Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Security Certifications Podcasts

show episodes
 
Artwork

1
Cyber Work

Infosec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
  continue reading
 
Artwork

1
Cyber Sitrep

Corvus Technologies, Digital Beachhead

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Cyber Sitrep brings you all the latest cybersecurity news, commentary, and threat intelligence. Focused on small to midsize businesses who we feel have been left behind. Hosted by Eric from Corvus Technologies and Mike from Digital Beachhead who bring their unique perspective based on their military and cybersecurity experience. If you want to understand more about how cybersecurity is important to your organization, enjoy funny tales or just want to learn more about the field of cybersecuri ...
  continue reading
 
Artwork

1
The Hacker's Cache

Kyser Clark - Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
  continue reading
 
Artwork

1
THEOS Cybernova

Theos CyberNova

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
  continue reading
 
Artwork

1
Cyber Security Grey Beard®

Cyber Security Grey Beard®

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession.
  continue reading
 
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
  continue reading
 
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
  continue reading
 
Bare Metal Cyber Presents: Framework is your go-to podcast for mastering cybersecurity frameworks, with a special focus on the NIST Cybersecurity Framework (CSF) and NIST 800-53. This series breaks down each function, category, and subcategory to help professionals, educators, and organizations understand their structure and real-world applications. Each episode delivers clear, practical insights with examples that make cybersecurity frameworks more accessible and actionable. Whether you're ...
  continue reading
 
The DailyCyber Podcast and New Live Stream every Wednesday at 6:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
  continue reading
 
Artwork

1
Secure Ninja TV

secureninja.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Secure Ninja TV is a weekly source of updates, insights, opinions and overviews of the Information Security and IT industry. Through interviews with industry leaders and cutting-edge IT instructors, Secure Ninja TV will empower you to attack network threats and security vulnerabilities with the most valuable tool at your disposal...knowledge.
  continue reading
 
Artwork

1
GDPR Now!

Karen Heaton/Data Protection 4 Business

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
  continue reading
 
Artwork
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
  continue reading
 
Loading …
show series
 
In this Q&A episode of The Hacker’s Cache, I answer your top questions about breaking into cybersecurity from a software engineering background, whether an associate's degree is worth pursuing, and how I prepare for CompTIA certifications using third-party resources. I also open up about why YouTube took down one of my most popular Wi-Fi hacking vi…
  continue reading
 
DevSecOps generates a lot of data valuable for better decision making. However, decision makers may not see all they need to in order to make best use of the data for continuous improvement. The SEI open source Polar tool unlocks the data, giving DevSecOps teams greater capability to automate, which in turn means they can innovate rapidly – without…
  continue reading
 
#mobilesecurity #AppPrivacy #cybertips - Are the mobile apps on your phone really safe? In this episode, we dive into the cybersecurity side of mobile applications—how much access they have, what data they collect, and whether you should trust that app you downloaded last night. From shady permissions to sneaky trackers, we break down what you need…
  continue reading
 
In this episode, we explore a hot-button topic in the cybersecurity world: Are certifications actually necessary to succeed in the industry? Whether you're just starting your cyber career or you're a seasoned pro, this episode breaks down the real-world value of certifications like CompTIA Security+, CISSP, and others. Cyber Sitrep Episode #29 Epis…
  continue reading
 
#ThankYouSubscribers #CreatorCommunity #ShoutoutTimeIn this short but meaningful episode, we take a moment to give a heartfelt shoutout to all our amazing subscribers. Your support fuels everything we do, and this one's for you! Whether you've been with us since day one or just joined the community—thank you. Cyber Sitrep Episode #30 Episodes Every…
  continue reading
 
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
  continue reading
 
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
  continue reading
 
In this episode, Richie Vinson (4NU81X7H3H4CK3r) shares how he broke into red teaming without a college degree or the OSCP certification. He explains why he skipped traditional credentials, how volunteering at cybersecurity conferences helped him bypass the HR firewall, and what newcomers can do to stand out. From earning a Black Badge at HackSpace…
  continue reading
 
Organizations looking to build and adopt artificial intelligence (AI)–enabled systems face the challenge of identifying the right capabilities and tools to support Machine Learning Operations (MLOps) pipelines. Navigating the wide range of available tools can be especially difficult for organizations new to AI or those that have not yet deployed sy…
  continue reading
 
Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
  continue reading
 
Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
  continue reading
 
Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast Andre McGregor of ForceMetrics shares his incredible journey from reluctant FBI recruit to cybersecurity entrepreneur. Despite initially declining the FBI's recruitment call, Andre went on to beco…
  continue reading
 
In this episode of The Hacker’s Cache, Kyser Clark interviews John Kounelis, a Senior Product Security Engineer with a background in software development and AppSec. John shares how discovering vulnerabilities in his own code led him to a full-time role in application security, and explains the key differences in AppSec across defense, biotech, and…
  continue reading
 
This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
  continue reading
 
This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
  continue reading
 
In this episode, we're shifting the focus from technology to people. When it comes to cyber security, your team can be your biggest asset. We'll break down why human error is one of the greatest risks to your business and how building a strong security culture is key to keeping your business safe. We'll also discuss a real life example of a situati…
  continue reading
 
In this episode of The Hacker’s Cache, senior offensive security consultant Michael Kim shares how he landed a cybersecurity job without knowing all the answers in the interview and why hiring managers still chose him. We discuss how to ace your cybersecurity interview, the importance of mindset and growth, and why technical skills alone aren’t eno…
  continue reading
 
