Technology Tap
This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
Episodes
98 episodes
Cybersecurity Fundamentals: Hunting Weak Spots Chapter 8
What’s the weakest link in your world—an old router, a forgotten Windows box, or that “anyone with the link” setting you meant to change? We unpack the real vulnerabilities hiding in small businesses, nonprofits, and home networks, then share a...
•
Season 5
•
Episode 98
•
25:29
A Plus+ Fundamentals: Network Language, Decoded Chapter 6
Ever wish the network would just explain itself? We walk through the real language of connectivity—how links come alive, how packets choose their paths, and how a few core ideas unlock routers, firewalls, addressing, and the exam questions that...
•
Season 5
•
Episode 97
•
25:11
History of Modern Computing : Cloud, Unboxed
What if the world’s hard drives merged into one invisible place—and you used it a hundred times today without thinking? We pull back the curtain on cloud storage, tracing its unlikely path from room-sized machines and punch cards to AWS’s game-...
•
Season 5
•
Episode 96
•
25:03
Cybersecurity Fundamentals : High Availability, Real Resilience Chapter 7
What keeps a business alive when the lights flicker, a server drops, or an ISP blinks? We pull back the curtain on practical resilience—how continuity planning, capacity, and clear runbooks turn chaos into a minor hiccup—then pressure-test the ...
•
Season 5
•
Episode 95
•
24:45
A + Fundamentals : Networking Unlocked: From LANs to Wi-Fi 7 Chapter 5
What if your “all-in-one” router is doing too much—and your Wi‑Fi “speed” isn’t the real bottleneck? We pull back the rack door and trace the digital bloodstream from SOHO setups to enterprise backbones, translating jargon into choices you can ...
•
Season 5
•
Episode 94
•
26:23
History of Modern Technology: Pocket Power: The USB Story
A tiny stick changed how we move information—and how attackers move too. We pull back the curtain on the USB flash drive’s quiet takeover: why floppies and CD-Rs failed us, how flash memory and USB converged, and which teams across Singapore, I...
•
Season 5
•
Episode 93
•
25:29
Cybersecurity Fundamentals : Cloud, Zero Trust, and You Chapter 6
Cloud perimeters are fading, identities are multiplying, and threats move faster than patches. We dive into the real mechanics of securing a hybrid world—mapping cloud deployment choices, clarifying shared responsibility across SaaS, PaaS, and ...
•
Season 5
•
Episode 92
•
23:57
A+ Fundamentals: Boot to Brains Chapter 4
A dead PC at the worst moment is a gut punch—unless you have a roadmap. We walk through the exact thinking that turns “no lights, no fans, no display” into a calm, step‑by‑step recovery, starting where every system truly begins: firmware. BIOS ...
•
Season 5
•
Episode 91
•
24:47
History of Modern Technology : Zip vs. CD
Storage didn’t just get bigger; it got personal. We rewind to the late ’90s and early 2000s to unpack the clash between Iomega’s Zip drive and the laser-lit world of the CD—two formats that taught a generation how to back up, carry, and truly o...
•
Season 5
•
Episode 90
•
23:47
Cybersecurity Fundamentals : Enterprise Security Architecture Chapter 5
Dive deep into the essential building blocks of secure enterprise networks with Professor J. Rod in this comprehensive exploration of network architecture, security appliances, and remote access solutions.What makes a truly secure organ...
•
Season 5
•
Episode 89
•
24:27
A+ Fundamentals : Power First, Stability Always Chapter 3
What if the real cause of your random reboots isn’t the GPU at all—but the power plan behind it? We take you end to end through a stability-first build, starting with the underrated hero of every system: clean, properly sized power. You’ll lear...
•
Season 5
•
Episode 88
•
25:18
The Rise and Fall of Floppy Disks: From 5.25" to 3.5" Storage Revolution
Remember that satisfying click of inserting a floppy disk? The nerve-wracking moments waiting for your term paper to save? The frustration of "Please insert disk 5 of 12" during game installations?Join Professor J-Rod on a nostalgic yet...
•
Season 5
•
Episode 87
•
24:40
Cybersecurity Fundamentals: Cracking the Authentication Code Chapter 4
Ever wonder what happens behind the scenes when you tap "Login" on your favorite app? Authentication is the invisible guardian standing between your personal data and potential attackers, and it's more sophisticated than you might think.
