• Episode 59: Prepcast Supercut (All Episodes)
    Aug 18 2025

    The Tech+ PrepCast Supercut brings together all 58 episodes into one complete study resource for the CompTIA Tech+ (FC0-U71) certification exam. Covering every domain, glossary term, and exam objective, this extended episode provides a seamless, start-to-finish review of computing concepts, infrastructure, software, development, databases, and security. Ideal for learners who want a comprehensive refresher or a single, uninterrupted study companion, the supercut ensures every key topic is reinforced in one continuous session.

    Show More Show Less
    13 hrs and 5 mins
  • Episode 58: Wireless Security Settings: SSID, WPA2, and WPA3
    Aug 18 2025

    This episode covers the essential security settings for configuring a small wireless network. We explain how to change the default SSID, set strong passwords, and choose between encryption standards such as WPA2 and WPA3. You will learn the differences between open, pre-shared key, and enterprise-level authentication options.

    We also provide real-world examples, such as securing a home network from unauthorized access or configuring a business Wi-Fi environment to protect sensitive data. These practices not only help meet exam objectives but also reflect the core principles of maintaining a secure wireless infrastructure. Produced by BareMetalCyber.com, where you’ll find more cyber prepcasts, books, and information to strengthen your certification path.

    Show More Show Less
    14 mins
  • Episode 57: Encryption Use Cases: Data at Rest vs. Data in Transit
    Aug 18 2025

    This episode explains how encryption protects data in two primary states—when stored (data at rest) and when moving across networks (data in transit). We define plaintext and ciphertext, along with encryption methods for securing files, disks, mobile devices, emails, and web traffic. Understanding these concepts is vital for identifying when and how encryption should be applied.

    We provide practical examples such as encrypting a laptop hard drive to protect against theft or using a VPN to secure communications over public Wi-Fi. These scenarios show how encryption supports confidentiality and compliance, both in the workplace and on the exam. Produced by BareMetalCyber.com, where you’ll find more cyber prepcasts, books, and information to strengthen your certification path.

    Show More Show Less
    15 mins
  • Episode 56: Password Management: Complexity, Rotation, and Managers
    Aug 18 2025

    This episode examines best practices for creating and managing secure passwords. We explain why password length, complexity, and uniqueness are essential to reducing the risk of compromise. You will learn how to implement policies for password history, expiration, and avoiding reuse across different accounts. These guidelines help maintain system security and are directly reflected in the exam objectives.

    We also explore the use of password managers for secure storage and generation, as well as the importance of changing default usernames and passwords on new devices. Examples include enforcing complex password requirements in an organization or using a manager to handle unique credentials for multiple services. Produced by BareMetalCyber.com, where you’ll find more cyber prepcasts, books, and information to strengthen your certification path.

    Show More Show Less
    11 mins
  • Episode 55: Safe Browsing: Certificates, Sites, and AI Risks
    Aug 18 2025

    This episode focuses on safe browsing practices to protect user data and system integrity. We explain how to verify website security using valid certificates, recognize potentially malicious sites, and configure browser settings for safer operation. Privacy considerations include managing cookies, limiting personal information shared online, and understanding how AI-generated content can introduce risks.

    We also discuss examples such as avoiding insecure public Wi-Fi for sensitive transactions, using HTTPS for secure communications, and enabling browser protections to block harmful content. These practices align closely with exam objectives on security awareness and online safety. Produced by BareMetalCyber.com, where you’ll find more cyber prepcasts, books, and information to strengthen your certification path.

    Show More Show Less
    12 mins
  • Episode 54: Software Practices: Licensing, Sources, and Updates
    Aug 18 2025

    This episode covers the best practices for managing software, from verifying licensing compliance to ensuring secure sourcing and regular updates. We explain the differences between open source, proprietary, subscription, and perpetual licenses, along with the importance of product keys and serial numbers.

    We also emphasize downloading software from trusted sources, such as OEM websites or verified app stores, to reduce security risks. Examples include validating application integrity before deployment and ensuring updates are applied without disrupting operations. Produced by BareMetalCyber.com, where you’ll find more cyber prepcasts, books, and information to strengthen your certification path.

    Show More Show Less
    14 mins
  • Episode 53: Device Security: Phishing, Malware, and Hardening
    Aug 18 2025

    This episode addresses key strategies for securing devices against common threats. We cover security awareness measures, such as recognizing phishing attempts, and the importance of anti-malware tools, firewalls, and regular patching. You will learn how to implement physical protections like cable and USB locks, as well as software-based safeguards.

    We also discuss device hardening, which involves disabling unnecessary services, securing default settings, and applying vendor updates. Examples highlight securing both mobile devices and workstations in environments where users handle sensitive data. Produced by BareMetalCyber.com, where you’ll find more cyber prepcasts, books, and information to strengthen your certification path.

    Show More Show Less
    13 mins
  • Episode 52: Authentication and Authorization: Models and Logging
    Aug 18 2025

    This episode focuses on the processes of authentication and authorization, explaining how they verify identity and determine permissions. We outline common authentication methods, from single-factor to multifactor, and introduce models such as least privilege and role-based access control. You will also learn how proper logging supports accounting and auditing functions.

    Real-world examples include setting different access permissions for administrators and users, implementing single sign-on for efficiency, and reviewing log files to identify suspicious activity. These concepts are directly tested in the exam and are vital for secure system administration. Produced by BareMetalCyber.com, where you’ll find more cyber prepcasts, books, and information to strengthen your certification path.

    Show More Show Less
    11 mins