<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/certified-the-isc2-cc-audio-course" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Certified: The ISC2 CC Audio Course (2026 Version)</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/certified-the-isc2-cc-audio-course</itunes:new-feed-url>
    <description>This is the 2026 Edition. Certified: The ISC2 CC (2026) Audio Course is a narrated, audio-first learning experience for people preparing for the upcoming ISC2 Certified in Cybersecurity exam. It is built for new and aspiring cybersecurity professionals, career changers, IT support staff, help desk technicians, students, and anyone who wants a structured entry point into security without needing slides, labs, or long reading assignments. The course assumes you may be new to formal cybersecurity language, but it does not talk down to you. Each episode is designed to help you understand the ideas behind the exam objectives, not just memorize isolated facts. The focus is practical, exam-aligned learning: security principles, governance, identity and access management, networking, cloud concepts, operations, incident response, and the newer AI-related security issues that increasingly affect entry-level security work.

You will learn how core cybersecurity concepts connect in real situations. The course explains confidentiality, integrity, availability, risk, controls, business continuity, disaster recovery, access lifecycle, network segmentation, cloud responsibility models, data protection, cryptography, logging, threat intelligence, incident response, security testing, and physical security in plain language. Because the course is built for audio, every lesson is written to be understood by listening alone. Ideas are introduced, reinforced, compared, and revisited through spoken examples, scenario framing, and clear definitions. You can study while commuting, walking, exercising, cleaning, or taking short breaks during the day. The goal is not to overload you with jargon. The goal is to make each concept feel familiar enough that you can recognize it, explain it, and apply it when the exam presents a scenario.

What makes this course different is its commitment to the upcoming 2026 ISC2 CC blueprint and to audio-only learning. It does not depend on handouts, slides, screenshots, or outside exercises. The episodes are ordered so that foundational ideas come first, then build into applied security decisions across identity, network, cloud, operations, and incident response. Periodic reviews and glossary-style episodes help strengthen recall without turning the course into a list of flashcards. Success means more than feeling ready to sit for an exam. It means you can hear a security situation, identify the risk, choose the right control, understand the role of governance, and explain why a response makes sense. By the end, learners should feel more confident with both the language of cybersecurity and the reasoning expected of an entry-level security professional.</description>
    <copyright>2026 Bare Metal Cyber</copyright>
    <podcast:guid>5de4037a-08f7-5f66-af3a-8cbe1caa872e</podcast:guid>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="143fc9c4-74e3-506c-8f6a-319fe2cb366d" feedUrl="https://feeds.transistor.fm/certified-the-cissp-prepcast"/>
      <podcast:remoteItem feedGuid="9af25f2f-f465-5c56-8635-fc5e831ff06a" feedUrl="https://feeds.transistor.fm/bare-metal-cyber-a725a484-8216-4f80-9a32-2bfd5efcc240"/>
      <podcast:remoteItem feedGuid="ac645ca7-7469-50bf-9010-f13c165e3e14" feedUrl="https://feeds.transistor.fm/baremetalcyber-dot-one"/>
      <podcast:remoteItem feedGuid="202ca6a1-6ecd-53ac-8a12-21741b75deec" feedUrl="https://feeds.transistor.fm/certified-the-isaca-aaia-audio-course"/>
      <podcast:remoteItem feedGuid="b0bba863-f5ac-53e3-ad5d-30089ff50edc" feedUrl="https://feeds.transistor.fm/certified-the-isaca-aair-audio-course"/>
      <podcast:remoteItem feedGuid="12ba6b47-50a9-5caa-aebe-16bae40dbbc5" feedUrl="https://feeds.transistor.fm/cism"/>
      <podcast:remoteItem feedGuid="b6a2705a-6440-5c6a-8c0e-2a21eccbe46d" feedUrl="https://feeds.transistor.fm/certified-the-giac-gstrt-audio-course"/>
      <podcast:remoteItem feedGuid="8fb26813-bdb7-5678-85b7-f8b5206137a4" feedUrl="https://feeds.transistor.fm/certified-sans-giac-gsec-audio-course"/>
      <podcast:remoteItem feedGuid="c20b81e4-c8ba-5ad1-a56f-adb004b2840b" feedUrl="https://feeds.transistor.fm/certified-the-giac-gcil-audio-course"/>
      <podcast:remoteItem feedGuid="0a94ff8f-95c6-5b31-9262-c3761e5e5fc3" feedUrl="https://feeds.transistor.fm/certified-comptia-network"/>
    </podcast:podroll>
    <podcast:locked>yes</podcast:locked>
    <podcast:trailer pubdate="Tue, 21 Apr 2026 20:54:26 -0500" url="https://media.transistor.fm/e30de808/f53311e8.mp3" length="521840" type="audio/mpeg">Welcome to the ISC2 CC Course!</podcast:trailer>
    <language>en</language>
    <pubDate>Sat, 25 Apr 2026 15:51:12 -0500</pubDate>
    <lastBuildDate>Sat, 25 Apr 2026 15:52:24 -0500</lastBuildDate>
    <image>
      <url>https://img.transistorcdn.com/1sh-Lr9nwqAWZ2JUwE7wJUF4avC55rI5jD4hKh8CUZY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMDA1/OTc4ZDQ0ZWI4ZDIw/ZDJiZjlkOGY1NTg1/NWM2Mi5wbmc.jpg</url>
      <title>Certified: The ISC2 CC Audio Course (2026 Version)</title>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Education">
      <itunes:category text="Courses"/>
    </itunes:category>
    <itunes:type>serial</itunes:type>
    <itunes:author>Jason Edwards</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/1sh-Lr9nwqAWZ2JUwE7wJUF4avC55rI5jD4hKh8CUZY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMDA1/OTc4ZDQ0ZWI4ZDIw/ZDJiZjlkOGY1NTg1/NWM2Mi5wbmc.jpg"/>
    <itunes:summary>This is the 2026 Edition. Certified: The ISC2 CC (2026) Audio Course is a narrated, audio-first learning experience for people preparing for the upcoming ISC2 Certified in Cybersecurity exam. It is built for new and aspiring cybersecurity professionals, career changers, IT support staff, help desk technicians, students, and anyone who wants a structured entry point into security without needing slides, labs, or long reading assignments. The course assumes you may be new to formal cybersecurity language, but it does not talk down to you. Each episode is designed to help you understand the ideas behind the exam objectives, not just memorize isolated facts. The focus is practical, exam-aligned learning: security principles, governance, identity and access management, networking, cloud concepts, operations, incident response, and the newer AI-related security issues that increasingly affect entry-level security work.

You will learn how core cybersecurity concepts connect in real situations. The course explains confidentiality, integrity, availability, risk, controls, business continuity, disaster recovery, access lifecycle, network segmentation, cloud responsibility models, data protection, cryptography, logging, threat intelligence, incident response, security testing, and physical security in plain language. Because the course is built for audio, every lesson is written to be understood by listening alone. Ideas are introduced, reinforced, compared, and revisited through spoken examples, scenario framing, and clear definitions. You can study while commuting, walking, exercising, cleaning, or taking short breaks during the day. The goal is not to overload you with jargon. The goal is to make each concept feel familiar enough that you can recognize it, explain it, and apply it when the exam presents a scenario.

What makes this course different is its commitment to the upcoming 2026 ISC2 CC blueprint and to audio-only learning. It does not depend on handouts, slides, screenshots, or outside exercises. The episodes are ordered so that foundational ideas come first, then build into applied security decisions across identity, network, cloud, operations, and incident response. Periodic reviews and glossary-style episodes help strengthen recall without turning the course into a list of flashcards. Success means more than feeling ready to sit for an exam. It means you can hear a security situation, identify the risk, choose the right control, understand the role of governance, and explain why a response makes sense. By the end, learners should feel more confident with both the language of cybersecurity and the reasoning expected of an entry-level security professional.</itunes:summary>
    <itunes:subtitle>This is the 2026 Edition.</itunes:subtitle>
    <itunes:keywords></itunes:keywords>
    <itunes:owner>
      <itunes:name>Jason Edwards</itunes:name>
      <itunes:email>baremetalcyber@outlook.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Welcome to the ISC2 CC Course!</title>
      <itunes:title>Welcome to the ISC2 CC Course!</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">5807d643-53a0-4509-aa23-c37d10e9b385</guid>
      <link>https://share.transistor.fm/s/e30de808</link>
      <description>
        <![CDATA[<p>Welcome to Certified: The ISC2 CC (2026) Audio Course. This course is designed to help you prepare for the upcoming ISC2 Certified in Cybersecurity exam using clear, structured lessons you can follow by listening. You do not need a security job title to begin. You might be moving from IT support into cybersecurity, starting your first certification path, returning to study after a long break, or trying to turn scattered security knowledge into something organized. Across the course, we will work through the exam content in a steady order, from core principles and governance to identity, networking, cloud security, data protection, security operations, incident response, and practical AI security concerns.</p><p>Use this course in short, repeatable sessions. A single episode can introduce a concept, but listening again will help the language become more natural. When you hear a term such as least privilege, shared responsibility, threat intelligence, or business continuity, pause long enough to explain it back to yourself in simple words. That habit builds real understanding. You can listen while commuting, walking, doing chores, or reviewing before a study session. The course is not here to scare you with complexity. It is here to give you a calm path through the material and help you think like a beginning security professional. Follow or subscribe so the next lesson is ready when you are.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to Certified: The ISC2 CC (2026) Audio Course. This course is designed to help you prepare for the upcoming ISC2 Certified in Cybersecurity exam using clear, structured lessons you can follow by listening. You do not need a security job title to begin. You might be moving from IT support into cybersecurity, starting your first certification path, returning to study after a long break, or trying to turn scattered security knowledge into something organized. Across the course, we will work through the exam content in a steady order, from core principles and governance to identity, networking, cloud security, data protection, security operations, incident response, and practical AI security concerns.</p><p>Use this course in short, repeatable sessions. A single episode can introduce a concept, but listening again will help the language become more natural. When you hear a term such as least privilege, shared responsibility, threat intelligence, or business continuity, pause long enough to explain it back to yourself in simple words. That habit builds real understanding. You can listen while commuting, walking, doing chores, or reviewing before a study session. The course is not here to scare you with complexity. It is here to give you a calm path through the material and help you think like a beginning security professional. Follow or subscribe so the next lesson is ready when you are.</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 20:54:26 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e30de808/f53311e8.mp3" length="521840" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>66</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Welcome to Certified: The ISC2 CC (2026) Audio Course. This course is designed to help you prepare for the upcoming ISC2 Certified in Cybersecurity exam using clear, structured lessons you can follow by listening. You do not need a security job title to begin. You might be moving from IT support into cybersecurity, starting your first certification path, returning to study after a long break, or trying to turn scattered security knowledge into something organized. Across the course, we will work through the exam content in a steady order, from core principles and governance to identity, networking, cloud security, data protection, security operations, incident response, and practical AI security concerns.</p><p>Use this course in short, repeatable sessions. A single episode can introduce a concept, but listening again will help the language become more natural. When you hear a term such as least privilege, shared responsibility, threat intelligence, or business continuity, pause long enough to explain it back to yourself in simple words. That habit builds real understanding. You can listen while commuting, walking, doing chores, or reviewing before a study session. The course is not here to scare you with complexity. It is here to give you a calm path through the material and help you think like a beginning security professional. Follow or subscribe so the next lesson is ready when you are.</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e30de808/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 1 — Decode the 2026 CC Blueprint Structure and Spoken Learning Path</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Episode 1 — Decode the 2026 CC Blueprint Structure and Spoken Learning Path</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dadc20d6-7af0-4cdd-bdb7-b52f5f22c209</guid>
      <link>https://share.transistor.fm/s/6a38d194</link>
      <description>
        <![CDATA[<p>This episode explains how the 2026 CC blueprint is organized, what domains carry the course, and how to use that structure to study with purpose instead of guessing what matters most. For the exam, you need to recognize how security principles, governance, access control, networks, cloud, and operations connect across questions, even when the wording shifts. A practical approach is to turn each domain into a spoken learning path: identify key terms, map related concepts, and notice where one domain supports another so you can answer scenario questions with a full-picture mindset. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how the 2026 CC blueprint is organized, what domains carry the course, and how to use that structure to study with purpose instead of guessing what matters most. For the exam, you need to recognize how security principles, governance, access control, networks, cloud, and operations connect across questions, even when the wording shifts. A practical approach is to turn each domain into a spoken learning path: identify key terms, map related concepts, and notice where one domain supports another so you can answer scenario questions with a full-picture mindset. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 20:55:23 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6a38d194/becac5e5.mp3" length="36820251" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>920</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how the 2026 CC blueprint is organized, what domains carry the course, and how to use that structure to study with purpose instead of guessing what matters most. For the exam, you need to recognize how security principles, governance, access control, networks, cloud, and operations connect across questions, even when the wording shifts. A practical approach is to turn each domain into a spoken learning path: identify key terms, map related concepts, and notice where one domain supports another so you can answer scenario questions with a full-picture mindset. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6a38d194/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 2 — Build Steady Pacing and Decision Habits for Adaptive Question Thinking</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode 2 — Build Steady Pacing and Decision Habits for Adaptive Question Thinking</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2cf3aeb6-7861-40cc-91f9-9fbc301b92f2</guid>
      <link>https://share.transistor.fm/s/fdb86590</link>
      <description>
        <![CDATA[<p>This episode focuses on exam pacing, disciplined reading, and the decision habits that help you handle adaptive-style pressure without rushing into avoidable mistakes. For certification success, it is important to separate what a question is really asking from distracting details, eliminate weak options, and choose the answer that best matches security principles, not just familiar wording. In real work and on the exam, steady thinking beats speed alone, so we will use examples such as partial evidence, uncertain logs, or incomplete policy language to show how calm, structured judgment leads to better outcomes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on exam pacing, disciplined reading, and the decision habits that help you handle adaptive-style pressure without rushing into avoidable mistakes. For certification success, it is important to separate what a question is really asking from distracting details, eliminate weak options, and choose the answer that best matches security principles, not just familiar wording. In real work and on the exam, steady thinking beats speed alone, so we will use examples such as partial evidence, uncertain logs, or incomplete policy language to show how calm, structured judgment leads to better outcomes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 20:55:48 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fdb86590/789d3a38.mp3" length="35333376" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>882</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on exam pacing, disciplined reading, and the decision habits that help you handle adaptive-style pressure without rushing into avoidable mistakes. For certification success, it is important to separate what a question is really asking from distracting details, eliminate weak options, and choose the answer that best matches security principles, not just familiar wording. In real work and on the exam, steady thinking beats speed alone, so we will use examples such as partial evidence, uncertain logs, or incomplete policy language to show how calm, structured judgment leads to better outcomes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fdb86590/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 3 — Master Confidentiality Integrity and Availability as Your Security Compass</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Episode 3 — Master Confidentiality Integrity and Availability as Your Security Compass</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c94191fc-6460-46c3-92fd-a3269288ee04</guid>
      <link>https://share.transistor.fm/s/7c480609</link>
      <description>
        <![CDATA[<p>This episode introduces confidentiality, integrity, and availability as the core triad that anchors both exam reasoning and practical cybersecurity decisions. You will review what each term means, how they can conflict in real environments, and why the best answer on the exam often depends on identifying which part of the triad is most at risk in a given scenario. Examples such as encrypting sensitive data, preventing unauthorized file changes, and sustaining service uptime during outages show how CIA helps you evaluate controls, prioritize responses, and troubleshoot business impact clearly. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces confidentiality, integrity, and availability as the core triad that anchors both exam reasoning and practical cybersecurity decisions. You will review what each term means, how they can conflict in real environments, and why the best answer on the exam often depends on identifying which part of the triad is most at risk in a given scenario. Examples such as encrypting sensitive data, preventing unauthorized file changes, and sustaining service uptime during outages show how CIA helps you evaluate controls, prioritize responses, and troubleshoot business impact clearly. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 20:56:18 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7c480609/35a6679e.mp3" length="40017661" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1000</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces confidentiality, integrity, and availability as the core triad that anchors both exam reasoning and practical cybersecurity decisions. You will review what each term means, how they can conflict in real environments, and why the best answer on the exam often depends on identifying which part of the triad is most at risk in a given scenario. Examples such as encrypting sensitive data, preventing unauthorized file changes, and sustaining service uptime during outages show how CIA helps you evaluate controls, prioritize responses, and troubleshoot business impact clearly. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7c480609/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 4 — Connect Authentication Authorization Accounting Non Repudiation and Privacy in Practice</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Episode 4 — Connect Authentication Authorization Accounting Non Repudiation and Privacy in Practice</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dea45f94-137c-425e-bcce-0a9fc7727214</guid>
      <link>https://share.transistor.fm/s/80ab3573</link>
      <description>
        <![CDATA[<p>This episode connects several foundational security concepts that often appear together in both study material and real operational decisions: authentication, authorization, accounting, non repudiation, and privacy. For the exam, you must know not only the definitions, but also how they differ, such as proving identity versus granting permissions, or logging activity versus preserving a user’s control over personal data. Realistic scenarios like shared admin accounts, weak audit trails, or excessive data collection help illustrate best practices, common confusion points, and how these concepts work together to support trust, accountability, and lawful data handling. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode connects several foundational security concepts that often appear together in both study material and real operational decisions: authentication, authorization, accounting, non repudiation, and privacy. For the exam, you must know not only the definitions, but also how they differ, such as proving identity versus granting permissions, or logging activity versus preserving a user’s control over personal data. Realistic scenarios like shared admin accounts, weak audit trails, or excessive data collection help illustrate best practices, common confusion points, and how these concepts work together to support trust, accountability, and lawful data handling. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 20:57:41 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/80ab3573/48086e4d.mp3" length="40897491" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1022</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode connects several foundational security concepts that often appear together in both study material and real operational decisions: authentication, authorization, accounting, non repudiation, and privacy. For the exam, you must know not only the definitions, but also how they differ, such as proving identity versus granting permissions, or logging activity versus preserving a user’s control over personal data. Realistic scenarios like shared admin accounts, weak audit trails, or excessive data collection help illustrate best practices, common confusion points, and how these concepts work together to support trust, accountability, and lawful data handling. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/80ab3573/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 5 — Protect AI Integrity Privacy and Availability Against Model Poisoning Risks</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Episode 5 — Protect AI Integrity Privacy and Availability Against Model Poisoning Risks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9c2c8fe2-6122-48b2-b8e8-9e44402a700e</guid>
