Showing results by author "Jason Edwards" in All Categories
-
-
Certified - AI Security Audio Course
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
The AI Security & Threats Audio Course is a comprehensive, audio-first learning series focused on the risks, defenses, and governance models that define secure artificial intelligence operations today. Designed for cybersecurity professionals, AI practitioners, and certification candidates, this course translates complex technical and policy concepts into clear, practical lessons. Each episode explores a critical aspect of AI security—from prompt injection and model theft to data poisoning, adversarial attacks, and secure machine learning operations (MLOps). You’ll gain a structured ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
The Business Owners Guide to Tax Freedom
- If You Are Tired of Overpaying Income Tax, This Book Is for You
- By: Edward Cotney, Douglas A. Dickey, R. Dustin MacFarlane, and others
- Narrated by: Rachel Sloane
- Length: 5 hrs and 1 min
- Unabridged
-
Overall0
-
Performance0
-
Story0
Proactive tax planning for 2025 and beyond. This book is for business owners who would like to better protect what they have created, pay less tax, increase cash flow and enjoy more life. A lot of tax professionals are compliance focused rather than planning focused. As such they may not be looking at ways to improve your future but rather focused on accounting for the past. As an entrepreneur you are always focused on the future and looking to optimize your business and its value.
-
The Business Owners Guide to Tax Freedom
- If You Are Tired of Overpaying Income Tax, This Book Is for You
- Narrated by: Rachel Sloane
- Length: 5 hrs and 1 min
- Release date: 22-04-25
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£12.20 or free with trial. Auto-renews at £5.99/month after trial. See eligibility.
-
-
-
Framework - ISO 27001 (Cyber)
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
The ISO/IEC 27001 Framework is the internationally recognized standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). It provides a systematic approach to managing sensitive information through risk management, governance, and control implementation. At its core, ISO 27001 helps organizations protect the confidentiality, integrity, and availability of data—whether stored, processed, or transmitted—by aligning security practices with business objectives and regulatory requirements. The framework is built around a ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
A Grave Friend
- By: Jason Harris Edwards
- Narrated by: Merphy Napier
- Length: 8 mins
- Unabridged
-
Overall0
-
Performance0
-
Story0
You can't blame Carl for enjoying death more than life. That's when he lived the most! Join Carl, as he meets the young adventurous kids that will change his life...rather, his death, forever. Dark forests are explored, old bogs reveal secrets, and life long friendships are forged in the unforgettable tale of A Grave Friend.
-
A Grave Friend
- Narrated by: Merphy Napier
- Length: 8 mins
- Release date: 28-10-19
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£4.29 or free with trial. Auto-renews at £5.99/month after trial. See eligibility.
-
-
-
Certified - CompTIA CYSA+ Audio Course
- By: Dr. Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
The CYSA+ Audio Course is your complete, exam-focused companion for mastering the CompTIA Cybersecurity Analyst (CYSA+) certification. Designed for learners who are always on the move, this Audio Course transforms the official exam objectives into clear, structured, and easy-to-follow lessons. Each episode helps you understand, retain, and apply key cybersecurity analysis skills—covering threat detection, vulnerability management, security architecture, and incident response. Whether you’re studying during your commute, exercising, or reviewing between shifts, every session is crafted to ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
Certified: The CompTIA Security+ Audio Course
- By: Dr. Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and help you pass on your first attempt. Structured for busy professionals and new learners alike, the ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
Certified: The ISC(2) CC Audio Course
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
Certified: The ISC(2) CC Certification Audio Course is an audio-first study program built for people who want a clean, practical path into cybersecurity without getting buried in jargon. It’s designed for beginners and career changers, as well as IT and business professionals who need a solid security foundation. If you’re aiming for the ISC(2) Certified in Cybersecurity (CC) credential, this course gives you a structured way to learn the concepts the exam expects, using plain language and real-world framing. You do not need a deep technical background to start. You need consistency, ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
Certified: The ISACA AAIA Audio Course
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
Welcome to Certified: The ISACA AAIA Audio Course. I’m your guide for this series, and my job is to make AI auditing feel clear, structured, and doable for people who already have a full plate. Across these episodes, you’ll build a practical mental model for how AI systems work in an organization and how an auditor or assurance professional should evaluate them. Expect plain language, a steady pace, and a focus on what you can actually test, document, and defend. We’ll spend time on governance, data, models, controls, and monitoring, but we’ll always bring it back to audit outcomes: ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
Certified: The GIAC GLEG Audio Course
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
Welcome to Certified: The GIAC GLEG Certification Audio Course. I’m your guide for this series, and my job is to make the legal side of cybersecurity feel clear, practical, and usable, even if you’ve never taken a law class. In the real world, security work doesn’t happen in a vacuum. The moment an incident becomes an investigation, or a monitoring tool becomes a privacy concern, legal rules start shaping what you can do and how you should document it. In this course, we’ll connect the law of data security and investigations to the decisions you make in policy, compliance, incident ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
Certified: The ISACA CCOA Audio Course
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
Welcome to Certified: The ISACA CCOA Audio Course, a focused, audio-first program designed to help you build confidence in cybersecurity audit and assurance. If you’ve ever struggled to interpret an audit request, map security work to a control expectation, or explain evidence in a way that satisfies reviewers, you’re in the right place. I’ll guide you through the concepts that show up again and again in assurance work: how audit scope gets defined, how controls are evaluated, what strong evidence looks like, and how findings are framed. Expect clear explanations, practical language, and...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
Certified: The ISACA CDPSE Audio Course
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