•
Season 5
•
Episode 86
•
26:48
A+ Fundamentals Chapter 1 and 2: Becoming an IT Specialist: Troubleshooting and Hardware Essentials
The digital world seems like magic to many, but behind every functioning computer is a complex system of hardware components and methodical troubleshooting approaches. In this comprehensive episode, we pull back the curtain on what makes IT spe...
•
Season 5
•
Episode 85
•
23:47
Cybersecurity Fundamentals Crypto Keys: Protecting Our Digital World Chapter 3 Part 2
Cryptology isn't just theory—it's the invisible shield protecting your every digital move. This second installment of our cryptology deep dive moves beyond the fundamentals to reveal how these powerful tools operate in real-world systems that s...
•
Season 5
•
Episode 84
•
10:02
Cybersecurity Fundamentals: Crypto Shields: How Your Data Stays Secret Chapter 3 Part 1
Have you ever wondered what invisible force protects your private messages, banking details, and personal information as they travel across the internet? The answer lies in cryptology—the fascinating science of securing information through math...
•
Season 5
•
Episode 83
•
10:26
History of Modern Technology : The 8 inch Floppy
Step back in time with Professor JRod as we uncover the remarkable story of the 8-inch floppy disk – the groundbreaking invention that forever changed how we store and transport digital information.Before cloud storage, before USB drive...
•
Season 5
•
Episode 82
•
9:01
Cybersecurity Fundamentals : Hacking Humans: The Art of Social Engineering Chapter 2 Part 2
Cybersecurity isn't just about firewalls and antivirus software—it's about understanding the complex interplay between technical systems and human psychology. In this continuation of our Security+ series, we explore the multifaceted world of at...
•
Season 5
•
Episode 81
•
23:49
Cybersecurity Fundamentals: Understanding Threat Actors Chapter 2 Part 1
Dive deep into the world of cybersecurity threat actors with Professor J-Rod as we unpack the essential definitions from Chapter 2 of the Security+ 701 certification exam. This knowledge-packed episode breaks down the critical foundation of inf...
•
Season 5
•
Episode 80
•
22:35
The Mentor Effect
What separates career-changing advice from everyday guidance? The difference often lies in both the wisdom itself and the intentions of those sharing it. Professor JRod takes a detour from his usual CompTIA certification topics to ...
•
Season 5
•
Episode 79
•
16:54
Cybersecurity Fundamentals: Unlocking Security+ Chapter 1 Part 2: Controls and Roles
Diving into the foundations of cybersecurity certification, Professor JRod delivers an insightful exploration of CompTIA Security+ Chapter 1, revealing why this certification might actually be more approachable than many believe. Unlike many en...
•
Season 5
•
Episode 78
•
26:47
Cybersecurity Fundamentals: Unlocking Security Plus Chapter 1 Part 1
Professor JRod makes a triumphant return to Technology Tap after a year-long hiatus, bringing listeners up to speed on his personal journey and diving straight into Security Plus 701 fundamentals. Having completed his doctorate and subsequently...
•
Season 5
•
Episode 77
•
26:05
The 2016 Verizon Hack: Lessons in Cybersecurity and Data Protection
Ever wondered how one of the largest telecommunications companies fell victim to a major cyberattack? Join us as cybersecurity students Alexis Severo and Aaron Kispe unravel the infamous Verizon hack of 2016. We kick off our discussion with an ...
•
Season 4
•
Episode 76
•
14:37
The OPM Breach Unveiled: A Deep Dive into the 2013 Cyber Attack on Government Personnel Data
What happens when the very agency responsible for safeguarding government personnel data becomes the target of an unprecedented cyber attack? Join us on this riveting episode of Technology Tap as we unravel the intricacies of the infamous Offic...
•
Season 4
•
Episode 75
•
17:57
From N10-008 to N10-009: What's New And Also Spanning Tree Protocols
Ready to ace the new CompTIA Network Plus exam, N10-009? Discover the game-changing updates and crucial differences from the N10-008, and learn how to sharpen your skills on modern tech like SD-WAN, 5G, and cloud architecture. We'll guide you t...
•
Season 4
•
Episode 74
•
17:19