaking Operations</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Episode 16 — Apply Technical Controls That Reduce Risk Without Breaking Operations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e5bfef7f-1981-4e3c-9832-ae44d3fcdb3c</guid>
      <link>https://share.transistor.fm/s/43fc56b4</link>
      <description>
        <![CDATA[<p>This episode focuses on technical controls and how they are used to reduce risk in practical, testable ways that show up in the CC objectives. You will learn how controls such as encryption, access control, firewalls, endpoint protection, and logging are selected to address specific threats and vulnerabilities, rather than being applied as a random checklist. We will discuss preventive, detective, and corrective control functions, and how the same tool can serve different functions depending on configuration and context. You will practice matching a control to a scenario, like choosing encryption to protect confidentiality of data in transit, or choosing monitoring to detect suspicious access patterns early. Real-world considerations will include performance tradeoffs, deployment pitfalls, false positives, and the importance of testing changes so controls do not cause outages that harm availability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on technical controls and how they are used to reduce risk in practical, testable ways that show up in the CC objectives. You will learn how controls such as encryption, access control, firewalls, endpoint protection, and logging are selected to address specific threats and vulnerabilities, rather than being applied as a random checklist. We will discuss preventive, detective, and corrective control functions, and how the same tool can serve different functions depending on configuration and context. You will practice matching a control to a scenario, like choosing encryption to protect confidentiality of data in transit, or choosing monitoring to detect suspicious access patterns early. Real-world considerations will include performance tradeoffs, deployment pitfalls, false positives, and the importance of testing changes so controls do not cause outages that harm availability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:10:54 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/43fc56b4/74c0e018.mp3" length="43351620" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1082</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on technical controls and how they are used to reduce risk in practical, testable ways that show up in the CC objectives. You will learn how controls such as encryption, access control, firewalls, endpoint protection, and logging are selected to address specific threats and vulnerabilities, rather than being applied as a random checklist. We will discuss preventive, detective, and corrective control functions, and how the same tool can serve different functions depending on configuration and context. You will practice matching a control to a scenario, like choosing encryption to protect confidentiality of data in transit, or choosing monitoring to detect suspicious access patterns early. Real-world considerations will include performance tradeoffs, deployment pitfalls, false positives, and the importance of testing changes so controls do not cause outages that harm availability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/43fc56b4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 17 — Use Administrative Controls Well: Policies, Process Discipline, and Human Factors</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Episode 17 — Use Administrative Controls Well: Policies, Process Discipline, and Human Factors</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">34c0688e-ab9d-478c-8acc-8478f2361f1b</guid>
      <link>https://share.transistor.fm/s/4fda4224</link>
      <description>
        <![CDATA[<p>This episode explains administrative controls, which are the governance and process mechanisms that shape behavior and reduce risk, and they are critical for CC because they connect security to people and organizational decision-making. You will learn how policies, procedures, standards, training, background checks, and change management reduce vulnerabilities created by human error and inconsistent practices. We will discuss why administrative controls often fail when they are vague, unenforced, or disconnected from real workflows, and how to recognize those failure modes in exam questions. You will practice distinguishing an administrative control from a technical or physical one, even when the scenario includes a mix. Real-world examples will include enforcing least privilege through access request processes, using security awareness training to reduce phishing success, and applying change management to prevent accidental outages or misconfigurations that introduce new vulnerabilities. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains administrative controls, which are the governance and process mechanisms that shape behavior and reduce risk, and they are critical for CC because they connect security to people and organizational decision-making. You will learn how policies, procedures, standards, training, background checks, and change management reduce vulnerabilities created by human error and inconsistent practices. We will discuss why administrative controls often fail when they are vague, unenforced, or disconnected from real workflows, and how to recognize those failure modes in exam questions. You will practice distinguishing an administrative control from a technical or physical one, even when the scenario includes a mix. Real-world examples will include enforcing least privilege through access request processes, using security awareness training to reduce phishing success, and applying change management to prevent accidental outages or misconfigurations that introduce new vulnerabilities. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:11:21 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4fda4224/34a0c09b.mp3" length="41835497" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1045</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains administrative controls, which are the governance and process mechanisms that shape behavior and reduce risk, and they are critical for CC because they connect security to people and organizational decision-making. You will learn how policies, procedures, standards, training, background checks, and change management reduce vulnerabilities created by human error and inconsistent practices. We will discuss why administrative controls often fail when they are vague, unenforced, or disconnected from real workflows, and how to recognize those failure modes in exam questions. You will practice distinguishing an administrative control from a technical or physical one, even when the scenario includes a mix. Real-world examples will include enforcing least privilege through access request processes, using security awareness training to reduce phishing success, and applying change management to prevent accidental outages or misconfigurations that introduce new vulnerabilities. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4fda4224/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 18 — Strengthen Physical Controls: Layers, Barriers, and Practical Deterrence Strategies</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Episode 18 — Strengthen Physical Controls: Layers, Barriers, and Practical Deterrence Strategies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5766e7fe-3ada-4217-9413-b5583effe386</guid>
      <link>https://share.transistor.fm/s/13922040</link>
      <description>
        <![CDATA[<p>This episode covers physical controls, which protect facilities, equipment, and people from unauthorized access, theft, and environmental hazards, a topic the CC exam expects you to understand at a foundational level. You will learn how barriers, locks, fences, lighting, visitor procedures, and secured areas work together as layers, and why a single control rarely solves a physical risk by itself. We will discuss the idea of deterrence versus delay versus detection, and how physical security design aims to increase the effort and time required for an attacker while improving the chances of being noticed. You will practice identifying which physical control best addresses a scenario, such as preventing tailgating, protecting server rooms, or controlling access to sensitive documents. Real-world considerations will include balancing safety and convenience, managing keys and badges responsibly, and maintaining clear accountability for who can enter restricted areas and why. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers physical controls, which protect facilities, equipment, and people from unauthorized access, theft, and environmental hazards, a topic the CC exam expects you to understand at a foundational level. You will learn how barriers, locks, fences, lighting, visitor procedures, and secured areas work together as layers, and why a single control rarely solves a physical risk by itself. We will discuss the idea of deterrence versus delay versus detection, and how physical security design aims to increase the effort and time required for an attacker while improving the chances of being noticed. You will practice identifying which physical control best addresses a scenario, such as preventing tailgating, protecting server rooms, or controlling access to sensitive documents. Real-world considerations will include balancing safety and convenience, managing keys and badges responsibly, and maintaining clear accountability for who can enter restricted areas and why. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:11:48 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/13922040/b3e63c93.mp3" length="43579436" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1088</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers physical controls, which protect facilities, equipment, and people from unauthorized access, theft, and environmental hazards, a topic the CC exam expects you to understand at a foundational level. You will learn how barriers, locks, fences, lighting, visitor procedures, and secured areas work together as layers, and why a single control rarely solves a physical risk by itself. We will discuss the idea of deterrence versus delay versus detection, and how physical security design aims to increase the effort and time required for an attacker while improving the chances of being noticed. You will practice identifying which physical control best addresses a scenario, such as preventing tailgating, protecting server rooms, or controlling access to sensitive documents. Real-world considerations will include balancing safety and convenience, managing keys and badges responsibly, and maintaining clear accountability for who can enter restricted areas and why. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/13922040/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 19 — Operationalize the ISC2 Code of Ethics Under Real Workplace Pressure</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Episode 19 — Operationalize the ISC2 Code of Ethics Under Real Workplace Pressure</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cdd393e3-a87e-4c8b-90eb-bf623901df27</guid>
      <link>https://share.transistor.fm/s/6df9b0b5</link>
      <description>
        <![CDATA[<p>This episode explains how the ISC2 Code of Ethics guides professional behavior, and why the CC exam expects you to recognize ethical responsibilities as part of being trusted with systems and data. You will learn the intent of ethical principles such as protecting society, acting honorably, providing diligent service, and advancing the profession, then connect those ideas to realistic workplace decisions. We will discuss how ethical failures show up operationally, like mishandling sensitive data, ignoring safety risks, misrepresenting findings, or cutting corners that create harm. You will practice analyzing an ethical scenario by identifying stakeholders, possible harms, and the most responsible next step, which mirrors the reasoning the exam rewards. Real-world examples will include responsible disclosure choices, handling conflicts of interest, documenting security work truthfully, and using access appropriately, even when nobody seems to be watching. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how the ISC2 Code of Ethics guides professional behavior, and why the CC exam expects you to recognize ethical responsibilities as part of being trusted with systems and data. You will learn the intent of ethical principles such as protecting society, acting honorably, providing diligent service, and advancing the profession, then connect those ideas to realistic workplace decisions. We will discuss how ethical failures show up operationally, like mishandling sensitive data, ignoring safety risks, misrepresenting findings, or cutting corners that create harm. You will practice analyzing an ethical scenario by identifying stakeholders, possible harms, and the most responsible next step, which mirrors the reasoning the exam rewards. Real-world examples will include responsible disclosure choices, handling conflicts of interest, documenting security work truthfully, and using access appropriately, even when nobody seems to be watching. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:12:18 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6df9b0b5/f6314946.mp3" length="42567945" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1063</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how the ISC2 Code of Ethics guides professional behavior, and why the CC exam expects you to recognize ethical responsibilities as part of being trusted with systems and data. You will learn the intent of ethical principles such as protecting society, acting honorably, providing diligent service, and advancing the profession, then connect those ideas to realistic workplace decisions. We will discuss how ethical failures show up operationally, like mishandling sensitive data, ignoring safety risks, misrepresenting findings, or cutting corners that create harm. You will practice analyzing an ethical scenario by identifying stakeholders, possible harms, and the most responsible next step, which mirrors the reasoning the exam rewards. Real-world examples will include responsible disclosure choices, handling conflicts of interest, documenting security work truthfully, and using access appropriately, even when nobody seems to be watching. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6df9b0b5/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 20 — Turn Governance Into Action: Policies, Procedures, and Standards That Stick</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Episode 20 — Turn Governance Into Action: Policies, Procedures, and Standards That Stick</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">82e6d798-0681-4f38-8e6e-77fd188fb7d2</guid>
      <link>https://share.transistor.fm/s/c96b938c</link>
      <description>
        <![CDATA[<p>This episode focuses on governance as the structure that makes security consistent, measurable, and aligned with business goals, which is a recurring theme in the CC objectives. You will learn how policies set high-level intent, standards define mandatory requirements, and procedures describe the step-by-step actions people follow to implement controls reliably. We will discuss why governance fails when documents are created but not maintained, when roles are unclear, or when enforcement is inconsistent across teams. You will practice interpreting scenario questions that ask what is missing when a security program is inconsistent, such as the absence of a standard for password complexity or a procedure for approving access. Real-world examples will include building a clear onboarding process, implementing change management so updates are reviewed and reversible, and using audits and metrics to confirm that governance is more than paperwork. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on governance as the structure that makes security consistent, measurable, and aligned with business goals, which is a recurring theme in the CC objectives. You will learn how policies set high-level intent, standards define mandatory requirements, and procedures describe the step-by-step actions people follow to implement controls reliably. We will discuss why governance fails when documents are created but not maintained, when roles are unclear, or when enforcement is inconsistent across teams. You will practice interpreting scenario questions that ask what is missing when a security program is inconsistent, such as the absence of a standard for password complexity or a procedure for approving access. Real-world examples will include building a clear onboarding process, implementing change management so updates are reviewed and reversible, and using audits and metrics to confirm that governance is more than paperwork. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:12:45 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c96b938c/af2eef98.mp3" length="42389281" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1058</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on governance as the structure that makes security consistent, measurable, and aligned with business goals, which is a recurring theme in the CC objectives. You will learn how policies set high-level intent, standards define mandatory requirements, and procedures describe the step-by-step actions people follow to implement controls reliably. We will discuss why governance fails when documents are created but not maintained, when roles are unclear, or when enforcement is inconsistent across teams. You will practice interpreting scenario questions that ask what is missing when a security program is inconsistent, such as the absence of a standard for password complexity or a procedure for approving access. Real-world examples will include building a clear onboarding process, implementing change management so updates are reviewed and reversible, and using audits and metrics to confirm that governance is more than paperwork. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c96b938c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 21 — Navigate Regulations and Laws: What Compliance Demands From Security Work</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Episode 21 — Navigate Regulations and Laws: What Compliance Demands From Security Work</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a6f85bd9-d20a-43da-9333-c437a46d8906</guid>
      <link>https://share.transistor.fm/s/e6ba7466</link>
      <description>
        <![CDATA[<p>This episode explains how laws and regulations influence security requirements, and it prepares you for CC questions that test your ability to recognize compliance drivers without needing to memorize specific statutes. You will learn the practical difference between legal requirements, regulatory requirements, contractual obligations, and internal policy, and how each can create mandatory controls or reporting expectations. We will discuss why compliance is not the same as security, but why security programs must still align with compliance to protect the organization from legal and financial harm. You will practice interpreting scenarios where data handling, privacy expectations, retention rules, or breach reporting timelines affect what security teams must do. Real-world examples will include handling customer personal data appropriately, following industry rules for sensitive information, documenting decisions for audits, and escalating concerns when an action might violate a requirement even if it seems operationally convenient. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how laws and regulations influence security requirements, and it prepares you for CC questions that test your ability to recognize compliance drivers without needing to memorize specific statutes. You will learn the practical difference between legal requirements, regulatory requirements, contractual obligations, and internal policy, and how each can create mandatory controls or reporting expectations. We will discuss why compliance is not the same as security, but why security programs must still align with compliance to protect the organization from legal and financial harm. You will practice interpreting scenarios where data handling, privacy expectations, retention rules, or breach reporting timelines affect what security teams must do. Real-world examples will include handling customer personal data appropriately, following industry rules for sensitive information, documenting decisions for audits, and escalating concerns when an action might violate a requirement even if it seems operationally convenient. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:13:52 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e6ba7466/43e369c9.mp3" length="35728053" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>892</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how laws and regulations influence security requirements, and it prepares you for CC questions that test your ability to recognize compliance drivers without needing to memorize specific statutes. You will learn the practical difference between legal requirements, regulatory requirements, contractual obligations, and internal policy, and how each can create mandatory controls or reporting expectations. We will discuss why compliance is not the same as security, but why security programs must still align with compliance to protect the organization from legal and financial harm. You will practice interpreting scenarios where data handling, privacy expectations, retention rules, or breach reporting timelines affect what security teams must do. Real-world examples will include handling customer personal data appropriately, following industry rules for sensitive information, documenting decisions for audits, and escalating concerns when an action might violate a requirement even if it seems operationally convenient. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e6ba7466/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 22 — Business Continuity Purpose: Keep Critical Work Going During Disruption</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Episode 22 — Business Continuity Purpose: Keep Critical Work Going During Disruption</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">69b34b94-ca51-47fc-abd9-33f3ffa25be6</guid>
      <link>https://share.transistor.fm/s/f4ad18c6</link>
      <description>
        <![CDATA[<p>This episode introduces business continuity as the discipline of keeping essential business functions operating during disruptive events, which is foundational knowledge for the CC exam. You will learn how continuity planning focuses on the mission, the people, and the processes—not just the technology—and how organizations decide what must continue versus what can pause. We will cover key ideas such as critical functions, dependencies, maximum tolerable downtime, and continuity strategies that keep work moving even when normal systems are unavailable. You will practice recognizing continuity objectives in scenarios like facility issues, supplier outages, staffing disruptions, or cyber incidents that affect productivity. Real-world examples will include maintaining customer support during system degradation, keeping payroll running through alternate workflows, and using clear roles and communication plans so teams know how to operate during uncertainty. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces business continuity as the discipline of keeping essential business functions operating during disruptive events, which is foundational knowledge for the CC exam. You will learn how continuity planning focuses on the mission, the people, and the processes—not just the technology—and how organizations decide what must continue versus what can pause. We will cover key ideas such as critical functions, dependencies, maximum tolerable downtime, and continuity strategies that keep work moving even when normal systems are unavailable. You will practice recognizing continuity objectives in scenarios like facility issues, supplier outages, staffing disruptions, or cyber incidents that affect productivity. Real-world examples will include maintaining customer support during system degradation, keeping payroll running through alternate workflows, and using clear roles and communication plans so teams know how to operate during uncertainty. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:14:20 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f4ad18c6/28af0d67.mp3" length="31658171" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>790</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces business continuity as the discipline of keeping essential business functions operating during disruptive events, which is foundational knowledge for the CC exam. You will learn how continuity planning focuses on the mission, the people, and the processes—not just the technology—and how organizations decide what must continue versus what can pause. We will cover key ideas such as critical functions, dependencies, maximum tolerable downtime, and continuity strategies that keep work moving even when normal systems are unavailable. You will practice recognizing continuity objectives in scenarios like facility issues, supplier outages, staffing disruptions, or cyber incidents that affect productivity. Real-world examples will include maintaining customer support during system degradation, keeping payroll running through alternate workflows, and using clear roles and communication plans so teams know how to operate during uncertainty. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f4ad18c6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 23 — Business Continuity Importance: Downtime Costs, Priorities, and Stakeholder Trust</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Episode 23 — Business Continuity Importance: Downtime Costs, Priorities, and Stakeholder Trust</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7c243770-696a-41bd-a7f9-05f0b4228e49</guid>
