Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
Welcome to the CompTIA CYSA+ Certification
|
Oct 14, 2025 |
|
Episode 130: Root Cause Analysis and Incident Performance Metrics
|
Jul 15, 2025 |
|
Episode 129: Regulatory and Law Enforcement Reporting
|
Jul 15, 2025 |
|
Episode 128: Customer and Media Communications
|
Jul 15, 2025 |
|
Episode 127: Legal and PR Communications During an Incident
|
Jul 15, 2025 |
|
Episode 126: Writing Effective Incident Response Reports
|
Jul 15, 2025 |
|
Episode 125: Incident Declaration and Escalation Procedures
|
Jul 15, 2025 |
|
Episode 124: Stakeholder Communication for Incident Response
|
Jul 15, 2025 |
|
Episode 123: Identifying Stakeholders for Vulnerability Reporting
|
Jul 15, 2025 |
|
Episode 122: Metrics and KPIs in Vulnerability Management
|
Jul 15, 2025 |
|
Episode 121: Inhibitors to Remediation
|
Jul 15, 2025 |
|
Episode 120: Action Plans and Remediation Communication
|
Jul 15, 2025 |
|
Episode 119: Creating and Understanding Compliance Reports
|
Jul 15, 2025 |
|
Episode 118: Vulnerability Management Reporting Essentials
|
Jul 15, 2025 |
|
Episode 117: Domain 4 Overview – Reporting and Communication in Cybersecurity
|
Jul 15, 2025 |
|
Episode 116: Post-Incident Activity and Organizational Learning
|
Jul 15, 2025 |
|
Episode 115: Incident Preparation – Building a Response Program
|
Jul 15, 2025 |
|
Episode 114: Containment, Eradication, and Recovery Phases
|
Jul 15, 2025 |
|
Episode 113: Data and Log Analysis During an Incident
|
Jul 15, 2025 |
|
Episode 112: Evidence Acquisition and Chain of Custody
|
Jul 15, 2025 |
|
Episode 111: Indicators of Compromise (IoCs) – Detection Foundations
|
Jul 15, 2025 |
|
Episode 110: Open Source Security Testing Methodology Manual (OSSTMM)
|
Jul 15, 2025 |
|
Episode 109: MITRE ATT&CK Framework for Analysts
|
Jul 15, 2025 |
|
Episode 108: The Diamond Model of Intrusion Analysis
|
Jul 15, 2025 |
|
Episode 107: Cyber Kill Chains – From Recon to Exploitation
|
Jul 15, 2025 |
|
Episode 106: Domain 3 Overview – Mastering Incident Response and Management
|
Jul 15, 2025 |
|
Episode 105: Domain 2 Review – From Scanning to Secure Development
|
Jul 15, 2025 |
|
Episode 104: Threat Modeling for Analysts
|
Jul 15, 2025 |
|
Episode 103: Secure Software Development Lifecycle (SDLC)
|
Jul 15, 2025 |
|
Episode 102: Secure Coding Best Practices for Analysts
|
Jul 15, 2025 |
|
Episode 101: Attack Surface Management in Action
|
Jul 15, 2025 |
|
Episode 100: Vulnerability Prioritization and Escalation
|
Jul 15, 2025 |
|
Episode 99: Policy, Governance, and SLO Integration
|
Jul 15, 2025 |
|
Episode 98: Risk Management Principles for Vulnerability Response
|
Jul 15, 2025 |
|
Episode 97: Documenting and Handling Exceptions
|
Jul 15, 2025 |
|
Episode 96: Maintenance Windows and Update Timing
|
Jul 15, 2025 |
|
Episode 95: Patch and Configuration Management Lifecycle
|
Jul 15, 2025 |
|
Episode 94: Control Types and Their Purposes
|
Jul 15, 2025 |
|
Episode 93: Compensating Controls in Vulnerability Management
|
Jul 15, 2025 |
|
Episode 92: Local/Remote File Inclusion (LFI/RFI)
|
Jul 15, 2025 |
|
Episode 91: Privilege Escalation Techniques and Dangers
|
Jul 15, 2025 |
|
Episode 90: Remote Code Execution (RCE) Threats
|
Jul 15, 2025 |
|
Episode 89: Server-Side Request Forgery (SSRF)
