1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity

Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity

This Book excerpt features interviews with numerous cybersecurity professionals, collectively offering insights into effective blue team strategies. The experts discuss crucial capabilities like netw…
00:33:29  |   Wed 26 Mar 2025
Tor And The Deep Web 2020: A Beginner's Guide to Staying Anonymous, Dark Net Journey on How to Be Anonymous Online

Tor And The Deep Web 2020: A Beginner's Guide to Staying Anonymous, Dark Net Journey on How to Be Anonymous Online

This beginner's guide to the dark web explains how Tor and onion routing mask a user's IP address, creating anonymity. It details the three-layered system of Tor nodes, contrasting it with standard H…
00:22:03  |   Wed 26 Mar 2025
TLS Mastery: Tux edition

TLS Mastery: Tux edition

The Book provide a comprehensive guide to Transport Layer Security (TLS), a fundamental technology for securing internet communications. The text covers a wide range of topics including cryptography …
00:20:41  |   Tue 25 Mar 2025
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks

Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks

This Book is about threat hunting in cloud environments, specifically AWS and Azure. The authors, experienced cybersecurity professionals, present a framework for multi-cloud threat hunting using the…
00:17:25  |   Tue 25 Mar 2025
Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

This Book about threat modeling, a process for identifying and mitigating security risks in software. The book explains various threat modeling strategies, including asset-centric, attacker-centric, …
00:35:52  |   Mon 24 Mar 2025
Write Great Code, Volume 2, 2nd Edition: Thinking Low-Level, Writing High-Level

Write Great Code, Volume 2, 2nd Edition: Thinking Low-Level, Writing High-Level

This Book is an excerpt from a Book on writing efficient high-level language (HLL) code by leveraging low-level understanding. It explores compiler optimization techniques, including constant folding…
00:19:15  |   Mon 24 Mar 2025
Software Craftsman, The: Professionalism, Pragmatism, Pride

Software Craftsman, The: Professionalism, Pragmatism, Pride

Sandro Mancuso's The Software Craftsman advocates for professionalism and pride in software development, contrasting outdated notions of seniority with modern demands. The book details the Software C…
00:23:57  |   Sun 23 Mar 2025
The Shellcoder's Handbook: Discovering and Exploiting Security Holes

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

The provided Book is an excerpt from "The Shellcoder’s Handbook," a book detailing the exploitation of software security vulnerabilities. The book focuses on practical, hands-on techniques for discov…
00:21:58  |   Sun 23 Mar 2025
The Quick Python Book, Second Edition

The Quick Python Book, Second Edition

This Book is from the second edition of The Quick Python Book, a programming tutorial. The book covers fundamental Python concepts, including syntax, control flow, and data structures. It then progre…
00:19:58  |   Sat 22 Mar 2025
The Pentester BluePrint: Starting a Career as an Ethical Hacker

The Pentester BluePrint: Starting a Career as an Ethical Hacker

"The Pentester Blueprint" is a guide to becoming an ethical hacker (pentester). The book covers the necessary technical skills, including operating systems, networking, and programming, as well as th…
00:23:04  |   Sat 22 Mar 2025
The Official Raspberry Pi Beginner's Guide: How to use your new computer

The Official Raspberry Pi Beginner's Guide: How to use your new computer

This Book provides a comprehensive introduction to the Raspberry Pi 4 Model B, covering its components, setup, and programming using Scratch and Python. It details the Raspbian operating system, demo…
00:27:23  |   Fri 21 Mar 2025
The Official CompTIA Security+ Certification Study Guide

The Official CompTIA Security+ Certification Study Guide

This Book is an excerpt from a CompTIA Security+ study guide that provides information about network security. The guide explores topics such as risk assessment, malware identification, network attac…
00:13:38  |   Fri 21 Mar 2025
The Linux Programming Interface: A Linux and UNIX System Programming Handbook

The Linux Programming Interface: A Linux and UNIX System Programming Handbook

The provided Book is a collection of excerpts from Michael Kerrisk's "The Linux Programming Interface," a comprehensive guide to Linux and UNIX system programming. The excerpts cover various aspects …
00:40:34  |   Thu 20 Mar 2025
The Hacker Playbook: Practical Guide To Penetration Testing

The Hacker Playbook: Practical Guide To Penetration Testing

"The Hacker Playbook: Practical Guide to Penetration Testing" is a manual providing a hands-on approach to penetration testing. The book details various techniques for network and web application sec…
00:32:50  |   Thu 20 Mar 2025
The Hacker Playbook 3: Practical Guide To Penetration Testing

The Hacker Playbook 3: Practical Guide To Penetration Testing

"The Hacker Playbook 3" is a guide to penetration testing and red teaming, focusing on advanced techniques to simulate real-world attacks. The book covers various attack vectors, including web applic…
00:18:13  |   Wed 19 Mar 2025
The Docker Workshop: Learn how to use Docker containers effectively to speed up the development process

The Docker Workshop: Learn how to use Docker containers effectively to speed up the development process

This Book comprises excerpts from "The Docker Workshop," a guide to building and deploying applications using Docker. The book covers Dockerfiles, image management, container orchestration with Docke…
00:19:51  |   Wed 19 Mar 2025
The Decision Intelligence Handbook: Practical Steps for Evidence-Based Decisions in a Complex World

The Decision Intelligence Handbook: Practical Steps for Evidence-Based Decisions in a Complex World

The Decision Intelligence Handbook by Pratt and Malcolm is a practical guide to Decision Intelligence (DI), a methodology for improving decision-making using data and technology. The book outlines ni…
00:11:18  |   Tue 18 Mar 2025
The Complete Cyber Security Course

The Complete Cyber Security Course

The provided Book is a collection of excerpts from a cybersecurity course. The course, "The Complete Cyber Security Course Volume I Hackers Exposed," by Nathan House, focuses on practical techniques …
00:35:36  |   Tue 18 Mar 2025
The Clean Coder: A Code of Conduct for Professional Programmers

The Clean Coder: A Code of Conduct for Professional Programmers

This Book is an excerpt from Robert C. Martin's "The Clean Coder," a book focused on professionalism in software development. It explores various aspects of a professional programmer's conduct, inclu…
00:15:55  |   Mon 17 Mar 2025
CERT Oracle Secure Coding Standard for Java, The (SEI Series in Software Engineering)

CERT Oracle Secure Coding Standard for Java, The (SEI Series in Software Engineering)

The provided Book is an excerpt from The CERT Oracle Secure Coding Standard for Java, a guide to secure coding practices in Java. It details numerous rules categorized by topic (e.g., input validatio…
00:39:51  |   Mon 17 Mar 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.