      <link>https://share.transistor.fm/s/f68d8127</link>
      <description>
        <![CDATA[<p>This episode explains why business continuity matters, focusing on the real costs of downtime and the broader impacts that reach beyond IT into revenue, safety, legal exposure, and reputation. You will learn how continuity planning protects stakeholder trust by ensuring the organization can keep promises to customers, partners, and employees during disruptions. We will discuss how continuity priorities are set using impact analysis, including financial loss, operational bottlenecks, regulatory consequences, and harm to critical services. You will practice evaluating a scenario for continuity significance, such as a hospital system outage, a payment processing interruption, or a loss of access to a key vendor platform. Real-world considerations will include communicating clearly during incidents, maintaining manual workarounds where appropriate, and ensuring leadership understands that continuity is a planned capability rather than an emergency improvisation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why business continuity matters, focusing on the real costs of downtime and the broader impacts that reach beyond IT into revenue, safety, legal exposure, and reputation. You will learn how continuity planning protects stakeholder trust by ensuring the organization can keep promises to customers, partners, and employees during disruptions. We will discuss how continuity priorities are set using impact analysis, including financial loss, operational bottlenecks, regulatory consequences, and harm to critical services. You will practice evaluating a scenario for continuity significance, such as a hospital system outage, a payment processing interruption, or a loss of access to a key vendor platform. Real-world considerations will include communicating clearly during incidents, maintaining manual workarounds where appropriate, and ensuring leadership understands that continuity is a planned capability rather than an emergency improvisation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:14:49 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f68d8127/0665eef9.mp3" length="33092836" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>826</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why business continuity matters, focusing on the real costs of downtime and the broader impacts that reach beyond IT into revenue, safety, legal exposure, and reputation. You will learn how continuity planning protects stakeholder trust by ensuring the organization can keep promises to customers, partners, and employees during disruptions. We will discuss how continuity priorities are set using impact analysis, including financial loss, operational bottlenecks, regulatory consequences, and harm to critical services. You will practice evaluating a scenario for continuity significance, such as a hospital system outage, a payment processing interruption, or a loss of access to a key vendor platform. Real-world considerations will include communicating clearly during incidents, maintaining manual workarounds where appropriate, and ensuring leadership understands that continuity is a planned capability rather than an emergency improvisation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f68d8127/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 24 — Business Continuity Components: Roles, Dependencies, Plans, and Testing Cadence</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Episode 24 — Business Continuity Components: Roles, Dependencies, Plans, and Testing Cadence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2a1289b3-15fa-4ec6-a5cf-1576bc2bdbc0</guid>
      <link>https://share.transistor.fm/s/cdcbb9d7</link>
      <description>
        <![CDATA[<p>This episode breaks down the core components of a business continuity program and prepares you to answer CC questions that ask what a continuity plan must include to be effective. You will learn the role of business impact analysis, dependency mapping, continuity strategies, and clear ownership so actions are not delayed during a crisis. We will discuss how plans define responsibilities, communications, alternate processes, and escalation paths, and why a plan that is not tested is often a plan that will fail. You will practice identifying missing elements in scenarios, such as unclear decision authority, untested assumptions about staff availability, or a lack of coordination with key vendors. Real-world examples will include running tabletop exercises, validating contact lists, ensuring alternate work locations or remote access are feasible, and updating plans after organizational changes so continuity remains a living capability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode breaks down the core components of a business continuity program and prepares you to answer CC questions that ask what a continuity plan must include to be effective. You will learn the role of business impact analysis, dependency mapping, continuity strategies, and clear ownership so actions are not delayed during a crisis. We will discuss how plans define responsibilities, communications, alternate processes, and escalation paths, and why a plan that is not tested is often a plan that will fail. You will practice identifying missing elements in scenarios, such as unclear decision authority, untested assumptions about staff availability, or a lack of coordination with key vendors. Real-world examples will include running tabletop exercises, validating contact lists, ensuring alternate work locations or remote access are feasible, and updating plans after organizational changes so continuity remains a living capability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:15:17 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cdcbb9d7/e768088e.mp3" length="34660179" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>865</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode breaks down the core components of a business continuity program and prepares you to answer CC questions that ask what a continuity plan must include to be effective. You will learn the role of business impact analysis, dependency mapping, continuity strategies, and clear ownership so actions are not delayed during a crisis. We will discuss how plans define responsibilities, communications, alternate processes, and escalation paths, and why a plan that is not tested is often a plan that will fail. You will practice identifying missing elements in scenarios, such as unclear decision authority, untested assumptions about staff availability, or a lack of coordination with key vendors. Real-world examples will include running tabletop exercises, validating contact lists, ensuring alternate work locations or remote access are feasible, and updating plans after organizational changes so continuity remains a living capability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cdcbb9d7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 25 — Disaster Recovery Purpose: Restore IT Services Fast and Validate the Return</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Episode 25 — Disaster Recovery Purpose: Restore IT Services Fast and Validate the Return</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c2cb5eb4-2d74-4c72-b221-ed2ec769767b</guid>
      <link>https://share.transistor.fm/s/a873d5d3</link>
      <description>
        <![CDATA[<p>This episode introduces disaster recovery as the focused effort to restore IT systems and data after an outage or major disruption, and it clarifies how disaster recovery differs from broader business continuity. You will learn how disaster recovery emphasizes technical restoration activities such as rebuilding servers, restoring backups, failing over to alternate infrastructure, and confirming services function correctly after recovery. We will define recovery time objective (RTO) and recovery point objective (RPO) in practical terms and explain why these metrics matter in CC-style questions. You will practice identifying disaster recovery needs in scenarios like ransomware recovery, major hardware failure, cloud region outage, or data corruption that requires restoration to a known-good state. Real-world examples will include validating backup integrity, documenting recovery steps in runbooks, and ensuring recovery actions do not reintroduce the original failure through misconfiguration or incomplete patching. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces disaster recovery as the focused effort to restore IT systems and data after an outage or major disruption, and it clarifies how disaster recovery differs from broader business continuity. You will learn how disaster recovery emphasizes technical restoration activities such as rebuilding servers, restoring backups, failing over to alternate infrastructure, and confirming services function correctly after recovery. We will define recovery time objective (RTO) and recovery point objective (RPO) in practical terms and explain why these metrics matter in CC-style questions. You will practice identifying disaster recovery needs in scenarios like ransomware recovery, major hardware failure, cloud region outage, or data corruption that requires restoration to a known-good state. Real-world examples will include validating backup integrity, documenting recovery steps in runbooks, and ensuring recovery actions do not reintroduce the original failure through misconfiguration or incomplete patching. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:15:46 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a873d5d3/2b0aa2bd.mp3" length="32151371" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>802</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces disaster recovery as the focused effort to restore IT systems and data after an outage or major disruption, and it clarifies how disaster recovery differs from broader business continuity. You will learn how disaster recovery emphasizes technical restoration activities such as rebuilding servers, restoring backups, failing over to alternate infrastructure, and confirming services function correctly after recovery. We will define recovery time objective (RTO) and recovery point objective (RPO) in practical terms and explain why these metrics matter in CC-style questions. You will practice identifying disaster recovery needs in scenarios like ransomware recovery, major hardware failure, cloud region outage, or data corruption that requires restoration to a known-good state. Real-world examples will include validating backup integrity, documenting recovery steps in runbooks, and ensuring recovery actions do not reintroduce the original failure through misconfiguration or incomplete patching. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a873d5d3/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 26 — Disaster Recovery Importance: RTO, RPO, and Tradeoffs You Must Understand</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Episode 26 — Disaster Recovery Importance: RTO, RPO, and Tradeoffs You Must Understand</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5aeb2d7a-8b14-4425-be73-cbe0c1dba3ed</guid>
      <link>https://share.transistor.fm/s/13f0331d</link>
      <description>
        <![CDATA[<p>This episode explains why disaster recovery planning is essential, focusing on how RTO and RPO translate into real business tradeoffs and investment decisions that security professionals must understand. You will learn that shorter recovery times and smaller data loss windows usually require higher cost, more complexity, and more disciplined operations, which is why organizations must define realistic targets instead of hoping for miracles during an incident. We will discuss common misunderstandings, such as assuming backups automatically guarantee fast recovery, or assuming that cloud services eliminate the need for disaster recovery planning. You will practice reasoning through scenarios where a chosen recovery strategy does not match the business need, like a critical system with a long RTO or a high-value dataset with an unacceptable RPO. Real-world considerations will include aligning recovery targets with continuity priorities, testing recovery under realistic conditions, and documenting decisions so stakeholders understand what the organization can and cannot restore within the required time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why disaster recovery planning is essential, focusing on how RTO and RPO translate into real business tradeoffs and investment decisions that security professionals must understand. You will learn that shorter recovery times and smaller data loss windows usually require higher cost, more complexity, and more disciplined operations, which is why organizations must define realistic targets instead of hoping for miracles during an incident. We will discuss common misunderstandings, such as assuming backups automatically guarantee fast recovery, or assuming that cloud services eliminate the need for disaster recovery planning. You will practice reasoning through scenarios where a chosen recovery strategy does not match the business need, like a critical system with a long RTO or a high-value dataset with an unacceptable RPO. Real-world considerations will include aligning recovery targets with continuity priorities, testing recovery under realistic conditions, and documenting decisions so stakeholders understand what the organization can and cannot restore within the required time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:17:03 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/13f0331d/6bbcf22e.mp3" length="30355187" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>758</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why disaster recovery planning is essential, focusing on how RTO and RPO translate into real business tradeoffs and investment decisions that security professionals must understand. You will learn that shorter recovery times and smaller data loss windows usually require higher cost, more complexity, and more disciplined operations, which is why organizations must define realistic targets instead of hoping for miracles during an incident. We will discuss common misunderstandings, such as assuming backups automatically guarantee fast recovery, or assuming that cloud services eliminate the need for disaster recovery planning. You will practice reasoning through scenarios where a chosen recovery strategy does not match the business need, like a critical system with a long RTO or a high-value dataset with an unacceptable RPO. Real-world considerations will include aligning recovery targets with continuity priorities, testing recovery under realistic conditions, and documenting decisions so stakeholders understand what the organization can and cannot restore within the required time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/13f0331d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 27 — Disaster Recovery Components: Backups, Failover, Runbooks, and Recovery Checks</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Episode 27 — Disaster Recovery Components: Backups, Failover, Runbooks, and Recovery Checks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">00d904f7-78c6-481a-9748-67d18c15155e</guid>
      <link>https://share.transistor.fm/s/066bbb29</link>
      <description>
        <![CDATA[<p>This episode covers the building blocks of a workable disaster recovery capability, including backups, replication, failover planning, documented runbooks, and validation steps that confirm systems are truly restored. You will learn how different backup types and storage choices influence recovery speed and reliability, and why integrity checks are critical before trusting restored data. We will discuss failover concepts such as hot, warm, and cold approaches in practical terms, emphasizing what each implies for cost, complexity, and recovery time. You will practice identifying which component is missing in scenarios where recovery fails, such as incomplete documentation, untested backups, missing credentials, or dependencies that were overlooked. Real-world examples will include restoring a database to a consistent point, verifying application connectivity after failover, and ensuring security controls—like access restrictions and logging—are still in place after recovery to avoid turning an outage into a security incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers the building blocks of a workable disaster recovery capability, including backups, replication, failover planning, documented runbooks, and validation steps that confirm systems are truly restored. You will learn how different backup types and storage choices influence recovery speed and reliability, and why integrity checks are critical before trusting restored data. We will discuss failover concepts such as hot, warm, and cold approaches in practical terms, emphasizing what each implies for cost, complexity, and recovery time. You will practice identifying which component is missing in scenarios where recovery fails, such as incomplete documentation, untested backups, missing credentials, or dependencies that were overlooked. Real-world examples will include restoring a database to a consistent point, verifying application connectivity after failover, and ensuring security controls—like access restrictions and logging—are still in place after recovery to avoid turning an outage into a security incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:17:28 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/066bbb29/31d99838.mp3" length="31413679" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>784</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers the building blocks of a workable disaster recovery capability, including backups, replication, failover planning, documented runbooks, and validation steps that confirm systems are truly restored. You will learn how different backup types and storage choices influence recovery speed and reliability, and why integrity checks are critical before trusting restored data. We will discuss failover concepts such as hot, warm, and cold approaches in practical terms, emphasizing what each implies for cost, complexity, and recovery time. You will practice identifying which component is missing in scenarios where recovery fails, such as incomplete documentation, untested backups, missing credentials, or dependencies that were overlooked. Real-world examples will include restoring a database to a consistent point, verifying application connectivity after failover, and ensuring security controls—like access restrictions and logging—are still in place after recovery to avoid turning an outage into a security incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/066bbb29/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 28 — Incident Response Purpose: Contain Damage and Restore Normal Operations</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Episode 28 — Incident Response Purpose: Contain Damage and Restore Normal Operations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f93acee6-ca23-4b9c-9c96-cbea54dd3123</guid>
      <link>https://share.transistor.fm/s/2bc07e7e</link>
      <description>
        <![CDATA[<p>This episode introduces incident response as the structured approach for handling security events so the organization can limit damage, preserve evidence, and recover operations efficiently. You will learn how incident response differs from general troubleshooting by focusing on security objectives such as containment, eradication, and preventing recurrence. We will define key terms like incident, event, alert, and compromise, and explain why proper classification matters for deciding escalation and response actions. You will practice identifying when a situation requires incident response, such as suspected malware spread, unauthorized access, data exfiltration indicators, or abnormal privilege use. Real-world examples will include isolating affected systems to stop propagation, preserving logs for investigation, coordinating with stakeholders so communication is accurate, and balancing fast containment with the need to avoid destroying evidence that supports root cause analysis or legal obligations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces incident response as the structured approach for handling security events so the organization can limit damage, preserve evidence, and recover operations efficiently. You will learn how incident response differs from general troubleshooting by focusing on security objectives such as containment, eradication, and preventing recurrence. We will define key terms like incident, event, alert, and compromise, and explain why proper classification matters for deciding escalation and response actions. You will practice identifying when a situation requires incident response, such as suspected malware spread, unauthorized access, data exfiltration indicators, or abnormal privilege use. Real-world examples will include isolating affected systems to stop propagation, preserving logs for investigation, coordinating with stakeholders so communication is accurate, and balancing fast containment with the need to avoid destroying evidence that supports root cause analysis or legal obligations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:17:56 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2bc07e7e/f2c885ba.mp3" length="28736637" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>717</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces incident response as the structured approach for handling security events so the organization can limit damage, preserve evidence, and recover operations efficiently. You will learn how incident response differs from general troubleshooting by focusing on security objectives such as containment, eradication, and preventing recurrence. We will define key terms like incident, event, alert, and compromise, and explain why proper classification matters for deciding escalation and response actions. You will practice identifying when a situation requires incident response, such as suspected malware spread, unauthorized access, data exfiltration indicators, or abnormal privilege use. Real-world examples will include isolating affected systems to stop propagation, preserving logs for investigation, coordinating with stakeholders so communication is accurate, and balancing fast containment with the need to avoid destroying evidence that supports root cause analysis or legal obligations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2bc07e7e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 29 — Incident Response Importance: Speed, Evidence, and Communication Under Stress</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Episode 29 — Incident Response Importance: Speed, Evidence, and Communication Under Stress</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f8c712b8-f045-4249-9f24-a02b3cc219f6</guid>
      <link>https://share.transistor.fm/s/72060e47</link>
      <description>
