Legitimate Cybersecurity Podcast - designed to empower you with real-world cybersecurity information, stories, and advice.
…
continue reading
Cybersecurity is more than tools and threats — it’s the people who choose this path, and I’d love to hear how you found yours. Suppose you’re a student, early-career professional, veteran, career changer, or seasoned practitioner. In that case, you’re invited to share your story for a short, relaxed conversation that will be featured across Bare Metal Cyber channels. Use the form below to tell me a bit about your background, where you are in your journey, and what you’d like to talk about, a ...
…
continue reading
The Tech+ Audio Course is your complete, on-demand study companion for mastering the CompTIA Tech+ (FC0-U71) certification exam. Designed for those beginning their journey into information technology, it guides you step by step through every domain and objective of the official exam blueprint. Each episode transforms complex IT concepts into clear, relatable lessons filled with practical examples, definitions, and real-world applications. Whether you’re learning about hardware components, so ...
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading
1
Default Global Podcast: Navigating Global Expansion, Remote Teams, and International Talent
Vit Koval
👋 Welcome to Default Global, the podcast hosted by Vit, a seasoned expert with over a decade of experience assisting tech companies in building global teams. Join us as we dive into insightful conversations with remote and global-first entrepreneurs, founders of international tech companies, and HR specialists who share their expertise on business expansion, global hiring, and remote work strategies. 🔍 Explore topics crucial for US & EU Entrepreneurs: ✔️International Market Entry, ✔️Global H ...
…
continue reading
1
AI Is Rebuilding the Dead — With Your Data
37:04
37:04
Play later
Play later
Lists
Like
Liked
37:04Your body dies — but your accounts don’t. And now AI can be trained on the dead. So who “owns” your digital afterlife… and who gets to use it? In this episode of Legitimate Cybersecurity, Frank and Dr. Dustin Brewer unpack the real risk behind “legacy accounts,” AI memorial bots, and digital grief tools: consent, identity control, and what happens …
…
continue reading
1
5 Holiday Scams That Drain Your Money Fast (Gift Cards, Texts, QR)
45:02
45:02
Play later
Play later
Lists
Like
Liked
45:02Your gift card can be empty before you even buy it—and that’s just one of the holiday scams exploding right now. In December, attackers don’t need skill. They need distracted people. In this episode of Legitimate Cybersecurity, Frank Downs and Dr. Dustin Brewer break down the five highest-volume holiday scams hitting normal, smart people—gift cards…
…
continue reading
1
Your Phone, Your Car, Your Movies—You Don’t Actually Own ANY of It #cybersecurity
44:20
44:20
Play later
Play later
Lists
Like
Liked
44:20Your smartphone, your streaming library, even your tractor—none of them actually belong to you. Companies can lock you out, delete your data, revoke your access, or simply shut down the servers your devices rely on. And now with AI moderation quietly deleting accounts behind the scenes… who’s really in control? In this episode of Legitimate Cyberse…
…
continue reading
1
Why Security Tools Are Designed To Fail (VP Revelations) #cybersecurity
46:49
46:49
Play later
Play later
Lists
Like
Liked
46:49The cybersecurity industry is gaslighting you. We spend billions on dashboards that look pretty but act like "sleep paralysis demons" for the analysts trying to use them. In this episode, Jennifer Von Kainold (VP of Product Management at BlueVoyant) reveals the dirty secret of security engineering: the tools are built for the builders, not the defe…
…
continue reading
1
The Drone Privacy Crisis: What No One Is Telling You. #cybersecurity
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41Drones are showing up where they shouldn’t — over backyards, pools, windows, driveways, campsites, neighborhoods, and even over insurance customers’ houses to jack up premiums. And here’s the terrifying part: nobody knows who owns them, and the laws protecting you are a mess. In this episode of Legitimate Cybersecurity, Frank, Dustin, and Chris Adk…
…
continue reading
