1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

This Book explores the inner workings of various malware, including the TDL3 and TDL4 rootkits and the Festi, Rovnix, Gapz, and Olmasco bootkits. The text details the infection techniques used by the…
00:35:58  |   Fri 21 Feb 2025
Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel

Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel

Rootkits, as explained in "Rootkits - Subverting the Windows Kernel," are powerful hacking tools that enable attackers to maintain virtually undetectable access to compromised systems. The book provi…
00:17:18  |   Fri 21 Feb 2025
RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200)

RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200)

This Book excerpt is a training guide and exam preparation manual for the Red Hat Certified System Administrator (RHCSA) exam on Red Hat Enterprise Linux (RHEL) 8. It covers a wide range of topics, i…
00:39:23  |   Thu 20 Feb 2025
Reverse Engineering Questions and Answers - George Duckett

Reverse Engineering Questions and Answers - George Duckett

This Stack Exchange Q&A thread centers on reverse engineering, covering various aspects like disassembling binaries (ARM, x86), identifying compilers, analyzing function calls and stack frames (using…
00:18:53  |   Thu 20 Feb 2025
Red Team Development and Operations: A practical guide

Red Team Development and Operations: A practical guide

This Book is a practical guide to red teaming in cybersecurity, written by Joe Vest and James Tubberville. It explains the methodology of red teaming, which involves simulating real-world threats to …
00:22:57  |   Wed 19 Feb 2025
Red Hat Linux Security and Optimization

Red Hat Linux Security and Optimization

This is an excerpt from Red Hat Linux Security and Optimization, a technical manual authored by Mohammed J. Kabir. The book extensively covers system and network performance tuning for Red Hat Linux,…
00:43:34  |   Wed 19 Feb 2025
Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)

Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)

This Book is an excerpt from a study guide for the Red Hat Certified Engineer (RHCE) exam, focusing on Ansible automation. It covers Ansible's fundamentals, including configuration, inventory managem…
00:27:42  |   Tue 18 Feb 2025
The Red Team Handbook - The Army's Guide To Making Better Decisions

The Red Team Handbook - The Army's Guide To Making Better Decisions

The "Red Team Handbook" produced by the TRADOC G-2 Operational Environment Enterprise outlines the U.S. Army's approach to Red Teaming, a flexible cognitive approach to decision-making. It emphasizes…
00:28:40  |   Tue 18 Feb 2025
Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)

Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)

This Book is a collection of chapters exploring security, privacy, and trust issues in the Internet of Things (IoT) and Cyber-Physical Systems (CPS), focusing on the integration of cloud computing an…
00:30:16  |   Tue 18 Feb 2025
Real-World Python: A Hacker's Guide to Solving Problems with Code

Real-World Python: A Hacker's Guide to Solving Problems with Code

This Book is a collection of excerpts from Real-World Python: A Hacker’s Guide to Solving Problems with Code, by Lee Vaughan. The excerpts detail numerous Python programming projects, focusing on pra…
00:14:18  |   Mon 17 Feb 2025
Raspberry Pi Assembly Language Programming: ARM Processor Coding

Raspberry Pi Assembly Language Programming: ARM Processor Coding

This Book is from a Book on Raspberry Pi assembly language programming. It covers fundamental assembly instructions, memory management, and control flow, progressing to more advanced topics like func…
00:16:15  |   Mon 17 Feb 2025
Ransomware and Cyber Extortion: Response and Prevention

Ransomware and Cyber Extortion: Response and Prevention

This Book is from a Book titled "Ransomware and Cyber Extortion Response and Prevention," which provides a comprehensive guide to understanding, responding to, and preventing ransomware and cyber ext…
00:21:08  |   Mon 17 Feb 2025
Racket Programming the Fun Way: From Strings to Turing Machines

Racket Programming the Fun Way: From Strings to Turing Machines

This Book is a table of contents and excerpts from the Book "Racket Programming the Fun Way" a tutorial teaching the Racket programming language. The book covers fundamental concepts, including data …
00:26:32  |   Sat 15 Feb 2025
Python for Data Analysis: Data Wrangling with pandas, NumPy, and Jupyter

Python for Data Analysis: Data Wrangling with pandas, NumPy, and Jupyter

This Book excerpt is from the Book Python for Data Analysis by Wes McKinney. The book focuses on how to perform data analysis using Python, specifically with the libraries pandas, NumPy, and Jupyter.…
00:12:53  |   Sat 15 Feb 2025
Python: Penetration Testing for Developers

Python: Penetration Testing for Developers

This Book is a textbook excerpt from "Python Penetration Testing for Developers" and provides a comprehensive guide to penetration testing using Python. It covers a wide range of topics, from the fun…
00:15:48  |   Sat 15 Feb 2025
Python Hacking Essentials

Python Hacking Essentials

This excerpt from the Book "Python Network Hacking Essentials" provides a comprehensive guide for beginners interested in network hacking. It starts with a basic introduction to Python programming, i…
00:35:25  |   Fri 14 Feb 2025
Python GUI Programming with Tkinter: Design and build functional and user-friendly GUI applications

Python GUI Programming with Tkinter: Design and build functional and user-friendly GUI applications

The provided Book is a collection of excerpts from a book on GUI programming in Python using Tkinter. The excerpts cover various aspects of Tkinter development, ranging from basic concepts like creat…
00:10:29  |   Fri 14 Feb 2025
Python for Professionals: Hands-on Guide for Python Professionals

Python for Professionals: Hands-on Guide for Python Professionals

The Book "Python for Professionals" is a guide for programmers learning Python as a second language. It explains core Python concepts, including data types, control flow, functions, object-oriented p…
00:26:15  |   Fri 14 Feb 2025
Python 201: Intermediate Python

Python 201: Intermediate Python

The provided Book is an excerpt from a document titled "Python 201" which acts as a guide for intermediate Python programmers. The text focuses on various advanced features and techniques within Pyth…
00:25:06  |   Thu 13 Feb 2025
Python 101: 2nd Edition

Python 101: 2nd Edition

The Book provide a comprehensive guide to learning Python programming, covering both fundamental concepts and advanced techniques. The document is divided into four parts: Part I introduces basic Pyt…
00:14:08  |   Thu 13 Feb 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.