        <![CDATA[<p>This episode explains why incident response is important, emphasizing the time-sensitive nature of attacks and the need for disciplined decisions when pressure is high. You will learn how delays increase attacker dwell time, expand impact, and complicate recovery, while rushed actions can destroy evidence, trigger broader outages, or lead to incorrect conclusions. We will discuss the role of evidence handling, logging, and documentation, and why clear communication prevents confusion and protects organizational trust. You will practice recognizing the best next step in scenarios where teams must decide whether to isolate systems, reset credentials, notify leadership, or begin forensic preservation. Real-world examples will include responding to phishing-driven account compromise, coordinating containment across teams, communicating with users without spreading misinformation, and documenting timelines so lessons learned can drive improvements to controls, training, and detection. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why incident response is important, emphasizing the time-sensitive nature of attacks and the need for disciplined decisions when pressure is high. You will learn how delays increase attacker dwell time, expand impact, and complicate recovery, while rushed actions can destroy evidence, trigger broader outages, or lead to incorrect conclusions. We will discuss the role of evidence handling, logging, and documentation, and why clear communication prevents confusion and protects organizational trust. You will practice recognizing the best next step in scenarios where teams must decide whether to isolate systems, reset credentials, notify leadership, or begin forensic preservation. Real-world examples will include responding to phishing-driven account compromise, coordinating containment across teams, communicating with users without spreading misinformation, and documenting timelines so lessons learned can drive improvements to controls, training, and detection. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:18:21 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/72060e47/74266c09.mp3" length="30570444" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>763</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why incident response is important, emphasizing the time-sensitive nature of attacks and the need for disciplined decisions when pressure is high. You will learn how delays increase attacker dwell time, expand impact, and complicate recovery, while rushed actions can destroy evidence, trigger broader outages, or lead to incorrect conclusions. We will discuss the role of evidence handling, logging, and documentation, and why clear communication prevents confusion and protects organizational trust. You will practice recognizing the best next step in scenarios where teams must decide whether to isolate systems, reset credentials, notify leadership, or begin forensic preservation. Real-world examples will include responding to phishing-driven account compromise, coordinating containment across teams, communicating with users without spreading misinformation, and documenting timelines so lessons learned can drive improvements to controls, training, and detection. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/72060e47/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 30 — Incident Response Components: Prepare, Detect, Contain, Eradicate, Recover</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Episode 30 — Incident Response Components: Prepare, Detect, Contain, Eradicate, Recover</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">94b4fe23-ba37-40f2-a70a-7ccdb0e9910c</guid>
      <link>https://share.transistor.fm/s/4c3dde54</link>
      <description>
        <![CDATA[<p>This episode walks through the major components of incident response, showing how preparation, detection, containment, eradication, and recovery fit together as a repeatable lifecycle. You will learn what preparation includes in practical terms, such as clear roles, access to tools, logging readiness, and playbooks that reduce decision time. We will discuss detection as the process of turning signals into validated incidents, then focus on containment strategies that reduce spread while preserving evidence. You will practice understanding eradication as removing the root cause, not just the symptoms, and recovery as the controlled return to normal operations with validation steps that confirm systems are clean and stable. Real-world examples will include a malware outbreak where containment requires segmentation, an account compromise where credential hygiene is critical, and post-incident actions where lessons learned improve policies, training, and technical controls to prevent recurrence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode walks through the major components of incident response, showing how preparation, detection, containment, eradication, and recovery fit together as a repeatable lifecycle. You will learn what preparation includes in practical terms, such as clear roles, access to tools, logging readiness, and playbooks that reduce decision time. We will discuss detection as the process of turning signals into validated incidents, then focus on containment strategies that reduce spread while preserving evidence. You will practice understanding eradication as removing the root cause, not just the symptoms, and recovery as the controlled return to normal operations with validation steps that confirm systems are clean and stable. Real-world examples will include a malware outbreak where containment requires segmentation, an account compromise where credential hygiene is critical, and post-incident actions where lessons learned improve policies, training, and technical controls to prevent recurrence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:18:48 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4c3dde54/e64a65a5.mp3" length="32147189" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>802</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode walks through the major components of incident response, showing how preparation, detection, containment, eradication, and recovery fit together as a repeatable lifecycle. You will learn what preparation includes in practical terms, such as clear roles, access to tools, logging readiness, and playbooks that reduce decision time. We will discuss detection as the process of turning signals into validated incidents, then focus on containment strategies that reduce spread while preserving evidence. You will practice understanding eradication as removing the root cause, not just the symptoms, and recovery as the controlled return to normal operations with validation steps that confirm systems are clean and stable. Real-world examples will include a malware outbreak where containment requires segmentation, an account compromise where credential hygiene is critical, and post-incident actions where lessons learned improve policies, training, and technical controls to prevent recurrence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4c3dde54/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 31 — Physical Access Controls: Badges, Gate Entry, and Environmental Design Basics</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Episode 31 — Physical Access Controls: Badges, Gate Entry, and Environmental Design Basics</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2de63ebc-2847-46b1-b03b-676d7bb3ee1d</guid>
      <link>https://share.transistor.fm/s/3843bd24</link>
      <description>
        <![CDATA[<p>This episode explains physical access controls and how they reduce risk by limiting who can enter facilities and restricted areas, a foundational topic for the CC exam. You will learn how badges, keys, locks, turnstiles, mantraps, and controlled entry points work together to prevent unauthorized access, support accountability, and create useful audit trails. We will discuss how environmental design choices—like lighting, door placement, reception layout, and secured zones—support physical security goals by guiding legitimate movement while discouraging opportunistic intrusion. You will practice identifying which control best addresses scenarios such as tailgating, lost badges, shared keys, or unsecured server rooms. Real-world best practices will include badge issuance and deprovisioning, periodic access reviews, visitor management procedures, and the importance of aligning physical access privileges with job roles so the organization reduces risk without creating unnecessary friction. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains physical access controls and how they reduce risk by limiting who can enter facilities and restricted areas, a foundational topic for the CC exam. You will learn how badges, keys, locks, turnstiles, mantraps, and controlled entry points work together to prevent unauthorized access, support accountability, and create useful audit trails. We will discuss how environmental design choices—like lighting, door placement, reception layout, and secured zones—support physical security goals by guiding legitimate movement while discouraging opportunistic intrusion. You will practice identifying which control best addresses scenarios such as tailgating, lost badges, shared keys, or unsecured server rooms. Real-world best practices will include badge issuance and deprovisioning, periodic access reviews, visitor management procedures, and the importance of aligning physical access privileges with job roles so the organization reduces risk without creating unnecessary friction. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:19:18 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3843bd24/36814d05.mp3" length="37603653" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>939</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains physical access controls and how they reduce risk by limiting who can enter facilities and restricted areas, a foundational topic for the CC exam. You will learn how badges, keys, locks, turnstiles, mantraps, and controlled entry points work together to prevent unauthorized access, support accountability, and create useful audit trails. We will discuss how environmental design choices—like lighting, door placement, reception layout, and secured zones—support physical security goals by guiding legitimate movement while discouraging opportunistic intrusion. You will practice identifying which control best addresses scenarios such as tailgating, lost badges, shared keys, or unsecured server rooms. Real-world best practices will include badge issuance and deprovisioning, periodic access reviews, visitor management procedures, and the importance of aligning physical access privileges with job roles so the organization reduces risk without creating unnecessary friction. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3843bd24/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 32 — Monitoring Physical Security: Guards, CCTV, Alarms, and Logs That Matter</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Episode 32 — Monitoring Physical Security: Guards, CCTV, Alarms, and Logs That Matter</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f9724106-1d17-40de-9ace-55605ccbf831</guid>
      <link>https://share.transistor.fm/s/bcc912d0</link>
      <description>
        <![CDATA[<p>This episode focuses on physical security monitoring and how detection mechanisms support deterrence, response, and investigation, which the CC exam expects you to understand at a practical level. You will learn how guards, cameras, alarms, motion sensors, and access logs provide signals that an organization can use to verify events and respond quickly to suspicious activity. We will discuss the difference between deterrent and detective controls, and why monitoring must be paired with a response process to be effective rather than purely symbolic. You will practice reasoning through scenarios such as an alarm that triggers repeatedly, camera coverage gaps, or missing access logs during an investigation, and you will learn how to identify likely root causes like misconfiguration, poor placement, or inadequate staffing. Real-world best practices will include testing alarm systems, retaining logs appropriately, ensuring time synchronization across systems, and documenting incident response steps for physical events as carefully as for digital ones. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on physical security monitoring and how detection mechanisms support deterrence, response, and investigation, which the CC exam expects you to understand at a practical level. You will learn how guards, cameras, alarms, motion sensors, and access logs provide signals that an organization can use to verify events and respond quickly to suspicious activity. We will discuss the difference between deterrent and detective controls, and why monitoring must be paired with a response process to be effective rather than purely symbolic. You will practice reasoning through scenarios such as an alarm that triggers repeatedly, camera coverage gaps, or missing access logs during an investigation, and you will learn how to identify likely root causes like misconfiguration, poor placement, or inadequate staffing. Real-world best practices will include testing alarm systems, retaining logs appropriately, ensuring time synchronization across systems, and documenting incident response steps for physical events as carefully as for digital ones. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:19:54 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bcc912d0/1bfbdff9.mp3" length="43326549" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1082</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on physical security monitoring and how detection mechanisms support deterrence, response, and investigation, which the CC exam expects you to understand at a practical level. You will learn how guards, cameras, alarms, motion sensors, and access logs provide signals that an organization can use to verify events and respond quickly to suspicious activity. We will discuss the difference between deterrent and detective controls, and why monitoring must be paired with a response process to be effective rather than purely symbolic. You will practice reasoning through scenarios such as an alarm that triggers repeatedly, camera coverage gaps, or missing access logs during an investigation, and you will learn how to identify likely root causes like misconfiguration, poor placement, or inadequate staffing. Real-world best practices will include testing alarm systems, retaining logs appropriately, ensuring time synchronization across systems, and documenting incident response steps for physical events as carefully as for digital ones. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bcc912d0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 33 — Authorized Versus Unauthorized Personnel: Verification, Escorts, and Real Control</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Episode 33 — Authorized Versus Unauthorized Personnel: Verification, Escorts, and Real Control</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2797bb3c-c0cc-4971-9e67-4b85455dc9ef</guid>
      <link>https://share.transistor.fm/s/524127bd</link>
      <description>
        <![CDATA[<p>This episode teaches you how organizations separate authorized personnel from unauthorized personnel, which is essential for both physical and logical security and appears in CC objectives through access control concepts. You will learn how identity verification works in practice using badges, check-in procedures, visitor logs, escorts, and restricted area rules, and why “knowing someone” is not a control. We will discuss common failure modes such as tailgating, piggybacking, social engineering at reception, and credential sharing, and how these issues create risks ranging from data theft to sabotage. You will practice identifying the best control response in scenarios where visitors must access sensitive spaces, contractors need temporary access, or an employee challenges someone without a visible badge. Real-world best practices will include clear escort policies, training staff to challenge appropriately, rapid badge replacement and deactivation procedures, and designing processes that make the secure path the easiest path for legitimate users. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches you how organizations separate authorized personnel from unauthorized personnel, which is essential for both physical and logical security and appears in CC objectives through access control concepts. You will learn how identity verification works in practice using badges, check-in procedures, visitor logs, escorts, and restricted area rules, and why “knowing someone” is not a control. We will discuss common failure modes such as tailgating, piggybacking, social engineering at reception, and credential sharing, and how these issues create risks ranging from data theft to sabotage. You will practice identifying the best control response in scenarios where visitors must access sensitive spaces, contractors need temporary access, or an employee challenges someone without a visible badge. Real-world best practices will include clear escort policies, training staff to challenge appropriately, rapid badge replacement and deactivation procedures, and designing processes that make the secure path the easiest path for legitimate users. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:20:24 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/524127bd/90558bc3.mp3" length="36165881" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>903</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches you how organizations separate authorized personnel from unauthorized personnel, which is essential for both physical and logical security and appears in CC objectives through access control concepts. You will learn how identity verification works in practice using badges, check-in procedures, visitor logs, escorts, and restricted area rules, and why “knowing someone” is not a control. We will discuss common failure modes such as tailgating, piggybacking, social engineering at reception, and credential sharing, and how these issues create risks ranging from data theft to sabotage. You will practice identifying the best control response in scenarios where visitors must access sensitive spaces, contractors need temporary access, or an employee challenges someone without a visible badge. Real-world best practices will include clear escort policies, training staff to challenge appropriately, rapid badge replacement and deactivation procedures, and designing processes that make the secure path the easiest path for legitimate users. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/524127bd/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 34 — Least Privilege in Practice: Reducing Risk Without Slowing Work to a Crawl</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Episode 34 — Least Privilege in Practice: Reducing Risk Without Slowing Work to a Crawl</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">994b72ad-feb8-4c15-9763-95e1d4dd9a36</guid>
      <link>https://share.transistor.fm/s/5a3793ce</link>
      <description>
        <![CDATA[<p>This episode covers least privilege as the principle of giving users and systems only the access they need to perform required tasks, and it prepares you for CC questions that ask how to reduce exposure without harming productivity. You will learn how least privilege applies to users, service accounts, applications, and administrative tools, and why over-permissioning creates large blast radius when an account is compromised. We will discuss practical methods for implementing least privilege, including role design, access request workflows, temporary privilege elevation, and periodic access reviews. You will practice evaluating scenarios such as a user requesting broad access “just in case,” an administrator using a powerful account for routine work, or a third-party vendor needing limited access to a single system. Real-world troubleshooting considerations will include access failures caused by overly restrictive settings, documenting business justification for exceptions, and balancing security objectives with operational needs so least privilege becomes a sustainable habit rather than a constant fight. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers least privilege as the principle of giving users and systems only the access they need to perform required tasks, and it prepares you for CC questions that ask how to reduce exposure without harming productivity. You will learn how least privilege applies to users, service accounts, applications, and administrative tools, and why over-permissioning creates large blast radius when an account is compromised. We will discuss practical methods for implementing least privilege, including role design, access request workflows, temporary privilege elevation, and periodic access reviews. You will practice evaluating scenarios such as a user requesting broad access “just in case,” an administrator using a powerful account for routine work, or a third-party vendor needing limited access to a single system. Real-world troubleshooting considerations will include access failures caused by overly restrictive settings, documenting business justification for exceptions, and balancing security objectives with operational needs so least privilege becomes a sustainable habit rather than a constant fight. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:20:57 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5a3793ce/5fed5067.mp3" length="39767630" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>993</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers least privilege as the principle of giving users and systems only the access they need to perform required tasks, and it prepares you for CC questions that ask how to reduce exposure without harming productivity. You will learn how least privilege applies to users, service accounts, applications, and administrative tools, and why over-permissioning creates large blast radius when an account is compromised. We will discuss practical methods for implementing least privilege, including role design, access request workflows, temporary privilege elevation, and periodic access reviews. You will practice evaluating scenarios such as a user requesting broad access “just in case,” an administrator using a powerful account for routine work, or a third-party vendor needing limited access to a single system. Real-world troubleshooting considerations will include access failures caused by overly restrictive settings, documenting business justification for exceptions, and balancing security objectives with operational needs so least privilege becomes a sustainable habit rather than a constant fight. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5a3793ce/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 35 — Segregation of Duties Made Simple: Preventing Abuse and Catching Mistakes Early</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Episode 35 — Segregation of Duties Made Simple: Preventing Abuse and Catching Mistakes Early</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">76cdd99c-7690-4f52-ba58-91f7ac259c05</guid>
      <link>https://share.transistor.fm/s/08844766</link>
      <description>
        <![CDATA[<p>This episode explains segregation of duties (SoD) and why it is a powerful administrative control for preventing fraud, reducing insider threat risk, and catching errors before they become incidents, all of which are exam-relevant at the foundational level. You will learn how SoD works by splitting critical tasks across multiple roles so no single person can complete a high-impact action end-to-end without oversight. We will discuss common examples such as separating purchasing from approval, separating system administration from audit review, and separating code deployment from production access. You will practice identifying SoD gaps in scenarios where one user can both create and approve changes, or where the same person can modify logs and review their own actions. Real-world best practices will include implementing approval workflows, using audits and monitoring to validate separation, and designing roles carefully so SoD strengthens security without creating bottlenecks that drive teams toward risky workarounds. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains segregation of duties (SoD) and why it is a powerful administrative control for preventing fraud, reducing insider threat risk, and catching errors before they become incidents, all of which are exam-relevant at the foundational level. You will learn how SoD works by splitting critical tasks across multiple roles so no single person can complete a high-impact action end-to-end without oversight. We will discuss common examples such as separating purchasing from approval, separating system administration from audit review, and separating code deployment from production access. You will practice identifying SoD gaps in scenarios where one user can both create and approve changes, or where the same person can modify logs and review their own actions. Real-world best practices will include implementing approval workflows, using audits and monitoring to validate separation, and designing roles carefully so SoD strengthens security without creating bottlenecks that drive teams toward risky workarounds. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:22:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/08844766/1311ef4d.mp3" length="41282742" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1031</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains segregation of duties (SoD) and why it is a powerful administrative control for preventing fraud, reducing insider threat risk, and catching errors before they become incidents, all of which are exam-relevant at the foundational level. You will learn how SoD works by splitting critical tasks across multiple roles so no single person can complete a high-impact action end-to-end without oversight. We will discuss common examples such as separating purchasing from approval, separating system administration from audit review, and separating code deployment from production access. You will practice identifying SoD gaps in scenarios where one user can both create and approve changes, or where the same person can modify logs and review their own actions. Real-world best practices will include implementing approval workflows, using audits and monitoring to validate separation, and designing roles carefully so SoD strengthens security without creating bottlenecks that drive teams toward risky workarounds. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/08844766/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 36 — Discretionary Access Control: Ownership, Permissions, and Where It Breaks Down</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Episode 36 — Discretionary Access Control: Ownership, Permissions, and Where It Breaks Down</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">87494672-b8b3-4832-af1d-418fcd215670</guid>
