1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
Hands-On Red Team Tactics

Hands-On Red Team Tactics

The Book is a guide to ethical hacking and penetration testing, focusing on red team tactics. The guide outlines common penetration testing standards and techniques, exploring tools such as Metasploi…
00:39:47  |   Mon 20 Jan 2025
Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats

Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats

The provided Book "Cybersecurity Threats, Malware Trends, and Strategies," by Tim Rains. This book explains how to mitigate cybersecurity risks for organizations by providing in-depth knowledge about…
00:34:21  |   Mon 20 Jan 2025
Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities

Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities

This Book "Metasploit 5.x for Beginners - Second Edition" by Sagar Rahalkar. The book aims to teach readers how to effectively use the Metasploit framework, a powerful tool for penetration testing. T…
00:22:44  |   Sun 19 Jan 2025
Cybersecurity Attacks - Red Team Strategies

Cybersecurity Attacks - Red Team Strategies

This Book is a comprehensive guide to building and managing a red team program within an organization. The text covers essential topics such as defining the mission of a red team, gaining leadership …
00:45:25  |   Sun 19 Jan 2025
Practical Web Penetration Testing

Practical Web Penetration Testing

The source Book "Practical Web Penetration Testing" by Gus Khawaja, published by Packt Publishing. The book is a guide for security professionals and enthusiasts who want to learn how to conduct pene…
00:35:33  |   Sun 19 Jan 2025
Network Security with pfSense

Network Security with pfSense

The provided Book "Network Security with pfSense" by Manuj Aggarwal and published by Packt Publishing. This comprehensive guide covers installing, configuring, and using pfSense, an open-source firew…
00:21:55  |   Sun 19 Jan 2025
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite

Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite

"Burp Suite Cookbook" is a guide to mastering web penetration testing using the Burp Suite tool. The book provides practical recipes for tackling vulnerabilities in web applications, covering a wide …
00:28:18  |   Sat 18 Jan 2025
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

This Book is about malware analysis. It covers several topics related to the process of investigating and understanding malicious software, including static and dynamic analysis, debugging, code inje…
00:36:57  |   Sat 18 Jan 2025
OWASP Mobile Security Testing Guide

OWASP Mobile Security Testing Guide

The Book is a comprehensive guide to mobile security testing, specifically focusing on Android and iOS platforms. It covers a wide range of security topics, including data storage, authentication, ne…
00:21:52  |   Sat 18 Jan 2025
Software Architecture with C++: Design modern systems using effective architecture concepts, design patterns, and techniques with C++20

Software Architecture with C++: Design modern systems using effective architecture concepts, design patterns, and techniques with C++20

This is a comprehensive guide to software architecture using C++. It covers key concepts like architectural styles, requirements, system design, performance, security, and deployment. The book delves…
00:34:52  |   Fri 17 Jan 2025
OSSTMM 3

OSSTMM 3

The OSSTMM (Open Source Security Testing Methodology Manual) is a framework for conducting comprehensive security audits. This methodology emphasizes testing the actual security of operational proces…
00:39:05  |   Fri 17 Jan 2025
MacOS and iOS Internals, Volume III: Security & Insecurity

MacOS and iOS Internals, Volume III: Security & Insecurity

The provided Book is an excerpt from a book titled "OS Internals Volume III: Security & Insecurity" by Jonathan Levin. This book describes security techniques and vulnerabilities in Apple's operating…
00:29:02  |   Fri 17 Jan 2025
MacOS and iOS Internals, Volume I: User Mode

MacOS and iOS Internals, Volume I: User Mode

The Book provide an in-depth look at the inner workings of the Apple operating systems, MacOS X and iOS, from the perspective of an operating system developer, Jonathan Levin. The book, OS Internals,…
00:37:19  |   Fri 17 Jan 2025
Linux System Programming: Talking Directly to the Kernel and C Library

Linux System Programming: Talking Directly to the Kernel and C Library

The provided Book "OReilly.Linux System Programming 2nd.Edition" and cover various aspects of Linux system programming, including file I/O, process management, memory management, signals, and time ma…
00:27:07  |   Thu 16 Jan 2025
Understanding the Linux Kernel

Understanding the Linux Kernel

The Book are a collection of excerpts from "Understanding the Linux Kernel" by Daniel P. Bovet and Marco Cesati. The book provides a detailed explanation of the inner workings of the Linux kernel, fo…
00:34:13  |   Thu 16 Jan 2025
Operator Handbook: Red Team + OSINT + Blue Team Reference

Operator Handbook: Red Team + OSINT + Blue Team Reference

This Book provides a comprehensive guide for red and blue teams conducting security operations. It covers a wide range of topics including tools, techniques, and strategies for both offensive and def…
00:21:55  |   Thu 16 Jan 2025
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

"Operationalizing Threat Intelligence" provides a comprehensive guide to building and implementing an effective threat intelligence program. The book covers a wide range of topics, including understa…
00:12:29  |   Wed 15 Jan 2025
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

This Book is a guide for conducting open source intelligence (OSINT) investigations. It provides a detailed overview of OSINT techniques and resources, such as using search engines, social media, and…
00:18:26  |   Wed 15 Jan 2025
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

This Book provides a comprehensive guide to Open Source Intelligence (OSINT) techniques, covering a wide range of topics from digital security and software configuration to advanced searches across s…
00:21:18  |   Wed 15 Jan 2025
Ontologies with Python: Programming OWL 2.0 Ontologies with Python and Owlready2

Ontologies with Python: Programming OWL 2.0 Ontologies with Python and Owlready2

This excerpt is from a Book that teaches programmers how to work with OWL ontologies using the Owlready2 Python library. The book provides a comprehensive guide to OWL ontologies, covering concepts l…
00:25:20  |   Wed 15 Jan 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.