      <link>https://share.transistor.fm/s/def2b92c</link>
      <description>
        <![CDATA[<p>This episode examines how AI systems can be weakened when training data, prompts, retrieval sources, or supporting workflows are manipulated in ways that distort outputs or expose sensitive information. For the exam, it is useful to treat AI risk through familiar security principles by asking what threatens integrity, what could leak private data, and what might reduce the system’s reliability or safe use. We will look at examples such as poisoned datasets, unsafe prompt handling, and overexposed model workspaces, along with practical safeguards like validation, access control, monitoring, and change discipline that support both exam answers and real deployments. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode examines how AI systems can be weakened when training data, prompts, retrieval sources, or supporting workflows are manipulated in ways that distort outputs or expose sensitive information. For the exam, it is useful to treat AI risk through familiar security principles by asking what threatens integrity, what could leak private data, and what might reduce the system’s reliability or safe use. We will look at examples such as poisoned datasets, unsafe prompt handling, and overexposed model workspaces, along with practical safeguards like validation, access control, monitoring, and change discipline that support both exam answers and real deployments. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 20:58:19 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/def2b92c/c2e1af87.mp3" length="36320829" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>907</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode examines how AI systems can be weakened when training data, prompts, retrieval sources, or supporting workflows are manipulated in ways that distort outputs or expose sensitive information. For the exam, it is useful to treat AI risk through familiar security principles by asking what threatens integrity, what could leak private data, and what might reduce the system’s reliability or safe use. We will look at examples such as poisoned datasets, unsafe prompt handling, and overexposed model workspaces, along with practical safeguards like validation, access control, monitoring, and change discipline that support both exam answers and real deployments. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/def2b92c/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 6 — Navigate the Risk Management Lifecycle and Risk Management Processes</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Episode 6 — Navigate the Risk Management Lifecycle and Risk Management Processes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2aadad9f-a5a4-4120-ad79-9b3398835c9e</guid>
      <link>https://share.transistor.fm/s/c984abd2</link>
      <description>
        <![CDATA[<p>This episode explains the risk management lifecycle as a repeatable process for identifying assets, threats, vulnerabilities, likelihood, impact, treatment options, and ongoing review. On the exam, questions often test whether you understand risk as a continuous business process rather than a one-time worksheet, so you need to know when to avoid, mitigate, transfer, accept, or monitor risk. Practical examples such as new cloud adoption, unsupported software, or third-party exposure show how sound risk thinking supports prioritization, communication with leadership, and better control decisions over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains the risk management lifecycle as a repeatable process for identifying assets, threats, vulnerabilities, likelihood, impact, treatment options, and ongoing review. On the exam, questions often test whether you understand risk as a continuous business process rather than a one-time worksheet, so you need to know when to avoid, mitigate, transfer, accept, or monitor risk. Practical examples such as new cloud adoption, unsupported software, or third-party exposure show how sound risk thinking supports prioritization, communication with leadership, and better control decisions over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 20:58:46 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c984abd2/f41f0d99.mp3" length="40788799" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1019</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains the risk management lifecycle as a repeatable process for identifying assets, threats, vulnerabilities, likelihood, impact, treatment options, and ongoing review. On the exam, questions often test whether you understand risk as a continuous business process rather than a one-time worksheet, so you need to know when to avoid, mitigate, transfer, accept, or monitor risk. Practical examples such as new cloud adoption, unsupported software, or third-party exposure show how sound risk thinking supports prioritization, communication with leadership, and better control decisions over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c984abd2/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 7 — Map Regulations Laws Frameworks Guidelines Policies Standards Procedures ISO and CIS</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Episode 7 — Map Regulations Laws Frameworks Guidelines Policies Standards Procedures ISO and CIS</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3c799216-4987-4b86-97ec-185c0b0e0a0a</guid>
      <link>https://share.transistor.fm/s/127c44b1</link>
      <description>
        <![CDATA[<p>This episode sorts out the terms that candidates often mix together by showing the difference between external requirements, internal governance documents, and recognized frameworks or benchmarks. For the exam, it matters whether something is legally binding, broadly recommended, or locally enforced inside the organization, because that changes how you interpret responsibility and compliance. We will compare examples such as laws, regulations, policies, standards, procedures, ISO guidance, and CIS resources so you can troubleshoot wording traps and identify the right layer of authority in workplace scenarios. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode sorts out the terms that candidates often mix together by showing the difference between external requirements, internal governance documents, and recognized frameworks or benchmarks. For the exam, it matters whether something is legally binding, broadly recommended, or locally enforced inside the organization, because that changes how you interpret responsibility and compliance. We will compare examples such as laws, regulations, policies, standards, procedures, ISO guidance, and CIS resources so you can troubleshoot wording traps and identify the right layer of authority in workplace scenarios. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 20:59:51 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/127c44b1/e9da38d1.mp3" length="45215019" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1129</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode sorts out the terms that candidates often mix together by showing the difference between external requirements, internal governance documents, and recognized frameworks or benchmarks. For the exam, it matters whether something is legally binding, broadly recommended, or locally enforced inside the organization, because that changes how you interpret responsibility and compliance. We will compare examples such as laws, regulations, policies, standards, procedures, ISO guidance, and CIS resources so you can troubleshoot wording traps and identify the right layer of authority in workplace scenarios. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/127c44b1/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 8 — Govern AI Adoption with Policies Laws Risk Appetite Transparency and Bias Awareness</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Episode 8 — Govern AI Adoption with Policies Laws Risk Appetite Transparency and Bias Awareness</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">33f6421e-fce3-46a8-aa6b-b6ddb588b14e</guid>
      <link>https://share.transistor.fm/s/c339747d</link>
      <description>
        <![CDATA[<p>This episode explores how organizations should govern AI adoption so that innovation does not outpace accountability, privacy, fairness, or business tolerance for risk. For certification purposes, you need to recognize that AI governance is not only a technical matter; it also depends on policy, legal obligations, transparency, documented ownership, and awareness of bias in data and outputs. Scenarios involving automated decisions, unclear training sources, or unapproved tools help show why approval processes, usage boundaries, monitoring, and explainability are essential for both exam reasoning and responsible real-world deployment. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explores how organizations should govern AI adoption so that innovation does not outpace accountability, privacy, fairness, or business tolerance for risk. For certification purposes, you need to recognize that AI governance is not only a technical matter; it also depends on policy, legal obligations, transparency, documented ownership, and awareness of bias in data and outputs. Scenarios involving automated decisions, unclear training sources, or unapproved tools help show why approval processes, usage boundaries, monitoring, and explainability are essential for both exam reasoning and responsible real-world deployment. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:00:19 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c339747d/fcda446d.mp3" length="42356176" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1058</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explores how organizations should govern AI adoption so that innovation does not outpace accountability, privacy, fairness, or business tolerance for risk. For certification purposes, you need to recognize that AI governance is not only a technical matter; it also depends on policy, legal obligations, transparency, documented ownership, and awareness of bias in data and outputs. Scenarios involving automated decisions, unclear training sources, or unapproved tools help show why approval processes, usage boundaries, monitoring, and explainability are essential for both exam reasoning and responsible real-world deployment. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c339747d/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 9 — Compare Technical Administrative and Physical Controls for Better Decisions</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Episode 9 — Compare Technical Administrative and Physical Controls for Better Decisions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">719f10a4-687b-4618-b49e-d3d351a36f63</guid>
      <link>https://share.transistor.fm/s/0ceb1a56</link>
      <description>
        <![CDATA[<p>This episode explains the three major control categories and shows how to distinguish them quickly when a question asks what kind of safeguard best fits a situation. Technical controls include tools such as access systems, encryption, and logging; administrative controls include policies, training, and governance; physical controls include locks, barriers, cameras, and facility protections. By walking through examples like badge misuse, poor password practices, and unsecured server rooms, this episode helps you choose controls based on the actual problem, layer them effectively, and avoid the exam mistake of selecting a familiar control that does not address the root risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains the three major control categories and shows how to distinguish them quickly when a question asks what kind of safeguard best fits a situation. Technical controls include tools such as access systems, encryption, and logging; administrative controls include policies, training, and governance; physical controls include locks, barriers, cameras, and facility protections. By walking through examples like badge misuse, poor password practices, and unsecured server rooms, this episode helps you choose controls based on the actual problem, layer them effectively, and avoid the exam mistake of selecting a familiar control that does not address the root risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:02:46 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0ceb1a56/7047f923.mp3" length="42056274" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1050</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains the three major control categories and shows how to distinguish them quickly when a question asks what kind of safeguard best fits a situation. Technical controls include tools such as access systems, encryption, and logging; administrative controls include policies, training, and governance; physical controls include locks, barriers, cameras, and facility protections. By walking through examples like badge misuse, poor password practices, and unsecured server rooms, this episode helps you choose controls based on the actual problem, layer them effectively, and avoid the exam mistake of selecting a familiar control that does not address the root risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0ceb1a56/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 10 — Maintain Professional Conduct with Due Care Diligence and ISC2 Ethics</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Episode 10 — Maintain Professional Conduct with Due Care Diligence and ISC2 Ethics</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">64c2fa51-e0d1-4b54-b4e6-3317d94136c3</guid>
      <link>https://share.transistor.fm/s/8e033924</link>
      <description>
        <![CDATA[<p>This episode focuses on professional conduct and the responsibility to act competently, consistently, and ethically when protecting systems, users, and organizations. For the exam, candidates should understand the difference between due care and due diligence, how those ideas appear in oversight and operations, and why the ISC2 Code of Ethics matters when choices involve pressure, shortcuts, or competing interests. Realistic situations such as ignoring repeated warnings, failing to review vendor claims, or overlooking known weaknesses help reinforce how ethical judgment supports trust, defensible decisions, and long-term security leadership. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on professional conduct and the responsibility to act competently, consistently, and ethically when protecting systems, users, and organizations. For the exam, candidates should understand the difference between due care and due diligence, how those ideas appear in oversight and operations, and why the ISC2 Code of Ethics matters when choices involve pressure, shortcuts, or competing interests. Realistic situations such as ignoring repeated warnings, failing to review vendor claims, or overlooking known weaknesses help reinforce how ethical judgment supports trust, defensible decisions, and long-term security leadership. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:05:26 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8e033924/3608aac9.mp3" length="43937081" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1098</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on professional conduct and the responsibility to act competently, consistently, and ethically when protecting systems, users, and organizations. For the exam, candidates should understand the difference between due care and due diligence, how those ideas appear in oversight and operations, and why the ISC2 Code of Ethics matters when choices involve pressure, shortcuts, or competing interests. Realistic situations such as ignoring repeated warnings, failing to review vendor claims, or overlooking known weaknesses help reinforce how ethical judgment supports trust, defensible decisions, and long-term security leadership. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8e033924/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 11 — Apply Security Principles Through Fast Scenario Based Decision Making</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Episode 11 — Apply Security Principles Through Fast Scenario Based Decision Making</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2148299c-2987-49b8-81ad-543a24580493</guid>
      <link>https://share.transistor.fm/s/fdc18003</link>
      <description>
        <![CDATA[<p>This episode develops the skill of applying core security principles quickly when the exam presents short scenarios with competing priorities and incomplete facts. Rather than memorizing isolated definitions, you need to recognize how confidentiality, integrity, availability, least privilege, separation of duties, and defense in depth guide the best answer under time pressure. Examples such as suspicious access requests, weak backup practices, or rushed change approvals show how to identify the underlying risk, reject options that sound helpful but miss the point, and make decisions that also reflect good judgment in real security operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode develops the skill of applying core security principles quickly when the exam presents short scenarios with competing priorities and incomplete facts. Rather than memorizing isolated definitions, you need to recognize how confidentiality, integrity, availability, least privilege, separation of duties, and defense in depth guide the best answer under time pressure. Examples such as suspicious access requests, weak backup practices, or rushed change approvals show how to identify the underlying risk, reject options that sound helpful but miss the point, and make decisions that also reflect good judgment in real security operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:05:56 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fdc18003/73a23da6.mp3" length="40516085" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1012</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode develops the skill of applying core security principles quickly when the exam presents short scenarios with competing priorities and incomplete facts. Rather than memorizing isolated definitions, you need to recognize how confidentiality, integrity, availability, least privilege, separation of duties, and defense in depth guide the best answer under time pressure. Examples such as suspicious access requests, weak backup practices, or rushed change approvals show how to identify the underlying risk, reject options that sound helpful but miss the point, and make decisions that also reflect good judgment in real security operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fdc18003/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 12 — Plan Governance Risk and Compliance with Purpose and Practical Tools</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Episode 12 — Plan Governance Risk and Compliance with Purpose and Practical Tools</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3aca337e-4306-4b83-82fd-568cb28ee76e</guid>
      <link>https://share.transistor.fm/s/094a66e6</link>
      <description>
        <![CDATA[<p>This episode explains governance, risk, and compliance as connected management functions that turn security from scattered activity into a coordinated program. For the exam, you must understand that governance sets direction and accountability, risk management evaluates uncertainty and impact, and compliance helps ensure required obligations are met through documented controls and oversight. Practical examples such as policy review cycles, risk registers, exception handling, and audit preparation show how GRC helps leadership make informed decisions, track progress, and correct control gaps before they become larger operational or regulatory problems. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains governance, risk, and compliance as connected management functions that turn security from scattered activity into a coordinated program. For the exam, you must understand that governance sets direction and accountability, risk management evaluates uncertainty and impact, and compliance helps ensure required obligations are met through documented controls and oversight. Practical examples such as policy review cycles, risk registers, exception handling, and audit preparation show how GRC helps leadership make informed decisions, track progress, and correct control gaps before they become larger operational or regulatory problems. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:06:30 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/094a66e6/055fa8e8.mp3" length="43831545" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1095</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains governance, risk, and compliance as connected management functions that turn security from scattered activity into a coordinated program. For the exam, you must understand that governance sets direction and accountability, risk management evaluates uncertainty and impact, and compliance helps ensure required obligations are met through documented controls and oversight. Practical examples such as policy review cycles, risk registers, exception handling, and audit preparation show how GRC helps leadership make informed decisions, track progress, and correct control gaps before they become larger operational or regulatory problems. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/094a66e6/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 13 — Build Redundancy Thinking Around Business Continuity and Disaster Recovery</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Episode 13 — Build Redundancy Thinking Around Business Continuity and Disaster Recovery</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fc607b7c-c3a8-426e-bc9c-bb0fc625e6d1</guid>
      <link>https://share.transistor.fm/s/cd667dc5</link>
      <description>
        <![CDATA[<p>This episode focuses on the role of redundancy in keeping critical functions available and helping organizations recover when systems, facilities, people, or suppliers are disrupted. On the exam, business continuity and disaster recovery questions often test whether you can distinguish between sustaining operations and restoring them after serious failure, while also understanding the value of alternate paths, backups, and resilient design. Scenarios involving power loss, cloud outages, failed storage, or unavailable staff show how redundancy supports recovery objectives, reduces downtime, and improves the organization’s ability to continue serving the business during stressful conditions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on the role of redundancy in keeping critical functions available and helping organizations recover when systems, facilities, people, or suppliers are disrupted. On the exam, business continuity and disaster recovery questions often test whether you can distinguish between sustaining operations and restoring them after serious failure, while also understanding the value of alternate paths, backups, and resilient design. Scenarios involving power loss, cloud outages, failed storage, or unavailable staff show how redundancy supports recovery objectives, reduces downtime, and improves the organization’s ability to continue serving the business during stressful conditions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:06:54 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cd667dc5/d50f1910.mp3" length="42328993" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1057</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on the role of redundancy in keeping critical functions available and helping organizations recover when systems, facilities, people, or suppliers are disrupted. On the exam, business continuity and disaster recovery questions often test whether you can distinguish between sustaining operations and restoring them after serious failure, while also understanding the value of alternate paths, backups, and resilient design. Scenarios involving power loss, cloud outages, failed storage, or unavailable staff show how redundancy supports recovery objectives, reduces downtime, and improves the organization’s ability to continue serving the business during stressful conditions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cd667dc5/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 14 — Protect AI Continuity Through Dataset Backups Configuration Recovery and Model Drift</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Episode 14 — Protect AI Continuity Through Dataset Backups Configuration Recovery and Model Drift</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1e4f6ae1-3088-4887-9da8-32b6a976c820</guid>