      <link>https://share.transistor.fm/s/aeba7c85</link>
      <description>
        <![CDATA[<p>This episode focuses on discretionary access control (DAC), a model where resource owners decide who gets access and what level of permission is granted, and it helps you answer CC questions that compare access control approaches. You will learn how DAC commonly appears in operating systems through file and folder permissions, access control lists, and user-managed sharing settings. We will discuss the strengths of DAC, such as flexibility and ease of delegation, alongside weaknesses such as inconsistent permissioning, excessive sharing, and difficulty enforcing organization-wide rules when owners make independent decisions. You will practice identifying DAC in scenarios involving shared drives, collaboration platforms, and user-controlled resource permissions, and you will learn how to recognize when DAC increases confidentiality risk through accidental oversharing. Real-world best practices will include establishing standards for sharing, monitoring for excessive permissions, using groups and roles where possible to reduce complexity, and reviewing access periodically to prevent permission sprawl. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on discretionary access control (DAC), a model where resource owners decide who gets access and what level of permission is granted, and it helps you answer CC questions that compare access control approaches. You will learn how DAC commonly appears in operating systems through file and folder permissions, access control lists, and user-managed sharing settings. We will discuss the strengths of DAC, such as flexibility and ease of delegation, alongside weaknesses such as inconsistent permissioning, excessive sharing, and difficulty enforcing organization-wide rules when owners make independent decisions. You will practice identifying DAC in scenarios involving shared drives, collaboration platforms, and user-controlled resource permissions, and you will learn how to recognize when DAC increases confidentiality risk through accidental oversharing. Real-world best practices will include establishing standards for sharing, monitoring for excessive permissions, using groups and roles where possible to reduce complexity, and reviewing access periodically to prevent permission sprawl. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:22:29 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/aeba7c85/ac5693a4.mp3" length="44776879" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1118</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on discretionary access control (DAC), a model where resource owners decide who gets access and what level of permission is granted, and it helps you answer CC questions that compare access control approaches. You will learn how DAC commonly appears in operating systems through file and folder permissions, access control lists, and user-managed sharing settings. We will discuss the strengths of DAC, such as flexibility and ease of delegation, alongside weaknesses such as inconsistent permissioning, excessive sharing, and difficulty enforcing organization-wide rules when owners make independent decisions. You will practice identifying DAC in scenarios involving shared drives, collaboration platforms, and user-controlled resource permissions, and you will learn how to recognize when DAC increases confidentiality risk through accidental oversharing. Real-world best practices will include establishing standards for sharing, monitoring for excessive permissions, using groups and roles where possible to reduce complexity, and reviewing access periodically to prevent permission sprawl. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/aeba7c85/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 37 — Mandatory Access Control: Labels, Rules, and High-Control Environments</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>Episode 37 — Mandatory Access Control: Labels, Rules, and High-Control Environments</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">85243ebb-c01b-4e4d-b91b-b27808427d74</guid>
      <link>https://share.transistor.fm/s/4417aa88</link>
      <description>
        <![CDATA[<p>This episode explains mandatory access control (MAC), a model where a central authority defines access rules and users cannot override them, which is frequently tested through comparisons with DAC and RBAC. You will learn how MAC uses labels, classifications, and clear rules to control information flow, and why it is common in environments that require strict confidentiality protections. We will discuss how MAC reduces the risk of discretionary sharing, but can also increase operational complexity because exceptions are harder to implement and changes require formal administration. You will practice recognizing MAC in scenarios where data is classified, access is determined by clearance and need-to-know, and users cannot grant access even if they own a file. Real-world considerations will include handling labeled data correctly, understanding the difference between identity and clearance, and troubleshooting access issues that occur when labels, classifications, or authorization rules do not align with the user’s assigned permissions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains mandatory access control (MAC), a model where a central authority defines access rules and users cannot override them, which is frequently tested through comparisons with DAC and RBAC. You will learn how MAC uses labels, classifications, and clear rules to control information flow, and why it is common in environments that require strict confidentiality protections. We will discuss how MAC reduces the risk of discretionary sharing, but can also increase operational complexity because exceptions are harder to implement and changes require formal administration. You will practice recognizing MAC in scenarios where data is classified, access is determined by clearance and need-to-know, and users cannot grant access even if they own a file. Real-world considerations will include handling labeled data correctly, understanding the difference between identity and clearance, and troubleshooting access issues that occur when labels, classifications, or authorization rules do not align with the user’s assigned permissions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:23:02 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4417aa88/12685817.mp3" length="39705973" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>991</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains mandatory access control (MAC), a model where a central authority defines access rules and users cannot override them, which is frequently tested through comparisons with DAC and RBAC. You will learn how MAC uses labels, classifications, and clear rules to control information flow, and why it is common in environments that require strict confidentiality protections. We will discuss how MAC reduces the risk of discretionary sharing, but can also increase operational complexity because exceptions are harder to implement and changes require formal administration. You will practice recognizing MAC in scenarios where data is classified, access is determined by clearance and need-to-know, and users cannot grant access even if they own a file. Real-world considerations will include handling labeled data correctly, understanding the difference between identity and clearance, and troubleshooting access issues that occur when labels, classifications, or authorization rules do not align with the user’s assigned permissions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4417aa88/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 38 — Role-Based Access Control: Designing Roles That Actually Reflect Job Duties</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Episode 38 — Role-Based Access Control: Designing Roles That Actually Reflect Job Duties</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">de77c544-562d-41ea-a048-de33c0142a78</guid>
      <link>https://share.transistor.fm/s/e680118e</link>
      <description>
        <![CDATA[<p>This episode covers role-based access control (RBAC) and prepares you to apply it in exam questions that ask how to manage access at scale without creating chaos. You will learn how RBAC assigns permissions to roles based on job functions, then assigns users to roles, making access easier to administer and review than individual, user-by-user permissions. We will discuss how good role design reduces over-permissioning and supports least privilege, while poor role design creates “role explosion,” confusion, and shadow access that is hard to audit. You will practice identifying RBAC in scenarios like help desk access, finance system permissions, and administrative duties that vary by team, and you will learn how to handle exceptions using temporary elevation or supplemental roles. Real-world best practices will include periodic role reviews, mapping roles to business processes, documenting role purpose clearly, and monitoring for privilege creep when users accumulate multiple roles over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers role-based access control (RBAC) and prepares you to apply it in exam questions that ask how to manage access at scale without creating chaos. You will learn how RBAC assigns permissions to roles based on job functions, then assigns users to roles, making access easier to administer and review than individual, user-by-user permissions. We will discuss how good role design reduces over-permissioning and supports least privilege, while poor role design creates “role explosion,” confusion, and shadow access that is hard to audit. You will practice identifying RBAC in scenarios like help desk access, finance system permissions, and administrative duties that vary by team, and you will learn how to handle exceptions using temporary elevation or supplemental roles. Real-world best practices will include periodic role reviews, mapping roles to business processes, documenting role purpose clearly, and monitoring for privilege creep when users accumulate multiple roles over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:24:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e680118e/d48fdae0.mp3" length="39099942" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>976</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers role-based access control (RBAC) and prepares you to apply it in exam questions that ask how to manage access at scale without creating chaos. You will learn how RBAC assigns permissions to roles based on job functions, then assigns users to roles, making access easier to administer and review than individual, user-by-user permissions. We will discuss how good role design reduces over-permissioning and supports least privilege, while poor role design creates “role explosion,” confusion, and shadow access that is hard to audit. You will practice identifying RBAC in scenarios like help desk access, finance system permissions, and administrative duties that vary by team, and you will learn how to handle exceptions using temporary elevation or supplemental roles. Real-world best practices will include periodic role reviews, mapping roles to business processes, documenting role purpose clearly, and monitoring for privilege creep when users accumulate multiple roles over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e680118e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 39 — Computer Networking Foundations: OSI and TCP/IP Models for Security Thinking</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>Episode 39 — Computer Networking Foundations: OSI and TCP/IP Models for Security Thinking</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">acf0dba1-5432-4ae0-bd84-a88f302e9c9a</guid>
      <link>https://share.transistor.fm/s/0d518ba1</link>
      <description>
        <![CDATA[<p>This episode teaches networking fundamentals through the OSI and TCP/IP models, focusing on how layered communication helps you reason about where security controls operate and where attacks occur, which is CC-relevant knowledge. You will learn what each layer is responsible for and how data moves from an application down to the network and back, along with the practical meaning of encapsulation. We will discuss how common security tools map to layers, such as firewalls and filtering at network and transport levels, and how application-layer threats exploit higher-level protocols and services. You will practice translating a scenario into layers, for example identifying whether a problem is a physical connectivity issue, a routing issue, a port and transport issue, or an application protocol issue. Real-world troubleshooting considerations will include isolating the layer where failure occurs, understanding why a ping test does not prove an application is healthy, and recognizing how attackers exploit weak configurations at multiple layers. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches networking fundamentals through the OSI and TCP/IP models, focusing on how layered communication helps you reason about where security controls operate and where attacks occur, which is CC-relevant knowledge. You will learn what each layer is responsible for and how data moves from an application down to the network and back, along with the practical meaning of encapsulation. We will discuss how common security tools map to layers, such as firewalls and filtering at network and transport levels, and how application-layer threats exploit higher-level protocols and services. You will practice translating a scenario into layers, for example identifying whether a problem is a physical connectivity issue, a routing issue, a port and transport issue, or an application protocol issue. Real-world troubleshooting considerations will include isolating the layer where failure occurs, understanding why a ping test does not prove an application is healthy, and recognizing how attackers exploit weak configurations at multiple layers. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:24:29 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0d518ba1/c74c8a2c.mp3" length="39399830" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>984</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches networking fundamentals through the OSI and TCP/IP models, focusing on how layered communication helps you reason about where security controls operate and where attacks occur, which is CC-relevant knowledge. You will learn what each layer is responsible for and how data moves from an application down to the network and back, along with the practical meaning of encapsulation. We will discuss how common security tools map to layers, such as firewalls and filtering at network and transport levels, and how application-layer threats exploit higher-level protocols and services. You will practice translating a scenario into layers, for example identifying whether a problem is a physical connectivity issue, a routing issue, a port and transport issue, or an application protocol issue. Real-world troubleshooting considerations will include isolating the layer where failure occurs, understanding why a ping test does not prove an application is healthy, and recognizing how attackers exploit weak configurations at multiple layers. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0d518ba1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 40 — IPv4 and IPv6 Basics: Addressing, Notation, and Security-Relevant Differences</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>Episode 40 — IPv4 and IPv6 Basics: Addressing, Notation, and Security-Relevant Differences</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">816d67de-7cd3-45f4-a090-76f01ab7e3ee</guid>
      <link>https://share.transistor.fm/s/aca9614b</link>
      <description>
        <![CDATA[<p>This episode explains IPv4 and IPv6 addressing in practical terms, helping you recognize what you are looking at in exam questions and understand how addressing influences security and troubleshooting. You will learn basic IPv4 structure, private versus public ranges at a high level, and the purpose of subnetting concepts without turning the discussion into math-heavy drills. We will then introduce IPv6 notation, why IPv6 exists, and how common IPv6 features change operational assumptions, such as larger address space and different address types. You will practice recognizing likely misconfigurations, such as incorrect gateway settings, duplicate addressing problems, and misunderstandings caused by mixed IPv4 and IPv6 environments. Real-world security considerations will include the risk of unmanaged IPv6 on networks that still think “we only use IPv4,” the importance of consistent filtering policies, and using logs and monitoring that accurately capture both protocol families. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains IPv4 and IPv6 addressing in practical terms, helping you recognize what you are looking at in exam questions and understand how addressing influences security and troubleshooting. You will learn basic IPv4 structure, private versus public ranges at a high level, and the purpose of subnetting concepts without turning the discussion into math-heavy drills. We will then introduce IPv6 notation, why IPv6 exists, and how common IPv6 features change operational assumptions, such as larger address space and different address types. You will practice recognizing likely misconfigurations, such as incorrect gateway settings, duplicate addressing problems, and misunderstandings caused by mixed IPv4 and IPv6 environments. Real-world security considerations will include the risk of unmanaged IPv6 on networks that still think “we only use IPv4,” the importance of consistent filtering policies, and using logs and monitoring that accurately capture both protocol families. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:24:57 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/aca9614b/25344303.mp3" length="41239897" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1030</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains IPv4 and IPv6 addressing in practical terms, helping you recognize what you are looking at in exam questions and understand how addressing influences security and troubleshooting. You will learn basic IPv4 structure, private versus public ranges at a high level, and the purpose of subnetting concepts without turning the discussion into math-heavy drills. We will then introduce IPv6 notation, why IPv6 exists, and how common IPv6 features change operational assumptions, such as larger address space and different address types. You will practice recognizing likely misconfigurations, such as incorrect gateway settings, duplicate addressing problems, and misunderstandings caused by mixed IPv4 and IPv6 environments. Real-world security considerations will include the risk of unmanaged IPv6 on networks that still think “we only use IPv4,” the importance of consistent filtering policies, and using logs and monitoring that accurately capture both protocol families. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/aca9614b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 41 — WiFi Fundamentals for Security: How Wireless Works and Where Attacks Hide</title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>Episode 41 — WiFi Fundamentals for Security: How Wireless Works and Where Attacks Hide</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f2fff2af-c001-4a01-a82f-b59e8863f630</guid>
      <link>https://share.transistor.fm/s/82a382e8</link>
      <description>
        <![CDATA[<p>This episode explains WiFi fundamentals with a security lens, helping you understand what wireless networks are doing behind the scenes and why the CC exam expects you to recognize common wireless risks. You will learn core ideas such as access points, clients, SSIDs, basic authentication and encryption concepts, and why radio-based communication changes the threat model compared to wired networks. We will discuss typical wireless attack paths, including rogue access points, evil twin hotspots, weak or misconfigured encryption, and credential capture attempts that rely on user trust rather than technical brilliance. You will practice identifying safer behaviors and controls, such as using strong encryption settings, disabling insecure legacy options, segmenting guest networks, and validating that you are connecting to the right network in the first place. Real-world troubleshooting considerations will include distinguishing signal problems from authentication failures, recognizing captive portals and misdirection, and understanding why “it connects” does not automatically mean it is secure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains WiFi fundamentals with a security lens, helping you understand what wireless networks are doing behind the scenes and why the CC exam expects you to recognize common wireless risks. You will learn core ideas such as access points, clients, SSIDs, basic authentication and encryption concepts, and why radio-based communication changes the threat model compared to wired networks. We will discuss typical wireless attack paths, including rogue access points, evil twin hotspots, weak or misconfigured encryption, and credential capture attempts that rely on user trust rather than technical brilliance. You will practice identifying safer behaviors and controls, such as using strong encryption settings, disabling insecure legacy options, segmenting guest networks, and validating that you are connecting to the right network in the first place. Real-world troubleshooting considerations will include distinguishing signal problems from authentication failures, recognizing captive portals and misdirection, and understanding why “it connects” does not automatically mean it is secure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:25:26 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/82a382e8/f3259ece.mp3" length="36060330" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>900</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains WiFi fundamentals with a security lens, helping you understand what wireless networks are doing behind the scenes and why the CC exam expects you to recognize common wireless risks. You will learn core ideas such as access points, clients, SSIDs, basic authentication and encryption concepts, and why radio-based communication changes the threat model compared to wired networks. We will discuss typical wireless attack paths, including rogue access points, evil twin hotspots, weak or misconfigured encryption, and credential capture attempts that rely on user trust rather than technical brilliance. You will practice identifying safer behaviors and controls, such as using strong encryption settings, disabling insecure legacy options, segmenting guest networks, and validating that you are connecting to the right network in the first place. Real-world troubleshooting considerations will include distinguishing signal problems from authentication failures, recognizing captive portals and misdirection, and understanding why “it connects” does not automatically mean it is secure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/82a382e8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 42 — Ports and Applications: Mapping Network Conversations to Real Risk</title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>Episode 42 — Ports and Applications: Mapping Network Conversations to Real Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5eaf94ed-07a6-4833-a37b-3e2624953644</guid>
      <link>https://share.transistor.fm/s/28684763</link>
      <description>
