1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
Kubernetes Security - Operating Kubernetes Clusters and Applications Safely

Kubernetes Security - Operating Kubernetes Clusters and Applications Safely

This excerpt from the book Kubernetes Security by Liz Rice and Michael Hausenblas provides a comprehensive overview of how to secure Kubernetes clusters and applications. The authors discuss various …
00:23:56  |   Fri 20 Dec 2024
Keyboard Shortcuts For Data Scientists

Keyboard Shortcuts For Data Scientists

The Book "Keyboard Shortcuts For Data Scientists.pdf" provides keyboard shortcuts for commonly used software tools by data scientists. The document is organized by software type, including Python, R,…
00:23:17  |   Fri 20 Dec 2024
Kali Linux Reference Guide: A Pentester's Voyage

Kali Linux Reference Guide: A Pentester's Voyage

The provided Book comes from a book titled "Kali Linux Reference Guide: A Pentester's Voyage" which serves as a comprehensive guide for individuals seeking to learn about penetration testing techniqu…
00:23:56  |   Fri 20 Dec 2024
Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition

Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition

This excerpt from the book "Kali Linux 2: Assuring Security" is a comprehensive guide to using Kali Linux for penetration testing. It begins by introducing the features and installation of Kali Linux…
00:44:45  |   Fri 20 Dec 2024
Kali Linux Wireless Penetration Testing Beginner's Guide

Kali Linux Wireless Penetration Testing Beginner's Guide

This Book is an excerpt from the book "Kali Linux Wireless Penetration Testing Beginner's Guide" by Vivek Ramachandran and Cameron Buchanan. The book teaches readers how to conduct penetration tests …
00:24:48  |   Fri 20 Dec 2024
Kali Linux Revealed: Mastering the Penetration Testing Distribution

Kali Linux Revealed: Mastering the Penetration Testing Distribution

The Book material provides a comprehensive guide to Kali Linux, covering everything from basic system fundamentals and package management to advanced usage scenarios such as kernel recompilation, cus…
00:51:16  |   Fri 20 Dec 2024
Kali Linux Ctf Blueprints

Kali Linux Ctf Blueprints

The source Book provides a comprehensive guide to building and utilizing penetration testing environments using Kali Linux. The document outlines specific scenarios and vulnerabilities that can be re…
00:25:17  |   Thu 19 Dec 2024
Kali Linux

Kali Linux

The Book titled "Kali Linux". It includes the email address and professional title of Souhail Laghchim, who identifies himself as a developer. This suggests that the document might contain informatio…
00:04:37  |   Thu 19 Dec 2024
JNCIP: Juniper Networks Certified Internet Professional Study Guide

JNCIP: Juniper Networks Certified Internet Professional Study Guide

The provided Book comes from a study guide for the Juniper Networks Certified Internet Professional (JNCIP) exam. The study guide covers key concepts and configurations necessary for the JNCIP-M prac…
00:31:30  |   Thu 19 Dec 2024
Jumpstarting the Raspberry Pi Zero W: Control the World Around You with a $10 Computer

Jumpstarting the Raspberry Pi Zero W: Control the World Around You with a $10 Computer

This Book from “Jumpstarting the Raspberry Pi Zero W” by Akkana Peck focuses on using the Raspberry Pi Zero W to control hardware and network devices. The book provides a comprehensive introduction t…
00:20:54  |   Thu 19 Dec 2024
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

The Book "The Art of Intrusion" by Kevin Mitnick and William Simon, a detailed account of hacker exploits and security vulnerabilities. The text explores various methods used by hackers to penetrate …
00:22:48  |   Thu 19 Dec 2024
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide

(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide

The Book is an excerpt from a study guide for the Systems Security Certified Practitioner (SSCP) exam. It explains key information security concepts and best practices, including the three pillars of…
00:22:48  |   Thu 19 Dec 2024
ISO/IEC 9899:1999, Programming languages -- C

ISO/IEC 9899:1999, Programming languages -- C

The Book material provides a comprehensive and detailed description of the C programming language, including its syntax, semantics, and standard library. It covers topics ranging from basic concepts …
00:17:20  |   Thu 19 Dec 2024
JavaScript Everywhere: Building Cross-Platform Applications with GraphQL, React, React Native, and Electron

JavaScript Everywhere: Building Cross-Platform Applications with GraphQL, React, React Native, and Electron

The Book provide a comprehensive guide to building cross-platform applications with GraphQL, React, React Native, and Electron. The first source, "JavaScript Everywhere," focuses on setting up a deve…
00:37:10  |   Tue 17 Dec 2024
(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test

(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test

The Book "(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test" is a study guide for the CISSP certification exam, which focuses on the field of information syst…
00:28:52  |   Tue 17 Dec 2024
ISACA Certified in Risk and Information Systems Control (CRISC) Exam Guide

ISACA Certified in Risk and Information Systems Control (CRISC) Exam Guide

The Book provide a comprehensive guide to the Certified in Risk and Information Systems Control (CRISC) certification exam. It explores various aspects of IT risk management, including governance, co…
00:45:11  |   Tue 17 Dec 2024
IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT

IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT

This "IoT and OT Security Handbook" explains the challenges of securing IoT and OT devices in the era of Industry 4.0. The book highlights the importance of asset inventory, network segmentation, vul…
00:13:53  |   Tue 17 Dec 2024
iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

This excerpt comes from iOS Forensics for Investigators, a book by Gianluca Tiepolo, a cybersecurity researcher specializing in mobile forensics and incident response. The book is a comprehensive gui…
00:24:40  |   Tue 17 Dec 2024
iOS Application Security: The Definitive Guide for Hackers and Developers

iOS Application Security: The Definitive Guide for Hackers and Developers

The source is a book entitled "iOS Application Security" by William Pollock. The book is a guide to security practices and common security vulnerabilities in iOS development. It covers a wide range o…
00:38:22  |   Tue 17 Dec 2024
iOS 14 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics

iOS 14 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics

The Book is an excerpt from a book about iOS 14 programming fundamentals using Swift. The Book covers fundamental topics such as object types, variables, control flow, memory management, and Cocoa cl…
00:20:49  |   Tue 17 Dec 2024
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.