      <link>https://share.transistor.fm/s/b0aeae12</link>
      <description>
        <![CDATA[<p>This episode examines continuity for AI-supported systems by focusing on the supporting assets that keep them reliable, recoverable, and useful over time. For the exam, it is important to view AI environments through standard continuity and recovery thinking, including protected datasets, recoverable configurations, version control, access restrictions, and monitoring for drift that can gradually reduce model quality or change behavior. Examples such as accidental dataset deletion, unauthorized tuning changes, or degraded output after new data exposure show why backup planning, tested restoration steps, and change accountability matter in both real operations and exam questions involving emerging technologies. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode examines continuity for AI-supported systems by focusing on the supporting assets that keep them reliable, recoverable, and useful over time. For the exam, it is important to view AI environments through standard continuity and recovery thinking, including protected datasets, recoverable configurations, version control, access restrictions, and monitoring for drift that can gradually reduce model quality or change behavior. Examples such as accidental dataset deletion, unauthorized tuning changes, or degraded output after new data exposure show why backup planning, tested restoration steps, and change accountability matter in both real operations and exam questions involving emerging technologies. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:07:18 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b0aeae12/28a84feb.mp3" length="40109650" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1002</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode examines continuity for AI-supported systems by focusing on the supporting assets that keep them reliable, recoverable, and useful over time. For the exam, it is important to view AI environments through standard continuity and recovery thinking, including protected datasets, recoverable configurations, version control, access restrictions, and monitoring for drift that can gradually reduce model quality or change behavior. Examples such as accidental dataset deletion, unauthorized tuning changes, or degraded output after new data exposure show why backup planning, tested restoration steps, and change accountability matter in both real operations and exam questions involving emerging technologies. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b0aeae12/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 15 — Shape Security Awareness Through Organizational Culture and Leadership</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Episode 15 — Shape Security Awareness Through Organizational Culture and Leadership</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">398f2752-e95e-4f9d-9b30-c515143ab859</guid>
      <link>https://share.transistor.fm/s/f517f4c3</link>
      <description>
        <![CDATA[<p>This episode explores how security awareness becomes more effective when it is supported by leadership behavior, clear expectations, and a culture that treats security as part of everyday work rather than a separate burden. On the exam, awareness is not just about annual training; it includes communication, reinforcement, accountability, and the way management priorities influence employee choices. Real-world situations such as rushed approvals, repeated phishing clicks, or weak incident reporting habits show how culture shapes outcomes, and why leaders must model good behavior, make policies understandable, and encourage employees to raise concerns without fear of blame. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explores how security awareness becomes more effective when it is supported by leadership behavior, clear expectations, and a culture that treats security as part of everyday work rather than a separate burden. On the exam, awareness is not just about annual training; it includes communication, reinforcement, accountability, and the way management priorities influence employee choices. Real-world situations such as rushed approvals, repeated phishing clicks, or weak incident reporting habits show how culture shapes outcomes, and why leaders must model good behavior, make policies understandable, and encourage employees to raise concerns without fear of blame. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:09:05 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f517f4c3/fe225d7d.mp3" length="42819043" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1070</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explores how security awareness becomes more effective when it is supported by leadership behavior, clear expectations, and a culture that treats security as part of everyday work rather than a separate burden. On the exam, awareness is not just about annual training; it includes communication, reinforcement, accountability, and the way management priorities influence employee choices. Real-world situations such as rushed approvals, repeated phishing clicks, or weak incident reporting habits show how culture shapes outcomes, and why leaders must model good behavior, make policies understandable, and encourage employees to raise concerns without fear of blame. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f517f4c3/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 16 — Defend Against Social Engineering with Password Protection and Phishing Awareness</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Episode 16 — Defend Against Social Engineering with Password Protection and Phishing Awareness</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">be81aa42-e09c-4b6d-83e2-029d45b30a4d</guid>
      <link>https://share.transistor.fm/s/62b9b215</link>
      <description>
        <![CDATA[<p>This episode explains how social engineering attacks exploit trust, urgency, curiosity, and routine behavior to bypass technical safeguards and gain access through people. For certification success, you should understand the mechanics of phishing, pretexting, impersonation, and other manipulative tactics, along with how password discipline, user awareness, and reporting processes reduce the chance of compromise. We will use examples such as fake password reset messages, vendor impersonation, and unusual requests from executives to show how users and defenders can spot warning signs, verify requests, and prevent small mistakes from turning into larger incidents. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how social engineering attacks exploit trust, urgency, curiosity, and routine behavior to bypass technical safeguards and gain access through people. For certification success, you should understand the mechanics of phishing, pretexting, impersonation, and other manipulative tactics, along with how password discipline, user awareness, and reporting processes reduce the chance of compromise. We will use examples such as fake password reset messages, vendor impersonation, and unusual requests from executives to show how users and defenders can spot warning signs, verify requests, and prevent small mistakes from turning into larger incidents. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:09:31 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/62b9b215/ce7b196c.mp3" length="42609040" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1064</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how social engineering attacks exploit trust, urgency, curiosity, and routine behavior to bypass technical safeguards and gain access through people. For certification success, you should understand the mechanics of phishing, pretexting, impersonation, and other manipulative tactics, along with how password discipline, user awareness, and reporting processes reduce the chance of compromise. We will use examples such as fake password reset messages, vendor impersonation, and unusual requests from executives to show how users and defenders can spot warning signs, verify requests, and prevent small mistakes from turning into larger incidents. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/62b9b215/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 17 — Measure Cybersecurity Effectiveness Using KRIs Dashboards Scorecards and Reports</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Episode 17 — Measure Cybersecurity Effectiveness Using KRIs Dashboards Scorecards and Reports</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ba92b8e8-606f-4af4-919a-3ccfe9f881b4</guid>
      <link>https://share.transistor.fm/s/dab79261</link>
      <description>
        <![CDATA[<p>This episode covers how organizations measure cybersecurity effectiveness so that leadership can see trends, emerging concerns, and whether controls are producing the intended results. On the exam, you should know the purpose of key risk indicators, dashboards, scorecards, and reports, as well as the difference between useful metrics and numbers that look impressive but fail to support action. Practical examples such as rising phishing rates, slow patch timelines, repeated privileged access exceptions, or weak backup testing results show how well-chosen measures help teams prioritize work, communicate clearly, and correct problems before risk grows further. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers how organizations measure cybersecurity effectiveness so that leadership can see trends, emerging concerns, and whether controls are producing the intended results. On the exam, you should know the purpose of key risk indicators, dashboards, scorecards, and reports, as well as the difference between useful metrics and numbers that look impressive but fail to support action. Practical examples such as rising phishing rates, slow patch timelines, repeated privileged access exceptions, or weak backup testing results show how well-chosen measures help teams prioritize work, communicate clearly, and correct problems before risk grows further. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:10:47 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dab79261/2f118f20.mp3" length="40417887" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1010</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers how organizations measure cybersecurity effectiveness so that leadership can see trends, emerging concerns, and whether controls are producing the intended results. On the exam, you should know the purpose of key risk indicators, dashboards, scorecards, and reports, as well as the difference between useful metrics and numbers that look impressive but fail to support action. Practical examples such as rising phishing rates, slow patch timelines, repeated privileged access exceptions, or weak backup testing results show how well-chosen measures help teams prioritize work, communicate clearly, and correct problems before risk grows further. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dab79261/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 18 — Connect GRC Redundancy Awareness and Metrics into Practical Governance Thinking</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Episode 18 — Connect GRC Redundancy Awareness and Metrics into Practical Governance Thinking</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">69a2ee2b-9c0c-4e1c-8506-7bf7429d3ecc</guid>
      <link>https://share.transistor.fm/s/d0b903ff</link>
      <description>
        <![CDATA[<p>This episode brings together governance, risk, compliance, redundancy, and measurement so you can think about security as an integrated management system rather than a set of unrelated topics. For the exam, this matters because strong governance depends on seeing how policies guide resilience, how redundancy supports business goals, and how metrics show whether those decisions are actually working. Scenarios involving fragile single points of failure, incomplete reporting, or compliance-driven controls with no performance follow-through illustrate how governance becomes more effective when leaders connect evidence, resilience planning, and measurable outcomes into one repeatable decision process. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode brings together governance, risk, compliance, redundancy, and measurement so you can think about security as an integrated management system rather than a set of unrelated topics. For the exam, this matters because strong governance depends on seeing how policies guide resilience, how redundancy supports business goals, and how metrics show whether those decisions are actually working. Scenarios involving fragile single points of failure, incomplete reporting, or compliance-driven controls with no performance follow-through illustrate how governance becomes more effective when leaders connect evidence, resilience planning, and measurable outcomes into one repeatable decision process. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:11:11 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d0b903ff/6a64c1c4.mp3" length="46328873" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1157</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode brings together governance, risk, compliance, redundancy, and measurement so you can think about security as an integrated management system rather than a set of unrelated topics. For the exam, this matters because strong governance depends on seeing how policies guide resilience, how redundancy supports business goals, and how metrics show whether those decisions are actually working. Scenarios involving fragile single points of failure, incomplete reporting, or compliance-driven controls with no performance follow-through illustrate how governance becomes more effective when leaders connect evidence, resilience planning, and measurable outcomes into one repeatable decision process. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d0b903ff/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 19 — Define Identity Roles Before Provisioning Decisions Create Access Risk</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Episode 19 — Define Identity Roles Before Provisioning Decisions Create Access Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f850b461-7508-4464-96b5-fec790b31181</guid>
      <link>https://share.transistor.fm/s/1895c31e</link>
      <description>
        <![CDATA[<p>This episode explains why access control begins with clearly defined identities, responsibilities, and role boundaries before accounts and permissions are ever assigned. On the exam, poorly defined roles often appear as the hidden cause of overprovisioning, privilege creep, inconsistent approvals, or failed audits, so you need to understand why accurate role design is a security control in itself. Examples such as a contractor receiving employee access, a manager inheriting unnecessary admin rights, or a shared service team lacking clear boundaries show how identity planning supports least privilege, accountability, and smoother provisioning decisions in real environments. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why access control begins with clearly defined identities, responsibilities, and role boundaries before accounts and permissions are ever assigned. On the exam, poorly defined roles often appear as the hidden cause of overprovisioning, privilege creep, inconsistent approvals, or failed audits, so you need to understand why accurate role design is a security control in itself. Examples such as a contractor receiving employee access, a manager inheriting unnecessary admin rights, or a shared service team lacking clear boundaries show how identity planning supports least privilege, accountability, and smoother provisioning decisions in real environments. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:12:12 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1895c31e/d80c18a4.mp3" length="42229720" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1055</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why access control begins with clearly defined identities, responsibilities, and role boundaries before accounts and permissions are ever assigned. On the exam, poorly defined roles often appear as the hidden cause of overprovisioning, privilege creep, inconsistent approvals, or failed audits, so you need to understand why accurate role design is a security control in itself. Examples such as a contractor receiving employee access, a manager inheriting unnecessary admin rights, or a shared service team lacking clear boundaries show how identity planning supports least privilege, accountability, and smoother provisioning decisions in real environments. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1895c31e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 20 — Provision Access with Lifecycle Control and Accountability in Mind</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Episode 20 — Provision Access with Lifecycle Control and Accountability in Mind</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">be9afc0b-b27b-4376-8880-1852653d8f22</guid>
      <link>https://share.transistor.fm/s/62a29773</link>
      <description>
        <![CDATA[<p>This episode focuses on provisioning as a controlled lifecycle activity that must align with role definitions, business need, approval authority, and traceable accountability. For the certification exam, it is not enough to know that accounts are created; you must understand how proper requests, reviews, documentation, and technical enforcement reduce the risk of excessive or inappropriate access. Realistic situations such as rushed onboarding, missing approvals, inherited permissions, or manual access changes outside process help demonstrate why lifecycle control matters and how strong provisioning practices support both secure operations and reliable exam reasoning. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on provisioning as a controlled lifecycle activity that must align with role definitions, business need, approval authority, and traceable accountability. For the certification exam, it is not enough to know that accounts are created; you must understand how proper requests, reviews, documentation, and technical enforcement reduce the risk of excessive or inappropriate access. Realistic situations such as rushed onboarding, missing approvals, inherited permissions, or manual access changes outside process help demonstrate why lifecycle control matters and how strong provisioning practices support both secure operations and reliable exam reasoning. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:12:37 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/62a29773/bd67ee21.mp3" length="40853582" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1020</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on provisioning as a controlled lifecycle activity that must align with role definitions, business need, approval authority, and traceable accountability. For the certification exam, it is not enough to know that accounts are created; you must understand how proper requests, reviews, documentation, and technical enforcement reduce the risk of excessive or inappropriate access. Realistic situations such as rushed onboarding, missing approvals, inherited permissions, or manual access changes outside process help demonstrate why lifecycle control matters and how strong provisioning practices support both secure operations and reliable exam reasoning. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/62a29773/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 21 — Review Identity Access Regularly Before Privilege Drift Becomes Dangerous</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Episode 21 — Review Identity Access Regularly Before Privilege Drift Becomes Dangerous</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d65ef9d1-bd0b-4a40-9f0b-ebab6ff15242</guid>
      <link>https://share.transistor.fm/s/c38e3306</link>
      <description>
        <![CDATA[<p>This episode explains why identity and access reviews are necessary after provisioning, because permissions that were once appropriate can become risky as roles change, projects end, and responsibilities shift over time. For the exam, you need to understand privilege drift as a common control failure that occurs when accounts keep access they no longer need, especially in fast-moving organizations with promotions, transfers, temporary assignments, or poorly documented approvals. Real examples such as dormant administrator rights, inherited group memberships, and former project access that remains active will show how periodic reviews, ownership checks, attestation, and exception handling support least privilege, reduce audit findings, and prevent small oversights from becoming larger security exposures. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why identity and access reviews are necessary after provisioning, because permissions that were once appropriate can become risky as roles change, projects end, and responsibilities shift over time. For the exam, you need to understand privilege drift as a common control failure that occurs when accounts keep access they no longer need, especially in fast-moving organizations with promotions, transfers, temporary assignments, or poorly documented approvals. Real examples such as dormant administrator rights, inherited group memberships, and former project access that remains active will show how periodic reviews, ownership checks, attestation, and exception handling support least privilege, reduce audit findings, and prevent small oversights from becoming larger security exposures. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:14:35 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c38e3306/e4f12fb0.mp3" length="37126444" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>927</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why identity and access reviews are necessary after provisioning, because permissions that were once appropriate can become risky as roles change, projects end, and responsibilities shift over time. For the exam, you need to understand privilege drift as a common control failure that occurs when accounts keep access they no longer need, especially in fast-moving organizations with promotions, transfers, temporary assignments, or poorly documented approvals. Real examples such as dormant administrator rights, inherited group memberships, and former project access that remains active will show how periodic reviews, ownership checks, attestation, and exception handling support least privilege, reduce audit findings, and prevent small oversights from becoming larger security exposures. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c38e3306/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 22 — Deprovision Access Cleanly When Roles People or Systems Change</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Episode 22 — Deprovision Access Cleanly When Roles People or Systems Change</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b942d023-c931-44df-b834-2ca3d1d12da7</guid>