#cybersecuritynews #dataprotection #techinsights - In this episode of CyberSitrep, we delve into the latest developments in cybersecurity. Topics include recent data breaches, emerging threats, and expert insights into protecting digital assets. Stay informed with our in-depth analysis and discussions on the evolving landscape of cyber threats. Cyb…
  continue reading
 
During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
  continue reading
 
During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
  continue reading
 
Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Ed Williams, Vice President of EMEA Consulting and Professional Services (CPS) at TrustWave, shares his two decades of pentesting and red teaming experience with Cyber Work li…
  continue reading
 
#cybersecurity #SIEM #CyberSitrep In this episode of the Cyber Sitrep, Eric and Mike tackle the question: “To SIEM or not to SIEM?” They break down what a SIEM (Security Information and Event Management) system actually is, why it's a cornerstone of cybersecurity infrastructure, and what it takes to implement one effectively. From log normalization…
  continue reading
 
This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
  continue reading
 
This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
  continue reading
 
Feeling overwhelmed watching hacking videos and not understanding what’s going on? You’re not alone, and you’re not behind. In this episode of The Hacker’s Cache, I answer real questions from the community about certifications, career paths, and that all-too-familiar. I share my own experience struggling with concepts early on, why I prefer the bab…
  continue reading
 
#CyberSecurity #MultiFactorAuthentication #PhishingAwareness - In this episode of Cyber SitRep, Eric and Mike explore the risks of stolen authentication tokens and how even multi-factor authentication (MFA) can be compromised when users are targeted through phishing and proxy attacks. They break down how token-based access works, share real-world h…
  continue reading
 
#cybersecurity #windows10 #technews In this episode of The Cyber Sitrep, Eric and Mike discuss the upcoming end-of-life for Windows 10 and what it means for users still on the platform. They break down the risks of running an unsupported operating system, the importance of security updates, and why migrating to Windows 11 is critical before the Oct…
  continue reading
 
Cyber Sitrep Episode #18 - Cyber Security 101 "Introduction" - Today we are starting a 6-part series in which we go into a well-rounded guide to Cyber Security for Small and Medium businesses. In this specific episode Eric and Mike go into the introduction to the series and a bit of an overview of what is to come. Episodes will be on Tuesday's and …
  continue reading
 
Cyber Sitrep Episode #21 - Cyber Security 101 "Ring 2" - In this episode Eric and Mike talk about what all is within ring 2 of our Cyber Security 101 course. STIG Link: https://public.cyber.mil/stigs/ Episodes Every Wednesday at 11 A.M. MST Links: Corvus website: https://www.corvus-tech.net/ Digital Beachhead website: https://digitalbeachhead.com/ …
  continue reading
 
Cyber Sitrep Episode #22 Cyber Security 101 "Ring 3" - In this Episode Eric and Mike talk about STIGS, Audits, and SIEM's. Episode Links: STIG: https://public.cyber.mil/stigs/ CIS: https://www.cisecurity.org/cis-benchmarks Microsoft Sentinel: https://azure.microsoft.com/en-us/products/microsoft-sentinel Tenable: https://www.tenable.com/ Episodes Ev…
  continue reading
 
Cyber Sitrep Episode #-20 Cyber Security 101 "Ring 1" - In this Episode Eric and Mike talk about the first Ring of Cyber Security 101. Episodes Every Wednesday at 11 A.M. MST https://www.av-comparatives.org/ Links: Corvus website: https://www.corvus-tech.net/ Digital Beachhead website: https://digitalbeachhead.com/ The Cyber Sitrep brings you all t…
  continue reading
 
In this Episode Eric and Mike close out the 6 part series about Cyber Security 101 with the Edge. Cyber Sitrep Episode #23 Cyber Security 101 Ep.6 "Edge" Episode Links: https://csrc.nist.gov/publications/sp800 Episodes Every Wednesday at 11 A.M. MST Links: Corvus website: https://www.corvus-tech.net/ Digital Beachhead website: https://digitalbeachh…
  continue reading
 
Cyber Sitrep Episode #19 - Cyber Security 101 "Core" - In this episode Eric and Mike go over how Data backups, and training are a great start for your business cyber health. Links: Corvus website: https://www.corvus-tech.net/ Digital Beachhead website: https://digitalbeachhead.com/ The Cyber Sitrep brings you all the latest cybersecurity news, comm…
  continue reading
 
#cmmc #cybersecurity #scopematters In this episode of The Cyber Sitrep, Eric and Mike dive deep into one of the most critical — yet misunderstood — elements of CMMC assessments: scoping. They explain why scoping your environment accurately can save you serious time, money, and pain during a C3PAO assessment. From defining "in scope" vs. "out of sco…
  continue reading
 
In the leadership and communications section, Why Every CISO Should Be Gunning For A Seat At The Board Table, The Innovation We Need is Strategic, Not Technical , The Best Leaders Ask the Right Questions, and more! This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them! Fortra is successfully reduc…
  continue reading
 
In the leadership and communications section, Why Every CISO Should Be Gunning For A Seat At The Board Table, The Innovation We Need is Strategic, Not Technical , The Best Leaders Ask the Right Questions, and more! This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them! Fortra is successfully reduc…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play