Mapped Learning Podcast

PODCAST · education

Mapped Learning Podcast

I teach the IT universe with clarity, structure, and mapped understanding. If my work helps you, your support helps me keep building it. mappedlearning.substack.com

  1. 10

    Career Journey Advice

    ⭐ Certifications, Degrees, Experience — and Why Quality Beats Quantity Every TimeRead the article below, or listen to the podcast if you want to hear me tell the full story in my own voice.Breaking into tech — or growing within it — is confusing. Everyone has an opinion about certifications, degrees, and experience, and most of those opinions contradict each other. Some people swear by certifications. Others say degrees are the only thing that matter. Others insist that experience is everything. And then there’s the job market itself, which often behaves like none of the above matter at all.This article is about cutting through the noise. It’s about understanding what hiring managers actually look for, why the job market is so unpredictable, and why quality always beats quantity — no matter what stage of your career you’re in.The Three Pillars: Certifications, Degrees, ExperienceEvery career in IT and cybersecurity is built on some combination of these three pillars. But the mistake people make is assuming that more is always better. More certifications. More degrees. More job titles. More bullet points.The truth is simpler:Quantity doesn’t get you hired. Quality does.Certifications show current, testable knowledge. Degrees show long‑term discipline and structured learning. Experience shows real‑world judgment and the ability to solve problems when things break — because things always break.Each one matters, but not equally, and not at every stage of your career.The Job Market Isn’t Fair — And It Isn’t LinearOne of the hardest lessons to learn is that hiring is not a meritocracy. You can be the strongest candidate in the room and still lose the job for reasons that have nothing to do with your skill.I’ve lived this firsthand.I once interviewed for a healthcare role where I answered every technical question, taught the interviewers things they didn’t know, and walked out feeling like the clear choice. They told me I’d hear back soon. Instead, I heard nothing — for a year. The final message simply said the position had been closed.That wasn’t about my ability. It wasn’t about my credentials. It wasn’t about my experience. It was volatility. Internal politics. Budget freezes. Fear. Bias. Or maybe just a manager who didn’t want to feel overshadowed.And then, on the opposite end of the spectrum, I’ve had interviews where I was the only person they talked to. They stopped the search, offered the job immediately, and agreed to a higher salary without hesitation.Same person.Same certifications.Same degrees.Same experience.Completely different outcomes.This is why you can’t tie your worth to a single interview. The hiring process is unpredictable — but your development doesn’t have to be.Quality vs. Quantity: CertificationsCertifications are valuable, but only when chosen intentionally. Stacking fifteen entry‑level certs doesn’t signal expertise — it signals insecurity. Three well‑chosen professional‑level certifications signal far more depth and maturity than a wall of beginner badges.Entry‑level certs say, “I’m learning.”Professional certs say, “I can operate independently.”Specialized certs say, “I can solve real problems.”Certifications aren’t Pokémon cards. You don’t collect them. You select them.Quality vs. Quantity: JobsExperience isn’t the number of jobs you’ve had — it’s the quality of the problems you’ve solved.Twelve jobs in ten years looks unstable.Three jobs in ten years looks like growth.Employers look for trajectory, not volume. They want to see increasing responsibility, not constant resets.Quality vs. Quantity: DegreesDegrees matter — but not universally, and not forever.They matter based on:* The job you want (MBA for leadership, MS for technical depth)* The focus of the degree (cybersecurity degree > general IT degree for security roles)* How recent it is (a 2005 CS degree doesn’t include cloud, zero trust, or modern security)Degrees age. Technology moves. Relevance matters more than the diploma itself.What Employers Actually Look ForWhen you strip away the noise, employers look for:* Depth* Relevance* Progression* Judgment* Stability* Communication* Ability to learn* Ability to solve real problemsNot:* Number of certifications* Number of degrees* Number of jobsHiring managers don’t count — they interpret.The Bottom LineDon’t chase quantity.Don’t tie your worth to a single interview.Don’t assume rejection means you weren’t good enough.Build intentionally.Choose certifications with purpose.Pursue degrees that align with your goals.Seek experience that teaches you something real.Hiring is volatile — but your growth doesn’t have to be.And if you want to hear me tell the full story, including the interviews, the lessons, and the real‑world examples behind all of this, you can listen to the podcast version of this episode.If you ever have questions about your own path — what to take next, how to build a roadmap, or how to position yourself — feel free to reach out. I’m always happy to help. Get full access to Jonathan Lincoln at mappedlearning.substack.com/subscribe