        <![CDATA[<p>This episode connects ports, services, and applications so you can interpret common exam scenarios that describe traffic, blocked connections, or suspicious network behavior. You will learn what a port represents, why transport protocols matter, and how services are identified and exposed through listening ports on hosts and devices. We will discuss the security implications of open ports, including expanded attack surface, misconfigured services, and the risk of exposing administrative interfaces to untrusted networks. You will practice translating a scenario into practical questions such as “what service is this likely to be,” “should this be exposed,” and “what control would reduce risk,” without requiring you to memorize long port lists. Real-world examples will include troubleshooting why a service is unreachable, recognizing the difference between blocked traffic and service failure, and using firewall rules and segmentation to ensure only required ports are accessible to the right users and systems. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode connects ports, services, and applications so you can interpret common exam scenarios that describe traffic, blocked connections, or suspicious network behavior. You will learn what a port represents, why transport protocols matter, and how services are identified and exposed through listening ports on hosts and devices. We will discuss the security implications of open ports, including expanded attack surface, misconfigured services, and the risk of exposing administrative interfaces to untrusted networks. You will practice translating a scenario into practical questions such as “what service is this likely to be,” “should this be exposed,” and “what control would reduce risk,” without requiring you to memorize long port lists. Real-world examples will include troubleshooting why a service is unreachable, recognizing the difference between blocked traffic and service failure, and using firewall rules and segmentation to ensure only required ports are accessible to the right users and systems. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:26:23 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/28684763/a484cc8c.mp3" length="33920365" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>847</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode connects ports, services, and applications so you can interpret common exam scenarios that describe traffic, blocked connections, or suspicious network behavior. You will learn what a port represents, why transport protocols matter, and how services are identified and exposed through listening ports on hosts and devices. We will discuss the security implications of open ports, including expanded attack surface, misconfigured services, and the risk of exposing administrative interfaces to untrusted networks. You will practice translating a scenario into practical questions such as “what service is this likely to be,” “should this be exposed,” and “what control would reduce risk,” without requiring you to memorize long port lists. Real-world examples will include troubleshooting why a service is unreachable, recognizing the difference between blocked traffic and service failure, and using firewall rules and segmentation to ensure only required ports are accessible to the right users and systems. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/28684763/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 43 — Network Threat Types: DDoS, Viruses, Worms, Trojans, MITM, Side-Channels</title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>Episode 43 — Network Threat Types: DDoS, Viruses, Worms, Trojans, MITM, Side-Channels</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b20c5a78-ff14-4bc6-ba5c-e8425246dd40</guid>
      <link>https://share.transistor.fm/s/52fce3a7</link>
      <description>
        <![CDATA[<p>This episode surveys common network and malware threat types that the CC exam expects you to recognize, focusing on what each threat aims to do and how it typically shows up in symptoms and logs. You will learn how denial-of-service attacks affect availability, how malware families differ in propagation and intent, and why man-in-the-middle attacks are especially dangerous for confidentiality and integrity when trust is misplaced. We will discuss side-channel concepts at a foundational level so you can recognize the idea that information can leak through unintended signals, even when encryption is used correctly. You will practice mapping each threat type to likely indicators, such as unusual outbound connections, repeated login attempts, unexpected process behavior, or large traffic spikes that overwhelm resources. Real-world examples will include phishing-delivered Trojans, worms spreading through weak patching, and MITM risks on untrusted WiFi, with best practices that focus on layered defenses rather than single-point solutions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode surveys common network and malware threat types that the CC exam expects you to recognize, focusing on what each threat aims to do and how it typically shows up in symptoms and logs. You will learn how denial-of-service attacks affect availability, how malware families differ in propagation and intent, and why man-in-the-middle attacks are especially dangerous for confidentiality and integrity when trust is misplaced. We will discuss side-channel concepts at a foundational level so you can recognize the idea that information can leak through unintended signals, even when encryption is used correctly. You will practice mapping each threat type to likely indicators, such as unusual outbound connections, repeated login attempts, unexpected process behavior, or large traffic spikes that overwhelm resources. Real-world examples will include phishing-delivered Trojans, worms spreading through weak patching, and MITM risks on untrusted WiFi, with best practices that focus on layered defenses rather than single-point solutions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:26:51 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/52fce3a7/4db3096b.mp3" length="38765569" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>968</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode surveys common network and malware threat types that the CC exam expects you to recognize, focusing on what each threat aims to do and how it typically shows up in symptoms and logs. You will learn how denial-of-service attacks affect availability, how malware families differ in propagation and intent, and why man-in-the-middle attacks are especially dangerous for confidentiality and integrity when trust is misplaced. We will discuss side-channel concepts at a foundational level so you can recognize the idea that information can leak through unintended signals, even when encryption is used correctly. You will practice mapping each threat type to likely indicators, such as unusual outbound connections, repeated login attempts, unexpected process behavior, or large traffic spikes that overwhelm resources. Real-world examples will include phishing-delivered Trojans, worms spreading through weak patching, and MITM risks on untrusted WiFi, with best practices that focus on layered defenses rather than single-point solutions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/52fce3a7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 44 — Identify Attacks Using IDS Concepts: What Detection Can and Cannot Prove</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>Episode 44 — Identify Attacks Using IDS Concepts: What Detection Can and Cannot Prove</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">010f7798-fc03-4b7f-b77c-24efc54503b2</guid>
      <link>https://share.transistor.fm/s/4bd55321</link>
      <description>
        <![CDATA[<p>This episode explains intrusion detection system (IDS) concepts and helps you understand how detection works at a high level, which the CC exam often tests through scenario questions about alerts and monitoring. You will learn the difference between signature-based and anomaly-based detection, and why both approaches can produce false positives and false negatives depending on context. We will discuss how IDS fits into a broader monitoring strategy, including the importance of baselines, logging quality, and a clear process for validating whether an alert reflects real malicious activity. You will practice thinking through an alert scenario by asking what evidence is needed next, what the alert suggests, and what it does not prove, which is critical for avoiding overreaction or complacency. Real-world troubleshooting considerations will include noisy alerts caused by misconfigured thresholds, blind spots caused by encrypted traffic, and the need to correlate IDS signals with endpoint logs, authentication logs, and network flow data for a more accurate picture. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains intrusion detection system (IDS) concepts and helps you understand how detection works at a high level, which the CC exam often tests through scenario questions about alerts and monitoring. You will learn the difference between signature-based and anomaly-based detection, and why both approaches can produce false positives and false negatives depending on context. We will discuss how IDS fits into a broader monitoring strategy, including the importance of baselines, logging quality, and a clear process for validating whether an alert reflects real malicious activity. You will practice thinking through an alert scenario by asking what evidence is needed next, what the alert suggests, and what it does not prove, which is critical for avoiding overreaction or complacency. Real-world troubleshooting considerations will include noisy alerts caused by misconfigured thresholds, blind spots caused by encrypted traffic, and the need to correlate IDS signals with endpoint logs, authentication logs, and network flow data for a more accurate picture. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:38:03 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4bd55321/0159183a.mp3" length="35512802" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>886</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains intrusion detection system (IDS) concepts and helps you understand how detection works at a high level, which the CC exam often tests through scenario questions about alerts and monitoring. You will learn the difference between signature-based and anomaly-based detection, and why both approaches can produce false positives and false negatives depending on context. We will discuss how IDS fits into a broader monitoring strategy, including the importance of baselines, logging quality, and a clear process for validating whether an alert reflects real malicious activity. You will practice thinking through an alert scenario by asking what evidence is needed next, what the alert suggests, and what it does not prove, which is critical for avoiding overreaction or complacency. Real-world troubleshooting considerations will include noisy alerts caused by misconfigured thresholds, blind spots caused by encrypted traffic, and the need to correlate IDS signals with endpoint logs, authentication logs, and network flow data for a more accurate picture. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4bd55321/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 45 — HIDS and NIDS Explained: Host Versus Network Detection Tradeoffs</title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>Episode 45 — HIDS and NIDS Explained: Host Versus Network Detection Tradeoffs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ce765158-dece-433a-9a2c-f65235c6a5d2</guid>
      <link>https://share.transistor.fm/s/d70fbe91</link>
      <description>
        <![CDATA[<p>This episode compares host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS), giving you a practical framework for choosing the right visibility for a given risk, which is a common exam expectation. You will learn what each approach can observe, such as host process activity and file changes for HIDS versus traffic patterns and protocol behavior for NIDS. We will discuss tradeoffs including deployment effort, coverage, performance impact, and how encryption can limit network visibility while endpoint tools may still see behavior after decryption. You will practice selecting an approach in scenarios like detecting lateral movement between hosts, monitoring a sensitive server for unauthorized changes, or identifying suspicious scanning activity at the network edge. Real-world considerations will include how to reduce alert fatigue, how to tune detection rules responsibly, and why detection tools are most effective when paired with incident response processes that define who investigates, how evidence is captured, and what containment actions are authorized. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode compares host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS), giving you a practical framework for choosing the right visibility for a given risk, which is a common exam expectation. You will learn what each approach can observe, such as host process activity and file changes for HIDS versus traffic patterns and protocol behavior for NIDS. We will discuss tradeoffs including deployment effort, coverage, performance impact, and how encryption can limit network visibility while endpoint tools may still see behavior after decryption. You will practice selecting an approach in scenarios like detecting lateral movement between hosts, monitoring a sensitive server for unauthorized changes, or identifying suspicious scanning activity at the network edge. Real-world considerations will include how to reduce alert fatigue, how to tune detection rules responsibly, and why detection tools are most effective when paired with incident response processes that define who investigates, how evidence is captured, and what containment actions are authorized. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:38:33 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d70fbe91/b70ddb79.mp3" length="34611039" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>864</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode compares host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS), giving you a practical framework for choosing the right visibility for a given risk, which is a common exam expectation. You will learn what each approach can observe, such as host process activity and file changes for HIDS versus traffic patterns and protocol behavior for NIDS. We will discuss tradeoffs including deployment effort, coverage, performance impact, and how encryption can limit network visibility while endpoint tools may still see behavior after decryption. You will practice selecting an approach in scenarios like detecting lateral movement between hosts, monitoring a sensitive server for unauthorized changes, or identifying suspicious scanning activity at the network edge. Real-world considerations will include how to reduce alert fatigue, how to tune detection rules responsibly, and why detection tools are most effective when paired with incident response processes that define who investigates, how evidence is captured, and what containment actions are authorized. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d70fbe91/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 46 — Prevent Attacks with Antivirus and Scanning: Strengths, Limits, and Good Use</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>Episode 46 — Prevent Attacks with Antivirus and Scanning: Strengths, Limits, and Good Use</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">11fe142c-f512-4d2e-8b72-6febc659d5f3</guid>
      <link>https://share.transistor.fm/s/1fc43c0a</link>
      <description>
        <![CDATA[<p>This episode covers antivirus and scanning as preventive and detective measures, helping you understand what these tools do well, where they fail, and how the CC exam expects you to reason about layered protection. You will learn the difference between traditional signature-based antivirus and more behavior-focused approaches, and why updates and tuning are necessary to remain effective against evolving threats. We will discuss how scanning can identify known vulnerabilities, misconfigurations, and exposures, but also why scans must be interpreted carefully to avoid chasing false positives or breaking systems through careless remediation. You will practice evaluating scenarios such as a workstation repeatedly flagging malware, an organization running vulnerability scans before patching, or a new system failing compliance checks due to missing updates. Real-world troubleshooting considerations will include investigating repeated detections, validating scan scope, scheduling scans to reduce operational disruption, and coordinating remediation through change management so security improvements do not create availability incidents. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers antivirus and scanning as preventive and detective measures, helping you understand what these tools do well, where they fail, and how the CC exam expects you to reason about layered protection. You will learn the difference between traditional signature-based antivirus and more behavior-focused approaches, and why updates and tuning are necessary to remain effective against evolving threats. We will discuss how scanning can identify known vulnerabilities, misconfigurations, and exposures, but also why scans must be interpreted carefully to avoid chasing false positives or breaking systems through careless remediation. You will practice evaluating scenarios such as a workstation repeatedly flagging malware, an organization running vulnerability scans before patching, or a new system failing compliance checks due to missing updates. Real-world troubleshooting considerations will include investigating repeated detections, validating scan scope, scheduling scans to reduce operational disruption, and coordinating remediation through change management so security improvements do not create availability incidents. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:39:09 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1fc43c0a/04e4b03c.mp3" length="35000810" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>874</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers antivirus and scanning as preventive and detective measures, helping you understand what these tools do well, where they fail, and how the CC exam expects you to reason about layered protection. You will learn the difference between traditional signature-based antivirus and more behavior-focused approaches, and why updates and tuning are necessary to remain effective against evolving threats. We will discuss how scanning can identify known vulnerabilities, misconfigurations, and exposures, but also why scans must be interpreted carefully to avoid chasing false positives or breaking systems through careless remediation. You will practice evaluating scenarios such as a workstation repeatedly flagging malware, an organization running vulnerability scans before patching, or a new system failing compliance checks due to missing updates. Real-world troubleshooting considerations will include investigating repeated detections, validating scan scope, scheduling scans to reduce operational disruption, and coordinating remediation through change management so security improvements do not create availability incidents. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1fc43c0a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 47 — Firewalls and IPS Fundamentals: Blocking, Allowing, and Stopping What Matters</title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>Episode 47 — Firewalls and IPS Fundamentals: Blocking, Allowing, and Stopping What Matters</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">780731cc-d4c0-4831-8e6e-5459c0acf572</guid>
      <link>https://share.transistor.fm/s/d642fc47</link>
      <description>
        <![CDATA[<p>This episode explains firewalls and intrusion prevention systems (IPS) at a foundational level, emphasizing how they support confidentiality, integrity, and availability by controlling traffic and stopping known malicious patterns. You will learn how firewall rules decide what is allowed or denied based on criteria like source, destination, protocol, and port, and why default-deny thinking is often safer than permissive configurations. We will discuss IPS as a control that can actively block or drop traffic based on detection logic, and why prevention introduces tuning requirements to avoid disrupting legitimate business activity. You will practice reasoning through scenarios like an application failing after a rule change, repeated blocked traffic that suggests scanning, or an IPS generating frequent alerts that may represent misconfiguration rather than real attack activity. Real-world best practices will include documenting rule changes, validating business requirements, monitoring for unintended consequences, and using segmentation so firewalling supports least privilege at the network level, not just at the perimeter. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains firewalls and intrusion prevention systems (IPS) at a foundational level, emphasizing how they support confidentiality, integrity, and availability by controlling traffic and stopping known malicious patterns. You will learn how firewall rules decide what is allowed or denied based on criteria like source, destination, protocol, and port, and why default-deny thinking is often safer than permissive configurations. We will discuss IPS as a control that can actively block or drop traffic based on detection logic, and why prevention introduces tuning requirements to avoid disrupting legitimate business activity. You will practice reasoning through scenarios like an application failing after a rule change, repeated blocked traffic that suggests scanning, or an IPS generating frequent alerts that may represent misconfiguration rather than real attack activity. Real-world best practices will include documenting rule changes, validating business requirements, monitoring for unintended consequences, and using segmentation so firewalling supports least privilege at the network level, not just at the perimeter. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:39:38 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d642fc47/df2c3053.mp3" length="34171163" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>853</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains firewalls and intrusion prevention systems (IPS) at a foundational level, emphasizing how they support confidentiality, integrity, and availability by controlling traffic and stopping known malicious patterns. You will learn how firewall rules decide what is allowed or denied based on criteria like source, destination, protocol, and port, and why default-deny thinking is often safer than permissive configurations. We will discuss IPS as a control that can actively block or drop traffic based on detection logic, and why prevention introduces tuning requirements to avoid disrupting legitimate business activity. You will practice reasoning through scenarios like an application failing after a rule change, repeated blocked traffic that suggests scanning, or an IPS generating frequent alerts that may represent misconfiguration rather than real attack activity. Real-world best practices will include documenting rule changes, validating business requirements, monitoring for unintended consequences, and using segmentation so firewalling supports least privilege at the network level, not just at the perimeter. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d642fc47/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 48 — On-Prem Network Infrastructure: Power, HVAC, Fire Suppression, Redundancy</title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>Episode 48 — On-Prem Network Infrastructure: Power, HVAC, Fire Suppression, Redundancy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">82346f44-3f6b-4044-bb36-b4b3b258f060</guid>
      <link>https://share.transistor.fm/s/d8649260</link>
      <description>
        <![CDATA[<p>This episode covers on-premises infrastructure considerations that affect security and resilience, helping you answer CC questions where physical and operational realities determine availability and risk. You will learn why power, cooling, fire suppression, and environmental monitoring matter to security, and how failures in these areas can cause downtime, data loss, and unsafe conditions. We will discuss redundancy concepts such as uninterruptible power supplies, generators, redundant network links, and hardware failover, emphasizing how these support availability targets and disaster recovery planning. You will practice identifying the likely point of failure in scenarios where systems overheat, networks intermittently drop, or equipment is damaged due to poor environmental control. Real-world best practices will include regular testing of backup power, maintaining physical security around infrastructure rooms, monitoring for temperature and humidity drift, and documenting dependencies so continuity and recovery plans reflect the actual environment rather than assumptions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers on-premises infrastructure considerations that affect security and resilience, helping you answer CC questions where physical and operational realities determine availability and risk. You will learn why power, cooling, fire suppression, and environmental monitoring matter to security, and how failures in these areas can cause downtime, data loss, and unsafe conditions. We will discuss redundancy concepts such as uninterruptible power supplies, generators, redundant network links, and hardware failover, emphasizing how these support availability targets and disaster recovery planning. You will practice identifying the likely point of failure in scenarios where systems overheat, networks intermittently drop, or equipment is damaged due to poor environmental control. Real-world best practices will include regular testing of backup power, maintaining physical security around infrastructure rooms, monitoring for temperature and humidity drift, and documenting dependencies so continuity and recovery plans reflect the actual environment rather than assumptions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:40:03 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d8649260/e065bbce.mp3" length="33654975" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>840</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers on-premises infrastructure considerations that affect security and resilience, helping you answer CC questions where physical and operational realities determine availability and risk. You will learn why power, cooling, fire suppression, and environmental monitoring matter to security, and how failures in these areas can cause downtime, data loss, and unsafe conditions. We will discuss redundancy concepts such as uninterruptible power supplies, generators, redundant network links, and hardware failover, emphasizing how these support availability targets and disaster recovery planning. You will practice identifying the likely point of failure in scenarios where systems overheat, networks intermittently drop, or equipment is damaged due to poor environmental control. Real-world best practices will include regular testing of backup power, maintaining physical security around infrastructure rooms, monitoring for temperature and humidity drift, and documenting dependencies so continuity and recovery plans reflect the actual environment rather than assumptions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d8649260/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 49 — MOUs and MOAs in Infrastructure Planning: Shared Responsibilities and Risk</title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>Episode 49 — MOUs and MOAs in Infrastructure Planning: Shared Responsibilities and Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c68be559-ed49-4b3d-ae14-ca357a73177c</guid>
