1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Arts Education Books Tech News News
Update frequency
every day
Average duration
24 minutes
Episodes
1000
Years Active
2024 - 2025
Share to:
Wi-Fi 7 In Depth: Your guide to mastering Wi-Fi 7, the 802.11be protocol, and their deployment

Wi-Fi 7 In Depth: Your guide to mastering Wi-Fi 7, the 802.11be protocol, and their deployment

Provides an extensive guide to Wi-Fi 7 (802.11be protocol), detailing its technical aspects and deployment strategies. It covers the evolution of Wi-Fi standards, including physical layer enhancement…
00:19:40  |   Sat 06 Sep 2025
Building an Effective Security Program

Building an Effective Security Program

Offers comprehensive guidance on establishing and operating an effective cybersecurity program. It addresses various facets of cybersecurity, including understanding cyber threats and attackers, impl…
00:25:26  |   Sat 06 Sep 2025
Azure Strategy and Implementation Guide: The essential handbook to cloud transformation with Azure

Azure Strategy and Implementation Guide: The essential handbook to cloud transformation with Azure

Offers an in-depth exploration of cloud transformation using Microsoft Azure. It covers essential topics such as implementing hybrid and multicloud strategies with services like Azure Arc and Azure S…
00:22:59  |   Fri 05 Sep 2025
Blockchain Enabled Applications: Understand the Blockchain Ecosystem and How to Make it Work for You

Blockchain Enabled Applications: Understand the Blockchain Ecosystem and How to Make it Work for You

Explores the foundations and diverse applications of blockchain technology. It begins by contextualizing blockchain's emergence in the wake of the 2008 financial crisis and details the Bitcoin protoc…
00:19:42  |   Fri 05 Sep 2025
AWS Certified Advanced Networking - Specialty Exam Guide: Build your knowledge and technical expertise as an AWS-certified networking

AWS Certified Advanced Networking - Specialty Exam Guide: Build your knowledge and technical expertise as an AWS-certified networking

Serves as an exam guide for the AWS Certified Advanced Networking - Specialty exam, focusing on the networking components and services within the Amazon Web Services (AWS) cloud. It explores fundamen…
00:27:09  |   Thu 04 Sep 2025
Authentication and Access Control: Practical Cryptography Methods and Tools

Authentication and Access Control: Practical Cryptography Methods and Tools

Serves as a comprehensive guide to understanding and implementing secure authentication mechanisms. It begins by introducing fundamental cryptographic principles, including symmetric and asymmetric e…
00:30:55  |   Thu 04 Sep 2025
Vulkan 3D Graphics Rendering Cookbook: Implement expert-level techniques for high-performance graphics with Vulkan

Vulkan 3D Graphics Rendering Cookbook: Implement expert-level techniques for high-performance graphics with Vulkan

A rendering lead at Meta and Ubisoft RedLynx, and other industry experts, serves as a handbook for modern real-time rendering using Vulkan. The book systematically covers Vulkan development, starting…
00:18:50  |   Wed 03 Sep 2025
Active Directory Administration Cookbook: Actionable, proven solutions to identity management and authentication on servers and in the cloud

Active Directory Administration Cookbook: Actionable, proven solutions to identity management and authentication on servers and in the cloud

Provides an in-depth guide to Active Directory administration, covering a wide array of practical "recipes" for managing both on-premises and Azure Active Directory environments. It details fundament…
00:20:39  |   Wed 03 Sep 2025
The Ultimate iOS Interview Playbook: Conquer Swift, frameworks, design patterns, and app architecture for your dream job

The Ultimate iOS Interview Playbook: Conquer Swift, frameworks, design patterns, and app architecture for your dream job

A comprehensive guide aimed at helping iOS developers succeed in job interviews. The book covers a wide array of topics crucial for iOS development roles, ranging from developer branding and resume b…
00:18:02  |   Tue 02 Sep 2025
The Ghidra Book: The Definitive Guide