  2. 9

    Staying Safe Online - How to Verify What You Click - Part 1

    Staying Safe Online: How to Verify What You Click — Part 1 (Desktop Edition)By Jonathan — Mapped LearningOnline safety isn’t about fear. It’s about clarity.Every day, people click links in emails, messages, and websites without realizing how easy it is for attackers to imitate something familiar. A login page that looks identical. A sender name that seems legitimate. A URL that’s almost right. One click is often all it takes.Part 1 of this series focuses on desktop verification — how to check websites and emails safely on Windows and macOS. This article follows the same structure as the video and slide deck, giving you a written reference you can return to anytime.You don’t need to memorize everything at once. Think of this as a guide you can revisit as you build confidence.Why Verification MattersMost online attacks don’t start with hacking — they start with tricking.A fake login page.A misleading email.A certificate warning you’ve never seen before.Attackers rely on speed and emotion: urgency, fear, pressure. Verification slows everything down and gives you the space to make a safe decision.1. Understanding Browser CertificatesModern browsers give you powerful signals about whether a site is legitimate. In Part 1, we look at four major browsers:Edge – Untrusted CertificateWhen a certificate is expired, mismatched, or untrusted, Edge warns you clearly.Red indicators, “Not secure” labels, and detailed error messages all point to the same conclusion: don’t enter personal information.Firefox – Trusted CertificateFirefox shows a padlock and a “Connection secure” message when everything checks out.You can inspect the certificate to see who issued it and who it was issued to.Chrome – Trusted CertificateChrome’s security panel confirms when a connection is encrypted and valid.A legitimate site will show a valid certificate issued by a trusted authority.Safari – Trusted CertificateSafari displays ownership information, certificate chains, and expiration dates.This helps macOS users confirm that a site truly belongs to the organization it claims.Why this matters: When you know what a trusted connection looks like, it becomes much easier to spot when something is wrong.2. Email Verification: Malicious vs. LegitimateEmail is still the #1 way attackers trick people.Malicious Email (Outlook Example)Phishing emails often use:* Urgency (“Your photos will be deleted!”)* Fear (“We failed to renew your storage!”)* Impersonation (Apple, Microsoft, banks, etc.)* Suspicious sender domains* Links that point to unrelated or strange URLsEven if the branding looks perfect, the details give it away.Legitimate Email (Browser Example)A real, authenticated email shows:* A consistent sender address* A recognizable domain* A valid digital signature* Clear verification indicatorsThese signals confirm the message hasn’t been tampered with.Why this matters: When you know how a legitimate email behaves, the fake ones become obvious.3. The Live Demo: Real‑World Verification TechniquesIn the video, we walk through the most common tricks attackers use — and how to spot them instantly:* Hover‑over link previews* URL bar verification* Subdomain traps* Misspellings* TLD swaps* Fake login pages* Certificate warnings* Real‑time browser behaviorThese examples show you exactly what to look for when something feels “off.”4. What Comes NextPart 2 will focus on mobile and app verification — how to stay safe on iPhone and Android, where attackers use slightly different tactics.If You Have Questions, I’m HereThis topic can feel overwhelming at first. No one is expected to master everything immediately — that’s why Mapped Learning exists.If you have questions about:* Something you saw in the video* A suspicious email you received* A website you’re unsure about* A certificate warning you don’t understandYou can reach out anytime. I’m always happy to help you learn safely and confidently.Thanks for being hereEverything I make is free, and I’m grateful you’re part of this journey.If this helped you, share it with someone who’s learning too.Slides with notes:Mapped Learning Substack: https://substack.com/@mappedlearningMapped Learning YouTube: https://www.youtube.com/@mappedlearningMapped Learning Patreon: https://www.patreon.com/cw/mappedlearning Get full access to Jonathan Lincoln at mappedlearning.substack.com/subscribe