      <link>https://share.transistor.fm/s/89fd8ddd</link>
      <description>
        <![CDATA[<p>This episode explains memorandums of understanding (MOUs) and memorandums of agreement (MOAs) as governance tools that clarify shared responsibilities, which is useful for CC scenarios involving third parties, shared services, or cross-department operations. You will learn how these documents define expectations, roles, service responsibilities, and accountability boundaries so security does not fall into gaps between teams. We will discuss why unclear responsibility creates risk, such as unpatched systems, unmonitored logs, or inconsistent access control enforcement, and how agreements help prevent “we thought they handled that” failures. You will practice interpreting a scenario where a vendor provides a service but security controls are not clearly defined, and you will learn what questions a security professional should ask to ensure responsibilities align with policy and risk tolerance. Real-world examples will include shared data environments, managed service providers, and interdepartmental systems where clear agreements support incident response coordination, compliance obligations, and continuity planning. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains memorandums of understanding (MOUs) and memorandums of agreement (MOAs) as governance tools that clarify shared responsibilities, which is useful for CC scenarios involving third parties, shared services, or cross-department operations. You will learn how these documents define expectations, roles, service responsibilities, and accountability boundaries so security does not fall into gaps between teams. We will discuss why unclear responsibility creates risk, such as unpatched systems, unmonitored logs, or inconsistent access control enforcement, and how agreements help prevent “we thought they handled that” failures. You will practice interpreting a scenario where a vendor provides a service but security controls are not clearly defined, and you will learn what questions a security professional should ask to ensure responsibilities align with policy and risk tolerance. Real-world examples will include shared data environments, managed service providers, and interdepartmental systems where clear agreements support incident response coordination, compliance obligations, and continuity planning. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:40:29 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/89fd8ddd/9dc389f4.mp3" length="31363516" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>783</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains memorandums of understanding (MOUs) and memorandums of agreement (MOAs) as governance tools that clarify shared responsibilities, which is useful for CC scenarios involving third parties, shared services, or cross-department operations. You will learn how these documents define expectations, roles, service responsibilities, and accountability boundaries so security does not fall into gaps between teams. We will discuss why unclear responsibility creates risk, such as unpatched systems, unmonitored logs, or inconsistent access control enforcement, and how agreements help prevent “we thought they handled that” failures. You will practice interpreting a scenario where a vendor provides a service but security controls are not clearly defined, and you will learn what questions a security professional should ask to ensure responsibilities align with policy and risk tolerance. Real-world examples will include shared data environments, managed service providers, and interdepartmental systems where clear agreements support incident response coordination, compliance obligations, and continuity planning. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/89fd8ddd/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 50 — Network Design Security: DMZ, VLAN, VPN, and Micro-Segmentation Done Right</title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>Episode 50 — Network Design Security: DMZ, VLAN, VPN, and Micro-Segmentation Done Right</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">eaff72fd-7c2e-4418-a8ed-3f59a27b7398</guid>
      <link>https://share.transistor.fm/s/425509f1</link>
      <description>
        <![CDATA[<p>This episode teaches secure network design concepts, including DMZs, VLANs, VPNs, and micro-segmentation, focusing on how segmentation reduces attack surface and limits blast radius, which is directly relevant to CC exam objectives. You will learn how a DMZ isolates public-facing services, how VLANs separate internal traffic into logical segments, and how VPNs provide secure remote connectivity when properly configured and controlled. We will discuss micro-segmentation as a finer-grained approach that restricts east-west movement, reducing lateral spread when a host is compromised. You will practice reasoning through scenarios like placing a web server that must be reachable from the internet, isolating guest devices from internal systems, and securing remote access for employees without exposing administrative interfaces broadly. Real-world troubleshooting considerations will include misrouted traffic due to VLAN configuration errors, access failures caused by overly broad or overly narrow rules, and designing segmentation policies that align with least privilege rather than relying on a single perimeter boundary. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches secure network design concepts, including DMZs, VLANs, VPNs, and micro-segmentation, focusing on how segmentation reduces attack surface and limits blast radius, which is directly relevant to CC exam objectives. You will learn how a DMZ isolates public-facing services, how VLANs separate internal traffic into logical segments, and how VPNs provide secure remote connectivity when properly configured and controlled. We will discuss micro-segmentation as a finer-grained approach that restricts east-west movement, reducing lateral spread when a host is compromised. You will practice reasoning through scenarios like placing a web server that must be reachable from the internet, isolating guest devices from internal systems, and securing remote access for employees without exposing administrative interfaces broadly. Real-world troubleshooting considerations will include misrouted traffic due to VLAN configuration errors, access failures caused by overly broad or overly narrow rules, and designing segmentation policies that align with least privilege rather than relying on a single perimeter boundary. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:41:51 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/425509f1/da0da456.mp3" length="40305753" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1006</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches secure network design concepts, including DMZs, VLANs, VPNs, and micro-segmentation, focusing on how segmentation reduces attack surface and limits blast radius, which is directly relevant to CC exam objectives. You will learn how a DMZ isolates public-facing services, how VLANs separate internal traffic into logical segments, and how VPNs provide secure remote connectivity when properly configured and controlled. We will discuss micro-segmentation as a finer-grained approach that restricts east-west movement, reducing lateral spread when a host is compromised. You will practice reasoning through scenarios like placing a web server that must be reachable from the internet, isolating guest devices from internal systems, and securing remote access for employees without exposing administrative interfaces broadly. Real-world troubleshooting considerations will include misrouted traffic due to VLAN configuration errors, access failures caused by overly broad or overly narrow rules, and designing segmentation policies that align with least privilege rather than relying on a single perimeter boundary. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/425509f1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 51 — Defense in Depth and NAC: Segmentation for Embedded Systems and IoT</title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>Episode 51 — Defense in Depth and NAC: Segmentation for Embedded Systems and IoT</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">64508ab9-40d1-4136-b31a-ae9b3a21d232</guid>
      <link>https://share.transistor.fm/s/17b02f65</link>
      <description>
        <![CDATA[<p>This episode focuses on defense in depth and network access control (NAC) as practical strategies for managing risk from embedded systems and IoT devices, which frequently have limited security features and long patch cycles. You will learn how defense in depth layers controls so a single failure does not become a full compromise, and how NAC helps enforce who and what is allowed onto a network based on identity, device posture, or policy. We will discuss why IoT and embedded devices expand attack surface through weak defaults, hard-to-change credentials, limited logging, and inconsistent update mechanisms, and why segmentation is a common compensating control when device hardening is not realistic. You will practice reasoning through scenarios like isolating smart devices on a separate network, restricting their outbound traffic, and monitoring for unusual connections that suggest compromise. Real-world best practices will include inventorying devices, enforcing least privilege at the network level, validating vendor support expectations, and designing segmentation rules that limit lateral movement without breaking required device functionality. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on defense in depth and network access control (NAC) as practical strategies for managing risk from embedded systems and IoT devices, which frequently have limited security features and long patch cycles. You will learn how defense in depth layers controls so a single failure does not become a full compromise, and how NAC helps enforce who and what is allowed onto a network based on identity, device posture, or policy. We will discuss why IoT and embedded devices expand attack surface through weak defaults, hard-to-change credentials, limited logging, and inconsistent update mechanisms, and why segmentation is a common compensating control when device hardening is not realistic. You will practice reasoning through scenarios like isolating smart devices on a separate network, restricting their outbound traffic, and monitoring for unusual connections that suggest compromise. Real-world best practices will include inventorying devices, enforcing least privilege at the network level, validating vendor support expectations, and designing segmentation rules that limit lateral movement without breaking required device functionality. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:42:27 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/17b02f65/09bf72b1.mp3" length="41722620" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1042</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on defense in depth and network access control (NAC) as practical strategies for managing risk from embedded systems and IoT devices, which frequently have limited security features and long patch cycles. You will learn how defense in depth layers controls so a single failure does not become a full compromise, and how NAC helps enforce who and what is allowed onto a network based on identity, device posture, or policy. We will discuss why IoT and embedded devices expand attack surface through weak defaults, hard-to-change credentials, limited logging, and inconsistent update mechanisms, and why segmentation is a common compensating control when device hardening is not realistic. You will practice reasoning through scenarios like isolating smart devices on a separate network, restricting their outbound traffic, and monitoring for unusual connections that suggest compromise. Real-world best practices will include inventorying devices, enforcing least privilege at the network level, validating vendor support expectations, and designing segmentation rules that limit lateral movement without breaking required device functionality. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/17b02f65/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 52 — Cloud Network Concepts: SLA, MSP, SaaS, PaaS, IaaS, Hybrid Explained</title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>Episode 52 — Cloud Network Concepts: SLA, MSP, SaaS, PaaS, IaaS, Hybrid Explained</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c93e8049-e2cc-4fa9-b2a7-b2660e519f86</guid>
      <link>https://share.transistor.fm/s/a3d439e2</link>
      <description>
        <![CDATA[<p>This episode introduces cloud service models and key terms such as service level agreements (SLAs), managed service providers (MSPs), and hybrid deployments, helping you interpret CC exam questions that describe shared environments and shared responsibilities. You will learn how SaaS, PaaS, and IaaS differ in who manages what, and why misunderstanding responsibility boundaries leads to gaps in security controls, logging, and patching. We will discuss what an SLA represents, what it does and does not guarantee, and how organizations use SLAs and contracts to set availability expectations and support continuity planning. You will practice identifying which party is responsible for controls like identity management, data protection, configuration hardening, and incident response coordination in different service models. Real-world examples will include using cloud services for email and storage, running applications on managed platforms, and integrating on-prem and cloud networks, with best practices that emphasize visibility, access control discipline, and clear governance. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces cloud service models and key terms such as service level agreements (SLAs), managed service providers (MSPs), and hybrid deployments, helping you interpret CC exam questions that describe shared environments and shared responsibilities. You will learn how SaaS, PaaS, and IaaS differ in who manages what, and why misunderstanding responsibility boundaries leads to gaps in security controls, logging, and patching. We will discuss what an SLA represents, what it does and does not guarantee, and how organizations use SLAs and contracts to set availability expectations and support continuity planning. You will practice identifying which party is responsible for controls like identity management, data protection, configuration hardening, and incident response coordination in different service models. Real-world examples will include using cloud services for email and storage, running applications on managed platforms, and integrating on-prem and cloud networks, with best practices that emphasize visibility, access control discipline, and clear governance. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:43:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a3d439e2/acc27bb4.mp3" length="43769577" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1093</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces cloud service models and key terms such as service level agreements (SLAs), managed service providers (MSPs), and hybrid deployments, helping you interpret CC exam questions that describe shared environments and shared responsibilities. You will learn how SaaS, PaaS, and IaaS differ in who manages what, and why misunderstanding responsibility boundaries leads to gaps in security controls, logging, and patching. We will discuss what an SLA represents, what it does and does not guarantee, and how organizations use SLAs and contracts to set availability expectations and support continuity planning. You will practice identifying which party is responsible for controls like identity management, data protection, configuration hardening, and incident response coordination in different service models. Real-world examples will include using cloud services for email and storage, running applications on managed platforms, and integrating on-prem and cloud networks, with best practices that emphasize visibility, access control discipline, and clear governance. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a3d439e2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 53 — Encryption Essentials: Symmetric, Asymmetric, and Hashing Without Confusion</title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>Episode 53 — Encryption Essentials: Symmetric, Asymmetric, and Hashing Without Confusion</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9b30fc08-b10f-40b9-b243-930436d9d6af</guid>
      <link>https://share.transistor.fm/s/36a3b4b1</link>
      <description>
        <![CDATA[<p>This episode explains foundational cryptography concepts that appear frequently on the CC exam, focusing on how symmetric encryption, asymmetric encryption, and hashing solve different security problems. You will learn what each method is used for in practical terms, such as symmetric encryption for efficient confidentiality, asymmetric encryption for key exchange and digital signatures, and hashing for integrity verification and safe comparisons. We will discuss common misunderstandings, like thinking hashing can be reversed or assuming encryption automatically proves who sent a message, and we will tie these ideas to real security controls such as TLS, password storage, and file integrity checks. You will practice recognizing which cryptographic method is appropriate in scenarios like protecting data in transit, verifying a downloaded file has not been altered, or enabling non-repudiation through signatures. Real-world troubleshooting considerations will include certificate trust issues, weak algorithm choices, key management failures, and why cryptography is only as strong as the processes used to implement and maintain it. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains foundational cryptography concepts that appear frequently on the CC exam, focusing on how symmetric encryption, asymmetric encryption, and hashing solve different security problems. You will learn what each method is used for in practical terms, such as symmetric encryption for efficient confidentiality, asymmetric encryption for key exchange and digital signatures, and hashing for integrity verification and safe comparisons. We will discuss common misunderstandings, like thinking hashing can be reversed or assuming encryption automatically proves who sent a message, and we will tie these ideas to real security controls such as TLS, password storage, and file integrity checks. You will practice recognizing which cryptographic method is appropriate in scenarios like protecting data in transit, verifying a downloaded file has not been altered, or enabling non-repudiation through signatures. Real-world troubleshooting considerations will include certificate trust issues, weak algorithm choices, key management failures, and why cryptography is only as strong as the processes used to implement and maintain it. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:43:35 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/36a3b4b1/6ce4228a.mp3" length="38866930" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>970</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains foundational cryptography concepts that appear frequently on the CC exam, focusing on how symmetric encryption, asymmetric encryption, and hashing solve different security problems. You will learn what each method is used for in practical terms, such as symmetric encryption for efficient confidentiality, asymmetric encryption for key exchange and digital signatures, and hashing for integrity verification and safe comparisons. We will discuss common misunderstandings, like thinking hashing can be reversed or assuming encryption automatically proves who sent a message, and we will tie these ideas to real security controls such as TLS, password storage, and file integrity checks. You will practice recognizing which cryptographic method is appropriate in scenarios like protecting data in transit, verifying a downloaded file has not been altered, or enabling non-repudiation through signatures. Real-world troubleshooting considerations will include certificate trust issues, weak algorithm choices, key management failures, and why cryptography is only as strong as the processes used to implement and maintain it. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/36a3b4b1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 54 — Data Handling Discipline: Classification, Labeling, Retention, and Destruction</title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>Episode 54 — Data Handling Discipline: Classification, Labeling, Retention, and Destruction</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9091756a-2bca-4fd1-a800-8e104d5c80f8</guid>
      <link>https://share.transistor.fm/s/e0e081f9</link>
      <description>
        <![CDATA[<p>This episode covers data handling as a practical security skill, connecting classification, labeling, retention, and secure destruction to the confidentiality and compliance outcomes the CC exam tests. You will learn why classification defines how data should be protected, how labels communicate handling expectations, and how retention rules reduce risk by limiting how long sensitive data remains exposed. We will discuss secure destruction methods in concept, including why deletion alone is often insufficient and how organizations use policies and approved processes to ensure data is removed appropriately. You will practice interpreting scenarios where data is mishandled through oversharing, improper storage, uncontrolled copies, or retention beyond business need, and you will learn how to identify the best corrective action. Real-world best practices will include minimizing data collection, restricting access based on role, using encryption for sensitive datasets, documenting retention schedules, and ensuring disposal processes cover backups and replicas so risk does not quietly persist. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers data handling as a practical security skill, connecting classification, labeling, retention, and secure destruction to the confidentiality and compliance outcomes the CC exam tests. You will learn why classification defines how data should be protected, how labels communicate handling expectations, and how retention rules reduce risk by limiting how long sensitive data remains exposed. We will discuss secure destruction methods in concept, including why deletion alone is often insufficient and how organizations use policies and approved processes to ensure data is removed appropriately. You will practice interpreting scenarios where data is mishandled through oversharing, improper storage, uncontrolled copies, or retention beyond business need, and you will learn how to identify the best corrective action. Real-world best practices will include minimizing data collection, restricting access based on role, using encryption for sensitive datasets, documenting retention schedules, and ensuring disposal processes cover backups and replicas so risk does not quietly persist. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:44:08 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e0e081f9/95796a7e.mp3" length="41347524" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1032</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers data handling as a practical security skill, connecting classification, labeling, retention, and secure destruction to the confidentiality and compliance outcomes the CC exam tests. You will learn why classification defines how data should be protected, how labels communicate handling expectations, and how retention rules reduce risk by limiting how long sensitive data remains exposed. We will discuss secure destruction methods in concept, including why deletion alone is often insufficient and how organizations use policies and approved processes to ensure data is removed appropriately. You will practice interpreting scenarios where data is mishandled through oversharing, improper storage, uncontrolled copies, or retention beyond business need, and you will learn how to identify the best corrective action. Real-world best practices will include minimizing data collection, restricting access based on role, using encryption for sensitive datasets, documenting retention schedules, and ensuring disposal processes cover backups and replicas so risk does not quietly persist. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e0e081f9/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 55 — Logging and Monitoring Security Events: What to Capture for Real Value</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>Episode 55 — Logging and Monitoring Security Events: What to Capture for Real Value</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bdb8e40f-986c-4d75-bbac-9354c8ed949d</guid>