Welcome to the Cyber Journey Podcast. This is where real people in cybersecurity share how they actually got here, what they learned along the way, and what they wish someone had told them at the start. If you are trying to break into cyber, change directions in your career, or just figure out what is real in all the noise, you are in the right pla…
…
continue reading
1
SIM Swapping Is Back — And They Can Steal Your Phone Without Touching It #cybersecurity
44:12
44:12
Play later
Play later
Lists
Like
Liked
44:12SIM swapping has returned — and the attackers have leveled up. In this episode, Frank, Dustin, and returning guest Chris Adkins break down how modern thieves hijack your SIM, clone your phone, intercept your MFA codes, and drain your accounts… all without ever touching your device. We cover: • Why your phone number is the master key to your digital…
…
continue reading
1
AI vs Religion: The Vatican Breaks Its Silence — And It’s Terrifying #cybersecurity
42:20
42:20
Play later
Play later
Lists
Like
Liked
42:20The Vatican just issued a massive warning about AI — and it might be the most unexpected twist in the religion-tech debate yet. Frank and Dustin dive deep into the rising spiritual panic around artificial intelligence: AI as a therapist, AI as a partner, AI as a spiritual advisor… and the truly wild question: Should an AI ever be baptized? In this …
…
continue reading
1
Leonardo da Vinci Had Better Wi-Fi: The $100M Louvre Heist #cybersecurity
37:45
37:45
Play later
Play later
Lists
Like
Liked
37:45What happens when the most secure museum on Earth has a Wi-Fi password that’s literally “louvre”? 💎 $100 million in jewels disappear, and the world’s best art collection learns what Defense in Dumb really means. In this episode of Legitimate Cybersecurity, Frank Downs and Dr. Dustin Brewer unpack how the Louvre Museum was robbed in broad daylight —…
…
continue reading
1
Haunted Networks: Possessed Printers, Phantom Texts, and the OG Computer ‘Bug’ #cybersecurity
40:17
40:17
Play later
Play later
Lists
Like
Liked
40:17Tonight’s Halloween special gets deliciously weird. 🦇 Dustin and Frank unpack four true tech “hauntings”: • The Ghost in the Printer—Why old JetDirects spit hieroglyphics at night. • Laughing Alexa—The infamous 2018 bug that creeped out the world. • #GhostText—When delayed SMS messages arrived from the… beyond. • Grace Hopper’s Moth—The first liter…
…
continue reading
1
AI Is Quietly Killing Entry-Level Jobs (And No One Wants To Admit It)
31:21
31:21
Play later
Play later
Lists
Like
Liked
31:21Are we watching the ladder get pulled up? A new Harvard-linked analysis shows companies that adopt generative AI hire 7.7% fewer junior roles — a subtle shift with massive consequences for cybersecurity, tech, and the middle class. Frank Downs and Dr. Dustin Brewer break down what’s really happening: the automation sugar high, the hollowing of mid-…
…
continue reading
1
The Day the Cloud Died: How One Outage Broke Everything
27:45
27:45
Play later
Play later
Lists
Like
Liked
27:45What happens when ONE “cloud” hiccup in Virginia slams the brakes on your life—smart beds trap sleepers, Alexa goes dumb, Venmo sputters, and enterprise apps face-plant? Frank & Dr. Dustin break down Monday’s AWS DNS outage, why the internet’s “old bones” (DNS/IPv4) still run everything, how dependency hell spreads a local failure worldwide, and wh…
…
continue reading
1
AI Is Spying on You: Zero-Touch Hacks, Secret Data Leaks, and the “No Legal Privilege” Bombshell
37:26
37:26
Play later
Play later
Lists
Like
Liked
37:26Your AI assistant is helpful… until it isn’t. In this episode, Frank and Dustin break down the zero-touch exploits (EchoLeak & ShadowLeak) that can hijack AI integrations like email and office suites, quietly exfiltrate your prompts and IP, and even leak them to attacker infrastructure—no clicks required. We also talk about why your chats aren’t pr…
…
continue reading
By Jason Edwards
…
continue reading
1
AI Won’t Save You: James Gustafson on Junior Talent, Button-ology, and Real Risk Reduction
39:01
39:01
Play later
Play later
Lists
Like
Liked
39:01Why train when you can just hire?” In this episode, BlueVoyant Senior Vulnerability & Risk Analyst James Gustafson explains why that mindset—and the myth that AI can replace fundamentals—is putting orgs at risk. From Army “combat cable guy” to enterprise VM leader, James breaks down how to move from scan → prioritize → fix, how to develop junior ta…
…
continue reading
1
Shadow Credit Bureau Exposed: How LexisNexis Tracks Your Every Move (Even Roller Coasters!)