|
Jul 15, 2025 |
|
Episode 88: Identification and Authentication Failures
|
Jul 15, 2025 |
|
Episode 87: End-of-Life and Legacy Component Risk
|
Jul 15, 2025 |
|
Episode 86: Security Misconfiguration Issues
|
Jul 15, 2025 |
|
Episode 85: Insecure Design Patterns
|
Jul 15, 2025 |
|
Episode 84: Directory Traversal Vulnerabilities
|
Jul 15, 2025 |
|
Episode 83: Cross-Site Request Forgery (CSRF)
|
Jul 15, 2025 |
|
Episode 82: Injection Flaws Explained
|
Jul 15, 2025 |
|
Episode 81: Cryptographic Failures
|
Jul 15, 2025 |
|
Episode 80: Broken Access Control Flaws
|
Jul 15, 2025 |
|
Episode 79: Data Poisoning Risks
|
Jul 15, 2025 |
|
Episode 78: Overflow Vulnerabilities
|
Jul 15, 2025 |
|
Episode 77: Cross-Site Scripting Vulnerabilities (XSS)
|
Jul 15, 2025 |
|
Episode 76: Asset Value and Business Impact
|
Jul 15, 2025 |
|
Episode 75: Weaponization and Exploitability Considerations
|
Jul 15, 2025 |
|
Episode 74: Context-Aware Vulnerability Analysis
|
Jul 15, 2025 |
|
Episode 73: Validating Scanner Results – Reducing False Positives and Negatives
|
Jul 15, 2025 |
|
Episode 72: Understanding CVSS and Scoring Vulnerabilities
|
Jul 15, 2025 |
|
Episode 71: Cloud Vulnerability Assessment Tools (Scout Suite, Prowler)
|
Jul 15, 2025 |
|
Episode 70: Multipurpose Tools for Advanced Analysts (Nmap, MSF, Recon-ng)
|
Jul 15, 2025 |
|
Episode 69: Debugging Tools for Vulnerability Analysts
|
Jul 15, 2025 |
|
Episode 68: Vulnerability Scanners Explained (Nessus, OpenVAS)
|
Jul 15, 2025 |
|
Episode 67: Web Application Scanning Tools
|
Jul 15, 2025 |
|
Episode 66: Network Scanning and Mapping Tools
|
Jul 15, 2025 |
|
Episode 65: Industry Frameworks for Vulnerability Management
|
Jul 15, 2025 |
|
Episode 64: Security Baseline Scanning Techniques
|
Jul 15, 2025 |
|
Episode 63: Scanning Critical Infrastructure Systems (OT/ICS/SCADA)
|
Jul 15, 2025 |
|
Episode 62: Static vs. Dynamic Analysis Techniques
|
Jul 15, 2025 |
|
Episode 61: Passive vs. Active Vulnerability Detection
|
Jul 15, 2025 |
|
Episode 60: Credentialed vs. Non-Credentialed Scans
|
Jul 15, 2025 |
|
Episode 59: Agent-Based vs. Agentless Scanning
|
Jul 15, 2025 |
|
Episode 58: Internal vs. External Scanning Strategies
|
Jul 15, 2025 |
|
Episode 57: Vulnerability Scanning – Special Considerations
|
Jul 15, 2025 |
|
Episode 56: Asset Discovery in the Wild
|
Jul 15, 2025 |
|
Episode 55: Domain 2 Overview – Vulnerability Management in Practice
|
Jul 15, 2025 |
|
Episode 54: Single Pane of Glass: Visibility in the SOC
|
Jul 15, 2025 |
|
Episode 53: Integrating APIs and Plugins for Efficiency
|
Jul 15, 2025 |
|
Episode 52: Streamlining with SOAR and Threat Feed Enrichment
|
Jul 15, 2025 |
|
Episode 51: Standardizing and Automating Security Processes
|
Jul 15, 2025 |
|
Episode 50: Threat Hunting Focus Areas and Active Defense
|
Jul 15, 2025 |
|
Episode 49: Indicators of Compromise and Threat Hunting
|
Jul 15, 2025 |
|
Episode 48: How Threat Intelligence Powers Security Functions
|
Jul 15, 2025 |
|
Episode 47: Closed Source Threat Intel and Information Sharing
|
Jul 15, 2025 |
|
Episode 46: Open Source Threat Intelligence Collection
|
Jul 15, 2025 |
|
Episode 45: Threat Intelligence Confidence Levels and TTPs
|
Jul 15, 2025 |
|
Episode 44: Insider Threats and Supply Chain Risks
