show episodes
 
Artwork

1
Cyber Journeys

Dr Jason Edwards

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Cybersecurity is more than tools and threats — it’s the people who choose this path, and I’d love to hear how you found yours. Suppose you’re a student, early-career professional, veteran, career changer, or seasoned practitioner. In that case, you’re invited to share your story for a short, relaxed conversation that will be featured across Bare Metal Cyber channels. Use the form below to tell me a bit about your background, where you are in your journey, and what you’d like to talk about, a ...
  continue reading
 
The Tech+ Audio Course is your complete, on-demand study companion for mastering the CompTIA Tech+ (FC0-U71) certification exam. Designed for those beginning their journey into information technology, it guides you step by step through every domain and objective of the official exam blueprint. Each episode transforms complex IT concepts into clear, relatable lessons filled with practical examples, definitions, and real-world applications. Whether you’re learning about hardware components, so ...
  continue reading
 
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
  continue reading
 
👋 Welcome to Default Global, the podcast hosted by Vit, a seasoned expert with over a decade of experience assisting tech companies in building global teams. Join us as we dive into insightful conversations with remote and global-first entrepreneurs, founders of international tech companies, and HR specialists who share their expertise on business expansion, global hiring, and remote work strategies. 🔍 Explore topics crucial for US & EU Entrepreneurs: ✔️International Market Entry, ✔️Global H ...
  continue reading
 
Loading …
show series
 
Your body dies — but your accounts don’t. And now AI can be trained on the dead. So who “owns” your digital afterlife… and who gets to use it? In this episode of Legitimate Cybersecurity, Frank and Dr. Dustin Brewer unpack the real risk behind “legacy accounts,” AI memorial bots, and digital grief tools: consent, identity control, and what happens …
  continue reading
 
Your gift card can be empty before you even buy it—and that’s just one of the holiday scams exploding right now. In December, attackers don’t need skill. They need distracted people. In this episode of Legitimate Cybersecurity, Frank Downs and Dr. Dustin Brewer break down the five highest-volume holiday scams hitting normal, smart people—gift cards…
  continue reading
 
Your smartphone, your streaming library, even your tractor—none of them actually belong to you. Companies can lock you out, delete your data, revoke your access, or simply shut down the servers your devices rely on. And now with AI moderation quietly deleting accounts behind the scenes… who’s really in control? In this episode of Legitimate Cyberse…
  continue reading
 
The cybersecurity industry is gaslighting you. We spend billions on dashboards that look pretty but act like "sleep paralysis demons" for the analysts trying to use them. In this episode, Jennifer Von Kainold (VP of Product Management at BlueVoyant) reveals the dirty secret of security engineering: the tools are built for the builders, not the defe…
  continue reading
 
Drones are showing up where they shouldn’t — over backyards, pools, windows, driveways, campsites, neighborhoods, and even over insurance customers’ houses to jack up premiums. And here’s the terrifying part: nobody knows who owns them, and the laws protecting you are a mess. In this episode of Legitimate Cybersecurity, Frank, Dustin, and Chris Adk…
  continue reading
 
Welcome to the Cyber Journey Podcast. This is where real people in cybersecurity share how they actually got here, what they learned along the way, and what they wish someone had told them at the start. If you are trying to break into cyber, change directions in your career, or just figure out what is real in all the noise, you are in the right pla…
  continue reading
 
SIM swapping has returned — and the attackers have leveled up. In this episode, Frank, Dustin, and returning guest Chris Adkins break down how modern thieves hijack your SIM, clone your phone, intercept your MFA codes, and drain your accounts… all without ever touching your device. We cover: • Why your phone number is the master key to your digital…
  continue reading
 
The Vatican just issued a massive warning about AI — and it might be the most unexpected twist in the religion-tech debate yet. Frank and Dustin dive deep into the rising spiritual panic around artificial intelligence: AI as a therapist, AI as a partner, AI as a spiritual advisor… and the truly wild question: Should an AI ever be baptized? In this …
  continue reading
 