  3. 8

    IPv4 Subnetting - Part 2

    IPv4 Subnetting, Part 2 —The Magic Number, the Octet of Interest, and the Subnetting WorkflowSubnetting is one of the most important skills in networking — and one of the most intimidating when you’re first learning it. In Part 1 of this series, you learned the foundations: CIDR notation, borrowing bits, and how AND‑ing determines network boundaries.In Part 2, we take those ideas and turn them into a repeatable, mechanical workflow you can use for any subnetting problem.This article walks you through every concept from the lesson so you can follow along even if you haven’t watched the video yet.1. The Subnet Mask Table —Your Reference PointBefore you calculate anything, you need a quick way to understand how subnet masks behave. The Subnet Mask Table gives you three things:* The traditional IPv4 class ranges (A, B, C)* The value of the “bits borrowed” in the octet of interest* The binary scale (128 → 1)Even though modern networks use CIDR, the class ranges still help you understand why certain addresses behave the way they do. When you see an address starting with 10, 172, or 192, you immediately know the “shape” of the network you’re working with.This table becomes your anchor for the rest of the workflow.2. The Magic Number —Two Ways to Calculate ItThe Magic Number is the key value that tells you where each subnet begins.There are two valid ways to calculate it:Method 1: 256 – the subnet mask value in the octet of interestExample:Mask = 255.255.240.0 → octet of interest = 240Magic Number = 256 – 240 = 16Method 2: Look at the last “1” bit in the binary scaleBinary scale: 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1If the last “1” bit is under the 16 column → Magic Number = 16Both methods always give you the same result.Use whichever feels more natural.3. The Octet of Interest — What to Do With ItOnce you know the prefix length (like /20 or /27), you can identify the octet of interest — the octet where subnetting actually happens.Here’s what you do next:* All octets to the left stay the same. Those bits are part of the network.* The octet of interest and everything to the right becomes 0. This resets the address to the beginning of the subnet.* The result is your first subnetted network (the first network ID).This step gives you a clean starting point before you begin calculating hosts and broadcasts.4. What the Magic Number Actually DoesOnce you’ve reset the address, the Magic Number takes over.It drives the entire subnetting workflow:1. Next NetworkStart at 0 in the octet of interest.Add the Magic Number repeatedly:0, 16, 32, 48, 64…Each value is the start of a new network.2. First HostTake the network ID and add one binary bit (+1).This is always the first usable address.3. Broadcast AddressTake the next network and subtract one binary bit (–1).That gives you the broadcast.4. Last HostTake the broadcast and subtract one more binary bit (–1).That’s the last usable address.These four steps repeat for every subnet you ever calculate.5. Putting It All Together — The Practice WorkflowIn the lesson, you work through nine examples — three from each class — using the exact same steps every time:* Identify the octet of interest* Calculate the Magic Number* Reset the address to find the first network ID* Add the Magic Number to find the next network* Use +1 and –1 to find:* First host* Last host* Broadcast* Repeat for each new subnetEvery example uses a different prefix length, which helps you build speed and confidence across a wide range of scenarios.6. Why This Workflow WorksSubnetting becomes easy when you stop trying to memorize patterns and start using a predictable process.The Subnet Mask Table, the Octet of Interest, and the Magic Number give you a mechanical system you can apply to any IPv4 address.By the time you finish the practice problems, the entire workflow feels automatic — and that’s exactly what you want before moving into real‑world subnet design in Part 3.Everything I make is free, and it’s built to help you learn clearly and without noise. If this lesson helped you, share it with someone who’s learning too — it makes a real difference.See you in Part 3.Subnetting Part 2 slides with notes:⭐ Watch the lesson (Subnetting Part 1)🎥 YouTube Video:📝 Slides + Notes for Subnetting Part 1:IPv4 Subnetting - Part 1 Get full access to Jonathan Lincoln at mappedlearning.substack.com/subscribe

  4. 7

    IPv4 Subnetting - Part 1

    Subnetting has a reputation for being one of the most confusing topics in networking — but that’s usually because people jump straight into the math without understanding the ideas underneath it. In Mapped Learning, we do things differently. Before we calculate anything, we build the mental tools that make subnetting make sense.Today’s lesson is IPv4 Subnetting, Part 1, and it focuses entirely on the foundations:* What CIDR notation really means* How subnet masks are built* What “borrowing bits” actually does* How devices determine their network using AND‑ingThese concepts are the backbone of every subnetting problem you’ll ever solve.⭐ Why start here?Subnetting isn’t just a math exercise — it’s a way of thinking about networks. If you understand why subnetting works, the calculations become predictable instead of intimidating.This lesson gives you that foundation.We slow down, look at the structure of IPv4 addresses, and build the intuition you need before touching formulas or tables.By the end of Part 1, you’ll understand:CIDR NotationHow the /24, /25, /28, etc., define the boundary between network bits and host bits — and how that boundary shapes the entire network.Borrowing BitsHow subnetting creates more networks by shifting bits from the host side to the network side, and why that changes the number of available hosts.Binary MasksHow subnet masks look in binary, and how that binary pattern defines the network.AND‑ingHow devices determine whether two IP addresses are on the same network by performing a simple logical operation.These aren’t tricks — they’re the rules that every router and host follows.⭐ What’s inside the lessonIn the video and slides, we walk through:* A clear explanation of CIDR notation* A breakdown of the CIDR acronym* A visual demonstration of borrowing bits* Binary subnet masks and what they represent* A real AND‑ing example showing two devices on different networksEverything is designed to be simple, visual, and calm — the mapped‑learning way.If you’re new to networking, this will make subnetting feel far less mysterious.If you’re experienced, this will reinforce the fundamentals that make advanced topics easier.⭐ What’s coming nextIn IPv4 Subnetting, Part 2, we’ll take these concepts and turn them into practical skills:* The subnet mask table* The “magic number”* How to calculate networks quickly* Practice exercises to build confidencePart 1 gives you the understanding.Part 2 gives you the speed.⭐ Thanks for being hereEverything I make is free, and it’s built to help you learn clearly and without noise. If this lesson helped you, share it with someone who’s learning too — it makes a real difference.See you in Part 2.Subnetting Part 1 slides with notes:⭐ Watch the lesson (IPv4)🎥 YouTube Video: 📝 Slides + Notes for IPv4: Get full access to Jonathan Lincoln at mappedlearning.substack.com/subscribe