      <link>https://share.transistor.fm/s/6792940a</link>
      <description>
        <![CDATA[<p>This episode focuses on deprovisioning as a critical security process that must happen quickly and accurately when users leave, responsibilities change, contractors roll off, or systems are retired. On the exam, deprovisioning questions often test whether you recognize the risk of lingering access, shared credentials, forgotten service dependencies, or inconsistent offboarding between departments. We will examine scenarios such as terminated employees with active remote access, obsolete application accounts tied to legacy systems, and incomplete role transitions that leave duplicate entitlements in place, showing how coordinated identity records, approval workflows, account disablement, and verification steps protect the organization from avoidable access abuse and operational confusion. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on deprovisioning as a critical security process that must happen quickly and accurately when users leave, responsibilities change, contractors roll off, or systems are retired. On the exam, deprovisioning questions often test whether you recognize the risk of lingering access, shared credentials, forgotten service dependencies, or inconsistent offboarding between departments. We will examine scenarios such as terminated employees with active remote access, obsolete application accounts tied to legacy systems, and incomplete role transitions that leave duplicate entitlements in place, showing how coordinated identity records, approval workflows, account disablement, and verification steps protect the organization from avoidable access abuse and operational confusion. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:15:01 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6792940a/68f2fbc1.mp3" length="39313394" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>982</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on deprovisioning as a critical security process that must happen quickly and accurately when users leave, responsibilities change, contractors roll off, or systems are retired. On the exam, deprovisioning questions often test whether you recognize the risk of lingering access, shared credentials, forgotten service dependencies, or inconsistent offboarding between departments. We will examine scenarios such as terminated employees with active remote access, obsolete application accounts tied to legacy systems, and incomplete role transitions that leave duplicate entitlements in place, showing how coordinated identity records, approval workflows, account disablement, and verification steps protect the organization from avoidable access abuse and operational confusion. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6792940a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 23 — Compare IAM Frameworks and Tools Without Losing the Lifecycle View</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Episode 23 — Compare IAM Frameworks and Tools Without Losing the Lifecycle View</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2db6986f-ede1-4186-8e64-f4a1726f7606</guid>
      <link>https://share.transistor.fm/s/da44a586</link>
      <description>
        <![CDATA[<p>This episode compares identity and access management frameworks and supporting tools while keeping attention on the full lifecycle from onboarding to review and removal. For certification purposes, it is easy to become distracted by product features or terminology, but the exam is more likely to reward an understanding of how governance, provisioning, authentication, authorization, review, and deprovisioning work together as one control system. Examples involving directory services, identity providers, approval engines, access review platforms, and privileged access tooling will help you distinguish capabilities without losing sight of the larger objective, which is to manage identity consistently, enforce accountability, and keep access aligned with real business need over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode compares identity and access management frameworks and supporting tools while keeping attention on the full lifecycle from onboarding to review and removal. For certification purposes, it is easy to become distracted by product features or terminology, but the exam is more likely to reward an understanding of how governance, provisioning, authentication, authorization, review, and deprovisioning work together as one control system. Examples involving directory services, identity providers, approval engines, access review platforms, and privileged access tooling will help you distinguish capabilities without losing sight of the larger objective, which is to manage identity consistently, enforce accountability, and keep access aligned with real business need over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:15:50 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/da44a586/17f68c4d.mp3" length="37207933" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>929</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode compares identity and access management frameworks and supporting tools while keeping attention on the full lifecycle from onboarding to review and removal. For certification purposes, it is easy to become distracted by product features or terminology, but the exam is more likely to reward an understanding of how governance, provisioning, authentication, authorization, review, and deprovisioning work together as one control system. Examples involving directory services, identity providers, approval engines, access review platforms, and privileged access tooling will help you distinguish capabilities without losing sight of the larger objective, which is to manage identity consistently, enforce accountability, and keep access aligned with real business need over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/da44a586/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 24 — Control AI Bots and Service Accounts Through Lifecycle and Least Privilege</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Episode 24 — Control AI Bots and Service Accounts Through Lifecycle and Least Privilege</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bea940be-30b5-409c-b908-9749ed818978</guid>
      <link>https://share.transistor.fm/s/4113d743</link>
      <description>
        <![CDATA[<p>This episode examines AI bots and service accounts as nonhuman identities that still require the same discipline applied to people, including ownership, approval, limited permissions, monitoring, and timely cleanup. On the exam, these identities matter because they often accumulate broad access quietly, interact with sensitive data, and can be overlooked during normal review cycles even though they may operate continuously across systems. Scenarios such as automation accounts with excessive permissions, AI assistants connected to shared knowledge stores, or legacy service credentials embedded in scripts will show why lifecycle tracking, credential protection, segmentation, and least privilege are essential to prevent misuse, data leakage, and difficult troubleshooting when activity can no longer be tied clearly to accountable ownership. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode examines AI bots and service accounts as nonhuman identities that still require the same discipline applied to people, including ownership, approval, limited permissions, monitoring, and timely cleanup. On the exam, these identities matter because they often accumulate broad access quietly, interact with sensitive data, and can be overlooked during normal review cycles even though they may operate continuously across systems. Scenarios such as automation accounts with excessive permissions, AI assistants connected to shared knowledge stores, or legacy service credentials embedded in scripts will show why lifecycle tracking, credential protection, segmentation, and least privilege are essential to prevent misuse, data leakage, and difficult troubleshooting when activity can no longer be tied clearly to accountable ownership. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:16:17 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4113d743/b1ec39ca.mp3" length="40252781" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1005</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode examines AI bots and service accounts as nonhuman identities that still require the same discipline applied to people, including ownership, approval, limited permissions, monitoring, and timely cleanup. On the exam, these identities matter because they often accumulate broad access quietly, interact with sensitive data, and can be overlooked during normal review cycles even though they may operate continuously across systems. Scenarios such as automation accounts with excessive permissions, AI assistants connected to shared knowledge stores, or legacy service credentials embedded in scripts will show why lifecycle tracking, credential protection, segmentation, and least privilege are essential to prevent misuse, data leakage, and difficult troubleshooting when activity can no longer be tied clearly to accountable ownership. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4113d743/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 25 — Enforce Least Privilege and Separation of Duties in Daily Decisions</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Episode 25 — Enforce Least Privilege and Separation of Duties in Daily Decisions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">da94e0de-4177-41fe-a96f-700e3077202e</guid>
      <link>https://share.transistor.fm/s/47699854</link>
      <description>
        <![CDATA[<p>This episode explains how least privilege and separation of duties work together to reduce both error and abuse by ensuring that people receive only the access they need and that critical actions are not controlled by one person alone. For the exam, you should recognize that these are not abstract principles but practical control decisions that affect approvals, access design, transaction review, administration, and oversight. Examples such as a developer deploying unreviewed code to production, a finance employee both creating and approving payments, or an administrator holding broad rights across unrelated systems will help show how these controls prevent conflict, reduce damage potential, and support better governance in everyday operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how least privilege and separation of duties work together to reduce both error and abuse by ensuring that people receive only the access they need and that critical actions are not controlled by one person alone. For the exam, you should recognize that these are not abstract principles but practical control decisions that affect approvals, access design, transaction review, administration, and oversight. Examples such as a developer deploying unreviewed code to production, a finance employee both creating and approving payments, or an administrator holding broad rights across unrelated systems will help show how these controls prevent conflict, reduce damage potential, and support better governance in everyday operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:16:46 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/47699854/2c09e335.mp3" length="38545404" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>963</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how least privilege and separation of duties work together to reduce both error and abuse by ensuring that people receive only the access they need and that critical actions are not controlled by one person alone. For the exam, you should recognize that these are not abstract principles but practical control decisions that affect approvals, access design, transaction review, administration, and oversight. Examples such as a developer deploying unreviewed code to production, a finance employee both creating and approving payments, or an administrator holding broad rights across unrelated systems will help show how these controls prevent conflict, reduce damage potential, and support better governance in everyday operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/47699854/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 26 — Evaluate Access Control Models for Realistic Logical Control Choices</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Episode 26 — Evaluate Access Control Models for Realistic Logical Control Choices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c09a5292-d877-404b-adc1-94ea9818e89a</guid>
      <link>https://share.transistor.fm/s/dac404ff</link>
      <description>
        <![CDATA[<p>This episode introduces the major access control models and explains how they influence logical security decisions in real systems rather than existing only as theory for exam memorization. You will review concepts such as discretionary access control, mandatory access control, role-based access control, and attribute-based access control, while focusing on what each model is trying to achieve and where it fits best. Realistic examples like classified environments, enterprise business applications, dynamic access decisions based on context, and user-managed file sharing will help you compare strengths, limitations, and common exam traps so you can choose the model that best aligns with organizational requirements, risk tolerance, and administrative practicality. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces the major access control models and explains how they influence logical security decisions in real systems rather than existing only as theory for exam memorization. You will review concepts such as discretionary access control, mandatory access control, role-based access control, and attribute-based access control, while focusing on what each model is trying to achieve and where it fits best. Realistic examples like classified environments, enterprise business applications, dynamic access decisions based on context, and user-managed file sharing will help you compare strengths, limitations, and common exam traps so you can choose the model that best aligns with organizational requirements, risk tolerance, and administrative practicality. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:17:11 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dac404ff/d31c8e72.mp3" length="42012377" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1049</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces the major access control models and explains how they influence logical security decisions in real systems rather than existing only as theory for exam memorization. You will review concepts such as discretionary access control, mandatory access control, role-based access control, and attribute-based access control, while focusing on what each model is trying to achieve and where it fits best. Realistic examples like classified environments, enterprise business applications, dynamic access decisions based on context, and user-managed file sharing will help you compare strengths, limitations, and common exam traps so you can choose the model that best aligns with organizational requirements, risk tolerance, and administrative practicality. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dac404ff/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 27 — Apply IAM Concepts Through Role Lifecycle and Access Scenarios</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Episode 27 — Apply IAM Concepts Through Role Lifecycle and Access Scenarios</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1b66f38b-9df4-41fa-b545-dec3cc40fec7</guid>
      <link>https://share.transistor.fm/s/4ee56713</link>
      <description>
        <![CDATA[<p>This episode brings identity and access management together by showing how role definition, provisioning, review, adjustment, and deprovisioning play out across real workplace scenarios. On the exam, IAM questions often require you to spot where the lifecycle broke down, such as unclear role ownership, excessive inherited permissions, weak approval evidence, or delayed access removal after a status change. Scenarios involving employees changing teams, contractors needing temporary access, or administrators requiring elevated rights for specific tasks will help reinforce how role lifecycle thinking supports least privilege, accountability, efficient operations, and stronger responses when something goes wrong and investigators need a clear record of who had access to what and why. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode brings identity and access management together by showing how role definition, provisioning, review, adjustment, and deprovisioning play out across real workplace scenarios. On the exam, IAM questions often require you to spot where the lifecycle broke down, such as unclear role ownership, excessive inherited permissions, weak approval evidence, or delayed access removal after a status change. Scenarios involving employees changing teams, contractors needing temporary access, or administrators requiring elevated rights for specific tasks will help reinforce how role lifecycle thinking supports least privilege, accountability, efficient operations, and stronger responses when something goes wrong and investigators need a clear record of who had access to what and why. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:17:36 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4ee56713/ff7c469f.mp3" length="44555647" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1113</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode brings identity and access management together by showing how role definition, provisioning, review, adjustment, and deprovisioning play out across real workplace scenarios. On the exam, IAM questions often require you to spot where the lifecycle broke down, such as unclear role ownership, excessive inherited permissions, weak approval evidence, or delayed access removal after a status change. Scenarios involving employees changing teams, contractors needing temporary access, or administrators requiring elevated rights for specific tasks will help reinforce how role lifecycle thinking supports least privilege, accountability, efficient operations, and stronger responses when something goes wrong and investigators need a clear record of who had access to what and why. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4ee56713/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 28 — Map OSI TCP IP IPv4 IPv6 and VPN Concepts Clearly</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Episode 28 — Map OSI TCP IP IPv4 IPv6 and VPN Concepts Clearly</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">83278cd1-54aa-46bf-b774-27755776b7bd</guid>
      <link>https://share.transistor.fm/s/e6ad5ef9</link>
      <description>
        <![CDATA[<p>This episode explains the networking foundations that cybersecurity professionals must understand in order to interpret traffic, communicate clearly, and make better control decisions. For the exam, you are expected to know the purpose of the OSI and TCP/IP models, recognize the role of addressing in IPv4 and IPv6, and understand how virtual private networks protect traffic across less trusted networks. We will connect these ideas through examples such as routing between segments, encrypted remote access, protocol troubleshooting, and address exhaustion, so you can see how layered models, network communication, and secure transport support both practical security analysis and accurate answers when questions combine networking with access, monitoring, or remote connectivity. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains the networking foundations that cybersecurity professionals must understand in order to interpret traffic, communicate clearly, and make better control decisions. For the exam, you are expected to know the purpose of the OSI and TCP/IP models, recognize the role of addressing in IPv4 and IPv6, and understand how virtual private networks protect traffic across less trusted networks. We will connect these ideas through examples such as routing between segments, encrypted remote access, protocol troubleshooting, and address exhaustion, so you can see how layered models, network communication, and secure transport support both practical security analysis and accurate answers when questions combine networking with access, monitoring, or remote connectivity. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:18:28 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e6ad5ef9/8a8633d9.mp3" length="41339425" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1033</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains the networking foundations that cybersecurity professionals must understand in order to interpret traffic, communicate clearly, and make better control decisions. For the exam, you are expected to know the purpose of the OSI and TCP/IP models, recognize the role of addressing in IPv4 and IPv6, and understand how virtual private networks protect traffic across less trusted networks. We will connect these ideas through examples such as routing between segments, encrypted remote access, protocol troubleshooting, and address exhaustion, so you can see how layered models, network communication, and secure transport support both practical security analysis and accurate answers when questions combine networking with access, monitoring, or remote connectivity. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e6ad5ef9/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 29 — Interpret Firewalls Ports and Applications as Network Control Points</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Episode 29 — Interpret Firewalls Ports and Applications as Network Control Points</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">125f6879-a23b-46db-9275-5b94a70667ad</guid>
      <link>https://share.transistor.fm/s/c626f618</link>
      <description>
        <![CDATA[<p>This episode focuses on firewalls, ports, and application traffic as practical control points that shape how systems communicate and how defenders enforce policy. On the exam, you should understand that ports are associated with services, firewalls filter traffic according to rules, and application awareness can provide more precise control than simple address-based decisions alone. Examples such as allowing web traffic while blocking unnecessary services, restricting administrative access to specific management hosts, or troubleshooting a business application that fails because a required port is filtered will help you connect network theory to real security operations and recognize how segmentation, rule design, and traffic visibility reduce risk without interrupting legitimate business use. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on firewalls, ports, and application traffic as practical control points that shape how systems communicate and how defenders enforce policy. On the exam, you should understand that ports are associated with services, firewalls filter traffic according to rules, and application awareness can provide more precise control than simple address-based decisions alone. Examples such as allowing web traffic while blocking unnecessary services, restricting administrative access to specific management hosts, or troubleshooting a business application that fails because a required port is filtered will help you connect network theory to real security operations and recognize how segmentation, rule design, and traffic visibility reduce risk without interrupting legitimate business use. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:18:53 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c626f618/c6d61b29.mp3" length="39172345" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>978</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on firewalls, ports, and application traffic as practical control points that shape how systems communicate and how defenders enforce policy. On the exam, you should understand that ports are associated with services, firewalls filter traffic according to rules, and application awareness can provide more precise control than simple address-based decisions alone. Examples such as allowing web traffic while blocking unnecessary services, restricting administrative access to specific management hosts, or troubleshooting a business application that fails because a required port is filtered will help you connect network theory to real security operations and recognize how segmentation, rule design, and traffic visibility reduce risk without interrupting legitimate business use. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c626f618/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 30 — Secure Wireless Concepts Across Wi-Fi Bluetooth and Everyday Connections</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Episode 30 — Secure Wireless Concepts Across Wi-Fi Bluetooth and Everyday Connections</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4c2a010b-87a9-4130-8dc6-a47d7404de8c</guid>