      <link>https://share.transistor.fm/s/74dbe588</link>
      <description>
        <![CDATA[<p>This episode explains logging and monitoring as foundational security capabilities, showing how collecting the right events supports detection, investigation, and accountability, which are important themes in CC-level security operations. You will learn what good logs typically capture, such as authentication activity, privilege changes, configuration changes, and access to sensitive resources, and why context like timestamps and user identifiers matters for meaningful analysis. We will discuss common pitfalls including excessive noise, inconsistent formats, missing coverage, and time synchronization issues that make investigations harder than they need to be. You will practice reasoning through scenarios where an organization cannot confirm what happened because logs were not enabled, not retained, or not protected from tampering, and you will learn what corrective control would address the gap. Real-world best practices will include defining logging standards, protecting logs through access control and integrity measures, monitoring for anomalies like unusual login patterns, and ensuring alerts map to response processes so monitoring results in action rather than ignored dashboards. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains logging and monitoring as foundational security capabilities, showing how collecting the right events supports detection, investigation, and accountability, which are important themes in CC-level security operations. You will learn what good logs typically capture, such as authentication activity, privilege changes, configuration changes, and access to sensitive resources, and why context like timestamps and user identifiers matters for meaningful analysis. We will discuss common pitfalls including excessive noise, inconsistent formats, missing coverage, and time synchronization issues that make investigations harder than they need to be. You will practice reasoning through scenarios where an organization cannot confirm what happened because logs were not enabled, not retained, or not protected from tampering, and you will learn what corrective control would address the gap. Real-world best practices will include defining logging standards, protecting logs through access control and integrity measures, monitoring for anomalies like unusual login patterns, and ensuring alerts map to response processes so monitoring results in action rather than ignored dashboards. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:45:26 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/74dbe588/2046d3bd.mp3" length="40107214" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1001</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains logging and monitoring as foundational security capabilities, showing how collecting the right events supports detection, investigation, and accountability, which are important themes in CC-level security operations. You will learn what good logs typically capture, such as authentication activity, privilege changes, configuration changes, and access to sensitive resources, and why context like timestamps and user identifiers matters for meaningful analysis. We will discuss common pitfalls including excessive noise, inconsistent formats, missing coverage, and time synchronization issues that make investigations harder than they need to be. You will practice reasoning through scenarios where an organization cannot confirm what happened because logs were not enabled, not retained, or not protected from tampering, and you will learn what corrective control would address the gap. Real-world best practices will include defining logging standards, protecting logs through access control and integrity measures, monitoring for anomalies like unusual login patterns, and ensuring alerts map to response processes so monitoring results in action rather than ignored dashboards. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/74dbe588/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 56 — System Hardening Through Configuration Management: Baselines, Updates, Patches</title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>Episode 56 — System Hardening Through Configuration Management: Baselines, Updates, Patches</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6893052c-627b-4818-a700-0bd39e0b8a06</guid>
      <link>https://share.transistor.fm/s/82b136ab</link>
      <description>
        <![CDATA[<p>This episode focuses on system hardening through configuration management, which is the discipline of maintaining secure, consistent settings across systems while controlling change to reduce risk. You will learn how baselines define known-good configurations, how patching reduces exposure to known vulnerabilities, and how update processes must balance security urgency with stability and testing requirements. We will discuss why configuration drift occurs, how unauthorized changes create hidden risk, and how change management supports integrity and availability by ensuring changes are reviewed and reversible. You will practice interpreting scenarios where insecure defaults remain enabled, systems are out of date, or patching causes unexpected outages, and you will learn how to choose the best mitigation approach based on risk tolerance and criticality. Real-world best practices will include maintaining asset inventories, prioritizing patches based on exposure and impact, using staged rollouts, validating configuration compliance, and documenting exceptions so risk decisions remain visible and accountable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on system hardening through configuration management, which is the discipline of maintaining secure, consistent settings across systems while controlling change to reduce risk. You will learn how baselines define known-good configurations, how patching reduces exposure to known vulnerabilities, and how update processes must balance security urgency with stability and testing requirements. We will discuss why configuration drift occurs, how unauthorized changes create hidden risk, and how change management supports integrity and availability by ensuring changes are reviewed and reversible. You will practice interpreting scenarios where insecure defaults remain enabled, systems are out of date, or patching causes unexpected outages, and you will learn how to choose the best mitigation approach based on risk tolerance and criticality. Real-world best practices will include maintaining asset inventories, prioritizing patches based on exposure and impact, using staged rollouts, validating configuration compliance, and documenting exceptions so risk decisions remain visible and accountable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:45:56 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/82b136ab/317d6355.mp3" length="42703802" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1066</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on system hardening through configuration management, which is the discipline of maintaining secure, consistent settings across systems while controlling change to reduce risk. You will learn how baselines define known-good configurations, how patching reduces exposure to known vulnerabilities, and how update processes must balance security urgency with stability and testing requirements. We will discuss why configuration drift occurs, how unauthorized changes create hidden risk, and how change management supports integrity and availability by ensuring changes are reviewed and reversible. You will practice interpreting scenarios where insecure defaults remain enabled, systems are out of date, or patching causes unexpected outages, and you will learn how to choose the best mitigation approach based on risk tolerance and criticality. Real-world best practices will include maintaining asset inventories, prioritizing patches based on exposure and impact, using staged rollouts, validating configuration compliance, and documenting exceptions so risk decisions remain visible and accountable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/82b136ab/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 57 — Data Handling Policy Essentials: Rules That Prevent the Most Common Mistakes</title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>Episode 57 — Data Handling Policy Essentials: Rules That Prevent the Most Common Mistakes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cac1dea0-687c-4d72-b8f7-cb924f837289</guid>
      <link>https://share.transistor.fm/s/c9502063</link>
      <description>
        <![CDATA[<p>This episode explains data handling policies as administrative controls that translate confidentiality and privacy expectations into clear, repeatable behaviors across the organization, which the CC exam expects you to understand in principle. You will learn what effective data handling policies typically address, including classification rules, approved storage locations, sharing limitations, encryption expectations, and safe transmission practices. We will discuss why vague policies fail, how policy exceptions should be documented, and how enforcement and training turn policy into reality rather than shelfware. You will practice evaluating scenarios such as employees storing sensitive files in personal accounts, sending data to the wrong recipient, or copying restricted information into unsecured tools, and you will learn which policy element would prevent or reduce the risk. Real-world best practices will include aligning policy with business workflows, providing approved tools that make compliance easy, using access control and logging to support enforcement, and reviewing policy regularly so it stays current as systems, threats, and regulatory expectations change. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains data handling policies as administrative controls that translate confidentiality and privacy expectations into clear, repeatable behaviors across the organization, which the CC exam expects you to understand in principle. You will learn what effective data handling policies typically address, including classification rules, approved storage locations, sharing limitations, encryption expectations, and safe transmission practices. We will discuss why vague policies fail, how policy exceptions should be documented, and how enforcement and training turn policy into reality rather than shelfware. You will practice evaluating scenarios such as employees storing sensitive files in personal accounts, sending data to the wrong recipient, or copying restricted information into unsecured tools, and you will learn which policy element would prevent or reduce the risk. Real-world best practices will include aligning policy with business workflows, providing approved tools that make compliance easy, using access control and logging to support enforcement, and reviewing policy regularly so it stays current as systems, threats, and regulatory expectations change. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:46:26 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c9502063/36282b66.mp3" length="39694491" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>991</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains data handling policies as administrative controls that translate confidentiality and privacy expectations into clear, repeatable behaviors across the organization, which the CC exam expects you to understand in principle. You will learn what effective data handling policies typically address, including classification rules, approved storage locations, sharing limitations, encryption expectations, and safe transmission practices. We will discuss why vague policies fail, how policy exceptions should be documented, and how enforcement and training turn policy into reality rather than shelfware. You will practice evaluating scenarios such as employees storing sensitive files in personal accounts, sending data to the wrong recipient, or copying restricted information into unsecured tools, and you will learn which policy element would prevent or reduce the risk. Real-world best practices will include aligning policy with business workflows, providing approved tools that make compliance easy, using access control and logging to support enforcement, and reviewing policy regularly so it stays current as systems, threats, and regulatory expectations change. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c9502063/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 58 — Password Policy Essentials: Strength, Rotation Myths, and Practical Enforcement</title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>Episode 58 — Password Policy Essentials: Strength, Rotation Myths, and Practical Enforcement</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9ebddb14-9a18-4eb1-8ad2-95c4c372bef8</guid>
      <link>https://share.transistor.fm/s/4fce6b81</link>
      <description>
        <![CDATA[<p>This episode covers password policy fundamentals and prepares you for CC questions that test how authentication controls should be designed and enforced in real environments. You will learn what makes a password policy effective, including length expectations, banned password lists, secure storage practices, and account lockout considerations that reduce brute force risk without enabling denial-of-service through excessive lockouts. We will discuss the difference between password strength guidance and password management behavior, including why predictable patterns undermine complexity rules and why security teams often pair passwords with MFA. You will practice interpreting scenarios such as repeated login failures, credential stuffing risk, and users writing passwords down due to overly burdensome requirements, and you will learn what policy adjustments could reduce risk while improving compliance. Real-world best practices will include using password managers where appropriate, monitoring for compromised credentials, ensuring secure password reset workflows, and aligning policy with risk tolerance and user roles so privileged accounts receive stronger protections without forcing impossible requirements on everyone. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers password policy fundamentals and prepares you for CC questions that test how authentication controls should be designed and enforced in real environments. You will learn what makes a password policy effective, including length expectations, banned password lists, secure storage practices, and account lockout considerations that reduce brute force risk without enabling denial-of-service through excessive lockouts. We will discuss the difference between password strength guidance and password management behavior, including why predictable patterns undermine complexity rules and why security teams often pair passwords with MFA. You will practice interpreting scenarios such as repeated login failures, credential stuffing risk, and users writing passwords down due to overly burdensome requirements, and you will learn what policy adjustments could reduce risk while improving compliance. Real-world best practices will include using password managers where appropriate, monitoring for compromised credentials, ensuring secure password reset workflows, and aligning policy with risk tolerance and user roles so privileged accounts receive stronger protections without forcing impossible requirements on everyone. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:46:53 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4fce6b81/5d28c872.mp3" length="38873208" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>970</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers password policy fundamentals and prepares you for CC questions that test how authentication controls should be designed and enforced in real environments. You will learn what makes a password policy effective, including length expectations, banned password lists, secure storage practices, and account lockout considerations that reduce brute force risk without enabling denial-of-service through excessive lockouts. We will discuss the difference between password strength guidance and password management behavior, including why predictable patterns undermine complexity rules and why security teams often pair passwords with MFA. You will practice interpreting scenarios such as repeated login failures, credential stuffing risk, and users writing passwords down due to overly burdensome requirements, and you will learn what policy adjustments could reduce risk while improving compliance. Real-world best practices will include using password managers where appropriate, monitoring for compromised credentials, ensuring secure password reset workflows, and aligning policy with risk tolerance and user roles so privileged accounts receive stronger protections without forcing impossible requirements on everyone. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4fce6b81/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 59 — Acceptable Use Policy: Setting Boundaries Without Creating Shadow IT</title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>Episode 59 — Acceptable Use Policy: Setting Boundaries Without Creating Shadow IT</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1e543cb6-4bc5-4323-9879-056e547823ef</guid>
      <link>https://share.transistor.fm/s/e8f7b931</link>
      <description>
        <![CDATA[<p>This episode explains acceptable use policies (AUPs) as governance tools that set clear expectations for how users may access and use organizational systems, data, and networks, a concept that supports multiple CC objectives around administrative controls. You will learn what an AUP typically covers, such as appropriate device use, prohibited activities, safe browsing expectations, handling of organizational data, and consequences for misuse. We will discuss how AUPs reduce risk by clarifying what is allowed, supporting consistent enforcement, and providing a foundation for disciplinary action when behavior creates security exposure. You will practice reasoning through scenarios like employees installing unapproved software, using personal cloud storage for work files, or connecting unknown devices to the network, and you will learn how policy and technical controls work together to reduce these risks. Real-world best practices will include writing policies in plain language, aligning them with actual workflows so users are not forced into workarounds, and reinforcing expectations through regular training and reminders that emphasize safety and accountability rather than fear. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains acceptable use policies (AUPs) as governance tools that set clear expectations for how users may access and use organizational systems, data, and networks, a concept that supports multiple CC objectives around administrative controls. You will learn what an AUP typically covers, such as appropriate device use, prohibited activities, safe browsing expectations, handling of organizational data, and consequences for misuse. We will discuss how AUPs reduce risk by clarifying what is allowed, supporting consistent enforcement, and providing a foundation for disciplinary action when behavior creates security exposure. You will practice reasoning through scenarios like employees installing unapproved software, using personal cloud storage for work files, or connecting unknown devices to the network, and you will learn how policy and technical controls work together to reduce these risks. Real-world best practices will include writing policies in plain language, aligning them with actual workflows so users are not forced into workarounds, and reinforcing expectations through regular training and reminders that emphasize safety and accountability rather than fear. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:47:21 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e8f7b931/12c7f746.mp3" length="37038345" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>925</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains acceptable use policies (AUPs) as governance tools that set clear expectations for how users may access and use organizational systems, data, and networks, a concept that supports multiple CC objectives around administrative controls. You will learn what an AUP typically covers, such as appropriate device use, prohibited activities, safe browsing expectations, handling of organizational data, and consequences for misuse. We will discuss how AUPs reduce risk by clarifying what is allowed, supporting consistent enforcement, and providing a foundation for disciplinary action when behavior creates security exposure. You will practice reasoning through scenarios like employees installing unapproved software, using personal cloud storage for work files, or connecting unknown devices to the network, and you will learn how policy and technical controls work together to reduce these risks. Real-world best practices will include writing policies in plain language, aligning them with actual workflows so users are not forced into workarounds, and reinforcing expectations through regular training and reminders that emphasize safety and accountability rather than fear. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e8f7b931/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 60 — BYOD Policy Basics: Balancing User Convenience and Organizational Security</title>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:title>Episode 60 — BYOD Policy Basics: Balancing User Convenience and Organizational Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">22aef49e-6352-440f-97e6-8b53ce13c760</guid>
      <link>https://share.transistor.fm/s/422068ce</link>
      <description>
        <![CDATA[<p>This episode introduces bring your own device (BYOD) policy concepts and helps you understand how organizations manage the security risks of personal devices accessing corporate systems, a topic that appears in CC objectives through administrative and technical control thinking. You will learn the kinds of risks BYOD introduces, such as uncontrolled patching, mixed personal and corporate data, lost devices, insecure apps, and inconsistent logging visibility. We will discuss common BYOD policy elements like minimum device requirements, mobile device management expectations, encryption and screen lock rules, acceptable apps, and separation of work and personal data where possible. You will practice interpreting scenarios such as an employee wanting email access on a personal phone, a lost device with stored credentials, or a device that cannot meet security requirements, and you will learn which policy approach best reduces risk while maintaining productivity. Real-world best practices will include clear enrollment and offboarding steps, remote wipe options for corporate data, strong authentication, and communicating policy expectations up front so users understand what the organization can enforce and what support it will provide. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces bring your own device (BYOD) policy concepts and helps you understand how organizations manage the security risks of personal devices accessing corporate systems, a topic that appears in CC objectives through administrative and technical control thinking. You will learn the kinds of risks BYOD introduces, such as uncontrolled patching, mixed personal and corporate data, lost devices, insecure apps, and inconsistent logging visibility. We will discuss common BYOD policy elements like minimum device requirements, mobile device management expectations, encryption and screen lock rules, acceptable apps, and separation of work and personal data where possible. You will practice interpreting scenarios such as an employee wanting email access on a personal phone, a lost device with stored credentials, or a device that cannot meet security requirements, and you will learn which policy approach best reduces risk while maintaining productivity. Real-world best practices will include clear enrollment and offboarding steps, remote wipe options for corporate data, strong authentication, and communicating policy expectations up front so users understand what the organization can enforce and what support it will provide. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:47:57 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/422068ce/5e800d0a.mp3" length="38811549" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>969</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces bring your own device (BYOD) policy concepts and helps you understand how organizations manage the security risks of personal devices accessing corporate systems, a topic that appears in CC objectives through administrative and technical control thinking. You will learn the kinds of risks BYOD introduces, such as uncontrolled patching, mixed personal and corporate data, lost devices, insecure apps, and inconsistent logging visibility. We will discuss common BYOD policy elements like minimum device requirements, mobile device management expectations, encryption and screen lock rules, acceptable apps, and separation of work and personal data where possible. You will practice interpreting scenarios such as an employee wanting email access on a personal phone, a lost device with stored credentials, or a device that cannot meet security requirements, and you will learn which policy approach best reduces risk while maintaining productivity. Real-world best practices will include clear enrollment and offboarding steps, remote wipe options for corporate data, strong authentication, and communicating policy expectations up front so users understand what the organization can enforce and what support it will provide. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/422068ce/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 61 — Change Management Policy: Documentation, Approval, and Rollback That Works</title>