  5. 6

    Q&A - Xfinity Cable Modem Speeds

    Today’s lesson is based on a question from a friend:“Would you upgrade your modem from an XB7 from Xfinity? I was curious if there was a better, more secure option or if it was good enough as-is since it’s a Cisco modem but it only seems to have WEP2 security.”Great question! If you would like to ask your own question for me to answer, feel free to ask here: Mapped Learning ChatTo answer that question, we need to compare the technical specifications of all three modem / router combos. - Xfinity ModemsAs we can see from the table, all three modems have the same number of Ethernet ports. However, the XB7 / 8 / 10 have Wifi 6 / 6E / 7 respectively.As you can see from the table, Wifi 6 and 6E have similar specifications, but 6E support 2.4, 5, and 6 Ghz speeds, where 6 does not support 6 Ghz. 6 Ghz is faster for newer phones and computers. Wifi 7 supports wireless speeds up to 23 Gbps, while 6 / 6E supports up to 9.6 Gbps.Quick answer: If Xfinity is offering an upgrade from XB7 to XB10 for free, then I would take it. If you had to pay, I would NOT pay for an XB8 upgrade, but I WOULD pay for an XB10 depending on the price. For a more detailed answer, please watch the attached video.Mike’s Facebook page for The Workshop: The Workshop Get full access to Jonathan Lincoln at mappedlearning.substack.com/subscribe

  6. 5

    Cybersecurity Fundamentals - Full Video Lesson

    This video is a clear, beginner‑friendly walkthrough of the CIA Triad, the foundational model that shapes every cybersecurity decision. If you’re new to cybersecurity or just want a simple, structured explanation of how Confidentiality, Integrity, and Availability work, this lesson breaks everything down in a mapped‑learning flow that’s easy to follow.In the video, I explain what the CIA Triad actually represents and why it’s the cornerstone of modern security. We start with Confidentiality, exploring how encryption works, why symmetric and asymmetric algorithms exist, and what makes each one useful in different situations. You’ll see how keys, algorithms, and real‑world examples all tie together to protect sensitive information.From there, we move into Integrity, focusing on hashing and why it’s different from encryption. I walk through how hashing algorithms create fingerprints of data, why they can’t be reversed, and how they’re used to detect tampering, verify authenticity, and support secure systems. We also look at common hashing families and what makes some of them secure while others are considered broken.Finally, we cover Availability, the part of cybersecurity that ensures systems and data are accessible when they’re needed. I explain how redundancy, backups, failover systems, and modern cloud technologies all work together to keep services online — and how attacks like ransomware directly target this pillar.Throughout the lesson, I also highlight the tradeoffs between the three pillars. Strengthening one area often puts pressure on the others and understanding that balance is a key part of thinking like a cybersecurity professional. You’ll see real examples of how protecting confidentiality can impact availability, how integrity checks can slow systems down, and why no organization can maximize all three pillars at once.If you’re studying for a certification, working in IT, or simply curious about how cybersecurity works at a foundational level, this lesson gives you a clear, practical understanding of the CIA Triad and the technologies behind it. Everything is presented in a linear, mapped‑learning format so you can follow along easily and build confidence as you go.As always, everything here is free to learn and free to share. I hope this video helps you build a strong foundation in cybersecurity, and I welcome any questions or comments as we continue our journey.— Jonathan LincolnHere is the link to the article with the PowerPoint slides shown in this video: Get full access to Jonathan Lincoln at mappedlearning.substack.com/subscribe

