• Certified A Plus Supercut: Part 2
    Aug 18 2025

    The Supercut of the A Plus PrepCast covers every topic in the CompTIA A+ exam blueprint, offering focused audio instruction on hardware, mobile devices, networking, virtualization, and troubleshooting. Each episode is crafted for clarity and retention, making even complex topics like RAID, Wi-Fi standards, and printer diagnostics approachable and practical. Whether you're just starting your studies or reviewing before test day, this series turns technical content into structured, digestible lessons. Brought to you by BareMetalCyber.com.

    Show More Show Less
    14 hrs and 41 mins
  • Certified A Plus Supercut: Part 1
    Aug 18 2025

    The Supercut of the A Plus PrepCast covers every topic in the CompTIA A+ exam blueprint, offering focused audio instruction on hardware, mobile devices, networking, virtualization, and troubleshooting. Each episode is crafted for clarity and retention, making even complex topics like RAID, Wi-Fi standards, and printer diagnostics approachable and practical. Whether you're just starting your studies or reviewing before test day, this series turns technical content into structured, digestible lessons. Brought to you by BareMetalCyber.com.

    Show More Show Less
    15 hrs and 3 mins
  • Episode 138: Scripting and Remote Access — .bat, RDP, SSH, Risks
    Aug 17 2025

    Automating tasks and supporting systems remotely are part of modern IT workflows. In this episode, we begin with scripting—specifically .bat and PowerShell scripts—and explain how they’re used to automate routine tasks like file transfers, user creation, or system reboots. Then we introduce remote access tools like R D P and S S H, showing how they allow technicians to manage systems without being physically present.

    We also explore the risks involved with remote access—such as unsecured ports, weak passwords, or man-in-the-middle attacks—and how to mitigate them through encryption, access control, and logging. CompTIA expects you to identify secure and insecure remote management practices, especially in troubleshooting and policy scenarios. Brought to you by BareMetalCyber.com.

    Show More Show Less
    12 mins
  • Episode 137: Handling Confidential Materials
    Aug 17 2025

    Protecting sensitive data requires not only digital safeguards but also physical and procedural awareness. This episode teaches you how to properly handle confidential information, whether it's on printed documents, storage devices, or screens. We cover methods like locked cabinets, badge-restricted rooms, and screen privacy filters to prevent unauthorized access.

    You’ll also learn about secure printing, shredding, and transporting sensitive materials between locations. These practices are often part of organizational policy and may be legally required in regulated industries. Expect exam questions that test your ability to recognize when extra precautions are needed and which techniques to apply. Brought to you by BareMetalCyber.com.

    Show More Show Less
    11 mins
  • Episode 136: Communication and Customer Service Skills
    Aug 17 2025

    Technical skills are vital, but soft skills are what turn technicians into trusted professionals. This episode focuses on communication techniques that improve user experiences and foster trust. We start with active listening—how to give users your full attention and confirm your understanding through paraphrasing and clarification. Then we cover tone and professionalism, especially when users are frustrated or confused.

    We also discuss documentation and follow-up, including how to set clear expectations, provide written summaries, and avoid technical jargon when communicating with non-technical users. The A Plus exam includes questions about interpersonal behavior and professionalism, so mastering these skills is essential. Brought to you by BareMetalCyber.com.

    Show More Show Less
    11 mins
  • Episode 135: Data Privacy and Licensing — DRM, Chain of Custody
    Aug 17 2025

    This episode explores the legal and ethical responsibilities of handling data and software in IT environments. We start with licensing—understanding the difference between OEM, volume, and subscription licenses, and how misuse can result in compliance violations. Then we discuss Digital Rights Management (DRM), which limits copying or modifying media and software based on licensing terms.

    We also explore chain of custody procedures, especially for incidents involving stolen devices, legal evidence, or internal investigations. Maintaining a documented path of who accessed what, when, and how is essential for both legal and security purposes. CompTIA expects technicians to know not just how to use tools, but how to do so within legal boundaries. Brought to you by BareMetalCyber.com.

    Show More Show Less
    12 mins
  • Episode 134: Environmental Controls — Ventilation, Disposal, MSDS
    Aug 17 2025

    Maintaining the physical environment around IT systems is just as important as managing the systems themselves. This episode begins with ventilation and cooling requirements—how airflow affects server performance, what happens when heat builds up, and how to monitor environmental thresholds. We explain how to position equipment in racks, monitor for overheating, and implement failover systems like redundant fans or power supplies.

    We also cover proper disposal methods for batteries, toner cartridges, and electronic waste in compliance with environmental regulations. Lastly, we introduce the Material Safety Data Sheet (MSDS), which provides safety information for handling chemicals and components. These details may appear in both compliance- and scenario-based exam questions. Brought to you by BareMetalCyber.com.

    Show More Show Less
    12 mins
  • Episode 133: Safety Procedures — ESD, Handling, Fire Safety
    Aug 17 2025

    Keeping yourself and your equipment safe is foundational to effective IT work. This episode covers essential safety practices beginning with Electrostatic Discharge (E S D) prevention—why grounding matters and how to properly use wrist straps, mats, and anti-static bags. We explain how improper handling can damage sensitive components like CPUs, RAM, and storage devices even before they’re installed.

    We also walk through best practices for lifting heavy equipment, handling tools in tight environments, and managing fire safety with the correct type of extinguisher for electrical equipment. CompTIA expects you to identify safe behavior in support scenarios, and this episode ensures you’re prepared to answer those questions accurately. Brought to you by BareMetalCyber.com.

    Show More Show Less
    12 mins