Episode 221: Developing and Executing Security Awareness Programs (Domain 5)
Security awareness programs don’t happen by accident—they’re built with intent, tested with feedback, and refined over time. In this final episode of the series, we walk through how to develop and execute a successful awareness program, from defining goals and identifying target audiences to choosing content formats and delivery methods. We discuss how to incorporate phishing simulations, microlearning modules, video training, and role-specific content to meet learners where they are. Execution involves not just delivery, but reinforcement through regular communication, gamification, and leadership engagement. We also cover program measurement—tracking participation, testing knowledge, and adjusting campaigns based on results. A strong awareness program turns passive users into active defenders, extending your security posture across every click, login, and decision.
--------
8:34
--------
8:34
Episode 220: Security Reporting and Monitoring (Domain 5)
A well-informed workforce should be empowered not just to avoid risk—but to report it. In this episode, we explore how organizations build clear, accessible reporting channels that encourage employees to share suspicious activity, policy violations, or near misses without fear of reprisal. We also examine how recurring reports—like monthly phishing metrics or training completion rates—can help monitor the effectiveness of your awareness program and adjust content accordingly. Beyond individual reports, monitoring systems track broader trends in user behavior, risk exposure, and incident volume, providing insight into where further training may be needed. Reporting and monitoring aren’t just reactive tools—they’re indicators of a healthy security culture. The more people contribute, the stronger your human firewall becomes.
--------
8:56
--------
8:56
Episode 219: Hybrid and Remote Work Security Awareness (Domain 5)
Remote and hybrid work models create new layers of security complexity—blending corporate environments with home networks, personal devices, and cloud-first workflows. In this episode, we explore the core topics of remote work security awareness, starting with safe home Wi-Fi configurations, strong authentication, and VPN use for secure connections. We then discuss endpoint hardening for laptops and mobile devices, including encryption, screen locking, and secure backup practices. Hybrid workers also need guidance on physical security—like preventing shoulder surfing in public places or securing devices during commutes. Training should also cover secure transitions between environments, cloud data handling, and how to report incidents while working remotely. As the office perimeter disappears, awareness becomes the frontline.
--------
9:31
--------
9:31
Episode 218: User Guidance and Training (Part 3) (Domain 5)
Security training must evolve with the threat landscape—and that means addressing common but high-risk topics like removable media, social engineering, and operational security (OPSEC). In this episode, we explain how removable media—like USB drives and external hard drives—pose significant threats when plugged into unmanaged or infected systems. We also explore how cables, chargers, and other seemingly harmless peripherals can be weaponized to deliver malware or steal data. Social engineering training teaches users how to resist psychological manipulation—whether it’s through pretexting, impersonation, or urgency tactics. Finally, we dive into OPSEC, helping employees understand how casual conversations, unsecured devices, or oversharing on social media can inadvertently expose sensitive operations. This part of training connects behavior to consequence—turning security into a daily awareness practice, not just a quarterly presentation.
--------
8:50
--------
8:50
Episode 217: User Guidance and Training (Part 2) (Domain 5)
Beyond basic policy understanding, users need targeted training in key risk areas that attackers frequently exploit—especially insiders, passwords, and privileged access. In this episode, we focus on insider threat awareness, teaching employees how to recognize red flags like excessive access, unusual behavior, or data hoarding by peers. We also cover password management best practices: creating complex passphrases, using password managers, and understanding why reuse is dangerous. Many incidents begin with a weak or compromised password—making training a top defense. Finally, we emphasize tailoring training for different roles, with higher emphasis on privileged users who have elevated access to sensitive systems and data. The more your users understand the risks tied to their behavior, the better positioned they are to act as allies in defense.
Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence.
Created by cybersecurity author and educator Dr. Jason Edwards, this podcast is designed for learners who seek practical explanations, effective study strategies, and a structured path to certification. If you're serious about passing the Security+ exam—and launching your cybersecurity career—this podcast is your edge.
For a deeper study experience, grab a copy of Achieve CompTIA Security+ SY0-701 Exam Success by Dr. Jason Edwards. It’s the most concise and comprehensive Security+ guide available—built for busy professionals who want to pass the exam quickly and on their first attempt. You’ll also find additional resources, practice questions, and tools at BareMetalCyber.com.