32:17
32:17
Play later
Play later
Lists
Like
Liked
32:17By LegitimateCybersecurity
…
continue reading
1
Reddit’s Spiciest Cyber FAQs—Board Risk, Automation Fails, Pay Cuts & “Cyber Sucks”
45:18
45:18
Play later
Play later
Lists
Like
Liked
45:18Dr. Dustin Brewer just passed his dissertation defense (👑 incoming), so we celebrated the only way we know how: by tackling Reddit’s most controversial cybersecurity questions—no fluff, real talk. In this episode, Frank Downs and (now) Dr. Dustin break down: How to brief a non-technical board so they actually fund security (tie risk to $$, ops impa…
…
continue reading
1
From US Intelligence to DoD Cyber Ops: Frank & Dustin’s Origin Stories in Cybersecurity
41:32
41:32
Play later
Play later
Lists
Like
Liked
41:32Why should you listen to us? Honestly—you shouldn’t. But if you do, know this: we’re not just two jokers talking theory. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Brewer open up about their real beginnings—from accidental entry into US Intelligence after 9/11, to packet-hunting puzzles, Wi-Fi tinkering, and Linux dependenc…
…
continue reading
1
Secret Algorithms Controlling You! Are You the User… or the Product?
33:35
33:35
Play later
Play later
Lists
Like
Liked
33:35Are algorithms helping—or handling—you? Frank and Dustin dive into how recommender systems, data brokers, and AI-powered platforms shape your news, drives, purchases, health, and even relationships. From TikTok fear-mongering to Cambridge Analytica, OPM’s breach fallout, Google Maps routing incentives, Amazon “sponsored” defaults, and Facebook’s en…
…
continue reading
1
S2 E6 - What It Takes to Land That First Job
9:32
9:32
Play later
Play later
Lists
Like
Liked
9:32Are you getting the interviews but not the job? Are you tired of the rejections? Are you becoming frustrated and ready to quit? Don't do it. If you are determined to launch a career in the IT industry, you have to be persistent and smart about your approach. In this episode, I share how to continue to become the strongest entry-level candidate and …
…
continue reading
1
From Submarines to Cybersecurity: Chris Adkins’ Wild Journey Into Cyber Defense
48:42
48:42
Play later
Play later
Lists
Like
Liked
48:42What do submarines, Linux servers, Apple X Servers, and SOC analysts all have in common? They were all part of Chris Adkins’ path into cybersecurity. In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep with Chris as he shares his unique journey from being a sonar technician in the U.S. Navy to breaking into cyber through a SOC—a…
…
continue reading
1
He Helped Take Down the Dark Web (Twice) — Vincent D’Agostino on DFIR, FBI & Real-World Cyber
1:01:27
1:01:27
Play later
Play later
Lists
Like
Liked
1:01:27Former FBI agent and attorney Vincent “Vinnie” D’Agostino (now Head of Digital Forensics & Incident Response at BlueVoyant) joins us to unpack dark web takedowns, real DFIR process, and how a “range” of skills (law, tech, stand-up, curiosity) compounds into cyber success. We cover: How a team helped take down the dark web—twice DFIR reality vs myth…
…
continue reading
1
ChatGPT-5: Smarter Hackers, Dumber Defenders?
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40ChatGPT-5 is here — but is it really the leap forward everyone’s claiming? In this episode of Legitimate Cybersecurity, Frank and Dustin break down the hype vs. reality. From coding disasters that “look pretty but don’t work,” to AI being more like “that coworker who makes everything harder,” we explore what this means for hackers, defenders, and t…
…
continue reading
1
Episode 58: Wireless Security Settings: SSID, WPA2, and WPA3
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51This episode covers the essential security settings for configuring a small wireless network. We explain how to change the default SSID, set strong passwords, and choose between encryption standards such as WPA2 and WPA3. You will learn the differences between open, pre-shared key, and enterprise-level authentication options. We also provide real-w…
…
continue reading
1
Episode 57: Encryption Use Cases: Data at Rest vs. Data in Transit
15:29
15:29
Play later
Play later
Lists
Like
Liked
15:29This episode explains how encryption protects data in two primary states—when stored (data at rest) and when moving across networks (data in transit). We define plaintext and ciphertext, along with encryption methods for securing files, disks, mobile devices, emails, and web traffic. Understanding these concepts is vital for identifying when and ho…
…
continue reading
1
Episode 56: Password Management: Complexity, Rotation, and Managers
11:29
11:29
Play later
Play later
Lists
Like
Liked
11:29This episode examines best practices for creating and managing secure passwords. We explain why password length, complexity, and uniqueness are essential to reducing the risk of compromise. You will learn how to implement policies for password history, expiration, and avoiding reuse across different accounts. These guidelines help maintain system s…
…
continue reading
1
Episode 55: Safe Browsing: Certificates, Sites, and AI Risks
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10This episode focuses on safe browsing practices to protect user data and system integrity. We explain how to verify website security using valid certificates, recognize potentially malicious sites, and configure browser settings for safer operation. Privacy considerations include managing cookies, limiting personal information shared online, and un…
…
continue reading
1
Episode 54: Software Practices: Licensing, Sources, and Updates