Welcome to Certified: The ISACA CDPSE Audio Course. I’m going to guide you through the ideas and skills that sit behind the Certified Data Privacy Solutions Engineer credential, in a way that’s clear, exam-aligned, and grounded in how privacy actually works inside organizations. You can expect focused episodes that build your understanding step by step, from privacy governance and data life cycle thinking to privacy by design practices that hold up under real delivery pressure. We’ll keep the language straightforward, define terms in context, and connect each topic to the kinds of ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
Certified: The ISACA AAIR Audio Course
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
Welcome to Certified: The ISACA AAIR Audio Course. If you’re here, you’re probably seeing AI show up everywhere: in products, in internal tools, in vendor roadmaps, and in executive conversations that expect quick answers. I built this course for people who need to evaluate AI systems responsibly, even when they don’t have time to become machine learning specialists. Across these episodes, we’ll translate AI concepts into assurance language you can use: governance, controls, evidence, risk, and accountability. You’ll learn how to ask better questions, how to recognize weak assurances...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
Certified: The GIAC GCIL Audio Course
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
Welcome to Certified: The ISACA GCIL Audio Course. I’m Dr Jason Edwards, and I built this series for people who need governance leadership skills that hold up under real pressure—tight timelines, conflicting priorities, and stakeholders who want answers today. Across these lessons, you’ll hear a clear, practical walkthrough of what governance leadership means, how it differs from management, and how to apply it in organizations where technology, risk, and business goals collide. Expect short, focused episodes with straightforward explanations, common-sense examples, and language you can ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
Certified: The GIAC GSOM Audio Course
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
Welcome to Certified: The ISACA GSOM Audio Course. I’m here to help you build the kind of security operations management mindset that works in the real world, where priorities shift, alerts pile up, and executives want answers in plain language. Across this course, you can expect practical explanations, clear definitions, and guidance that connects day-to-day operations to business risk. We’ll talk about how security teams are structured, how work gets triaged and tracked, how incidents are managed without chaos, and how to report progress in a way leaders trust. Everything is taught with ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
Certified: The GIAC GISF Audio Course
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
Welcome to Certified: The ISACA GISF Audio Course. I built this course for people who want a clear, practical path into cybersecurity fundamentals—whether you’re moving into a security role, supporting security from IT or operations, or trying to build a reliable baseline before you specialize. Here’s what you can expect: short, focused lessons that connect concepts to real environments, plain-language explanations that still respect the technical detail, and a steady progression that helps you understand not just what something is, but why it matters. We’ll cover threats, risk, ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
Certified: The GIAC GPCS Audio Course
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
The podcast delivers practical cloud security guidance for professionals who have to ship real systems on real timelines. Episodes focus on the moves that prevent costly incidents: reducing accidental exposure, tightening identity and permissions, hardening serverless triggers, securing managed platforms, and building durable defaults that survive updates and team changes. The approach is technical and operational, with clear explanations that translate directly into repeatable patterns. Each topic is designed to help you think like both a defender and an architect: what attackers exploit ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
Certified: The GIAC GCLD Audio Course
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
This course teaches you how to secure cloud environments the way real incidents unfold: misconfigurations, over-permissioned identities, weak network boundaries, and data exposure paths that are easy to miss until it’s too late. You’ll build a practical, defensible security posture across compute, containers, storage, and managed services by using hardened baselines, policy enforcement, continuous validation, and clear ownership. Along the way, you’ll learn how to reduce attack surface with immutable deployment patterns, least privilege workload identities, safe sharing defaults, and ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
Certified: The GIAC GSLC Audio Course
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
This audio-first cybersecurity course is built for busy professionals who need security that works in real environments, not just on slides. You’ll learn how to design monitoring, logging, SIEM, and SOAR operations that produce usable visibility, reduce noise, and support fast, defensible response. Along the way, you’ll connect technical controls to practical program execution: ownership, SLAs, governance, decision rights, and evidence that holds up during incidents and audits. You’ll also strengthen your ability to explain risk in business terms and prioritize work using context like ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
Certified: The GIAC GCCC Audio Course
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
GCCC is a control-first security course built for busy professionals who want practical mastery of the CIS Controls v8 and the real-world workflows that make them stick. You’ll learn how to inventory assets and software with confidence, harden configurations without breaking operations, manage vulnerabilities with proof-based closure, and turn logging into outcomes through centralized collection, correlation, and sustainable alerting. The course also covers malware defense as layered prevention plus rapid containment, data protection through classification, access boundaries, and safe ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-
-
-
Certified: The GIAC GCTI Audio Course
- By: Jason Edwards
- Original Recording
-
Overall0
-
Performance0
-
Story0
This course is designed to teach you how real-world threat intelligence actually works, from first signal to final decision. It focuses on turning raw technical data into clear, defensible intelligence that security teams and leaders can trust. Rather than memorizing isolated frameworks or chasing alerts, you learn how to think analytically, challenge assumptions, and build conclusions that hold up under pressure. The emphasis throughout is on clarity, rigor, and practical application in modern security environments. You will learn how to model intrusions, track adversary behavior over time, ...
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
-