1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books Education News Arts Tech News
Update frequency
every day
Average duration
24 minutes
Episodes
1006
Years Active
2024 - 2025
Share to:
Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot

Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot

The provided Book is primarily from the Book "Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot", which guides readers through the concepts and practica…
00:16:34  |   Tue 29 Apr 2025
Black Hat Bash: Creative Scripting for Hackers and Pentesters

Black Hat Bash: Creative Scripting for Hackers and Pentesters

The provided Book, primarily from "Black Hat Bash: Creative Scripting for Hackers and Pentesters" serves as a guide for security professionals and penetration testers looking to leverage the Bash scr…
00:11:33  |   Tue 29 Apr 2025
Applied Data Science: Data Translators Across the Disciplines

Applied Data Science: Data Translators Across the Disciplines

This collection of writings examines the crucial role of data translators in various fields, emphasizing the need to bridge the gap between data science and domain-specific knowledge. Several chapter…
00:24:55  |   Mon 28 Apr 2025
An In-Depth Guide to Mobile Device Forensics

An In-Depth Guide to Mobile Device Forensics

This Book offers a comprehensive guide to mobile device forensics, beginning with foundational concepts of wireless communication, including electromagnetic waves, radio frequencies, and various mult…
00:21:03  |   Mon 28 Apr 2025
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers

An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers

This collection of Book originates from a Book titled "An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and government…
00:31:52  |   Sun 27 Apr 2025
Accelerate DevOps with GitHub: Enhance software delivery performance with GitHub Issues, Projects, Actions, and Advanced Security

Accelerate DevOps with GitHub: Enhance software delivery performance with GitHub Issues, Projects, Actions, and Advanced Security

This collection of excerpts focuses on accelerating software delivery performance through effective DevOps practices, primarily leveraging the GitHub platform. Key areas explored include team collabo…
00:24:23  |   Sun 27 Apr 2025
Advanced IPv6

Advanced IPv6

This Book is a training manual for a course on Advanced IPv6. It is broken down into various sections that explain IPv6 concepts, including packet format, routing basics, OSPFv3, BGP, host configurat…
00:22:12  |   Sat 26 Apr 2025
Information Security Management Handbook, 6th Edition

Information Security Management Handbook, 6th Edition

The Book is a compilation of information security management principles and best practices, drawn from the Information Security Management Handbook. The book covers a wide range of topics, including …
00:22:51  |   Sat 26 Apr 2025
AZ-900: Microsoft Azure Fundamentals: Study Guide with Practice Questions & Labs

AZ-900: Microsoft Azure Fundamentals: Study Guide with Practice Questions & Labs

This Book is an excerpt from a study guide for the Microsoft Azure Fundamentals certification exam (AZ-900). The guide covers the fundamental concepts of Azure, including cloud concepts like Infrastr…
00:28:21  |   Fri 25 Apr 2025
Powershell Step-by Step

Powershell Step-by Step

The provided Book excerpts are from the book, “Powershell Step-by-Step”, written by Brandon Shaw. This Book acts as a comprehensive guide to understanding PowerShell, a scripting language developed b…
00:09:01  |   Fri 25 Apr 2025
Beginner's Guide to Exploitation on ARM Vol 2

Beginner's Guide to Exploitation on ARM Vol 2

The Book, titled "Beginner's Guide to Exploitation on ARM Vol 2," is a guide to learning about exploiting security vulnerabilities in ARM-based systems. It is a continuation of the previous volume an…
00:25:54  |   Thu 24 Apr 2025
Beginner's Guide to Exploitation on ARM Vol 1

Beginner's Guide to Exploitation on ARM Vol 1

This Book is a beginner's guide to exploiting vulnerabilities on ARM systems, which are commonly used in mobile devices. The book guides the reader through the process of reverse engineering ARM bina…
00:25:05  |   Thu 24 Apr 2025
5G/5G-Advanced: The New Generation Wireless Access Technology

5G/5G-Advanced: The New Generation Wireless Access Technology

This Book is a technical overview of the 5G NR (New Radio) standard, focusing on the technical aspects of the radio interface, including the physical layer, radio resource control, and radio resource…
00:15:22  |   Thu 24 Apr 2025
5G for Dummies

5G for Dummies

This is an excerpt from a Book titled "5G for Dummies" a special edition for Sprint Business. The text provides an overview of 5G technology, its history, and potential applications. The book explain…
00:19:41  |   Thu 24 Apr 2025
Cisco CCNA Command Guide: Tips and Tricks to Learn Cisco CCNA Command Guide

Cisco CCNA Command Guide: Tips and Tricks to Learn Cisco CCNA Command Guide

The Book provide a comprehensive guide to the Cisco Certified Network Associate (CCNA) Routing and Switching certification. It details the history of the CCNA, explaining its evolution from a single …
00:17:18  |   Tue 22 Apr 2025
HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools

HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools

It covers various hacking techniques, including network scanning, post-exploitation, and ethical hacking. The second source is a collection of cybersecurity articles that discuss various data manipul…
00:27:17  |   Tue 22 Apr 2025
Inside Azure Management: The authoritative guide to Microsoft's hybrid management platform

Inside Azure Management: The authoritative guide to Microsoft's hybrid management platform

This excerpt from the Book "Inside Azure Management" provides a comprehensive overview of Azure management and monitoring tools. It highlights the evolution of Azure management services, particularly…
00:34:42  |   Mon 21 Apr 2025
Inside Cyber Warfare: Mapping the Cyber Underworld

Inside Cyber Warfare: Mapping the Cyber Underworld

The Book is an excerpt from the book "Inside Cyber Warfare: Mapping the Cyber Underworld" by Jeffrey Carr. The book explores the complex world of cyber warfare, examining the motivations and tactics …
00:18:47  |   Mon 21 Apr 2025
Cryptography & Network Security

Cryptography & Network Security

The Book provide an overview of cryptography and network security. defines mathematical symbols and notation used in cryptography and network security. The second source, the contents section from th…
00:33:09  |   Sun 20 Apr 2025
Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud

Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud

This excerpt from the Book "Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud" is a comprehensive guide to using Python for computer science a…
00:29:51  |   Sun 20 Apr 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.