13:42
13:42
Play later
Play later
Lists
Like
Liked
13:42This episode covers the best practices for managing software, from verifying licensing compliance to ensuring secure sourcing and regular updates. We explain the differences between open source, proprietary, subscription, and perpetual licenses, along with the importance of product keys and serial numbers. We also emphasize downloading software fro…
…
continue reading
1
Episode 53: Device Security: Phishing, Malware, and Hardening
12:50
12:50
Play later
Play later
Lists
Like
Liked
12:50This episode addresses key strategies for securing devices against common threats. We cover security awareness measures, such as recognizing phishing attempts, and the importance of anti-malware tools, firewalls, and regular patching. You will learn how to implement physical protections like cable and USB locks, as well as software-based safeguards…
…
continue reading
1
Episode 52: Authentication and Authorization: Models and Logging
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17This episode focuses on the processes of authentication and authorization, explaining how they verify identity and determine permissions. We outline common authentication methods, from single-factor to multifactor, and introduce models such as least privilege and role-based access control. You will also learn how proper logging supports accounting …
…
continue reading
1
Episode 51: Security Concepts: CIA, Privacy, and Frameworks
14:07
14:07
Play later
Play later
Lists
Like
Liked
14:07This episode explores the foundational concepts of information security, beginning with the CIA triad—confidentiality, integrity, and availability. We explain how each principle guides security decisions and policies, from controlling access to ensuring data accuracy and maintaining system uptime. You will also learn about privacy considerations, s…
…
continue reading
This episode introduces the Security domain, which covers essential principles, best practices, and protective technologies for safeguarding systems and information. You will learn how this domain addresses confidentiality, integrity, availability, privacy, authentication, and authorization concepts. Its coverage is broad, touching areas from devic…
…
continue reading
1
Episode 49: Backup Strategies: File, System, and Storage Locations
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29This episode covers the principles of data backup, including file-level backups, full system backups, and restore procedures. We explain different storage locations, from local media like external drives and SD cards to cloud-based storage solutions, and discuss the pros and cons of each approach. We also present examples of backup scheduling, such…
…
continue reading
1
Episode 48: Database Structures: Relational and Non-relational Explained
12:36
12:36
Play later
Play later
Lists
Like
Liked
12:36This episode compares relational and non-relational database structures, explaining when each is most effective. We define relational components such as tables, rows, columns, and keys, as well as non-relational formats like key/value and document databases. Understanding these distinctions is crucial for recognizing how data should be organized in…
…
continue reading
1
Episode 47: Databases in Action: Usage, Speed, and Structure
14:04
14:04
Play later
Play later
Lists
Like
Liked
14:04This episode focuses on the practical uses of databases, including creating, querying, and generating reports. We explain the advantages of databases over flat files, such as scalability, speed, and support for multiple concurrent users. You will also learn about data persistence, availability, and the trade-offs between cloud and local database ho…
…
continue reading
1
Episode 46: Data Value: Analytics, Reporting, and Monetization
11:18
11:18
Play later
Play later
Lists
Like
Liked
11:18This episode explains how organizations treat data as a valuable asset, exploring its role in decision-making, reporting, and revenue generation. We cover the difference between critical and non-critical data, how data is collected, and how it is correlated to identify trends and insights. You will learn how analytics and meaningful reporting influ…
…
continue reading
1
Episode 45: Data and Database Fundamentals: Domain Overview
10:56
10:56
Play later
Play later
Lists
Like
Liked
10:56This episode introduces the Data and Database Fundamentals domain, explaining how it addresses the value of data, database structures, and backup concepts. You will learn why this domain is crucial for understanding how information is stored, managed, and secured, and how it connects to other exam areas like software, networking, and security. We a…
…
continue reading
1
Episode 44: Code Organization: Pseudocode, Flowcharts, and Logic
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04This episode explains organizational techniques used in programming, including pseudocode, flowcharts, and logic structures. We describe how pseudocode provides a language-agnostic plan for development, how flowcharts visually map program flow, and how logical structures like branching and looping control execution. These tools help programmers des…
…
continue reading
1
Episode 43: Programming Concepts: Variables, Functions, and Objects
11:57
11:57
Play later
Play later
Lists
Like
Liked
11:57This episode covers the core concepts of programming, focusing on variables, functions, and objects. We explain how variables store and manipulate data, how functions encapsulate reusable logic, and how objects combine properties and methods to model real-world entities in code. Understanding these concepts is essential for interpreting how program…
