1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
Web Application Advanced Hacking

Web Application Advanced Hacking

Maor Tal's "Web Application Advanced Hacking" is a hands-on guide to advanced web application hacking techniques for security researchers and bug bounty hunters. The book covers a range of topics, in…
00:20:33  |   Mon 07 Apr 2025
You Don't Know JS: this & Object Prototypes

You Don't Know JS: this & Object Prototypes

This Book provides excerpts from Kyle Simpson's Book, "You Don't Know JS: this & Object Prototypes," which explores JavaScript's often-misunderstood this keyword and object prototypes. The Book expla…
00:13:55  |   Sun 06 Apr 2025
The Shellcoder's Handbook: Discovering and Exploiting Security Holes

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

The provided Book is a compilation of excerpts from "The Shellcoder’s Handbook, Second Edition," a book focusing on software exploitation. It details various methods of exploiting software vulnerabil…
00:17:10  |   Sun 06 Apr 2025
Web Hacking 101

Web Hacking 101

"Web Hacking 101" is a guide to ethical hacking, focusing on real-world examples of vulnerability reports that yielded bug bounties. The book covers various web vulnerabilities, including HTML inject…
00:32:35  |   Sun 06 Apr 2025
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs

Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs

This Book is a table of contents and excerpts from the "Zed Attack Proxy Cookbook," a guide to using the OWASP ZAP tool for web application security testing. The book covers various web application v…
00:20:34  |   Fri 04 Apr 2025
Zero Trust Networks: Building Secure Systems in Untrusted Networks

Zero Trust Networks: Building Secure Systems in Untrusted Networks

Zero Trust Networks, by Evan Gilman and Doug Barth, explores building secure systems in untrusted networks. The book critiques the limitations of perimeter-based security, arguing that assuming inter…
00:26:26  |   Fri 04 Apr 2025
You Don't Know JS: Types & Grammar

You Don't Know JS: Types & Grammar

Kyle Simpson's You Don't Know JS: Types & Grammar is a guide to mastering JavaScript's intricacies. The book thoroughly explains JavaScript's seven built-in types, addressing common misunderstandings…
00:43:22  |   Thu 03 Apr 2025
You Don't Know JS: Up & Going

You Don't Know JS: Up & Going

Kyle Simpson's "You Don't Know JS" Book series offers an in-depth exploration of JavaScript, challenging the common practice of only learning a superficial subset. The first book, "Up & Going," provi…
00:39:47  |   Thu 03 Apr 2025
Foundations of Linux Debugging, Disassembling, and Reversing: Analyze Binary Code, Understand Stack Memory Usage, and Reconstruct C/C++ Code

Foundations of Linux Debugging, Disassembling, and Reversing: Analyze Binary Code, Understand Stack Memory Usage, and Reconstruct C/C++ Code

Dmitry Vostokov's Book, Foundations of Linux Debugging, Disassembling, and Reversing, teaches readers to analyze binary code, understand stack memory usage, and reconstruct C/C++ code using Intel x64…
00:20:49  |   Tue 01 Apr 2025
Foundations of ARM64 Linux Debugging, Disassembling, and Reversing: Analyze Code, Understand Stack Memory Usage, and Reconstruct Original

Foundations of ARM64 Linux Debugging, Disassembling, and Reversing: Analyze Code, Understand Stack Memory Usage, and Reconstruct Original

Dmitry Vostokov's Book, Foundations of ARM64 Linux Debugging, Disassembling, and Reversing, provides a practical guide to understanding ARM64 assembly language and its relationship to C/C++ code. The…
00:11:41  |   Tue 01 Apr 2025
Viruses, Hardware and Software Trojans: Attacks and Countermeasures

Viruses, Hardware and Software Trojans: Attacks and Countermeasures

This Book explores the threats of hardware and software Trojans, particularly in critical infrastructure like telecommunications and nuclear power plants. It details the historical use of such Trojan…
00:21:18  |   Mon 31 Mar 2025
Unleashing the Art of Digital Forensics

Unleashing the Art of Digital Forensics

"Unleashing the Art of Digital Forensics" is a Book covering various aspects of digital forensics, including techniques, challenges, and legal considerations. It explores specific areas like steganog…
00:22:53  |   Mon 31 Mar 2025
UNIX and Linux System Administration Handbook, 4th Edition

UNIX and Linux System Administration Handbook, 4th Edition

This Book is an excerpt from the UNIX and Linux System Administration Handbook, covering various aspects of system administration. Sections detail software management, including scripting with Perl a…
00:27:34  |   Sun 30 Mar 2025
UNIX: The Textbook, Third Edition

UNIX: The Textbook, Third Edition

This Book chapter provides a "Quick Start" guide to the UNIX operating system, covering fundamental commands for file management, text editing (vi, vim, emacs), and shell scripting (Bourne and C shel…
00:17:41  |   Sun 30 Mar 2025
Understanding Network Hacks: Attack and Defense with Python 3

Understanding Network Hacks: Attack and Defense with Python 3

This Book is an excerpt from a book titled "Understanding Network Hacks Attack and Defense with Python 3," which teaches network security concepts and hacking techniques using Python. The book covers…
00:16:54  |   Sat 29 Mar 2025
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program

Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program

This Book is from a cybersecurity risk management book, offering a practical, three-part framework for building a sustainable program. The book emphasizes understanding risk by defining critical asse…
00:26:05  |   Sat 29 Mar 2025
Ubuntu Unleashed 2019: Covering 18.04, 18.10, 19.04, and 19.10

Ubuntu Unleashed 2019: Covering 18.04, 18.10, 19.04, and 19.10

This Book excerpt details Ubuntu Linux, focusing on installation, system administration, and software management. It covers using both the graphical user interface and command-line interface, explori…
00:53:12  |   Fri 28 Mar 2025
Troubleshooting & Maintaining PCs All-in-One For Dummies

Troubleshooting & Maintaining PCs All-in-One For Dummies

This Book is an excerpt from the fourth edition of Troubleshooting & Maintaining Your PC All-in-One For Dummies. The book offers comprehensive guidance on resolving various PC problems. It's divided …
00:41:23  |   Fri 28 Mar 2025
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership

Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership

This Book is an excerpt from Tribe of Hackers: Security Leaders, a book offering cybersecurity leadership strategies. The excerpt features interviews with numerous cybersecurity professionals, who sh…
00:37:05  |   Thu 27 Mar 2025
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity

Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity

This Book comprises excerpts from Tribe of Hackers Red Team, a book by Marcus J. Carey and Jennifer Jin. The excerpts feature interviews with numerous cybersecurity professionals, primarily red teame…
00:20:14  |   Thu 27 Mar 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.