      <link>https://share.transistor.fm/s/ed394471</link>
      <description>
        <![CDATA[<p>This episode explains wireless security across common technologies such as Wi-Fi and Bluetooth, with attention to the convenience they provide and the risks they introduce when configuration, authentication, or user behavior is weak. For certification study, you should know the basic purpose of wireless protections, the value of strong encryption and secure pairing, and the importance of limiting exposure in public, shared, or unmanaged environments. Real-world situations such as rogue access points, poorly secured guest networks, unauthorized device pairing, and users connecting to untrusted hotspots will help show how policy, configuration standards, user awareness, and monitoring can reduce wireless risk while still supporting the mobility and connectivity organizations expect. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains wireless security across common technologies such as Wi-Fi and Bluetooth, with attention to the convenience they provide and the risks they introduce when configuration, authentication, or user behavior is weak. For certification study, you should know the basic purpose of wireless protections, the value of strong encryption and secure pairing, and the importance of limiting exposure in public, shared, or unmanaged environments. Real-world situations such as rogue access points, poorly secured guest networks, unauthorized device pairing, and users connecting to untrusted hotspots will help show how policy, configuration standards, user awareness, and monitoring can reduce wireless risk while still supporting the mobility and connectivity organizations expect. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:20:06 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ed394471/1ad11d8e.mp3" length="42828451" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1070</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains wireless security across common technologies such as Wi-Fi and Bluetooth, with attention to the convenience they provide and the risks they introduce when configuration, authentication, or user behavior is weak. For certification study, you should know the basic purpose of wireless protections, the value of strong encryption and secure pairing, and the importance of limiting exposure in public, shared, or unmanaged environments. Real-world situations such as rogue access points, poorly secured guest networks, unauthorized device pairing, and users connecting to untrusted hotspots will help show how policy, configuration standards, user awareness, and monitoring can reduce wireless risk while still supporting the mobility and connectivity organizations expect. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ed394471/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 31 — Recognize Embedded Systems ICS and IoT Security Boundaries</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Episode 31 — Recognize Embedded Systems ICS and IoT Security Boundaries</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6b652d3c-d601-49d5-89f4-28e6f42f2503</guid>
      <link>https://share.transistor.fm/s/e1303385</link>
      <description>
        <![CDATA[<p>This episode explains how embedded systems, industrial control systems, and Internet of Things devices create unique security boundaries that differ from traditional desktops, servers, and general-purpose enterprise platforms. For the exam, you need to understand that these technologies often emphasize availability, safety, long operational life, limited patching windows, proprietary protocols, and constrained hardware, which means security decisions must account for both technical risk and operational consequence. Scenarios involving building controls, manufacturing environments, medical devices, smart sensors, and field equipment will help show why segmentation, strong inventory control, vendor coordination, restricted remote access, and careful change planning are essential when a cybersecurity mistake could disrupt physical processes, critical services, or human safety. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how embedded systems, industrial control systems, and Internet of Things devices create unique security boundaries that differ from traditional desktops, servers, and general-purpose enterprise platforms. For the exam, you need to understand that these technologies often emphasize availability, safety, long operational life, limited patching windows, proprietary protocols, and constrained hardware, which means security decisions must account for both technical risk and operational consequence. Scenarios involving building controls, manufacturing environments, medical devices, smart sensors, and field equipment will help show why segmentation, strong inventory control, vendor coordination, restricted remote access, and careful change planning are essential when a cybersecurity mistake could disrupt physical processes, critical services, or human safety. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:20:29 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e1303385/14393714.mp3" length="44279786" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1106</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how embedded systems, industrial control systems, and Internet of Things devices create unique security boundaries that differ from traditional desktops, servers, and general-purpose enterprise platforms. For the exam, you need to understand that these technologies often emphasize availability, safety, long operational life, limited patching windows, proprietary protocols, and constrained hardware, which means security decisions must account for both technical risk and operational consequence. Scenarios involving building controls, manufacturing environments, medical devices, smart sensors, and field equipment will help show why segmentation, strong inventory control, vendor coordination, restricted remote access, and careful change planning are essential when a cybersecurity mistake could disrupt physical processes, critical services, or human safety. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e1303385/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 32 — Design Segmentation with Firewall Zones VLANs and Micro-Segmentation</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Episode 32 — Design Segmentation with Firewall Zones VLANs and Micro-Segmentation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bdbe859c-08ed-40dc-a17b-4bfc6a71e2fb</guid>
      <link>https://share.transistor.fm/s/8c1f3653</link>
      <description>
        <![CDATA[<p>This episode focuses on network segmentation as a practical method for reducing attack paths, limiting exposure, and improving control over how users, systems, and services communicate. On the exam, segmentation questions often test whether you can distinguish broad separation methods such as firewall zones and VLANs from more granular approaches like micro-segmentation, while also understanding why internal boundaries matter as much as perimeter defenses. Examples such as separating user networks from servers, isolating sensitive applications, containing development environments, or restricting east-west traffic in virtualized infrastructure will show how segmentation supports least privilege, simplifies monitoring, reduces lateral movement, and makes incident response more effective when suspicious activity appears inside the organization. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on network segmentation as a practical method for reducing attack paths, limiting exposure, and improving control over how users, systems, and services communicate. On the exam, segmentation questions often test whether you can distinguish broad separation methods such as firewall zones and VLANs from more granular approaches like micro-segmentation, while also understanding why internal boundaries matter as much as perimeter defenses. Examples such as separating user networks from servers, isolating sensitive applications, containing development environments, or restricting east-west traffic in virtualized infrastructure will show how segmentation supports least privilege, simplifies monitoring, reduces lateral movement, and makes incident response more effective when suspicious activity appears inside the organization. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:20:58 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8c1f3653/94d6b271.mp3" length="44905700" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1122</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on network segmentation as a practical method for reducing attack paths, limiting exposure, and improving control over how users, systems, and services communicate. On the exam, segmentation questions often test whether you can distinguish broad separation methods such as firewall zones and VLANs from more granular approaches like micro-segmentation, while also understanding why internal boundaries matter as much as perimeter defenses. Examples such as separating user networks from servers, isolating sensitive applications, containing development environments, or restricting east-west traffic in virtualized infrastructure will show how segmentation supports least privilege, simplifies monitoring, reduces lateral movement, and makes incident response more effective when suspicious activity appears inside the organization. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8c1f3653/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 33 — Layer Defense in Depth and Zero Trust into Architecture</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Episode 33 — Layer Defense in Depth and Zero Trust into Architecture</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b1616b1d-8e33-4baa-a80e-32ff15bdfba4</guid>
      <link>https://share.transistor.fm/s/5c532f47</link>
      <description>
        <![CDATA[<p>This episode explains how defense in depth and zero trust strengthen security architecture by reducing dependence on any single control, assumption, or network location. For certification purposes, you should know that defense in depth uses multiple complementary safeguards across technology, people, and process, while zero trust emphasizes continuous verification, limited trust, and access decisions based on context rather than simple network presence. Practical scenarios such as remote users accessing cloud services, contractors working across segmented environments, or internal systems communicating with sensitive data stores will show how layered authentication, policy enforcement, monitoring, and segmentation combine to improve resilience against misuse, compromise, and overly broad trust relationships. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how defense in depth and zero trust strengthen security architecture by reducing dependence on any single control, assumption, or network location. For certification purposes, you should know that defense in depth uses multiple complementary safeguards across technology, people, and process, while zero trust emphasizes continuous verification, limited trust, and access decisions based on context rather than simple network presence. Practical scenarios such as remote users accessing cloud services, contractors working across segmented environments, or internal systems communicating with sensitive data stores will show how layered authentication, policy enforcement, monitoring, and segmentation combine to improve resilience against misuse, compromise, and overly broad trust relationships. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:21:50 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5c532f47/2ee39c22.mp3" length="41688433" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1041</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how defense in depth and zero trust strengthen security architecture by reducing dependence on any single control, assumption, or network location. For certification purposes, you should know that defense in depth uses multiple complementary safeguards across technology, people, and process, while zero trust emphasizes continuous verification, limited trust, and access decisions based on context rather than simple network presence. Practical scenarios such as remote users accessing cloud services, contractors working across segmented environments, or internal systems communicating with sensitive data stores will show how layered authentication, policy enforcement, monitoring, and segmentation combine to improve resilience against misuse, compromise, and overly broad trust relationships. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5c532f47/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 34 — Secure AI Data Pathways with Segmentation Zero Trust and Protected Environments</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Episode 34 — Secure AI Data Pathways with Segmentation Zero Trust and Protected Environments</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a22277d2-e608-40e7-b416-afd79d79e924</guid>
      <link>https://share.transistor.fm/s/e6992e68</link>
      <description>
        <![CDATA[<p>This episode examines how AI data pathways should be secured from input to storage to output so that sensitive information is not exposed through convenience, weak boundaries, or excessive integration. On the exam, this topic fits naturally with segmentation, least privilege, monitoring, and zero trust because AI systems often touch knowledge bases, shared files, user prompts, APIs, and model outputs that may cross multiple trust boundaries. Examples involving retrieval systems connected to internal documents, AI tools running in shared workspaces, and bots interacting with protected data will help show why isolated environments, scoped permissions, validated sources, and strong boundary controls are important for preventing leakage, preserving data integrity, and maintaining confidence in AI-assisted workflows. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode examines how AI data pathways should be secured from input to storage to output so that sensitive information is not exposed through convenience, weak boundaries, or excessive integration. On the exam, this topic fits naturally with segmentation, least privilege, monitoring, and zero trust because AI systems often touch knowledge bases, shared files, user prompts, APIs, and model outputs that may cross multiple trust boundaries. Examples involving retrieval systems connected to internal documents, AI tools running in shared workspaces, and bots interacting with protected data will help show why isolated environments, scoped permissions, validated sources, and strong boundary controls are important for preventing leakage, preserving data integrity, and maintaining confidence in AI-assisted workflows. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:22:16 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e6992e68/5a4d35a0.mp3" length="40722995" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1017</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode examines how AI data pathways should be secured from input to storage to output so that sensitive information is not exposed through convenience, weak boundaries, or excessive integration. On the exam, this topic fits naturally with segmentation, least privilege, monitoring, and zero trust because AI systems often touch knowledge bases, shared files, user prompts, APIs, and model outputs that may cross multiple trust boundaries. Examples involving retrieval systems connected to internal documents, AI tools running in shared workspaces, and bots interacting with protected data will help show why isolated environments, scoped permissions, validated sources, and strong boundary controls are important for preventing leakage, preserving data integrity, and maintaining confidence in AI-assisted workflows. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e6992e68/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 35 — Understand Cloud Characteristics That Shape Security Expectations and Risk</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Episode 35 — Understand Cloud Characteristics That Shape Security Expectations and Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f7ff20ad-31ed-46b5-bf70-72bebd1cad0f</guid>
      <link>https://share.transistor.fm/s/7fbe4cc4</link>
      <description>
        <![CDATA[<p>This episode explains the core characteristics of cloud computing and why they change the way security responsibilities, risk assumptions, and control design must be understood. For the exam, you should recognize that elasticity, broad network access, pooled resources, measured service, and rapid provisioning create advantages, but they also introduce challenges around visibility, configuration, identity, shared infrastructure, and governance. Realistic examples such as quickly deployed services with weak permissions, storage exposed through misconfiguration, or development teams creating resources faster than review processes can keep up will show how cloud characteristics influence both technical safeguards and management oversight in daily security practice. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains the core characteristics of cloud computing and why they change the way security responsibilities, risk assumptions, and control design must be understood. For the exam, you should recognize that elasticity, broad network access, pooled resources, measured service, and rapid provisioning create advantages, but they also introduce challenges around visibility, configuration, identity, shared infrastructure, and governance. Realistic examples such as quickly deployed services with weak permissions, storage exposed through misconfiguration, or development teams creating resources faster than review processes can keep up will show how cloud characteristics influence both technical safeguards and management oversight in daily security practice. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:22:40 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7fbe4cc4/f99d9786.mp3" length="47010136" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1174</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains the core characteristics of cloud computing and why they change the way security responsibilities, risk assumptions, and control design must be understood. For the exam, you should recognize that elasticity, broad network access, pooled resources, measured service, and rapid provisioning create advantages, but they also introduce challenges around visibility, configuration, identity, shared infrastructure, and governance. Realistic examples such as quickly deployed services with weak permissions, storage exposed through misconfiguration, or development teams creating resources faster than review processes can keep up will show how cloud characteristics influence both technical safeguards and management oversight in daily security practice. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7fbe4cc4/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 36 — Compare Cloud Service Models SaaS PaaS IaaS and Responsibility Boundaries</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Episode 36 — Compare Cloud Service Models SaaS PaaS IaaS and Responsibility Boundaries</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">36fcef57-0b8f-4a34-9ac7-58951fdc8f7e</guid>
      <link>https://share.transistor.fm/s/cd5d78a8</link>
      <description>
        <![CDATA[<p>This episode compares software as a service, platform as a service, and infrastructure as a service by focusing on what the customer controls, what the provider manages, and where security responsibilities change across the models. On the exam, this is a common area for confusion because the same task, such as patching, identity management, logging, or data protection, may belong to different parties depending on the service model in use. Examples such as a hosted email platform, a managed application runtime, or virtual machines built in the cloud will help illustrate how responsibility boundaries affect control selection, audit expectations, troubleshooting, and the practical division of labor needed to secure cloud environments effectively. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode compares software as a service, platform as a service, and infrastructure as a service by focusing on what the customer controls, what the provider manages, and where security responsibilities change across the models. On the exam, this is a common area for confusion because the same task, such as patching, identity management, logging, or data protection, may belong to different parties depending on the service model in use. Examples such as a hosted email platform, a managed application runtime, or virtual machines built in the cloud will help illustrate how responsibility boundaries affect control selection, audit expectations, troubleshooting, and the practical division of labor needed to secure cloud environments effectively. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:23:10 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cd5d78a8/3fc47ce7.mp3" length="39494183" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>986</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode compares software as a service, platform as a service, and infrastructure as a service by focusing on what the customer controls, what the provider manages, and where security responsibilities change across the models. On the exam, this is a common area for confusion because the same task, such as patching, identity management, logging, or data protection, may belong to different parties depending on the service model in use. Examples such as a hosted email platform, a managed application runtime, or virtual machines built in the cloud will help illustrate how responsibility boundaries affect control selection, audit expectations, troubleshooting, and the practical division of labor needed to secure cloud environments effectively. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cd5d78a8/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 37 — Choose Cloud Deployment Models with Clear Security Tradeoff Thinking</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>Episode 37 — Choose Cloud Deployment Models with Clear Security Tradeoff Thinking</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bb6d61a9-d7fa-40b9-baac-03328f109591</guid>
      <link>https://share.transistor.fm/s/dfd334cc</link>
      <description>
