1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
Investigating Windows Systems

Investigating Windows Systems

The source Book is an excerpt from "Investigating Windows Systems.pdf," a book that aims to guide digital forensic analysts through the process of analyzing data from Windows systems. The text provid…
00:14:17  |   Mon 16 Dec 2024
Investigating Internet Crimes

Investigating Internet Crimes

This excerpt from the book "Investigating Internet Crimes" provides a comprehensive guide for law enforcement officers and investigators on how to effectively investigate and prosecute internet-relat…
00:15:18  |   Mon 16 Dec 2024
Introduction to Computer Organization

Introduction to Computer Organization

The Book provide an introductory overview of computer organization, covering the fundamental concepts of hardware and software. The sources explore topics such as data storage formats, number systems…
00:17:12  |   Mon 16 Dec 2024
Introduction to Compiler Design

Introduction to Compiler Design

This excerpt from Introduction to Compiler Design by Torben Ægidius Mogensen provides a comprehensive overview of compiler design principles, focusing on the theoretical foundations and practical tec…
00:30:38  |   Mon 16 Dec 2024
Incident Response Techniques for Ransomware Attacks

Incident Response Techniques for Ransomware Attacks

This excerpt is from a book titled "Incident Response Techniques for Ransomware Attacks", which provides a comprehensive guide to the modern ransomware landscape. The book explores the history of hum…
00:23:17  |   Mon 16 Dec 2024
Incident Response with Threat Intelligence

Incident Response with Threat Intelligence

The Book are chapters on incident response with threat intelligence. The text covers a range of topics, including the different types of threat actors, the Cyber Kill Chain framework, MITRE ATT&CK, a…
00:17:37  |   Mon 16 Dec 2024
Incident Response & Computer Forensics, Third Edition

Incident Response & Computer Forensics, Third Edition

Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization o…
00:30:33  |   Sun 15 Dec 2024
Implementing VxRail HCI Solutions: A complete guide to VxRail Appliance administration and configuration

Implementing VxRail HCI Solutions: A complete guide to VxRail Appliance administration and configuration

This is a guide on implementing and managing VxRail HCI solutions. It explains the VxRail system architecture, software components, and licensing. The guide also provides step-by-step instructions fo…
00:26:35  |   Sun 15 Dec 2024
Implementing Effective Code Reviews: How to Build and Maintain Clean Code

Implementing Effective Code Reviews: How to Build and Maintain Clean Code

This Book "Implementing Effective Code Reviews" by Giuliana Carullo. The book is designed to guide software engineers in writing clean and efficient code. The excerpt focuses on the importance of cod…
00:26:02  |   Sun 15 Dec 2024
Implementing Cryptography Using Python

Implementing Cryptography Using Python

The Book titled "Implementing Cryptography Using Python" by Shannon W. Bray. It is a guide for information security professionals who want to learn how to implement cryptographic algorithms and proto…
00:30:19  |   Sun 15 Dec 2024
Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide

Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide

This Book provides an extensive overview of Cisco networking concepts and technologies. It explores topics ranging from basic network fundamentals to advanced routing protocols, security measures, an…
00:35:53  |   Sun 15 Dec 2024
Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking,

Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking,

This Book about reverse engineering, specifically focusing on the x86 architecture. The Book provides a comprehensive guide to understanding the internal workings of computing systems, assembly langu…
00:31:34  |   Sun 15 Dec 2024
Implementing Cisco IP Switch Networks (300-115)

Implementing Cisco IP Switch Networks (300-115)

The Book provides a guide for implementing Cisco IP Switch Networks. The guide details configuring Cisco switches, setting up VLANS, trunk links, and utilizing various security protocols. The documen…
00:19:43  |   Sun 15 Dec 2024
IEEE 802.3BW-2015 EEE Standard for Ethernet Amendment 1: Physical Layer Specifications and Management Parameters for 100 Mb/s Operation over

IEEE 802.3BW-2015 EEE Standard for Ethernet Amendment 1: Physical Layer Specifications and Management Parameters for 100 Mb/s Operation over

The Book is the IEEE Standard for Ethernet (IEEE 802.3-2018), a Book that specifies the technical details for the Ethernet network standard. The standard covers a wide range of topics including the p…
00:25:12  |   Sun 15 Dec 2024
IBM b-type Gen 7 Installation, Migration, and Best Practices Guide

IBM b-type Gen 7 Installation, Migration, and Best Practices Guide

This Book provides an extensive guide on installing, migrating, and implementing best practices for the IBM b-type Gen 7 SAN director. It covers various topics, including the autonomous SAN, automati…
00:34:16  |   Sun 15 Dec 2024
Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud

Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud

The Book is an excerpt from the book "Hybrid Cloud Security Patterns," authored by Sreekanth Iyer and reviewed by Tony Carrato. It details various security patterns and best practices for securing hy…
00:27:55  |   Sun 15 Dec 2024
How Linux Works, 3rd Edition: What Every Superuser Should Know

How Linux Works, 3rd Edition: What Every Superuser Should Know

The Book provide an in-depth guide to understanding the workings of Linux, ranging from fundamental system concepts to practical configurations and scripting techniques. The book, "How Linux Works," …
00:41:47  |   Sun 15 Dec 2024
How to Measure Anything in Cybersecurity Risk

How to Measure Anything in Cybersecurity Risk

This is an excerpt from How to Measure Anything in Cybersecurity Risk by Douglas Hubbard and Richard Seiersen, which argues for a more quantitative approach to cybersecurity risk management. The auth…
00:15:09  |   Sun 15 Dec 2024
How to Hack Like a Legend: Breaking Windows

How to Hack Like a Legend: Breaking Windows

This excerpt from the Book "How to Hack Like a Legend" by Sparc Flow is a guide to ethical hacking techniques. The book provides a detailed step-by-step plan on how to penetrate a company's network, …
00:16:33  |   Fri 13 Dec 2024
How to Catch a Phish: A Practical Guide to Detecting Phishing Emails

How to Catch a Phish: A Practical Guide to Detecting Phishing Emails

This book, How to Catch a Phish, provides a practical guide to detecting phishing emails, which are designed to trick users into providing sensitive information or downloading malicious software. The…
00:20:08  |   Fri 13 Dec 2024
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.