1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
Official (ISC)2 Guide to the CISSP-ISSMP CBK

Official (ISC)2 Guide to the CISSP-ISSMP CBK

The Book is a comprehensive guide for the Information Systems Security Management Professional (ISSMP) certification, covering the core principles and practices of information security management. Th…
00:36:49  |   Wed 15 Jan 2025
Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to bypass them

Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to bypass them

This Book, "Offensive Shellcode from Scratch," provides an in-depth guide to understanding and creating shellcode, a type of malicious code used to exploit vulnerabilities in software. It covers the …
00:12:16  |   Tue 14 Jan 2025
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data

Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data

The Book provides a comprehensive guide to analyzing leaked datasets, focusing on ethical considerations, technical skills, and practical tools for investigating sensitive information. It explores me…
00:33:20  |   Tue 14 Jan 2025
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments

Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments

This excerpt from the book "Pentesting Azure" by Matt Burrough offers a comprehensive guide for penetration testers and security professionals who seek to assess the security of Microsoft Azure deplo…
00:50:15  |   Mon 13 Jan 2025
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

The provided Book is an excerpt from a guide to using Nmap, a free and open-source network scanner. The guide covers a wide range of topics including the history of Nmap, installation instructions, d…
00:31:19  |   Mon 13 Jan 2025
NGINX Cookbook

NGINX Cookbook

The Book is a guide to the NGINX web server, specifically focused on NGINX Plus, a commercial edition. It covers a wide range of topics, from basic installation and configuration to advanced features…
00:21:27  |   Mon 13 Jan 2025
Networking All-in-One For Dummies

Networking All-in-One For Dummies

The Book provide an in-depth overview of networking concepts, covering both hardware and software aspects. From the fundamentals of network protocols and standards to the complexities of server admin…
00:36:39  |   Mon 13 Jan 2025
Exam 98-366 Networking Fundamentals, 2nd Edition

Exam 98-366 Networking Fundamentals, 2nd Edition

The Book, "Exam 98-366 Networking Fundamentals, 2nd Edition," is a textbook designed to prepare students for the Microsoft Technology Associate (MTA) Networking Fundamentals exam. It covers foundatio…
00:20:41  |   Sun 12 Jan 2025
Windows Server Administration Fundamentals

Windows Server Administration Fundamentals

This source is a book about networking fundamentals that teaches readers how to connect computers and devices to form networks. It starts with basic concepts such as local area networks (LANs) and ne…
00:19:51  |   Sun 12 Jan 2025
Network Security: Private Communication in a Public World

Network Security: Private Communication in a Public World

This Book "Network Security: Private Communications in a Public World" (Third Edition) by Charlie Kaufman, Radia Perlman, Mike Speciner, and Ray Perlner. The Book covers a wide range of topics relate…
00:11:41  |   Sun 12 Jan 2025
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks

Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks

This excerpt from the book "Network Security Monitoring" by Chris Fry and Martin Nystrom provides guidance on how to monitor network security effectively. The book focuses on targeted monitoring, whi…
00:17:52  |   Sat 11 Jan 2025
Network Security Assessment: Know Your Network

Network Security Assessment: Know Your Network

This book, Network Security Assessment, provides a comprehensive guide to penetration testing methods and techniques. The author covers a wide range of topics, including network reconnaissance, vulne…
00:21:31  |   Sat 11 Jan 2025
Network Security and Cryptography

Network Security and Cryptography

This Book is about computer network security and cryptography. It covers classical and modern cryptography, Internet security services such as IPSec and SSL, and systems security, including intrusion…
00:26:57  |   Sat 11 Jan 2025
Network Programmability with YANG: The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI

Network Programmability with YANG: The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI

This excerpt from "Network Programmability with YANG.pdf" explains the YANG language, which is designed for network configuration and management. It describes how YANG models work and how to create t…
00:16:33  |   Sat 11 Jan 2025
Network Forensics: Tracking Hackers through Cyberspace

Network Forensics: Tracking Hackers through Cyberspace

The source Book provides a comprehensive overview of network forensics, covering topics like evidence acquisition, packet analysis, intrusion detection, malware forensics, and wireless security. It d…
00:26:27  |   Fri 10 Jan 2025
Network Design Cookbook: Architecting Cisco Networks

Network Design Cookbook: Architecting Cisco Networks

This Book "Network Design Cookbook_Architecting Cisco Networks" guide. The guide aims to teach network design best practices and methodologies using Cisco technologies. It provides a step-by-step app…
00:11:38  |   Fri 10 Jan 2025
Network Connectivity: Concepts, Computation, and Optimization

Network Connectivity: Concepts, Computation, and Optimization

This Book investigate the concept of network connectivity, a measure of how well-connected nodes are within a network. They explore connectivity measures including path capacity, triangle capacity, a…
00:08:46  |   Fri 10 Jan 2025
National Cyber Summit (NCS) Research Track 2020

National Cyber Summit (NCS) Research Track 2020

The provided Book explore various facets of cybersecurity, including education, risk assessment, and security solutions for specific technologies. The papers discuss the development of cybersecurity …
00:34:34  |   Thu 09 Jan 2025
MSSQL Penetration Testing - Metasploit

MSSQL Penetration Testing - Metasploit

The provided Book is a guide on how to use Metasploit to penetrate and test Microsoft SQL Server (MSSQL) databases. The guide covers various steps, beginning with locating MSSQL servers on a network …
00:12:14  |   Thu 09 Jan 2025
MCSA Guide to Installing and Configuring Microsoft Windows Server 2012 /R2, Exam 70-410

MCSA Guide to Installing and Configuring Microsoft Windows Server 2012 /R2, Exam 70-410

The Book  provide a comprehensive guide to installing, configuring, and managing Microsoft Windows Server 2012/R2. The text covers a wide range of topics including server installation, storage config…
00:25:01  |   Thu 09 Jan 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.