        <![CDATA[<p>This episode explores cloud deployment models by examining the security tradeoffs that come with public, private, hybrid, and community approaches. For certification study, the important skill is not just remembering the names, but understanding how control, cost, scalability, governance, and integration needs influence which model is appropriate for a given organization or workload. Scenarios such as regulated data in a private environment, burst capacity in a public provider, or sensitive workloads split across hybrid infrastructure will show how deployment choice affects visibility, shared risk, administrative complexity, and the design of security controls needed to support both business flexibility and risk management. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explores cloud deployment models by examining the security tradeoffs that come with public, private, hybrid, and community approaches. For certification study, the important skill is not just remembering the names, but understanding how control, cost, scalability, governance, and integration needs influence which model is appropriate for a given organization or workload. Scenarios such as regulated data in a private environment, burst capacity in a public provider, or sensitive workloads split across hybrid infrastructure will show how deployment choice affects visibility, shared risk, administrative complexity, and the design of security controls needed to support both business flexibility and risk management. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:23:38 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dfd334cc/16360a6c.mp3" length="44226516" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1105</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explores cloud deployment models by examining the security tradeoffs that come with public, private, hybrid, and community approaches. For certification study, the important skill is not just remembering the names, but understanding how control, cost, scalability, governance, and integration needs influence which model is appropriate for a given organization or workload. Scenarios such as regulated data in a private environment, burst capacity in a public provider, or sensitive workloads split across hybrid infrastructure will show how deployment choice affects visibility, shared risk, administrative complexity, and the design of security controls needed to support both business flexibility and risk management. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dfd334cc/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 38 — Apply Shared Security Models Across Roles Responsibilities and Boundaries</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Episode 38 — Apply Shared Security Models Across Roles Responsibilities and Boundaries</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">91556809-4da5-4d10-81e9-7fb8cd03538f</guid>
      <link>https://share.transistor.fm/s/bef4e2e7</link>
      <description>
        <![CDATA[<p>This episode explains the shared responsibility concept as a practical model for understanding who secures what when cloud services, providers, customers, and internal teams all play a role in protection. On the exam, you should be prepared to identify where provider duties stop and customer duties continue, while also recognizing that internal ownership may still need to be divided between administrators, developers, compliance teams, and business stakeholders. Examples involving cloud storage permissions, virtual machine hardening, identity federation, application security, and backup responsibilities will help show why misunderstanding boundaries leads to control gaps, weak accountability, and false assumptions about who is monitoring, patching, or protecting critical assets. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains the shared responsibility concept as a practical model for understanding who secures what when cloud services, providers, customers, and internal teams all play a role in protection. On the exam, you should be prepared to identify where provider duties stop and customer duties continue, while also recognizing that internal ownership may still need to be divided between administrators, developers, compliance teams, and business stakeholders. Examples involving cloud storage permissions, virtual machine hardening, identity federation, application security, and backup responsibilities will help show why misunderstanding boundaries leads to control gaps, weak accountability, and false assumptions about who is monitoring, patching, or protecting critical assets. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:24:32 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bef4e2e7/adbd486a.mp3" length="38500485" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>962</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains the shared responsibility concept as a practical model for understanding who secures what when cloud services, providers, customers, and internal teams all play a role in protection. On the exam, you should be prepared to identify where provider duties stop and customer duties continue, while also recognizing that internal ownership may still need to be divided between administrators, developers, compliance teams, and business stakeholders. Examples involving cloud storage permissions, virtual machine hardening, identity federation, application security, and backup responsibilities will help show why misunderstanding boundaries leads to control gaps, weak accountability, and false assumptions about who is monitoring, patching, or protecting critical assets. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bef4e2e7/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 39 — Protect Data Through Classification Labeling Masking Sanitization and Handling</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>Episode 39 — Protect Data Through Classification Labeling Masking Sanitization and Handling</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d9b15a7a-a432-43cb-ae6c-4893ffa7f02a</guid>
      <link>https://share.transistor.fm/s/12047ac0</link>
      <description>
        <![CDATA[<p>This episode focuses on the data lifecycle controls that help organizations understand what information they hold, how sensitive it is, and what protections should follow it through creation, use, storage, sharing, and disposal. For the exam, you need to distinguish classification from labeling, understand the purpose of masking and sanitization, and recognize that handling requirements should align with the data’s sensitivity and business value. Examples such as protecting personal information in reports, labeling internal documents for proper sharing, sanitizing retired devices, or masking records in test environments will show how clear data handling practices reduce exposure, support compliance, and prevent accidental misuse by users who do not fully understand the importance of what they are accessing. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on the data lifecycle controls that help organizations understand what information they hold, how sensitive it is, and what protections should follow it through creation, use, storage, sharing, and disposal. For the exam, you need to distinguish classification from labeling, understand the purpose of masking and sanitization, and recognize that handling requirements should align with the data’s sensitivity and business value. Examples such as protecting personal information in reports, labeling internal documents for proper sharing, sanitizing retired devices, or masking records in test environments will show how clear data handling practices reduce exposure, support compliance, and prevent accidental misuse by users who do not fully understand the importance of what they are accessing. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:25:17 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/12047ac0/08889d3d.mp3" length="42785622" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1069</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on the data lifecycle controls that help organizations understand what information they hold, how sensitive it is, and what protections should follow it through creation, use, storage, sharing, and disposal. For the exam, you need to distinguish classification from labeling, understand the purpose of masking and sanitization, and recognize that handling requirements should align with the data’s sensitivity and business value. Examples such as protecting personal information in reports, labeling internal documents for proper sharing, sanitizing retired devices, or masking records in test environments will show how clear data handling practices reduce exposure, support compliance, and prevent accidental misuse by users who do not fully understand the importance of what they are accessing. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/12047ac0/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 40 — Explain Symmetric Asymmetric Hashing and Quantum Resistant Cryptography Clearly</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>Episode 40 — Explain Symmetric Asymmetric Hashing and Quantum Resistant Cryptography Clearly</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2944077f-955a-404b-a851-d4730961c69b</guid>
      <link>https://share.transistor.fm/s/cc987b1d</link>
      <description>
        <![CDATA[<p>This episode introduces key cryptographic concepts by explaining the differences between symmetric encryption, asymmetric encryption, hashing, and the growing discussion around quantum-resistant approaches. On the exam, you should understand the purpose of each method, such as fast shared-key encryption for confidentiality, public and private key pairs for secure exchange and authentication support, and hashing for integrity verification rather than reversible secrecy. Examples involving file protection, certificate use, password storage, digital signatures, and long-term planning for future cryptographic resilience will help you connect the concepts clearly, avoid common definition mistakes, and see why cryptography is not one tool but a set of related techniques chosen according to purpose, performance, and risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces key cryptographic concepts by explaining the differences between symmetric encryption, asymmetric encryption, hashing, and the growing discussion around quantum-resistant approaches. On the exam, you should understand the purpose of each method, such as fast shared-key encryption for confidentiality, public and private key pairs for secure exchange and authentication support, and hashing for integrity verification rather than reversible secrecy. Examples involving file protection, certificate use, password storage, digital signatures, and long-term planning for future cryptographic resilience will help you connect the concepts clearly, avoid common definition mistakes, and see why cryptography is not one tool but a set of related techniques chosen according to purpose, performance, and risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:25:40 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cc987b1d/dc4c3b43.mp3" length="42136742" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1053</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces key cryptographic concepts by explaining the differences between symmetric encryption, asymmetric encryption, hashing, and the growing discussion around quantum-resistant approaches. On the exam, you should understand the purpose of each method, such as fast shared-key encryption for confidentiality, public and private key pairs for secure exchange and authentication support, and hashing for integrity verification rather than reversible secrecy. Examples involving file protection, certificate use, password storage, digital signatures, and long-term planning for future cryptographic resilience will help you connect the concepts clearly, avoid common definition mistakes, and see why cryptography is not one tool but a set of related techniques chosen according to purpose, performance, and risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cc987b1d/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 41 — Monitor Logs and Security Events Without Missing Important Signals</title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>Episode 41 — Monitor Logs and Security Events Without Missing Important Signals</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4d040719-4b8d-4c63-ba0f-d7f100f3ed02</guid>
      <link>https://share.transistor.fm/s/4abb8c14</link>
      <description>
        <![CDATA[<p>This episode explains how logs and security events provide the visibility needed to detect misuse, investigate anomalies, and support timely response before small issues grow into larger incidents. For the exam, you should understand that logs come from many sources, including operating systems, applications, network devices, identity systems, and security tools, and that their value depends on collection, review, retention, and context. Examples such as repeated failed logins, unusual administrative changes, off-hours access, or traffic spikes to unfamiliar destinations will show how defenders separate ordinary activity from suspicious indicators, reduce blind spots, and build habits that support both exam reasoning and practical monitoring in real operational environments. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how logs and security events provide the visibility needed to detect misuse, investigate anomalies, and support timely response before small issues grow into larger incidents. For the exam, you should understand that logs come from many sources, including operating systems, applications, network devices, identity systems, and security tools, and that their value depends on collection, review, retention, and context. Examples such as repeated failed logins, unusual administrative changes, off-hours access, or traffic spikes to unfamiliar destinations will show how defenders separate ordinary activity from suspicious indicators, reduce blind spots, and build habits that support both exam reasoning and practical monitoring in real operational environments. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:27:09 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4abb8c14/1ea89e19.mp3" length="39093973" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>976</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how logs and security events provide the visibility needed to detect misuse, investigate anomalies, and support timely response before small issues grow into larger incidents. For the exam, you should understand that logs come from many sources, including operating systems, applications, network devices, identity systems, and security tools, and that their value depends on collection, review, retention, and context. Examples such as repeated failed logins, unusual administrative changes, off-hours access, or traffic spikes to unfamiliar destinations will show how defenders separate ordinary activity from suspicious indicators, reduce blind spots, and build habits that support both exam reasoning and practical monitoring in real operational environments. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4abb8c14/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 42 — Triage Security Events with Use Cases Prioritization and Correlation</title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>Episode 42 — Triage Security Events with Use Cases Prioritization and Correlation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">de5503db-deff-40af-b393-ed8ef29cd440</guid>
      <link>https://share.transistor.fm/s/a2226f3e</link>
      <description>
        <![CDATA[<p>This episode focuses on event triage by showing how security teams prioritize alerts, apply use cases, and correlate related activity so that attention is directed toward the events that matter most. On the exam, it is important to understand that not every alert represents the same level of risk, and that sound triage depends on factors such as asset value, user behavior, threat relevance, time sequence, and whether multiple signals point to the same underlying problem. Scenarios involving suspicious login attempts, endpoint detections, and network anomalies will help show how use case design, prioritization logic, and correlation reduce noise, improve analyst efficiency, and support better decisions when time and resources are limited. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on event triage by showing how security teams prioritize alerts, apply use cases, and correlate related activity so that attention is directed toward the events that matter most. On the exam, it is important to understand that not every alert represents the same level of risk, and that sound triage depends on factors such as asset value, user behavior, threat relevance, time sequence, and whether multiple signals point to the same underlying problem. Scenarios involving suspicious login attempts, endpoint detections, and network anomalies will help show how use case design, prioritization logic, and correlation reduce noise, improve analyst efficiency, and support better decisions when time and resources are limited. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:27:39 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a2226f3e/6d38bc3d.mp3" length="36815055" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>919</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on event triage by showing how security teams prioritize alerts, apply use cases, and correlate related activity so that attention is directed toward the events that matter most. On the exam, it is important to understand that not every alert represents the same level of risk, and that sound triage depends on factors such as asset value, user behavior, threat relevance, time sequence, and whether multiple signals point to the same underlying problem. Scenarios involving suspicious login attempts, endpoint detections, and network anomalies will help show how use case design, prioritization logic, and correlation reduce noise, improve analyst efficiency, and support better decisions when time and resources are limited. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a2226f3e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 43 — Triage AI Assisted SIEM Outputs and Prevent LLM Workspace Data Leakage</title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>Episode 43 — Triage AI Assisted SIEM Outputs and Prevent LLM Workspace Data Leakage</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">44de9666-b113-4d19-8ced-34789caf8056</guid>
      <link>https://share.transistor.fm/s/96786f5a</link>
      <description>
        <![CDATA[<p>This episode examines how AI-assisted security information and event management outputs can help analysts work faster while also introducing new risks if summaries, prompts, or linked workspaces expose sensitive operational data. For certification study, you should treat AI-assisted SIEM use as an extension of familiar security principles by asking whether the output is trustworthy, whether the workflow protects confidentiality, and whether analysts can still validate conclusions rather than accepting automation too quickly. Examples such as AI-generated incident summaries, natural language searches over alert data, and large language model workspaces connected to internal evidence will show why access control, data minimization, review discipline, and protected environments are essential to keep helpful tooling from becoming a source of leakage or poor triage decisions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode examines how AI-assisted security information and event management outputs can help analysts work faster while also introducing new risks if summaries, prompts, or linked workspaces expose sensitive operational data. For certification study, you should treat AI-assisted SIEM use as an extension of familiar security principles by asking whether the output is trustworthy, whether the workflow protects confidentiality, and whether analysts can still validate conclusions rather than accepting automation too quickly. Examples such as AI-generated incident summaries, natural language searches over alert data, and large language model workspaces connected to internal evidence will show why access control, data minimization, review discipline, and protected environments are essential to keep helpful tooling from becoming a source of leakage or poor triage decisions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:28:02 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/96786f5a/f47b21d6.mp3" length="37843238" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>945</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode examines how AI-assisted security information and event management outputs can help analysts work faster while also introducing new risks if summaries, prompts, or linked workspaces expose sensitive operational data. For certification study, you should treat AI-assisted SIEM use as an extension of familiar security principles by asking whether the output is trustworthy, whether the workflow protects confidentiality, and whether analysts can still validate conclusions rather than accepting automation too quickly. Examples such as AI-generated incident summaries, natural language searches over alert data, and large language model workspaces connected to internal evidence will show why access control, data minimization, review discipline, and protected environments are essential to keep helpful tooling from becoming a source of leakage or poor triage decisions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/96786f5a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 44 — Profile Threat Actors by Type Motivation and Likely Behavior</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>Episode 44 — Profile Threat Actors by Type Motivation and Likely Behavior</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">428446ae-4b5d-4acc-9be5-69f0cf59cab8</guid>
      <link>https://share.transistor.fm/s/9635e5a0</link>
      <description>
        <![CDATA[<p>This episode explains how security professionals profile threat actors by considering who they are, what motivates them, and how those motivations influence the behavior defenders are likely to see. On the exam, you may need to distinguish between insiders, cybercriminals, hacktivists, nation-state actors, competitors, or opportunistic attackers, while also understanding that motivation can shape target choice, patience, resources, and likely methods. Examples such as financially motivated phishing campaigns, espionage-focused persistence, disgruntled employee misuse, or disruption-oriented activity will help show how actor profiling improves defensive planning, monitoring priorities, and incident interpretation when the organization is trying to understand what an adversary may do next. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how security professionals profile threat actors by considering who they are, what motivates them, and how those motivations influence the behavior defenders are likely to see. On the exam, you may need to distinguish between insiders, cybercriminals, hacktivists, nation-state actors, competitors, or opportunistic attackers, while also understanding that motivation can shape target choice, patience, resources, and likely methods. Examples such as financially motivated phishing campaigns, espionage-focused persistence, disgruntled employee misuse, or disruption-oriented activity will help show how actor profiling improves defensive planning, monitoring priorities, and incident interpretation when the organization is trying to understand what an adversary may do next. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:28:27 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9635e5a0/4b4b0bf4.mp3" length="40145129" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1003</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how security professionals profile threat actors by considering who they are, what motivates them, and how those motivations influence the behavior defenders are likely to see. On the exam, you may need to distinguish between insiders, cybercriminals, hacktivists, nation-state actors, competitors, or opportunistic attackers, while also understanding that motivation can shape target choice, patience, resources, and likely methods. Examples such as financially motivated phishing campaigns, espionage-focused persistence, disgruntled employee misuse, or disruption-oriented activity will help show how actor profiling improves defensive planning, monitoring priorities, and incident interpretation when the organization is trying to understand what an adversary may do next. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9635e5a0/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 45 — Turn Cyber Threat Intelligence into Stronger Security Operations Decisions</title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>Episode 45 — Turn Cyber Threat Intelligence into Stronger Security Operations Decisions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9c3f4c91-18b8-4626-9574-ce64d4c8f730</guid>