      <itunes:episode>61</itunes:episode>
      <podcast:episode>61</podcast:episode>
      <itunes:title>Episode 61 — Change Management Policy: Documentation, Approval, and Rollback That Works</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">30001753-bd72-49da-b1e9-d2614948b559</guid>
      <link>https://share.transistor.fm/s/03c4f94f</link>
      <description>
        <![CDATA[<p>This episode explains change management policy as a control that protects integrity and availability by ensuring system changes are planned, reviewed, implemented carefully, and reversible when something goes wrong. You will learn why unmanaged changes create security risk through misconfigurations, untested updates, and undocumented access changes that are hard to investigate later. We will discuss core change management elements such as change requests, approvals, impact analysis, testing expectations, maintenance windows, and rollback plans, and we will connect these ideas to the kinds of scenario questions the CC exam uses. You will practice reasoning through examples like deploying a firewall rule change, applying a critical patch, or modifying access permissions, and you will learn what “good” documentation should capture so teams can reproduce decisions and troubleshoot failures. Real-world best practices will include prioritizing emergency changes with clear guardrails, ensuring stakeholders are informed, validating outcomes after implementation, and using post-change reviews to prevent repeating avoidable mistakes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains change management policy as a control that protects integrity and availability by ensuring system changes are planned, reviewed, implemented carefully, and reversible when something goes wrong. You will learn why unmanaged changes create security risk through misconfigurations, untested updates, and undocumented access changes that are hard to investigate later. We will discuss core change management elements such as change requests, approvals, impact analysis, testing expectations, maintenance windows, and rollback plans, and we will connect these ideas to the kinds of scenario questions the CC exam uses. You will practice reasoning through examples like deploying a firewall rule change, applying a critical patch, or modifying access permissions, and you will learn what “good” documentation should capture so teams can reproduce decisions and troubleshoot failures. Real-world best practices will include prioritizing emergency changes with clear guardrails, ensuring stakeholders are informed, validating outcomes after implementation, and using post-change reviews to prevent repeating avoidable mistakes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:48:28 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/03c4f94f/9e1f5c74.mp3" length="42168806" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1053</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains change management policy as a control that protects integrity and availability by ensuring system changes are planned, reviewed, implemented carefully, and reversible when something goes wrong. You will learn why unmanaged changes create security risk through misconfigurations, untested updates, and undocumented access changes that are hard to investigate later. We will discuss core change management elements such as change requests, approvals, impact analysis, testing expectations, maintenance windows, and rollback plans, and we will connect these ideas to the kinds of scenario questions the CC exam uses. You will practice reasoning through examples like deploying a firewall rule change, applying a critical patch, or modifying access permissions, and you will learn what “good” documentation should capture so teams can reproduce decisions and troubleshoot failures. Real-world best practices will include prioritizing emergency changes with clear guardrails, ensuring stakeholders are informed, validating outcomes after implementation, and using post-change reviews to prevent repeating avoidable mistakes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/03c4f94f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 62 — Privacy Policy Essentials: Expectations, Handling Rules, and Accountability</title>
      <itunes:episode>62</itunes:episode>
      <podcast:episode>62</podcast:episode>
      <itunes:title>Episode 62 — Privacy Policy Essentials: Expectations, Handling Rules, and Accountability</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8c537a6f-cf8a-442d-ba41-faf9ce672a2f</guid>
      <link>https://share.transistor.fm/s/ee6dc940</link>
      <description>
        <![CDATA[<p>This episode focuses on privacy policy essentials and helps you understand how organizations define acceptable collection, use, sharing, and protection of personal data, which supports CC-level privacy and governance concepts. You will learn what a privacy policy aims to communicate to stakeholders, including what data is collected, why it is collected, how it is used, who it may be shared with, and how long it is retained. We will discuss accountability concepts such as ownership, escalation paths, and documentation, because privacy failures often come from unclear responsibility as much as from technical weakness. You will practice interpreting scenarios where privacy expectations are violated, such as collecting unnecessary personal data, retaining it too long, sharing it without proper basis, or failing to protect it with appropriate access controls. Real-world best practices will include data minimization, clear consent and notice practices, secure handling rules aligned with classification, and regular reviews to keep policy accurate as systems and business practices evolve. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on privacy policy essentials and helps you understand how organizations define acceptable collection, use, sharing, and protection of personal data, which supports CC-level privacy and governance concepts. You will learn what a privacy policy aims to communicate to stakeholders, including what data is collected, why it is collected, how it is used, who it may be shared with, and how long it is retained. We will discuss accountability concepts such as ownership, escalation paths, and documentation, because privacy failures often come from unclear responsibility as much as from technical weakness. You will practice interpreting scenarios where privacy expectations are violated, such as collecting unnecessary personal data, retaining it too long, sharing it without proper basis, or failing to protect it with appropriate access controls. Real-world best practices will include data minimization, clear consent and notice practices, secure handling rules aligned with classification, and regular reviews to keep policy accurate as systems and business practices evolve. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:49:02 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ee6dc940/96a3c315.mp3" length="39404008" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>984</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on privacy policy essentials and helps you understand how organizations define acceptable collection, use, sharing, and protection of personal data, which supports CC-level privacy and governance concepts. You will learn what a privacy policy aims to communicate to stakeholders, including what data is collected, why it is collected, how it is used, who it may be shared with, and how long it is retained. We will discuss accountability concepts such as ownership, escalation paths, and documentation, because privacy failures often come from unclear responsibility as much as from technical weakness. You will practice interpreting scenarios where privacy expectations are violated, such as collecting unnecessary personal data, retaining it too long, sharing it without proper basis, or failing to protect it with appropriate access controls. Real-world best practices will include data minimization, clear consent and notice practices, secure handling rules aligned with classification, and regular reviews to keep policy accurate as systems and business practices evolve. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ee6dc940/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 63 — Security Awareness Training Concepts: Social Engineering and Human Exploits</title>
      <itunes:episode>63</itunes:episode>
      <podcast:episode>63</podcast:episode>
      <itunes:title>Episode 63 — Security Awareness Training Concepts: Social Engineering and Human Exploits</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e6b3a374-c51f-42fc-9214-58d3ad0f4645</guid>
      <link>https://share.transistor.fm/s/bb9ee5d5</link>
      <description>
        <![CDATA[<p>This episode explains the foundational concepts behind security awareness training, focusing on how social engineering attacks work and why human behavior is a major factor in organizational risk, which the CC exam expects you to understand. You will learn how attackers exploit trust, urgency, authority, curiosity, and fear to trick people into revealing information, approving MFA prompts, opening malicious attachments, or sending money to fraudulent accounts. We will discuss common social engineering methods such as phishing, spear phishing, vishing, smishing, pretexting, and baiting, and how each maps to realistic indicators you can spot during daily work. You will practice analyzing scenarios where an email looks legitimate but contains subtle red flags, or where a caller pressures an employee for sensitive details, and you will learn the safest response actions such as verification through known channels and reporting procedures. Real-world best practices will include reinforcing simple decision rules, practicing reporting without shame, and using training to build habits that reduce risk without turning users into security experts overnight. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains the foundational concepts behind security awareness training, focusing on how social engineering attacks work and why human behavior is a major factor in organizational risk, which the CC exam expects you to understand. You will learn how attackers exploit trust, urgency, authority, curiosity, and fear to trick people into revealing information, approving MFA prompts, opening malicious attachments, or sending money to fraudulent accounts. We will discuss common social engineering methods such as phishing, spear phishing, vishing, smishing, pretexting, and baiting, and how each maps to realistic indicators you can spot during daily work. You will practice analyzing scenarios where an email looks legitimate but contains subtle red flags, or where a caller pressures an employee for sensitive details, and you will learn the safest response actions such as verification through known channels and reporting procedures. Real-world best practices will include reinforcing simple decision rules, practicing reporting without shame, and using training to build habits that reduce risk without turning users into security experts overnight. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:49:43 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bb9ee5d5/2fa09a64.mp3" length="38489722" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>961</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains the foundational concepts behind security awareness training, focusing on how social engineering attacks work and why human behavior is a major factor in organizational risk, which the CC exam expects you to understand. You will learn how attackers exploit trust, urgency, authority, curiosity, and fear to trick people into revealing information, approving MFA prompts, opening malicious attachments, or sending money to fraudulent accounts. We will discuss common social engineering methods such as phishing, spear phishing, vishing, smishing, pretexting, and baiting, and how each maps to realistic indicators you can spot during daily work. You will practice analyzing scenarios where an email looks legitimate but contains subtle red flags, or where a caller pressures an employee for sensitive details, and you will learn the safest response actions such as verification through known channels and reporting procedures. Real-world best practices will include reinforcing simple decision rules, practicing reporting without shame, and using training to build habits that reduce risk without turning users into security experts overnight. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bb9ee5d5/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 64 — Security Awareness Training Importance: Building Habits That Resist Attacks</title>
      <itunes:episode>64</itunes:episode>
      <podcast:episode>64</podcast:episode>
      <itunes:title>Episode 64 — Security Awareness Training Importance: Building Habits That Resist Attacks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">da6f836c-ea4f-424f-94af-957cdd095cae</guid>
      <link>https://share.transistor.fm/s/77610b53</link>
      <description>
        <![CDATA[<p>This episode explains why security awareness training matters, emphasizing that training is not about blaming users but about building repeatable habits that reduce the probability and impact of common attacks. You will learn how awareness programs support multiple security goals, including preventing credential compromise, reducing malware infections, protecting sensitive data, and improving incident reporting speed. We will discuss what makes training effective, such as relevance to job roles, short refreshers, clear reporting paths, and reinforcement through realistic examples rather than abstract rules. You will practice interpreting scenarios like a suspicious email that targets payroll, a request for password sharing in the name of urgency, or an unexpected MFA prompt, and you will learn how consistent habits like verification and reporting change outcomes. Real-world best practices will include measuring training outcomes through reporting rates and reduced incident frequency, integrating awareness into onboarding and policy communications, and ensuring leadership models the behaviors expected, because culture is reinforced by what leaders tolerate and what they practice. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why security awareness training matters, emphasizing that training is not about blaming users but about building repeatable habits that reduce the probability and impact of common attacks. You will learn how awareness programs support multiple security goals, including preventing credential compromise, reducing malware infections, protecting sensitive data, and improving incident reporting speed. We will discuss what makes training effective, such as relevance to job roles, short refreshers, clear reporting paths, and reinforcement through realistic examples rather than abstract rules. You will practice interpreting scenarios like a suspicious email that targets payroll, a request for password sharing in the name of urgency, or an unexpected MFA prompt, and you will learn how consistent habits like verification and reporting change outcomes. Real-world best practices will include measuring training outcomes through reporting rates and reduced incident frequency, integrating awareness into onboarding and policy communications, and ensuring leadership models the behaviors expected, because culture is reinforced by what leaders tolerate and what they practice. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 21 Feb 2026 20:50:50 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/77610b53/37682e3d.mp3" length="37772922" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>943</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why security awareness training matters, emphasizing that training is not about blaming users but about building repeatable habits that reduce the probability and impact of common attacks. You will learn how awareness programs support multiple security goals, including preventing credential compromise, reducing malware infections, protecting sensitive data, and improving incident reporting speed. We will discuss what makes training effective, such as relevance to job roles, short refreshers, clear reporting paths, and reinforcement through realistic examples rather than abstract rules. You will practice interpreting scenarios like a suspicious email that targets payroll, a request for password sharing in the name of urgency, or an unexpected MFA prompt, and you will learn how consistent habits like verification and reporting change outcomes. Real-world best practices will include measuring training outcomes through reporting rates and reduced incident frequency, integrating awareness into onboarding and policy communications, and ensuring leadership models the behaviors expected, because culture is reinforced by what leaders tolerate and what they practice. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/77610b53/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Welcome to the ISC2 Certified in Cybersecurity Audio Course!</title>
      <itunes:title>Welcome to the ISC2 Certified in Cybersecurity Audio Course!</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">fd68dbc5-fe93-4cff-b169-7fe3e5a7b13a</guid>
      <link>https://share.transistor.fm/s/2a7cd759</link>
      <description>
        <![CDATA[<p>Certified: The ISC(2) CC Certification Audio Course is an audio-first study program built for people who want a clean, practical path into cybersecurity without getting buried in jargon. It’s designed for beginners and career changers, as well as IT and business professionals who need a solid security foundation. If you’re aiming for the ISC(2) Certified in Cybersecurity (CC) credential, this course gives you a structured way to learn the concepts the exam expects, using plain language and real-world framing. You do not need a deep technical background to start. You need consistency, curiosity, and a willingness to practice thinking like a security professional.</p><p>Across Certified: The ISC(2) CC Certification Audio Course, you’ll learn core security principles, basic risk thinking, security operations fundamentals, access and identity concepts, network and endpoint basics, and the purpose behind common controls. The teaching style is built for audio: short, focused explanations, repeatable definitions, and quick mental checkpoints that help you remember what matters. You can learn during commutes, workouts, chores, or quiet time—anywhere you can listen. Because the format is voice-driven, it also helps you get comfortable with security vocabulary, which makes exam questions feel less like a foreign language.</p><p>What makes Certified: The ISC(2) CC Certification Audio Course different is the editorial approach: it respects your time, stays focused, and keeps every episode tied to outcomes you can use. Instead of treating security as a pile of terms, it connects ideas to decisions you’ll actually make—what to protect, why it matters, and how to reduce risk without breaking the business. Success looks like this: you can explain key concepts in your own words, recognize what a question is really asking, and choose the best answer with confidence. By the end, you should feel ready to sit the CC exam—and ready to have smarter security conversations at work.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Certified: The ISC(2) CC Certification Audio Course is an audio-first study program built for people who want a clean, practical path into cybersecurity without getting buried in jargon. It’s designed for beginners and career changers, as well as IT and business professionals who need a solid security foundation. If you’re aiming for the ISC(2) Certified in Cybersecurity (CC) credential, this course gives you a structured way to learn the concepts the exam expects, using plain language and real-world framing. You do not need a deep technical background to start. You need consistency, curiosity, and a willingness to practice thinking like a security professional.</p><p>Across Certified: The ISC(2) CC Certification Audio Course, you’ll learn core security principles, basic risk thinking, security operations fundamentals, access and identity concepts, network and endpoint basics, and the purpose behind common controls. The teaching style is built for audio: short, focused explanations, repeatable definitions, and quick mental checkpoints that help you remember what matters. You can learn during commutes, workouts, chores, or quiet time—anywhere you can listen. Because the format is voice-driven, it also helps you get comfortable with security vocabulary, which makes exam questions feel less like a foreign language.</p><p>What makes Certified: The ISC(2) CC Certification Audio Course different is the editorial approach: it respects your time, stays focused, and keeps every episode tied to outcomes you can use. Instead of treating security as a pile of terms, it connects ideas to decisions you’ll actually make—what to protect, why it matters, and how to reduce risk without breaking the business. Success looks like this: you can explain key concepts in your own words, recognize what a question is really asking, and choose the best answer with confidence. By the end, you should feel ready to sit the CC exam—and ready to have smarter security conversations at work.</p>]]>
      </content:encoded>
      <pubDate>Wed, 11 Mar 2026 00:19:03 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2a7cd759/4a69f0b5.mp3" length="406065" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>51</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Certified: The ISC(2) CC Certification Audio Course is an audio-first study program built for people who want a clean, practical path into cybersecurity without getting buried in jargon. It’s designed for beginners and career changers, as well as IT and business professionals who need a solid security foundation. If you’re aiming for the ISC(2) Certified in Cybersecurity (CC) credential, this course gives you a structured way to learn the concepts the exam expects, using plain language and real-world framing. You do not need a deep technical background to start. You need consistency, curiosity, and a willingness to practice thinking like a security professional.</p><p>Across Certified: The ISC(2) CC Certification Audio Course, you’ll learn core security principles, basic risk thinking, security operations fundamentals, access and identity concepts, network and endpoint basics, and the purpose behind common controls. The teaching style is built for audio: short, focused explanations, repeatable definitions, and quick mental checkpoints that help you remember what matters. You can learn during commutes, workouts, chores, or quiet time—anywhere you can listen. Because the format is voice-driven, it also helps you get comfortable with security vocabulary, which makes exam questions feel less like a foreign language.</p><p>What makes Certified: The ISC(2) CC Certification Audio Course different is the editorial approach: it respects your time, stays focused, and keeps every episode tied to outcomes you can use. Instead of treating security as a pile of terms, it connects ideas to decisions you’ll actually make—what to protect, why it matters, and how to reduce risk without breaking the business. Success looks like this: you can explain key concepts in your own words, recognize what a question is really asking, and choose the best answer with confidence. By the end, you should feel ready to sit the CC exam—and ready to have smarter security conversations at work.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISC(2) CC Certification Audio Course, ISC2 CC certification, Certified in Cybersecurity exam prep, cybersecurity fundamentals, security principles, risk management basics, threat and vulnerability concepts, security controls, access control, identity and access management, authentication vs authorization, least privilege, security operations fundamentals, incident response basics, network security basics, endpoint security, encryption basics, data protection, governance and compliance, security policies and procedures, security awareness, beginner cybersecurity course, career change to cybersecurity, entry-level security cert, audio-first study</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
