1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
Memory Systems: Cache, DRAM, Disk

Memory Systems: Cache, DRAM, Disk

The Book provide a comprehensive overview of memory systems, focusing on the design, implementation, and optimization of various memory components, including caches, DRAM, and disks. The texts explor…
00:27:24  |   Sat 04 Jan 2025
Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders and malware attacks

Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders and malware attacks

This Book, Mastering Windows Security and Hardening, is a comprehensive guide to securing Windows systems, focusing on both client and server environments. It covers a wide range of topics, including…
00:44:40  |   Sat 04 Jan 2025
Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy

Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy

This Book is a comprehensive guide to mastering Windows Group Policy. It covers the fundamentals of Group Policy, including its role in managing users and computers in an Active Directory environment…
00:14:13  |   Fri 03 Jan 2025
Mastering Python Forensics

Mastering Python Forensics

The Book "Mastering Python Forensics" by Dr. Michael Spreitzenbarth and Dr. Johann Uhrmann. This book teaches readers how to use Python to perform digital forensic investigations on a variety of plat…
00:18:26  |   Fri 03 Jan 2025
Mastering Docker: Enhance your containerization and DevOps skills to deliver production-ready applications

Mastering Docker: Enhance your containerization and DevOps skills to deliver production-ready applications

This is a collection of excerpts from the book Mastering Docker, 4th Edition, which explores the fundamentals and advanced uses of Docker, a containerization technology that allows developers to pack…
00:19:45  |   Fri 03 Jan 2025
Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

This Book "Mastering Defensive Security," which covers essential concepts and techniques for securing computer systems, networks, and data. The book aims to guide IT professionals, data scientists, a…
00:28:46  |   Fri 03 Jan 2025
Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense

Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense

The Book "Mastering Cyber Intelligence," which aims to equip readers with the knowledge and skills necessary to develop and implement a comprehensive cyber threat intelligence program. The book explo…
00:20:18  |   Fri 03 Jan 2025
Mastering Azure Security: Keeping your Microsoft Azure workloads safe, 2nd Edition

Mastering Azure Security: Keeping your Microsoft Azure workloads safe, 2nd Edition

This Book Mastering Azure Security by Mustafa Toroman and Tom Janetscheck. It provides a comprehensive guide to securing Microsoft Azure workloads, covering topics like identity management, governanc…
00:38:23  |   Thu 02 Jan 2025
Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks

Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks

This excerpt is from "Mastering Linux Security and Hardening, 3rd Edition," a book that focuses on protecting Linux systems from cyberattacks. The text covers various security topics such as configur…
00:34:19  |   Thu 02 Jan 2025
Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

This Book, Mastering Defensive Security, is a guide to cybersecurity practices designed for professionals. It covers a variety of topics including vulnerability assessment, risk management, physical …
00:18:54  |   Thu 02 Jan 2025
Mastering Windows Server 2022 with Azure Cloud Services: IaaS, PaaS, and SaaS

Mastering Windows Server 2022 with Azure Cloud Services: IaaS, PaaS, and SaaS

The Book is a guide for learning about Windows Server 2022, including both the traditional desktop experience and the more secure Server Core installation. It covers a wide range of topics, from fund…
00:14:12  |   Thu 02 Jan 2025
Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principle

Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principle

This excerpt from the book "Mastering Windows Security and Hardening" provides a comprehensive guide to securing Windows environments. It covers a wide range of topics, including understanding the ev…
00:17:00  |   Wed 01 Jan 2025
Mastering Palo Alto Networks

Mastering Palo Alto Networks

This Book is an excerpt from a guide titled "Mastering Palo Alto Networks" which aims to teach readers how to deploy and manage Palo Alto Networks firewalls. It covers a range of topics including bas…
00:14:23  |   Wed 01 Jan 2025
Mastering Modern Linux

Mastering Modern Linux

This Book provides a detailed overview of the Linux operating system, including its history, architecture, and functionality. The text covers a wide range of topics, from fundamental concepts like th…
00:19:53  |   Wed 01 Jan 2025
Mastering Mobile Forensics

Mastering Mobile Forensics

The Book provides a comprehensive guide to mobile forensics, focusing on the intricacies of acquiring and analyzing data from iOS, Android, and Windows Phone devices. The text explores various forens…
00:49:39  |   Wed 01 Jan 2025
Mastering Malware Analysis - Second Edition: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT

Mastering Malware Analysis - Second Edition: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT

"Mastering Malware Analysis" is a comprehensive guide for malware analysts. The Book covers a broad range of topics, including assembly language, PE file analysis, unpacking and decryption techniques…
00:07:36  |   Tue 31 Dec 2024
Mastering Windows Network Forensics and Investigation

Mastering Windows Network Forensics and Investigation

This Book, "Mastering Windows Network Forensics," is a comprehensive guide for network investigators and incident responders to master the art of conducting thorough investigations into incidents tha…
00:44:36  |   Tue 31 Dec 2024
Windows Internals - Part 2

Windows Internals - Part 2

"Windows Internals, Sixth Edition, Part 2" is a technical guide that provides an in-depth look at the inner workings of the Windows operating system, specifically focusing on its memory management, I…
00:12:50  |   Tue 31 Dec 2024
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware

Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware

This Book, Malware Analysis and Detection Engineering, offers a comprehensive guide to understanding and combating malware. It covers a broad range of topics, from setting up a malware analysis lab t…
00:31:21  |   Tue 31 Dec 2024
Malware Forensics: Investigating and Analyzing Malicious Code

Malware Forensics: Investigating and Analyzing Malicious Code

This Book is a comprehensive guide to malware incident response, covering both Windows and Linux systems. It details the tools and techniques needed to investigate malware, analyze infected systems, …
00:36:45  |   Mon 30 Dec 2024
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.