      <link>https://share.transistor.fm/s/ffd172be</link>
      <description>
        <![CDATA[<p>This episode focuses on cyber threat intelligence as a way to improve operational judgment by turning outside information about adversaries, tools, methods, and campaigns into more focused internal action. For the exam, you should understand that intelligence is useful only when it is relevant, timely, and applied to actual decisions such as adjusting monitoring priorities, strengthening detections, reviewing exposed assets, or informing leadership about emerging risk. Practical scenarios involving new phishing themes, known exploited vulnerabilities, industry-targeted activity, or suspicious infrastructure indicators will show how teams use intelligence to improve readiness without overreacting to every external report, and how that balance supports both exam answers and real-world security operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on cyber threat intelligence as a way to improve operational judgment by turning outside information about adversaries, tools, methods, and campaigns into more focused internal action. For the exam, you should understand that intelligence is useful only when it is relevant, timely, and applied to actual decisions such as adjusting monitoring priorities, strengthening detections, reviewing exposed assets, or informing leadership about emerging risk. Practical scenarios involving new phishing themes, known exploited vulnerabilities, industry-targeted activity, or suspicious infrastructure indicators will show how teams use intelligence to improve readiness without overreacting to every external report, and how that balance supports both exam answers and real-world security operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:29:27 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ffd172be/3f1b5e35.mp3" length="38863067" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>971</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on cyber threat intelligence as a way to improve operational judgment by turning outside information about adversaries, tools, methods, and campaigns into more focused internal action. For the exam, you should understand that intelligence is useful only when it is relevant, timely, and applied to actual decisions such as adjusting monitoring priorities, strengthening detections, reviewing exposed assets, or informing leadership about emerging risk. Practical scenarios involving new phishing themes, known exploited vulnerabilities, industry-targeted activity, or suspicious infrastructure indicators will show how teams use intelligence to improve readiness without overreacting to every external report, and how that balance supports both exam answers and real-world security operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ffd172be/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 46 — Organize Adversary Behavior with Threat Frameworks and Repeatable Thinking</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>Episode 46 — Organize Adversary Behavior with Threat Frameworks and Repeatable Thinking</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2fd6b576-b837-4675-9497-6009ee24179a</guid>
      <link>https://share.transistor.fm/s/463c5618</link>
      <description>
        <![CDATA[<p>This episode explains how threat frameworks help defenders organize adversary behavior into patterns that make detection, analysis, and communication more consistent. On the exam, frameworks matter because they provide structured ways to think about how attackers gain access, move through environments, establish persistence, collect data, or disrupt operations, instead of treating every incident as completely unique. Examples such as mapping suspicious activity to common tactics, identifying missing controls across stages of an attack, or using a shared model to brief leadership will show how repeatable thinking improves analyst coordination, supports stronger defensive coverage, and reduces confusion when organizations are trying to understand complex or fast-moving threats. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how threat frameworks help defenders organize adversary behavior into patterns that make detection, analysis, and communication more consistent. On the exam, frameworks matter because they provide structured ways to think about how attackers gain access, move through environments, establish persistence, collect data, or disrupt operations, instead of treating every incident as completely unique. Examples such as mapping suspicious activity to common tactics, identifying missing controls across stages of an attack, or using a shared model to brief leadership will show how repeatable thinking improves analyst coordination, supports stronger defensive coverage, and reduces confusion when organizations are trying to understand complex or fast-moving threats. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:29:55 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/463c5618/d4c4f6e8.mp3" length="35954071" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>898</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how threat frameworks help defenders organize adversary behavior into patterns that make detection, analysis, and communication more consistent. On the exam, frameworks matter because they provide structured ways to think about how attackers gain access, move through environments, establish persistence, collect data, or disrupt operations, instead of treating every incident as completely unique. Examples such as mapping suspicious activity to common tactics, identifying missing controls across stages of an attack, or using a shared model to brief leadership will show how repeatable thinking improves analyst coordination, supports stronger defensive coverage, and reduces confusion when organizations are trying to understand complex or fast-moving threats. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/463c5618/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 47 — Implement Incident Response Plans Through Data Handling Policy Decisions</title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>Episode 47 — Implement Incident Response Plans Through Data Handling Policy Decisions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ee2adcd9-6177-4dd7-908f-74c81db659c3</guid>
      <link>https://share.transistor.fm/s/2390fe06</link>
      <description>
        <![CDATA[<p>This episode connects incident response planning with data handling decisions by showing that many response actions depend on knowing what information is involved, how sensitive it is, who owns it, and what rules govern its use during an incident. For certification purposes, you should recognize that response plans are not only technical playbooks; they also involve escalation paths, evidence handling, privacy considerations, legal obligations, and business-approved decision points. Scenarios involving compromised customer records, suspected insider misuse, malware on shared systems, or exposed cloud storage will help illustrate how classification, containment choices, preservation of evidence, and communication rules shape an effective incident response that protects the organization without creating additional risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode connects incident response planning with data handling decisions by showing that many response actions depend on knowing what information is involved, how sensitive it is, who owns it, and what rules govern its use during an incident. For certification purposes, you should recognize that response plans are not only technical playbooks; they also involve escalation paths, evidence handling, privacy considerations, legal obligations, and business-approved decision points. Scenarios involving compromised customer records, suspected insider misuse, malware on shared systems, or exposed cloud storage will help illustrate how classification, containment choices, preservation of evidence, and communication rules shape an effective incident response that protects the organization without creating additional risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:32:04 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2390fe06/d9ffed79.mp3" length="40401153" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1009</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode connects incident response planning with data handling decisions by showing that many response actions depend on knowing what information is involved, how sensitive it is, who owns it, and what rules govern its use during an incident. For certification purposes, you should recognize that response plans are not only technical playbooks; they also involve escalation paths, evidence handling, privacy considerations, legal obligations, and business-approved decision points. Scenarios involving compromised customer records, suspected insider misuse, malware on shared systems, or exposed cloud storage will help illustrate how classification, containment choices, preservation of evidence, and communication rules shape an effective incident response that protects the organization without creating additional risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2390fe06/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 48 — Rehearse Incident Response Exercises with Testing and Tabletop Thinking</title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>Episode 48 — Rehearse Incident Response Exercises with Testing and Tabletop Thinking</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3a2843f7-7001-48e0-85d6-2df5c4e33411</guid>
      <link>https://share.transistor.fm/s/faa87d9c</link>
      <description>
        <![CDATA[<p>This episode focuses on incident response exercises as a practical way to test whether plans, roles, tools, and communication paths will actually work under pressure. On the exam, you should understand that tabletop discussions, technical simulations, and broader testing activities help reveal gaps long before a real incident forces the organization to improvise. Examples such as ransomware affecting shared systems, suspicious exfiltration from a cloud platform, or a phishing campaign that reaches privileged users will show how exercises improve readiness by clarifying decision authority, exposing coordination problems, validating escalation steps, and building confidence that the response team can act consistently when a real event demands speed and accuracy. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on incident response exercises as a practical way to test whether plans, roles, tools, and communication paths will actually work under pressure. On the exam, you should understand that tabletop discussions, technical simulations, and broader testing activities help reveal gaps long before a real incident forces the organization to improvise. Examples such as ransomware affecting shared systems, suspicious exfiltration from a cloud platform, or a phishing campaign that reaches privileged users will show how exercises improve readiness by clarifying decision authority, exposing coordination problems, validating escalation steps, and building confidence that the response team can act consistently when a real event demands speed and accuracy. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:32:28 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/faa87d9c/823406d7.mp3" length="38281053" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>956</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on incident response exercises as a practical way to test whether plans, roles, tools, and communication paths will actually work under pressure. On the exam, you should understand that tabletop discussions, technical simulations, and broader testing activities help reveal gaps long before a real incident forces the organization to improvise. Examples such as ransomware affecting shared systems, suspicious exfiltration from a cloud platform, or a phishing campaign that reaches privileged users will show how exercises improve readiness by clarifying decision authority, exposing coordination problems, validating escalation steps, and building confidence that the response team can act consistently when a real event demands speed and accuracy. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/faa87d9c/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 49 — Manage Asset Lifecycles Across End Of Life Software and Devices</title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>Episode 49 — Manage Asset Lifecycles Across End Of Life Software and Devices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8228e5e2-9c95-484d-9826-9ad8fe85e080</guid>
      <link>https://share.transistor.fm/s/c1b856cd</link>
      <description>
        <![CDATA[<p>This episode explains asset lifecycle management by emphasizing that security risk changes as software, hardware, and connected devices move from acquisition to deployment, maintenance, retirement, and replacement. For the exam, end of life matters because unsupported assets often lose vendor updates, become harder to monitor, and remain in service longer than planned due to budget, dependency, or operational constraints. Real-world examples such as unpatched legacy applications, aging network devices, unsupported operating systems, or forgotten embedded equipment will help show why inventory accuracy, ownership, replacement planning, compensating controls, and retirement procedures are essential for reducing exposure before obsolete assets become the weak point attackers exploit. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains asset lifecycle management by emphasizing that security risk changes as software, hardware, and connected devices move from acquisition to deployment, maintenance, retirement, and replacement. For the exam, end of life matters because unsupported assets often lose vendor updates, become harder to monitor, and remain in service longer than planned due to budget, dependency, or operational constraints. Real-world examples such as unpatched legacy applications, aging network devices, unsupported operating systems, or forgotten embedded equipment will help show why inventory accuracy, ownership, replacement planning, compensating controls, and retirement procedures are essential for reducing exposure before obsolete assets become the weak point attackers exploit. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:32:57 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c1b856cd/5345187e.mp3" length="41889069" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1046</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains asset lifecycle management by emphasizing that security risk changes as software, hardware, and connected devices move from acquisition to deployment, maintenance, retirement, and replacement. For the exam, end of life matters because unsupported assets often lose vendor updates, become harder to monitor, and remain in service longer than planned due to budget, dependency, or operational constraints. Real-world examples such as unpatched legacy applications, aging network devices, unsupported operating systems, or forgotten embedded equipment will help show why inventory accuracy, ownership, replacement planning, compensating controls, and retirement procedures are essential for reducing exposure before obsolete assets become the weak point attackers exploit. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c1b856cd/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 50 — Control Configuration and Change Management Without Creating New Risk</title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>Episode 50 — Control Configuration and Change Management Without Creating New Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1adc4491-afa6-42e1-84dc-0b702820cc23</guid>
      <link>https://share.transistor.fm/s/f3f1a182</link>
      <description>
        <![CDATA[<p>This episode focuses on configuration and change management as the discipline that keeps systems stable, secure, and understandable as updates, fixes, and new business needs are introduced. On the exam, you should know that even well-intended changes can create risk when they bypass review, weaken hardened settings, introduce incompatibilities, or leave no reliable record of what was altered and why. Examples such as firewall rule changes made in a hurry, cloud permissions adjusted without approval, system baselines drifting over time, or emergency fixes that were never fully documented will show how controlled change processes, standard configurations, testing, rollback planning, and accountability reduce disruption while helping organizations improve security instead of accidentally weakening it. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on configuration and change management as the discipline that keeps systems stable, secure, and understandable as updates, fixes, and new business needs are introduced. On the exam, you should know that even well-intended changes can create risk when they bypass review, weaken hardened settings, introduce incompatibilities, or leave no reliable record of what was altered and why. Examples such as firewall rule changes made in a hurry, cloud permissions adjusted without approval, system baselines drifting over time, or emergency fixes that were never fully documented will show how controlled change processes, standard configurations, testing, rollback planning, and accountability reduce disruption while helping organizations improve security instead of accidentally weakening it. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:33:30 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f3f1a182/6bd7af17.mp3" length="43651824" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1090</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on configuration and change management as the discipline that keeps systems stable, secure, and understandable as updates, fixes, and new business needs are introduced. On the exam, you should know that even well-intended changes can create risk when they bypass review, weaken hardened settings, introduce incompatibilities, or leave no reliable record of what was altered and why. Examples such as firewall rule changes made in a hurry, cloud permissions adjusted without approval, system baselines drifting over time, or emergency fixes that were never fully documented will show how controlled change processes, standard configurations, testing, rollback planning, and accountability reduce disruption while helping organizations improve security instead of accidentally weakening it. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f3f1a182/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 51 — Validate Readiness Using Blue Teaming Purple Teaming and Red Teaming</title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>Episode 51 — Validate Readiness Using Blue Teaming Purple Teaming and Red Teaming</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">318da34b-d87b-495a-b53e-a1b3657b7ec8</guid>
      <link>https://share.transistor.fm/s/4e2072c7</link>
      <description>
        <![CDATA[<p>This episode explains how blue teaming, purple teaming, and red teaming help organizations validate whether their controls, detections, and response processes work as expected under realistic conditions. For the exam, you should understand the distinct purpose of each approach, with blue teams focused on defense, red teams simulating adversary behavior, and purple teams improving collaboration so that findings lead to measurable security gains. Examples such as testing detection coverage, exposing response delays, and identifying gaps in monitoring or escalation will show how these activities improve readiness, strengthen operational discipline, and help security teams learn from controlled exercises before a real attacker forces those lessons under pressure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how blue teaming, purple teaming, and red teaming help organizations validate whether their controls, detections, and response processes work as expected under realistic conditions. For the exam, you should understand the distinct purpose of each approach, with blue teams focused on defense, red teams simulating adversary behavior, and purple teams improving collaboration so that findings lead to measurable security gains. Examples such as testing detection coverage, exposing response delays, and identifying gaps in monitoring or escalation will show how these activities improve readiness, strengthen operational discipline, and help security teams learn from controlled exercises before a real attacker forces those lessons under pressure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:33:55 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4e2072c7/aeb1ce26.mp3" length="42582892" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1064</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how blue teaming, purple teaming, and red teaming help organizations validate whether their controls, detections, and response processes work as expected under realistic conditions. For the exam, you should understand the distinct purpose of each approach, with blue teams focused on defense, red teams simulating adversary behavior, and purple teams improving collaboration so that findings lead to measurable security gains. Examples such as testing detection coverage, exposing response delays, and identifying gaps in monitoring or escalation will show how these activities improve readiness, strengthen operational discipline, and help security teams learn from controlled exercises before a real attacker forces those lessons under pressure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4e2072c7/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 52 — Assess Applications with Vulnerability Scanning Static and Dynamic Analysis</title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>Episode 52 — Assess Applications with Vulnerability Scanning Static and Dynamic Analysis</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9f925440-5c58-419e-a3f9-65ce6fea11db</guid>
      <link>https://share.transistor.fm/s/22df0718</link>
      <description>
