1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks

SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks

This Book provides a comprehensive guide to SQL injection, covering both offensive and defensive strategies. Part one introduces SQL, database systems, and the theoretical underpinnings of SQL inject…
00:32:30  |   Tue 04 Mar 2025
Simplify Testing with React Testing Library: Create maintainable tests using RTL that do not break with changes

Simplify Testing with React Testing Library: Create maintainable tests using RTL that do not break with changes

This Book is on simplifying React application testing. It covers using the React Testing Library for unit and integration tests, emphasizing user-centric testing over implementation details. The book…
00:29:25  |   Tue 04 Mar 2025
Silver Peak Advanced SDWAN Deployments Self-Paced Student Guide

Silver Peak Advanced SDWAN Deployments Self-Paced Student Guide

This Book is a lab guide for a self-paced Silver Peak Advanced SDWAN course. It provides step-by-step instructions for configuring various networking elements within the Silver Peak Orchestrator, suc…
00:07:47  |   Mon 03 Mar 2025
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals

Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals

This Book is excerpt from Jon Westfall's 2021 Book, "Set Up and Manage Your Virtual Private Server." The book guides readers through setting up and administering a virtual private server (VPS), cover…
00:33:11  |   Mon 03 Mar 2025
Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud

Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud

This Book is a comprehensive guide to serverless security, focusing on the implementation of secure practices across AWS, Azure, and Google Cloud platforms. It covers various aspects, including secur…
00:48:05  |   Sat 01 Mar 2025
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption

Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption

This Book is a detailed guide to modern cryptography, covering both theoretical concepts and practical implementations. The book explores various cryptographic primitives, including stream ciphers, h…
00:21:16  |   Sat 01 Mar 2025
Security in Computing

Security in Computing

This excerpt from Charles P. Pfleeger's "Security in Computing" (5th edition) is a textbook chapter on computer security. It examines various threats to computer systems, including malicious attacks …
00:28:58  |   Fri 28 Feb 2025
Security Warrior: Know Your Enemy

Security Warrior: Know Your Enemy

Security Warrior is a technical manual focusing on network security, reverse engineering, and attack techniques. It covers various operating systems (Windows, Linux) and their vulnerabilities, explor…
00:15:46  |   Fri 28 Feb 2025
Security Testing with Kali NetHunter

Security Testing with Kali NetHunter

This Book is an excerpt from a Book about security testing with Kali NetHunter, a mobile penetration testing platform for Android. The excerpt covers installing and setting up a testing lab using vir…
00:27:22  |   Thu 27 Feb 2025
Security Engineering: A Guide to Building Dependable Distributed Systems

Security Engineering: A Guide to Building Dependable Distributed Systems

Ross Anderson's "Security Engineering: A Guide to Building Dependable Distributed Systems" explores various facets of security, from cryptographic vulnerabilities and attacks to access control mechan…
00:15:26  |   Thu 27 Feb 2025
Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments

Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments

Luigi Aversa's Security for Containers and Kubernetes is a comprehensive guide to securing containerized environments. The book covers container stack security, image and registry security, and Kuber…
00:15:37  |   Wed 26 Feb 2025
Security Strategies in Linux Platforms and Applications

Security Strategies in Linux Platforms and Applications

This Book excerpt details Linux security strategies, covering threats, vulnerabilities, and hardening techniques. It explains Linux's architecture, including the kernel and its role in security. The …
00:19:52  |   Wed 26 Feb 2025
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

This Book is a technical Book excerpt focusing on network security, specifically detailing secure proxies and their role in modern threat detection and mitigation. It explores various security techno…
00:20:43  |   Tue 25 Feb 2025
Security Automation with Ansible 2

Security Automation with Ansible 2

This Book is a table of contents and excerpts from Security Automation with Ansible 2, a book detailing how to automate security tasks using Ansible. The book covers Ansible fundamentals, integrating…
00:40:55  |   Tue 25 Feb 2025
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

"Securing VoIP Networks" is a technical Book examining the security challenges of Voice over Internet Protocol (VoIP) systems. The book details various threats and attacks against VoIP, including eav…
00:24:11  |   Mon 24 Feb 2025
Secure Programming with Static Analysis

Secure Programming with Static Analysis

Secure Programming with Static Analysis is a Book detailing how to write secure software using static analysis tools. It focuses on common coding errors in C and Java that lead to security vulnerabil…
00:23:27  |   Mon 24 Feb 2025
Secure PHP Development: Building 50 Practical Applications

Secure PHP Development: Building 50 Practical Applications

This Book excerpt details the creation of numerous PHP applications, focusing on secure coding practices and a reusable application framework. The author, Mohammed J. Kabir, presents 50 practical app…
00:14:51  |   Sun 23 Feb 2025
Automated Machine Learning with Microsoft Azure: Build highly accurate and scalable end-to-end AI solutions with Azure AutoML

Automated Machine Learning with Microsoft Azure: Build highly accurate and scalable end-to-end AI solutions with Azure AutoML

This Book is an excerpt from Dennis Sawyers' Book, "Automated Machine Learning with Microsoft Azure," which provides a comprehensive guide to using automated machine learning (AutoML) on Microsoft's …
00:37:20  |   Sun 23 Feb 2025
Rust Web Programming: A hands-on guide to developing fast and secure web apps with the Rust programming language

Rust Web Programming: A hands-on guide to developing fast and secure web apps with the Rust programming language

This Book is a table of contents and excerpts from a Book teaching Rust web programming. It covers fundamental Rust concepts like memory management and ownership, then progresses to building web appl…
00:34:46  |   Sat 22 Feb 2025
Modern Vulnerability Management: Predictive Cybersecurity

Modern Vulnerability Management: Predictive Cybersecurity

Modern Vulnerability Management: Predictive Cybersecurity is a Book by Roytman and Bellis that offers a data-driven approach to vulnerability management. It emphasizes risk-based vulnerability manage…
00:19:12  |   Sat 22 Feb 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.