|
Jul 15, 2025 |
|
Episode 43: Threat Actor Categories and Profiles
|
Jul 15, 2025 |
|
Episode 42: Security Scripting and Automation Basics
|
Jul 15, 2025 |
|
Episode 41: Detecting Abnormal User Behavior
|
Jul 15, 2025 |
|
Episode 40: Hashing and File Integrity Techniques
|
Jul 15, 2025 |
|
Episode 39: Email Analysis for Phishing and Spoofing
|
Jul 15, 2025 |
|
Episode 38: Suspicious Command Interpretation
|
Jul 15, 2025 |
|
Episode 37: Pattern Recognition and Command Analysis
|
Jul 15, 2025 |
|
Episode 36: Common Detection Techniques in the SOC
|
Jul 15, 2025 |
|
Episode 35: Dynamic Malware Analysis Platforms (Sandboxing)
|
Jul 15, 2025 |
|
Episode 34: Static File Inspection Tools
|
Jul 15, 2025 |
|
Episode 33: DNS and IP Intelligence Sources
|
Jul 15, 2025 |
|
Episode 32: Endpoint Detection and Response Systems (EDR)
|
Jul 15, 2025 |
|
Episode 31: Log Correlation and Orchestration Platforms (SIEM/SOAR)
|
Jul 15, 2025 |
|
Episode 30: Network Capture and Traffic Inspection Tools
|
Jul 15, 2025 |
|
Episode 29: Social Engineering and Obfuscation Detection
|
Jul 15, 2025 |
|
Episode 28: Application Behavior and Anomaly Detection
|
Jul 15, 2025 |
|
Episode 27: Host-Based Indicators of Malicious Activity
|
Jul 15, 2025 |
|
Episode 26: Network-Based Indicators of Malicious Activity
|
Jul 15, 2025 |
|
Episode 25: Sensitive Data Handling in the Enterprise
|
Jul 15, 2025 |
|
Episode 24: Encryption and Traffic Security Monitoring
|
Jul 15, 2025 |
|
Episode 23: Identity and Access Management Models
|
Jul 15, 2025 |
|
Episode 22: Network Architecture Design and Segmentation
|
Jul 15, 2025 |
|
Episode 21: Infrastructure Concepts in Modern SOCs
|
Jul 15, 2025 |
|
Episode 20: System-Level Behavior and Architecture Fundamentals
|
Jul 15, 2025 |
|
Episode 19: Core OS Concepts Every Analyst Should Know
|
Jul 15, 2025 |
|
Episode 18: Log Ingestion and Logging Control
|
Jul 15, 2025 |
|
Episode 17: Domain 1 Overview – Security Operations in the Analyst’s World
|
Jul 15, 2025 |
|
Episode 16: CySA+ Glossary Episode 3
|
Jul 15, 2025 |
|
Episode 15: CySA+ Glossary Episode 2
|
Jul 15, 2025 |
|
Episode 14: CySA+ Glossary Episode 1
|
Jul 15, 2025 |
|
Episode 13: Comprehensive Domain 3–4 Review (Pre-Exam Checklist)
|
Jul 15, 2025 |
|
Episode 12: Comprehensive Domain 1–2 Review (Pre-Exam Checklist)
|
Jul 15, 2025 |
|
Episode 11: Communicating Cybersecurity to Non-Technical Stakeholders
|
Jul 15, 2025 |
|
Episode 10: Life After CySA+ Certification: Career Paths and Professional Growth
|
Jul 15, 2025 |
|
Episode 9: Building Your Own Cybersecurity Lab Environment
|
Jul 15, 2025 |
|
Episode 8: CySA+ Multiple-Choice Question Strategies
|
Jul 15, 2025 |
|
Episode 7: Example Performance-Based Questions (PBQs) Walkthrough
|
Jul 15, 2025 |
|
Episode 6: Core Cybersecurity Foundations You Need Before You Start
|
Jul 15, 2025 |
|
Episode 5: What to Expect on Exam Day: Questions, Time, and Tips
|
Jul 15, 2025 |
|
Episode 4: How to Study for the CYSA Plus — Tools, Labs, and Habits
|
Jul 15, 2025 |
|
Episode 3: CySA+ vs Other Security Certifications: Where It Fits
|
Jul 15, 2025 |
|
Episode 2: Understanding the CySA+ Exam Structure and Domains
|
Jul 15, 2025 |
|
Episode 1: Welcome to the CySA+: Who It’s For and Why It Matters
|
Jul 15, 2025 |