        <![CDATA[<p>This episode focuses on application assessment methods that help teams find weaknesses before they become exploited in production systems or business processes. On the exam, you should be able to distinguish vulnerability scanning from static analysis and dynamic analysis, while also understanding that each method provides different visibility depending on whether the code, runtime behavior, or deployed environment is being evaluated. Scenarios such as insecure input handling, exposed components, weak dependencies, and flaws that appear only during execution will show how layered testing approaches improve software assurance, support remediation planning, and reduce the chance that avoidable application weaknesses become larger operational or compliance problems. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on application assessment methods that help teams find weaknesses before they become exploited in production systems or business processes. On the exam, you should be able to distinguish vulnerability scanning from static analysis and dynamic analysis, while also understanding that each method provides different visibility depending on whether the code, runtime behavior, or deployed environment is being evaluated. Scenarios such as insecure input handling, exposed components, weak dependencies, and flaws that appear only during execution will show how layered testing approaches improve software assurance, support remediation planning, and reduce the chance that avoidable application weaknesses become larger operational or compliance problems. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:34:48 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/22df0718/05957628.mp3" length="44445959" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1110</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on application assessment methods that help teams find weaknesses before they become exploited in production systems or business processes. On the exam, you should be able to distinguish vulnerability scanning from static analysis and dynamic analysis, while also understanding that each method provides different visibility depending on whether the code, runtime behavior, or deployed environment is being evaluated. Scenarios such as insecure input handling, exposed components, weak dependencies, and flaws that appear only during execution will show how layered testing approaches improve software assurance, support remediation planning, and reduce the chance that avoidable application weaknesses become larger operational or compliance problems. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/22df0718/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 53 — Model Application Threats Before Weaknesses Become Security Events</title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>Episode 53 — Model Application Threats Before Weaknesses Become Security Events</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">806ebbea-7985-41de-95b1-32d3da08f14c</guid>
      <link>https://share.transistor.fm/s/060e22da</link>
      <description>
        <![CDATA[<p>This episode explains threat modeling as a proactive way to think through how an application could be misused, exposed, or broken before those weaknesses turn into incidents. For certification study, the key idea is that secure design begins earlier than testing alone, because teams must consider trust boundaries, inputs, data flows, privileges, external dependencies, and likely attacker goals while systems are still being planned or changed. Examples such as unsafe authentication flows, insecure API assumptions, weak data validation, or overtrusted integrations will show how threat modeling helps developers and security teams identify risk early, prioritize defensive improvements, and make architecture decisions that reduce both exam confusion and real-world exposure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains threat modeling as a proactive way to think through how an application could be misused, exposed, or broken before those weaknesses turn into incidents. For certification study, the key idea is that secure design begins earlier than testing alone, because teams must consider trust boundaries, inputs, data flows, privileges, external dependencies, and likely attacker goals while systems are still being planned or changed. Examples such as unsafe authentication flows, insecure API assumptions, weak data validation, or overtrusted integrations will show how threat modeling helps developers and security teams identify risk early, prioritize defensive improvements, and make architecture decisions that reduce both exam confusion and real-world exposure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:35:23 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/060e22da/295fb395.mp3" length="41625761" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1040</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains threat modeling as a proactive way to think through how an application could be misused, exposed, or broken before those weaknesses turn into incidents. For certification study, the key idea is that secure design begins earlier than testing alone, because teams must consider trust boundaries, inputs, data flows, privileges, external dependencies, and likely attacker goals while systems are still being planned or changed. Examples such as unsafe authentication flows, insecure API assumptions, weak data validation, or overtrusted integrations will show how threat modeling helps developers and security teams identify risk early, prioritize defensive improvements, and make architecture decisions that reduce both exam confusion and real-world exposure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/060e22da/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 54 — Recognize Physical Penetration Testing Through Phishing Tailgating and Impersonation</title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>Episode 54 — Recognize Physical Penetration Testing Through Phishing Tailgating and Impersonation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ef5bbac9-cd35-48c4-8ff1-7a81feac80ed</guid>
      <link>https://share.transistor.fm/s/fd0617bc</link>
      <description>
        <![CDATA[<p>This episode examines physical penetration testing techniques that assess whether people, facilities, and procedures can resist manipulation as effectively as technical controls resist digital attack. On the exam, you should recognize that phishing, tailgating, impersonation, and related tactics often target trust, convenience, and routine behavior rather than software flaws, which makes them important to both physical and cybersecurity defense. Realistic examples such as an unauthorized visitor following staff through a secured door, a caller posing as support to obtain access details, or a fake delivery used to bypass scrutiny will show how awareness, visitor controls, verification practices, and reporting culture work together to reduce the success of attacks that cross the line between human behavior and physical access. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode examines physical penetration testing techniques that assess whether people, facilities, and procedures can resist manipulation as effectively as technical controls resist digital attack. On the exam, you should recognize that phishing, tailgating, impersonation, and related tactics often target trust, convenience, and routine behavior rather than software flaws, which makes them important to both physical and cybersecurity defense. Realistic examples such as an unauthorized visitor following staff through a secured door, a caller posing as support to obtain access details, or a fake delivery used to bypass scrutiny will show how awareness, visitor controls, verification practices, and reporting culture work together to reduce the success of attacks that cross the line between human behavior and physical access. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:35:45 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fd0617bc/850e512d.mp3" length="41831642" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1045</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode examines physical penetration testing techniques that assess whether people, facilities, and procedures can resist manipulation as effectively as technical controls resist digital attack. On the exam, you should recognize that phishing, tailgating, impersonation, and related tactics often target trust, convenience, and routine behavior rather than software flaws, which makes them important to both physical and cybersecurity defense. Realistic examples such as an unauthorized visitor following staff through a secured door, a caller posing as support to obtain access details, or a fake delivery used to bypass scrutiny will show how awareness, visitor controls, verification practices, and reporting culture work together to reduce the success of attacks that cross the line between human behavior and physical access. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fd0617bc/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 55 — Strengthen Operations and Incident Response Through Full Lifecycle Scenarios</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>Episode 55 — Strengthen Operations and Incident Response Through Full Lifecycle Scenarios</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bd86a2a3-afcd-46d4-8ee6-19202cb1e69e</guid>
      <link>https://share.transistor.fm/s/7dc4c06d</link>
      <description>
        <![CDATA[<p>This episode brings operations and incident response together by using full lifecycle scenarios to show how preparation, detection, triage, containment, recovery, and follow-up all depend on one another. For the exam, this matters because strong response is rarely about a single isolated action; it depends on earlier planning, asset knowledge, logging, data handling rules, communication paths, and recovery discipline that shape what the team can do once an event begins. Scenarios involving malware on shared systems, suspicious privileged access, or cloud misconfiguration affecting business services will help show how lifecycle thinking improves coordination, reduces confusion, and turns incident response into a managed operational process rather than a collection of improvised reactions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode brings operations and incident response together by using full lifecycle scenarios to show how preparation, detection, triage, containment, recovery, and follow-up all depend on one another. For the exam, this matters because strong response is rarely about a single isolated action; it depends on earlier planning, asset knowledge, logging, data handling rules, communication paths, and recovery discipline that shape what the team can do once an event begins. Scenarios involving malware on shared systems, suspicious privileged access, or cloud misconfiguration affecting business services will help show how lifecycle thinking improves coordination, reduces confusion, and turns incident response into a managed operational process rather than a collection of improvised reactions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:36:12 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7dc4c06d/4d8d1005.mp3" length="40133667" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1002</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode brings operations and incident response together by using full lifecycle scenarios to show how preparation, detection, triage, containment, recovery, and follow-up all depend on one another. For the exam, this matters because strong response is rarely about a single isolated action; it depends on earlier planning, asset knowledge, logging, data handling rules, communication paths, and recovery discipline that shape what the team can do once an event begins. Scenarios involving malware on shared systems, suspicious privileged access, or cloud misconfiguration affecting business services will help show how lifecycle thinking improves coordination, reduces confusion, and turns incident response into a managed operational process rather than a collection of improvised reactions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7dc4c06d/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 56 — Essential Terms Plain Language Glossary for Core Cybersecurity Vocabulary</title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>Episode 56 — Essential Terms Plain Language Glossary for Core Cybersecurity Vocabulary</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a4db15bf-e53b-4356-af00-a4dd15bbe463</guid>
      <link>https://share.transistor.fm/s/c582486f</link>
      <description>
        <![CDATA[<p>This episode reviews essential cybersecurity vocabulary in plain language so that common exam terms become easier to recognize, compare, and apply in context. On the certification exam, many incorrect answers sound plausible because candidates confuse related words such as threat and vulnerability, risk and impact, authentication and authorization, or event and incident, so strong terminology helps prevent avoidable mistakes. By grounding key terms in short practical situations like suspicious log activity, access approval decisions, or data handling requirements, this episode helps you build clearer mental models that support faster reading, more accurate reasoning, and better communication when the same language appears in real workplace conversations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode reviews essential cybersecurity vocabulary in plain language so that common exam terms become easier to recognize, compare, and apply in context. On the certification exam, many incorrect answers sound plausible because candidates confuse related words such as threat and vulnerability, risk and impact, authentication and authorization, or event and incident, so strong terminology helps prevent avoidable mistakes. By grounding key terms in short practical situations like suspicious log activity, access approval decisions, or data handling requirements, this episode helps you build clearer mental models that support faster reading, more accurate reasoning, and better communication when the same language appears in real workplace conversations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:36:36 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c582486f/1545c5a9.mp3" length="38874559" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>971</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode reviews essential cybersecurity vocabulary in plain language so that common exam terms become easier to recognize, compare, and apply in context. On the certification exam, many incorrect answers sound plausible because candidates confuse related words such as threat and vulnerability, risk and impact, authentication and authorization, or event and incident, so strong terminology helps prevent avoidable mistakes. By grounding key terms in short practical situations like suspicious log activity, access approval decisions, or data handling requirements, this episode helps you build clearer mental models that support faster reading, more accurate reasoning, and better communication when the same language appears in real workplace conversations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c582486f/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 57 — Integrate Data Identity Network Cloud and Governance Decisions Together</title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>Episode 57 — Integrate Data Identity Network Cloud and Governance Decisions Together</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2d0589cb-9838-473a-b996-d1c69dbc5136</guid>
      <link>https://share.transistor.fm/s/c899a828</link>
      <description>
        <![CDATA[<p>This episode shows how effective cybersecurity depends on integrating decisions across data protection, identity management, network design, cloud responsibility, and governance rather than treating each topic as a separate track. For the exam, this integrated thinking is important because real questions often combine several domains at once, such as access to sensitive cloud data, segmentation of shared resources, or governance oversight for new technology adoption. Examples involving privileged users in cloud platforms, classified information crossing network boundaries, or policy-driven approval for sensitive services will show how connected reasoning leads to better control choices, clearer accountability, and stronger security outcomes than isolated decisions made without regard for the larger environment. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode shows how effective cybersecurity depends on integrating decisions across data protection, identity management, network design, cloud responsibility, and governance rather than treating each topic as a separate track. For the exam, this integrated thinking is important because real questions often combine several domains at once, such as access to sensitive cloud data, segmentation of shared resources, or governance oversight for new technology adoption. Examples involving privileged users in cloud platforms, classified information crossing network boundaries, or policy-driven approval for sensitive services will show how connected reasoning leads to better control choices, clearer accountability, and stronger security outcomes than isolated decisions made without regard for the larger environment. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:37:30 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c899a828/fdd4f129.mp3" length="41640400" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1040</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode shows how effective cybersecurity depends on integrating decisions across data protection, identity management, network design, cloud responsibility, and governance rather than treating each topic as a separate track. For the exam, this integrated thinking is important because real questions often combine several domains at once, such as access to sensitive cloud data, segmentation of shared resources, or governance oversight for new technology adoption. Examples involving privileged users in cloud platforms, classified information crossing network boundaries, or policy-driven approval for sensitive services will show how connected reasoning leads to better control choices, clearer accountability, and stronger security outcomes than isolated decisions made without regard for the larger environment. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c899a828/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 58 — Build Scenario Chains Across Security Principles Governance IAM Cloud and Operations</title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>Episode 58 — Build Scenario Chains Across Security Principles Governance IAM Cloud and Operations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cd4402a9-ed3d-4576-bc22-6fd1fa0aa33e</guid>
      <link>https://share.transistor.fm/s/ca6cd094</link>
      <description>
        <![CDATA[<p>This episode develops the ability to follow scenario chains that span security principles, governance, identity and access management, cloud responsibilities, and day-to-day operations. On the exam, the best answer often depends on tracing how one decision creates downstream effects, such as weak governance enabling poor role design, which then leads to cloud misconfiguration, wider data exposure, and a more difficult incident response. Scenarios that link policy, provisioning, segmentation, monitoring, and recovery will help you practice seeing cause and effect across domains so you can choose answers that address root problems, not just surface symptoms, while also building the kind of cross-functional judgment needed in real environments. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode develops the ability to follow scenario chains that span security principles, governance, identity and access management, cloud responsibilities, and day-to-day operations. On the exam, the best answer often depends on tracing how one decision creates downstream effects, such as weak governance enabling poor role design, which then leads to cloud misconfiguration, wider data exposure, and a more difficult incident response. Scenarios that link policy, provisioning, segmentation, monitoring, and recovery will help you practice seeing cause and effect across domains so you can choose answers that address root problems, not just surface symptoms, while also building the kind of cross-functional judgment needed in real environments. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:37:53 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ca6cd094/14bc7f80.mp3" length="42929830" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1072</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode develops the ability to follow scenario chains that span security principles, governance, identity and access management, cloud responsibilities, and day-to-day operations. On the exam, the best answer often depends on tracing how one decision creates downstream effects, such as weak governance enabling poor role design, which then leads to cloud misconfiguration, wider data exposure, and a more difficult incident response. Scenarios that link policy, provisioning, segmentation, monitoring, and recovery will help you practice seeing cause and effect across domains so you can choose answers that address root problems, not just surface symptoms, while also building the kind of cross-functional judgment needed in real environments. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ca6cd094/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 59 — Connect Controls Metrics Threats and Response into One Security Story</title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>Episode 59 — Connect Controls Metrics Threats and Response into One Security Story</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8d143aba-5558-44fb-8dc2-5f585ff4dda3</guid>
      <link>https://share.transistor.fm/s/21c44a35</link>
      <description>
        <![CDATA[<p>This is the last episode in the attached list, and it brings the series together by showing how controls, metrics, threat understanding, and incident response form one coherent security story rather than four separate topics. For the exam, you should be able to see how controls reduce exposure, metrics reveal whether those controls are working, threat knowledge helps prioritize attention, and response capabilities determine how well the organization acts when prevention is not enough. Examples such as rising attack activity against poorly measured systems, weak controls hidden by incomplete reporting, or slow response to known threats will show how mature security programs connect evidence, judgment, and action into a repeatable operating model that supports both certification success and real-world effectiveness. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is the last episode in the attached list, and it brings the series together by showing how controls, metrics, threat understanding, and incident response form one coherent security story rather than four separate topics. For the exam, you should be able to see how controls reduce exposure, metrics reveal whether those controls are working, threat knowledge helps prioritize attention, and response capabilities determine how well the organization acts when prevention is not enough. Examples such as rising attack activity against poorly measured systems, weak controls hidden by incomplete reporting, or slow response to known threats will show how mature security programs connect evidence, judgment, and action into a repeatable operating model that supports both certification success and real-world effectiveness. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Apr 2026 21:38:15 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/21c44a35/d104c028.mp3" length="39197424" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>979</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is the last episode in the attached list, and it brings the series together by showing how controls, metrics, threat understanding, and incident response form one coherent security story rather than four separate topics. For the exam, you should be able to see how controls reduce exposure, metrics reveal whether those controls are working, threat knowledge helps prioritize attention, and response capabilities determine how well the organization acts when prevention is not enough. Examples such as rising attack activity against poorly measured systems, weak controls hidden by incomplete reporting, or slow response to known threats will show how mature security programs connect evidence, judgment, and action into a repeatable operating model that supports both certification success and real-world effectiveness. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/21c44a35/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
  </channel>
</rss>