…
continue reading
1
Episode 42: Data Types: Char, String, Integer, Float, Boolean
12:40
12:40
Play later
Play later
Lists
Like
Liked
12:40This episode reviews the fundamental data types used in programming, including characters, strings, integers, floating-point numbers, and Boolean values. We define each type, explain its purpose, and describe how data types influence program behavior. This understanding is critical for writing accurate code and avoiding type-related errors, which c…
…
continue reading
1
Episode 41: Programming Language Types: Interpreted, Compiled, and More
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21This episode explains the different categories of programming languages, including interpreted, compiled, scripting, markup, and query languages. We discuss how interpreted languages execute code line-by-line, compiled languages translate entire programs into machine code before execution, and how scripting and markup languages serve specific autom…
…
continue reading
1
Episode 40: Software Development Concepts: Domain Overview
13:07
13:07
Play later
Play later
Lists
Like
Liked
13:07This episode provides an overview of the Software Development Concepts domain, outlining the skills and knowledge areas it covers. You will learn about programming language categories, fundamental data types, programming concepts, and organizational techniques. The domain’s focus is on helping you understand the building blocks of software and how …
…
continue reading
1
Episode 39: AI in Tech+: Chatbots, Generative Tools, and Smart Systems
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49This episode introduces artificial intelligence concepts relevant to the Tech+ exam, including AI chatbots, assistants, and generative AI tools. We explain how AI can produce code, create content, and offer predictive suggestions, as well as its role in enhancing productivity and user interaction. Understanding these applications is important for r…
…
continue reading
1
Episode 38: Browser Configurations: Extensions, Privacy, and Sync
12:33
12:33
Play later
Play later
Lists
Like
Liked
12:33This episode focuses on configuring web browsers for security, efficiency, and personalization. We cover the use of extensions and add-ons, private browsing modes, cache management, and pop-up blocking. You will learn how to enable, disable, and remove extensions, as well as how to set default search engines and manage bookmarks for streamlined nav…
…
continue reading
1
Episode 37: Software Use Cases: Productivity, Collaboration, and Support
11:47
11:47
Play later
Play later
Lists
Like
Liked
11:47This episode reviews the main categories of software you will encounter in the exam, including productivity tools, collaboration platforms, and support utilities. We explain how word processors, spreadsheets, presentation software, and diagramming tools enable professional tasks, while collaboration tools like email clients, conferencing software, …
…
continue reading
1
Episode 36: OS Roles: Application, Task, and Device Management
11:58
11:58
Play later
Play later
Lists
Like
Liked
11:58This episode explains the primary roles of an operating system, focusing on how it manages applications, tasks, and connected devices. We detail how the OS provides an interface between hardware and software, coordinates resource allocation, and ensures processes run efficiently. You will learn how features like disk management, process scheduling,…
…
continue reading
1
Episode 35: OS Components: Filesystems, Drivers, and Interfaces
12:58
12:58
Play later
Play later
Lists
Like
Liked
12:58This episode explores the core components of an operating system, including filesystems, device drivers, and user interfaces. We explain how these components work together to manage hardware resources, provide application support, and deliver a functional user experience. Understanding filesystem features like compression, encryption, and file attr…
…
continue reading
1
Episode 34: Applications and Software: Domain Overview
12:25
12:25
Play later
Play later
Lists
Like
Liked
12:25This episode provides an overview of the Applications and Software domain, explaining how it addresses operating systems, productivity tools, browser configuration, and AI concepts. You will learn how this domain evaluates your ability to understand, configure, and manage software environments effectively. The domain’s scope includes both end-user …
…
continue reading
1
Episode 33: Wireless Capabilities: Standards, Speeds, and Interference
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48This episode covers the essential aspects of wireless networking, focusing on standards such as 802.11n, 802.11ac, and 802.11ax. We discuss the speed capabilities, frequency bands, and range considerations for each, as well as how interference and attenuation can affect performance. Knowing these factors will help you answer exam questions on wirel…
…
continue reading
1
Episode 32: Network Types and Models: LAN, WAN, Client-Server, P2P
15:37
15:37
Play later
Play later
Lists
Like
Liked
15:37This episode introduces the most common network types and architectures, including Local Area Networks, Wide Area Networks, client-server models, and peer-to-peer setups. We explain the characteristics, advantages, and limitations of each, along with their typical use cases. Understanding these distinctions will enable you to identify which configu…
…
continue reading