What happens when the most secure museum on Earth has a Wi-Fi password that’s literally “louvre”? 💎 $100 million in jewels disappear, and the world’s best art collection learns what Defense in Dumb really means. In this episode of Legitimate Cybersecurity, Frank Downs and Dr. Dustin Brewer unpack how the Louvre Museum was robbed in broad daylight —…
  continue reading
 
Tonight’s Halloween special gets deliciously weird. 🦇 Dustin and Frank unpack four true tech “hauntings”: • The Ghost in the Printer—Why old JetDirects spit hieroglyphics at night. • Laughing Alexa—The infamous 2018 bug that creeped out the world. • #GhostText—When delayed SMS messages arrived from the… beyond. • Grace Hopper’s Moth—The first liter…
  continue reading
 
Are we watching the ladder get pulled up? A new Harvard-linked analysis shows companies that adopt generative AI hire 7.7% fewer junior roles — a subtle shift with massive consequences for cybersecurity, tech, and the middle class. Frank Downs and Dr. Dustin Brewer break down what’s really happening: the automation sugar high, the hollowing of mid-…
  continue reading
 
What happens when ONE “cloud” hiccup in Virginia slams the brakes on your life—smart beds trap sleepers, Alexa goes dumb, Venmo sputters, and enterprise apps face-plant? Frank & Dr. Dustin break down Monday’s AWS DNS outage, why the internet’s “old bones” (DNS/IPv4) still run everything, how dependency hell spreads a local failure worldwide, and wh…
  continue reading
 
Your AI assistant is helpful… until it isn’t. In this episode, Frank and Dustin break down the zero-touch exploits (EchoLeak & ShadowLeak) that can hijack AI integrations like email and office suites, quietly exfiltrate your prompts and IP, and even leak them to attacker infrastructure—no clicks required. We also talk about why your chats aren’t pr…
  continue reading
 
Why train when you can just hire?” In this episode, BlueVoyant Senior Vulnerability & Risk Analyst James Gustafson explains why that mindset—and the myth that AI can replace fundamentals—is putting orgs at risk. From Army “combat cable guy” to enterprise VM leader, James breaks down how to move from scan → prioritize → fix, how to develop junior ta…
  continue reading
 
Dr. Dustin Brewer just passed his dissertation defense (👑 incoming), so we celebrated the only way we know how: by tackling Reddit’s most controversial cybersecurity questions—no fluff, real talk. In this episode, Frank Downs and (now) Dr. Dustin break down: How to brief a non-technical board so they actually fund security (tie risk to $$, ops impa…
  continue reading
 
Why should you listen to us? Honestly—you shouldn’t. But if you do, know this: we’re not just two jokers talking theory. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Brewer open up about their real beginnings—from accidental entry into US Intelligence after 9/11, to packet-hunting puzzles, Wi-Fi tinkering, and Linux dependenc…
  continue reading
 
Are algorithms helping—or handling—you? Frank and Dustin dive into how recommender systems, data brokers, and AI-powered platforms shape your news, drives, purchases, health, and even relationships. From TikTok fear-mongering to Cambridge Analytica, OPM’s breach fallout, Google Maps routing incentives, Amazon “sponsored” defaults, and Facebook’s en…
  continue reading
 
Are you getting the interviews but not the job? Are you tired of the rejections? Are you becoming frustrated and ready to quit? Don't do it. If you are determined to launch a career in the IT industry, you have to be persistent and smart about your approach. In this episode, I share how to continue to become the strongest entry-level candidate and …
  continue reading
 
What do submarines, Linux servers, Apple X Servers, and SOC analysts all have in common? They were all part of Chris Adkins’ path into cybersecurity. In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep with Chris as he shares his unique journey from being a sonar technician in the U.S. Navy to breaking into cyber through a SOC—a…
  continue reading
 
