1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
Python Made Simple: Full Beginner’s Guide to Mastering Python

Python Made Simple: Full Beginner’s Guide to Mastering Python

"Python & Hacking" is a comprehensive guide for beginners to learn Python programming. It starts with the basics of Python syntax, data types, and operators, then progresses to more advanced concepts…
00:34:26  |   Thu 13 Feb 2025
Protective Security: Creating Military-Grade Defenses for Your Digital Business

Protective Security: Creating Military-Grade Defenses for Your Digital Business

The Book, "Protective Security: Creating Military-Grade Defenses for Your Digital Business," written by Jim Seaman, draws on the author's experiences in the Royal Air Force to present a comprehensive…
00:22:37  |   Wed 12 Feb 2025
Pro PHP Security

Pro PHP Security

This Book, Pro PHP Security, focuses on the practical aspects of building secure PHP applications. It emphasizes understanding and preventing common web security vulnerabilities like SQL injection an…
00:26:16  |   Wed 12 Feb 2025
Programming Linux Anti-Reversing Technique

Programming Linux Anti-Reversing Technique

This Book excerpt details Linux anti-reversing techniques, focusing on compiler options and file format manipulation to hinder reverse engineering efforts. The author discusses using GCC compiler fla…
00:26:46  |   Wed 12 Feb 2025
Programming and Automating Cisco Networks: A guide to network programmability and automation in the data center, campus, and WAN

Programming and Automating Cisco Networks: A guide to network programmability and automation in the data center, campus, and WAN

This Book provides a comprehensive guide to network programmability and automation, covering foundational skills and specific applications in Cisco Data Center, Campus, and WAN networks. The book tea…
00:14:14  |   Mon 10 Feb 2025
Professor Messer's CompTIA A+ 220-901 and 220-902 Course Notes

Professor Messer's CompTIA A+ 220-901 and 220-902 Course Notes

Professor Messer's CompTIA 220-1001 Core 1 A+ Course Notes is a comprehensive study guide covering various aspects of computer hardware and networking. The notes extensively explain mobile devices, n…
00:38:19  |   Mon 10 Feb 2025
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

Professional Red Teaming: Conducting Successful Cybersecurity Engagements

It explores the process of red teaming, including shaping the engagement scope, establishing rules of engagement, executing the assessment, and reporting findings. The book argues for the continued i…
00:26:58  |   Mon 10 Feb 2025
Pro Ember Data: Getting Ember Data to Work with Your API

Pro Ember Data: Getting Ember Data to Work with Your API

David Tang's "Pro Ember Data" is a guide to using Ember Data with custom APIs. The book explains Ember Data's architecture, including the store, adapter, and serializer, and provides examples of cust…
00:21:25  |   Sun 09 Feb 2025
Privacy in Practice (Security, Audit and Leadership Series)

Privacy in Practice (Security, Audit and Leadership Series)

This Book is a table of contents and excerpts from a book on global privacy practices, authored by Dr. Alan Tang. The book comprehensively covers various aspects of data privacy, including internatio…
00:25:59  |   Sun 09 Feb 2025
Preventing Ransomware: Understand, prevent, and remediate ransomware attacks

Preventing Ransomware: Understand, prevent, and remediate ransomware attacks

The provided Book "Preventing Ransomware," published by Packt Publishing. The excerpt details various aspects of malware and ransomware, including their history, types, distribution methods, infectio…
00:25:22  |   Sun 09 Feb 2025
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century

"Practical Intrusion Analysis" is a comprehensive guide to intrusion detection, expanding beyond traditional vendor-specific focuses. The book covers intrusion detection systems (IDS), exploring sign…
00:20:31  |   Sat 08 Feb 2025
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly

Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly

The Book excerpts are from a book on practical binary analysis. It explains the challenges of analyzing binaries, such as the lack of high-level abstractions and the mixing of code and data. The book…
00:24:11  |   Sat 08 Feb 2025
Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs

Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs

This Book excerpt for the WebdriverIO automation framework, written for software testers. It covers installation and configuration, locating elements using various selectors, performing browser actio…
00:27:37  |   Sat 08 Feb 2025
Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk

Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk

This Book is an excerpt from Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk by Andrew Magnusson, a guide for improving an organization’s computer security. The book p…
00:20:41  |   Fri 07 Feb 2025
Practical Rust Web Projects: Building Cloud and Web-Based Applications

Practical Rust Web Projects: Building Cloud and Web-Based Applications

The provided Book "Practical Rust Web Projects: Building Cloud and Web-Based Applications" discuss various ways to develop web applications using the Rust programming language. The book starts by int…
00:25:20  |   Fri 07 Feb 2025
Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems

Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems

The Book provides a comprehensive guide to packet analysis, a crucial skill for network administrators and security professionals. It explains the fundamentals of network communication, the various l…
00:25:04  |   Fri 07 Feb 2025
Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices, 4th Edition

Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices, 4th Edition

This Book, Practical Mobile Forensics, is a comprehensive guide to investigating mobile devices. It covers the acquisition, analysis, and recovery of data from iOS, Android, and Windows Phone devices…
00:12:25  |   Sat 01 Feb 2025
Practical Linux System Administration: A Guide to Installation, Configuration, and Management

Practical Linux System Administration: A Guide to Installation, Configuration, and Management

This Book titled "Practical Linux System Administration" by Kenneth Hess. The text provides a comprehensive guide for Linux system administrators, covering topics such as installation, configuration,…
00:16:25  |   Sat 01 Feb 2025
Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT

Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT

This Book "Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT" provides a comprehensive guide to securing industrial control systems (ICS). The book covers a wide range of topics, includ…
00:19:42  |   Sat 01 Feb 2025
Practical C Programming: Solutions for modern C developers to create efficient and well-structured programs

Practical C Programming: Solutions for modern C developers to create efficient and well-structured programs

This Book is a compilation of programming recipes and explanations from a book titled "Practical C Programming." The book provides practical solutions and guidance for modern C developers aiming to b…
00:13:42  |   Thu 30 Jan 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.