1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
Cryptography & Network Security

Cryptography & Network Security

The Book provide an overview of cryptography and network security. defines mathematical symbols and notation used in cryptography and network security. The second source, the contents section from th…
00:33:09  |   Sun 20 Apr 2025
Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud

Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud

This excerpt from the Book "Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud" is a comprehensive guide to using Python for computer science a…
00:29:51  |   Sun 20 Apr 2025
Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)

Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)

Intelligent Mobile Malware Detection is a book that provides a comprehensive overview of Android malware detection mechanisms. The book begins by introducing the Android operating system and outlinin…
00:19:50  |   Sat 19 Apr 2025
Aligning Security Operations with the MITRE ATT&CK Framework: Level up your security operations center for better security

Aligning Security Operations with the MITRE ATT&CK Framework: Level up your security operations center for better security

This Book presents threat hunting playbooks aligned with MITRE ATT&CK tactics. Each playbook focuses on a specific attack phase (e.g., reconnaissance, execution, exfiltration), outlining data sources…
00:23:47  |   Sat 19 Apr 2025
You Don't Know JS: Scope & Closures

You Don't Know JS: Scope & Closures

This Book is an excerpt from Kyle Simpson's book, "You Don't Know JS: Scope & Closures" which comprehensively explains JavaScript scope and closures. The excerpt includes a foreword and preface discu…
00:22:20  |   Wed 16 Apr 2025
You Don't Know JS: ES6 & Beyond

You Don't Know JS: ES6 & Beyond

Kyle Simpson's "You Don't Know JS: ES6 & Beyond" is a programming textbook covering JavaScript's ES6 (ECMAScript 2015) update and future features. The book thoroughly explains new syntax, including b…
00:28:09  |   Mon 14 Apr 2025
You Don't Know JS: Async & Performance

You Don't Know JS: Async & Performance

This Book is from Kyle Simpson's "You Don't Know JS: Async & Performance," exploring JavaScript's asynchronous nature. It contrasts the limitations of callbacks, highlighting their impact on code rea…
00:26:43  |   Mon 14 Apr 2025
Writing Security Tools and Exploits

Writing Security Tools and Exploits

This Book excerpt on writing security exploits and tools. It covers various software vulnerabilities, such as buffer overflows (stack and heap), format string vulnerabilities, and integer bugs. The t…
00:25:51  |   Sun 13 Apr 2025
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

This Book is a detailed guide on using Wireshark, a network protocol analyzer, for security professionals. The book covers fundamental networking concepts, setting up a virtual lab environment using …
00:17:00  |   Sun 13 Apr 2025
Wireshark 101: Essential Skills for Network Analysis

Wireshark 101: Essential Skills for Network Analysis

This Book is an excerpt from the second edition of a book titled "Wireshark 101 Essential Skills for Network Analysis," which teaches beginners how to use Wireshark, a popular network analysis tool. …
00:41:22  |   Sat 12 Apr 2025
Wireshark Network Security

Wireshark Network Security

The provided Book is the table of contents and introductory material for a book titled Wireshark Network Security. The book aims to teach network administrators and security analysts how to use Wires…
00:22:08  |   Sat 12 Apr 2025
Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals

Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals

This Book excerpt detailing the use of Wireshark for network forensics. It covers Wireshark installation and basic usage, including packet capture and analysis techniques. The text also explores adva…
00:16:55  |   Fri 11 Apr 2025
Windows Server 2022 & PowerShell All-in-One For Dummies

Windows Server 2022 & PowerShell All-in-One For Dummies

The source Book "Windows Server 2022 & PowerShell All-in-One For Dummies" by Sara Perrott. It provides a comprehensive guide for system administrators, covering a wide range of topics including insta…
00:11:29  |   Fri 11 Apr 2025
Wireless Network Security

Wireless Network Security

This Book is a technical manual focused on wireless network security. It covers various wireless technologies, including WLAN, infrared, and near-field communication (NFC), exploring their respective…
00:21:16  |   Thu 10 Apr 2025
Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel

Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel

This Book, "Windows Ransomware Detection and Protection," provides a comprehensive guide to understanding and mitigating ransomware threats. Experts Matt Davidsson and Nitish Anand detail various ran…
00:36:15  |   Thu 10 Apr 2025
Windows Malware Analysis Essentials: Master the Fundamentals of Malware Analysis for the Windows Platform and Enhance Your Anti-malware

Windows Malware Analysis Essentials: Master the Fundamentals of Malware Analysis for the Windows Platform and Enhance Your Anti-malware

"Windows Malware Analysis Essentials" is a technical Book authored by Victor Marak that provides a comprehensive guide to malware analysis on the Windows platform. The book covers fundamental concept…
00:23:00  |   Wed 09 Apr 2025
Windows Kernel Programming

Windows Kernel Programming

This Book excerpts Windows kernel programming, covering Windows internals and kernel development. It explains process and thread structures, including memory management and handle tables. The book de…
00:31:53  |   Wed 09 Apr 2025
Windows Internals, Part 2 (Developer Reference)

Windows Internals, Part 2 (Developer Reference)

This Book is an excerpt from the seventh edition of "Windows Internals, Part 2," a technical book detailing the inner workings of the Windows operating system. It covers a wide array of low-level sys…
00:16:57  |   Tue 08 Apr 2025
Windows and Linux Penetration Testing from Scratch

Windows and Linux Penetration Testing from Scratch

This Book is an excerpt from a penetration testing manual, focusing on techniques for compromising Windows and Linux systems. The book details various methods of information gathering, including OSIN…
00:30:37  |   Tue 08 Apr 2025
Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure

Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure

The Book is an excerpt on securing Windows 8 and Windows Server 2012 systems. The Book discusses various aspects of network security, including general network settings, remote access, Internet conne…
00:24:39  |   Mon 07 Apr 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.