Former FBI agent and attorney Vincent “Vinnie” D’Agostino (now Head of Digital Forensics & Incident Response at BlueVoyant) joins us to unpack dark web takedowns, real DFIR process, and how a “range” of skills (law, tech, stand-up, curiosity) compounds into cyber success. We cover: How a team helped take down the dark web—twice DFIR reality vs myth…
  continue reading
 
ChatGPT-5 is here — but is it really the leap forward everyone’s claiming? In this episode of Legitimate Cybersecurity, Frank and Dustin break down the hype vs. reality. From coding disasters that “look pretty but don’t work,” to AI being more like “that coworker who makes everything harder,” we explore what this means for hackers, defenders, and t…
  continue reading
 
This episode covers the essential security settings for configuring a small wireless network. We explain how to change the default SSID, set strong passwords, and choose between encryption standards such as WPA2 and WPA3. You will learn the differences between open, pre-shared key, and enterprise-level authentication options. We also provide real-w…
  continue reading
 
This episode explains how encryption protects data in two primary states—when stored (data at rest) and when moving across networks (data in transit). We define plaintext and ciphertext, along with encryption methods for securing files, disks, mobile devices, emails, and web traffic. Understanding these concepts is vital for identifying when and ho…
  continue reading
 
This episode examines best practices for creating and managing secure passwords. We explain why password length, complexity, and uniqueness are essential to reducing the risk of compromise. You will learn how to implement policies for password history, expiration, and avoiding reuse across different accounts. These guidelines help maintain system s…
  continue reading
 
This episode focuses on safe browsing practices to protect user data and system integrity. We explain how to verify website security using valid certificates, recognize potentially malicious sites, and configure browser settings for safer operation. Privacy considerations include managing cookies, limiting personal information shared online, and un…
  continue reading
 
This episode covers the best practices for managing software, from verifying licensing compliance to ensuring secure sourcing and regular updates. We explain the differences between open source, proprietary, subscription, and perpetual licenses, along with the importance of product keys and serial numbers. We also emphasize downloading software fro…
  continue reading
 
This episode addresses key strategies for securing devices against common threats. We cover security awareness measures, such as recognizing phishing attempts, and the importance of anti-malware tools, firewalls, and regular patching. You will learn how to implement physical protections like cable and USB locks, as well as software-based safeguards…
  continue reading
 
This episode focuses on the processes of authentication and authorization, explaining how they verify identity and determine permissions. We outline common authentication methods, from single-factor to multifactor, and introduce models such as least privilege and role-based access control. You will also learn how proper logging supports accounting …
  continue reading
 
This episode explores the foundational concepts of information security, beginning with the CIA triad—confidentiality, integrity, and availability. We explain how each principle guides security decisions and policies, from controlling access to ensuring data accuracy and maintaining system uptime. You will also learn about privacy considerations, s…
  continue reading
 
This episode introduces the Security domain, which covers essential principles, best practices, and protective technologies for safeguarding systems and information. You will learn how this domain addresses confidentiality, integrity, availability, privacy, authentication, and authorization concepts. Its coverage is broad, touching areas from devic…
  continue reading
 
This episode covers the principles of data backup, including file-level backups, full system backups, and restore procedures. We explain different storage locations, from local media like external drives and SD cards to cloud-based storage solutions, and discuss the pros and cons of each approach. We also present examples of backup scheduling, such…
  continue reading
 
This episode compares relational and non-relational database structures, explaining when each is most effective. We define relational components such as tables, rows, columns, and keys, as well as non-relational formats like key/value and document databases. Understanding these distinctions is crucial for recognizing how data should be organized in…
  continue reading
 
This episode focuses on the practical uses of databases, including creating, querying, and generating reports. We explain the advantages of databases over flat files, such as scalability, speed, and support for multiple concurrent users. You will also learn about data persistence, availability, and the trade-offs between cloud and local database ho…
  continue reading
 
