1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

This Book titled "Practical Reverse Engineering." It provides a comprehensive guide to reverse engineering techniques for x86, x64, and ARM architectures. The text covers a variety of topics, includi…
00:28:24  |   Thu 30 Jan 2025
Practical Linux Security Cookbook

Practical Linux Security Cookbook

The Book "Practical Linux Security Cookbook," which provides a guide to configuring and implementing security measures on Linux systems. It covers topics such as password protection, server security,…
00:22:50  |   Thu 30 Jan 2025
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

This Book, "Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things" provides a comprehensive guide to the security vulnerabilities of Internet of Things (IoT) devices. It exp…
00:28:51  |   Mon 27 Jan 2025
PowerShell for Sysadmins: Workflow Automation Made Easy

PowerShell for Sysadmins: Workflow Automation Made Easy

The provided Book "PowerShell for Sysadmins: Workflow Automation Made Easy" by Adam Bertram. The excerpt is a guide to using PowerShell for automating tasks in a Windows environment. It covers a wide…
00:31:29  |   Mon 27 Jan 2025
PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems

PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems

The provided Book is an excerpt from a book titled "PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems," focusing on PowerShell 7, the latest version of PowerS…
00:20:51  |   Mon 27 Jan 2025
Power BI: Moving Beyond the Basics of Power BI and Learning about DAX Language

Power BI: Moving Beyond the Basics of Power BI and Learning about DAX Language

The Book provides a comprehensive guide to Microsoft Power BI, a powerful business intelligence tool. It begins with a basic overview of Power BI's components, features, and benefits, emphasizing its…
00:18:35  |   Sat 25 Jan 2025
PoC or GTFO, Volume 2

PoC or GTFO, Volume 2

This Book, "PoC or GTFO, Volume 2," is a compilation of articles written by a variety of authors on the subject of software exploitation. The articles discuss various aspects of hacking, including re…
00:16:43  |   Sat 25 Jan 2025
PoC or GTFO, Volume 3

PoC or GTFO, Volume 3

The Book titled "PoC or GTFO, Volume 3" which contains various articles discussing "Proof of Concept" exploits for a wide range of systems and devices. The book is a collection of writings from diffe…
00:43:11  |   Sat 25 Jan 2025
PoC or GTFO, Volume 1

PoC or GTFO, Volume 1

The Book, "PoC or GTFO, Volume 1" is a collection of articles and essays from various authors on the topic of computer security and reverse engineering. The authors, who are known for their expertise…
00:20:34  |   Fri 24 Jan 2025
Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology

Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology

The Book, Physical Red Team Operations: Physical Penetration Testing, is a guide for security professionals on how to plan and execute physical red team operations, or physical penetration testing. T…
00:30:02  |   Fri 24 Jan 2025
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks

Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks

The Book material provides a comprehensive guide to phishing attacks, exploring various types, tactics, communication channels, and legal aspects. It examines social engineering techniques, different…
00:18:48  |   Fri 24 Jan 2025
PGP & GPG: Email for the Practical Paranoid

PGP & GPG: Email for the Practical Paranoid

This excerpt from the Book "PGP & GPG: Email for the Practical Paranoid" by Michael W. Lucas provides an overview of the open-source encryption programs PGP and GnuPG, which are used to protect the c…
00:23:17  |   Wed 22 Jan 2025
Personal Digital Security: Protecting Yourself from Online Crime

Personal Digital Security: Protecting Yourself from Online Crime

This excerpt from the Book, "Personal Digital Security: Protecting Yourself from Online Crime" provides advice on how to keep personal computers and mobile devices secure from malicious hackers. The …
00:41:06  |   Wed 22 Jan 2025
Perform a web penetration test

Perform a web penetration test

This Book teaches readers how to perform a web penetration test. The course explains the stages of a penetration test, beginning with understanding the nature of such a test and the ethics involved, …
00:52:40  |   Wed 22 Jan 2025
Penetration Testing With Perl

Penetration Testing With Perl

This excerpt from the Book "Pentesting With Perl" describes how to use Perl programming for penetration testing. The book covers a wide range of topics including how to use Perl to gather open-source…
00:26:24  |   Wed 22 Jan 2025
Linux Forensics

Linux Forensics

This Book, Linux Forensics, aims to provide a comprehensive guide to digital forensics using Linux. It explores various techniques for collecting, analyzing, and interpreting digital evidence from Li…
00:51:14  |   Tue 21 Jan 2025
Pentest Secrets: Breaking The Unbreakable Enterprise Security

Pentest Secrets: Breaking The Unbreakable Enterprise Security

The excerpt is a section from the book "Pentest Secrets," which details the author's experience with a double-blind penetration test. The author, Sagar Bansal, describes his team's process of gaining…
00:27:44  |   Tue 21 Jan 2025
Penetration Testing With the Bash Shell: Make the Most of the Bash Shell and Kali Linux's Command-Line-Based Security Assessment Tools

Penetration Testing With the Bash Shell: Make the Most of the Bash Shell and Kali Linux's Command-Line-Based Security Assessment Tools

Penetration Testing with the Bash Shell is a guide to using the Bash shell and Kali Linux command-line tools for penetration testing. The book covers fundamental Bash skills, customizing the shell en…
00:38:12  |   Tue 21 Jan 2025
Penetration Testing For Dummies

Penetration Testing For Dummies

This Book is a compilation of excerpts from Penetration Testing for Dummies by Robert Shimonski. The book provides a comprehensive guide to penetration testing, covering various aspects from fundamen…
00:30:31  |   Tue 21 Jan 2025
PASS the CompTIA Network+ Exam N10-007

PASS the CompTIA Network+ Exam N10-007

This Book provides an extensive overview of network concepts, devices, and protocols with a particular focus on CompTIA Network+ exam preparation. It covers fundamental network components like router…
00:19:11  |   Mon 20 Jan 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.