The Ghidra Book: The Definitive Guide

Serves as the definitive resource for mastering the Ghidra platform, a powerful open-source tool developed by the NSA for reverse engineering. The book covers a vast array of Ghidra's functionalities…
00:22:00  |   Tue 02 Sep 2025
systemd for Linux SysAdmins: All You Need to Know About the systemd Suite for Linux Users

systemd for Linux SysAdmins: All You Need to Know About the systemd Suite for Linux Users

Provides an in-depth guide for Linux system administrators on managing their systems using the systemd suite of tools. Authored by David Both and technically reviewed by Seth Kenlon, the publication,…
00:24:23  |   Mon 01 Sep 2025
Red Hat Certified Engineer (RHCE) Ansible Automation Study Guide: In-Depth Guidance and Practice

Red Hat Certified Engineer (RHCE) Ansible Automation Study Guide: In-Depth Guidance and Practice

Prepares individuals for the Red Hat Certified Engineer (RHCE) Ansible Automation (EX294) exam. The book explores Ansible's core functionalities, covering everything from installation and configurati…
00:24:34  |   Mon 01 Sep 2025
Alice and Bob Learn Secure Coding

Alice and Bob Learn Secure Coding

A comprehensive guide to secure software development. It covers fundamental security concepts like authentication, authorization, and data protection, emphasizing proactive measures throughout the so…
00:18:54  |   Sun 31 Aug 2025
Advanced Front-End Development: Building Scalable and High-Performance Web Applications with React

Advanced Front-End Development: Building Scalable and High-Performance Web Applications with React

A comprehensive guide to modern React development. The book covers fundamental concepts such as components, props, and state, alongside crucial aspects like JSX and element rendering, event handling,…
00:09:27  |   Sun 31 Aug 2025
Zero Trust in Resilient Cloud and Network Architectures (Networking Technology)

Zero Trust in Resilient Cloud and Network Architectures (Networking Technology)

Offers an in-depth look at implementing zero trust architectures in modern IT environments, encompassing on-premises, cloud, and hybrid infrastructures. It covers various aspects, including network a…
00:26:15  |   Sat 30 Aug 2025
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

A comprehensive guide to ethical hacking. It covers a wide array of topics, beginning with setting up a lab environment using VirtualBox and Kali Linux, then progressing through network penetration t…
01:03:40  |   Sat 30 Aug 2025
Wireless Communication in Underground Mines: RFID-based Sensor Networking

Wireless Communication in Underground Mines: RFID-based Sensor Networking

Explores the critical need for robust communication and safety systems in underground mining environments. It investigates various wireless and wired communication technologies, such as RFID, ZigBee,…
00:22:27  |   Fri 29 Aug 2025
Wireless Hacking with Kali Linux: LEARN FAST HOW TO HACK ANY WIRELESS NETWORKS PENETRATION TESTING IMPLEMENTATION GUIDE

Wireless Hacking with Kali Linux: LEARN FAST HOW TO HACK ANY WIRELESS NETWORKS PENETRATION TESTING IMPLEMENTATION GUIDE

A comprehensive guide for aspiring IT security professionals interested in wireless penetration testing. It covers various wireless attack methodologies, including password attacks, man-in-the-middle…
00:26:32  |   Fri 29 Aug 2025
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell

Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell

A comprehensive guide for interacting with and automating tasks within the PowerShell environment. It offers practical "recipes" and solutions for a wide array of administrative challenges, ranging f…
00:18:04  |   Thu 28 Aug 2025
Windows Virus and Malware Troubleshooting (Windows Troubleshooting)

Windows Virus and Malware Troubleshooting (Windows Troubleshooting)

Provides comprehensive guidance on identifying, preventing, and removing malware from Windows PCs and networks. It details various types of malware, such as viruses, worms, ransomware, and rootkits, …
00:33:19  |   Thu 28 Aug 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.