This episode explains how organizations treat data as a valuable asset, exploring its role in decision-making, reporting, and revenue generation. We cover the difference between critical and non-critical data, how data is collected, and how it is correlated to identify trends and insights. You will learn how analytics and meaningful reporting influ…
  continue reading
 
This episode introduces the Data and Database Fundamentals domain, explaining how it addresses the value of data, database structures, and backup concepts. You will learn why this domain is crucial for understanding how information is stored, managed, and secured, and how it connects to other exam areas like software, networking, and security. We a…
  continue reading
 
This episode explains organizational techniques used in programming, including pseudocode, flowcharts, and logic structures. We describe how pseudocode provides a language-agnostic plan for development, how flowcharts visually map program flow, and how logical structures like branching and looping control execution. These tools help programmers des…
  continue reading
 
This episode covers the core concepts of programming, focusing on variables, functions, and objects. We explain how variables store and manipulate data, how functions encapsulate reusable logic, and how objects combine properties and methods to model real-world entities in code. Understanding these concepts is essential for interpreting how program…
  continue reading
 
This episode reviews the fundamental data types used in programming, including characters, strings, integers, floating-point numbers, and Boolean values. We define each type, explain its purpose, and describe how data types influence program behavior. This understanding is critical for writing accurate code and avoiding type-related errors, which c…
  continue reading
 
This episode explains the different categories of programming languages, including interpreted, compiled, scripting, markup, and query languages. We discuss how interpreted languages execute code line-by-line, compiled languages translate entire programs into machine code before execution, and how scripting and markup languages serve specific autom…
  continue reading
 
This episode provides an overview of the Software Development Concepts domain, outlining the skills and knowledge areas it covers. You will learn about programming language categories, fundamental data types, programming concepts, and organizational techniques. The domain’s focus is on helping you understand the building blocks of software and how …
  continue reading
 
This episode introduces artificial intelligence concepts relevant to the Tech+ exam, including AI chatbots, assistants, and generative AI tools. We explain how AI can produce code, create content, and offer predictive suggestions, as well as its role in enhancing productivity and user interaction. Understanding these applications is important for r…
  continue reading
 
This episode focuses on configuring web browsers for security, efficiency, and personalization. We cover the use of extensions and add-ons, private browsing modes, cache management, and pop-up blocking. You will learn how to enable, disable, and remove extensions, as well as how to set default search engines and manage bookmarks for streamlined nav…
  continue reading
 
This episode reviews the main categories of software you will encounter in the exam, including productivity tools, collaboration platforms, and support utilities. We explain how word processors, spreadsheets, presentation software, and diagramming tools enable professional tasks, while collaboration tools like email clients, conferencing software, …
  continue reading
 
This episode explains the primary roles of an operating system, focusing on how it manages applications, tasks, and connected devices. We detail how the OS provides an interface between hardware and software, coordinates resource allocation, and ensures processes run efficiently. You will learn how features like disk management, process scheduling,…
  continue reading
 
This episode explores the core components of an operating system, including filesystems, device drivers, and user interfaces. We explain how these components work together to manage hardware resources, provide application support, and deliver a functional user experience. Understanding filesystem features like compression, encryption, and file attr…
  continue reading
 
This episode provides an overview of the Applications and Software domain, explaining how it addresses operating systems, productivity tools, browser configuration, and AI concepts. You will learn how this domain evaluates your ability to understand, configure, and manage software environments effectively. The domain’s scope includes both end-user …
  continue reading
 
This episode covers the essential aspects of wireless networking, focusing on standards such as 802.11n, 802.11ac, and 802.11ax. We discuss the speed capabilities, frequency bands, and range considerations for each, as well as how interference and attenuation can affect performance. Knowing these factors will help you answer exam questions on wirel…
  continue reading
 
This episode introduces the most common network types and architectures, including Local Area Networks, Wide Area Networks, client-server models, and peer-to-peer setups. We explain the characteristics, advantages, and limitations of each, along with their typical use cases. Understanding these distinctions will enable you to identify which configu…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play