  7. 4

    Internet Protocol version 4 (IPv4) - Full Video Lesson

    Summary: IPv4 is a 32‑bit addressing system made of four 8‑bit octets, with binary values determining ranges, classes, and subnet masks. This lesson walks through binary powers, classful addressing, default masks, and CIDR notation using clear examples like 192.168.1.15/24.Links: Full article + PDF = Internet Protocol version 4 (IPv4)Mapped Learning Substack = Mapped Learning - SubstackMapped Learning YouTube = Mapped Learning - YouTubeMapped Learning Patreon = Mapped Learning - PatreonNext: Next chapter coming soon Get full access to Jonathan Lincoln at mappedlearning.substack.com/subscribe

  8. 3

    About Me — Who I Am and Why I Teach

    Welcome to the About Me video — the story behind who I am, where I come from, and why I created Mapped Learning.My path through education has been long, intentional, and built on curiosity. I started at Heald College, earning four Associate’s degrees in Applied Sciences: Electronics and Computer Repair, Cisco Networking, Microsoft Networking, and Network and Systems Administration. From there, I earned my Bachelor’s in Network Administration from Western Governors University, followed by two Master’s degrees — one in Information Security and Assurance, and another in IT Management through an MBA program. I’m now working toward my PhD in Information Systems with a specialization in Cybersecurity at Dakota State University, with a planned completion in August 2029.Along the way, I’ve passed more than 25 professional IT certification exams, most of which are still active. I’ll be posting the full list on the Mapped Learning Substack so you can see exactly what I’ve studied and where my expertise comes from.My career has taken me across the entire IT spectrum. I started in retail as a Sales Associate, then moved into IT roles including Desktop Support Specialist, Systems Administrator, Senior Server Administrator, and IT Instructor at two different colleges. Today, I serve as a Cybersecurity Manager — an Information Systems Security Manager (ISSM) supporting the Department of Defense. It’s a role that brings together everything I’ve learned: security, leadership, architecture, troubleshooting, and the responsibility of protecting systems that real people depend on.Mapped Learning exists because I’ve always wanted to teach — but only to people who want to learn. Not to a classroom forced to be there. Not to students checking a box. This platform lets me teach freely, clearly, and without noise.Education is one thing. Knowledge is another.Education is structured and credentialed.Knowledge is what actually changes your life.And I believe knowledge should be free.This channel is yours.Tell me what you want to learn.Ask questions about anything technical that confuses you or that you want to understand better.Mapped Learning is a long‑term project, and I plan to keep building it as long as it helps people who genuinely want to learn.Thanks for being here.If this resonates with you, share it with someone who’s learning too.Everything I create here is free — and if you want to support the mission, the links are below.We’re just getting started. Get full access to Jonathan Lincoln at mappedlearning.substack.com/subscribe

  9. 2

    Mapped Learning Begins Here

    Welcome to Mapped Learning — a place to learn freely, without ads or noise.This project has been years in the making. I’ve always wanted to teach, but only to people who want to learn. Substack gives me the perfect platform to do that: clean, structured, distraction‑free, and built for long‑form clarity.Mapped Learning isn’t a traditional tutorial channel. It’s not random tech videos, and it’s not a linear course you have to follow from beginning to end. This is a mapped‑learning ecosystem. Every video fits into a larger structure. Every category has its own path. Every chapter builds on the one before it.You’ll see videos across multiple categories — networking, security, workflows, troubleshooting, conceptual clarity, and more. I don’t publish them in strict order, but inside each category, the chapters are sequential. So if you see “Subnetting #3,” that’s the next chapter after #2, even if I posted a security video in between.My goal is simple: give you clarity. Not just how to do something, but why it works, how it fits, and how to think about it.If you’re new here, start anywhere. Pick a category that interests you and begin at Chapter 1. If you’re more experienced, jump straight into the chapter you need — the mapped visuals will keep you oriented.This space is yours.Tell me what you want to learn.Ask questions.Share what confuses you or what you want to understand better.Everything I create here is free.If it helps you, share it with someone who’s learning too.Thanks for being here.We’re just getting started. Get full access to Jonathan Lincoln at mappedlearning.substack.com/subscribe

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

I teach the IT universe with clarity, structure, and mapped understanding. If my work helps you, your support helps me keep building it. mappedlearning.substack.com

HOSTED BY

Guiding you through the IT universe with clarity and confidence

CATEGORIES

URL copied to clipboard!