1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books Education News Arts Tech News
Update frequency
every day
Average duration
24 minutes
Episodes
1006
Years Active
2024 - 2025
Share to:
Full-Stack React, TypeScript, and Node: Build cloud-ready web applications using React 17 with Hooks and GraphQL

Full-Stack React, TypeScript, and Node: Build cloud-ready web applications using React 17 with Hooks and GraphQL

The Book provide a comprehensive guide to building a full-stack web application using React, TypeScript, Node.js, Express, and GraphQL. The book "Full-Stack React, TypeScript, and Node" by David Choi…
00:29:15  |   Wed 04 Dec 2024
Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL

Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL

The provided Book excerpts are from the book "Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL" by Nader Dabit. This book is a comprehensive guide to building full s…
00:25:31  |   Wed 04 Dec 2024
Full Stack Python Security: Cryptography, TLS, and attack resistance

Full Stack Python Security: Cryptography, TLS, and attack resistance

The Book provide a comprehensive guide to securing Python-based web applications. The text covers fundamental cryptographic concepts, such as hashing and encryption, and then applies these concepts t…
00:30:23  |   Wed 04 Dec 2024
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

From Hacking to Report Writing: An Introduction to Security and Penetration Testing

The source Book provides a guide to security testing. It explains the different types of security tests, including black box, white box, and gray box, and how to execute them. The text then explores …
00:26:48  |   Wed 04 Dec 2024
Foundational Java: Key Elements and Practical Programming

Foundational Java: Key Elements and Practical Programming

This excerpt from the book "Foundational Java" provides an overview of object-oriented programming in Java. It explores key concepts such as classes, objects, inheritance, and polymorphism, along wit…
00:20:28  |   Wed 04 Dec 2024
Linux All-In-One For Dummies

Linux All-In-One For Dummies

The source Book provides a comprehensive guide to understanding and using Linux, covering a wide range of topics from basic installation and system administration to advanced scripting and network se…
00:16:52  |   Wed 04 Dec 2024
Flutter for Beginners

Flutter for Beginners

The provided Book excerpts come from the book "Flutter for Beginners" by Alessandro Biessek, offering a comprehensive guide to Flutter app development. The text covers a wide range of topics, includi…
00:26:07  |   Wed 04 Dec 2024
FIREWALLS DON'T STOP DRAGONS: A STEP-BY-STEP GUIDE TO COMPUTER SECURITY FOR NON-TECHIES

FIREWALLS DON'T STOP DRAGONS: A STEP-BY-STEP GUIDE TO COMPUTER SECURITY FOR NON-TECHIES

The Book provide an extensive guide to cybersecurity and privacy, using an analogy of a medieval castle to explain the importance of building strong defenses against cyber threats. The book details h…
00:31:56  |   Tue 03 Dec 2024
Finding Beacons in the Dark

Finding Beacons in the Dark

This research Book explores the Cobalt Strike framework, a popular tool used by both red teams and malicious actors for penetration testing and cyberattacks. The authors present a comprehensive analy…
00:18:57  |   Tue 03 Dec 2024
Ethical Hacking 101: How to conduct professional pentestings in 21 days or less!

Ethical Hacking 101: How to conduct professional pentestings in 21 days or less!

This excerpt is from a book that teaches aspiring ethical hackers how to conduct penetration tests. The book provides a framework for ethical hacking, which involves performing simulated cyberattacks…
00:50:58  |   Tue 03 Dec 2024
Ethical Hacker's Certification Guide (CEHv11)

Ethical Hacker's Certification Guide (CEHv11)

This excerpt is from a book on ethical hacking and penetration testing, specifically geared toward preparing individuals for the Certified Ethical Hacker (CEH) certification. The book is divided into…
00:18:02  |   Tue 03 Dec 2024
Ethical Hacking-Joe Grant

Ethical Hacking-Joe Grant

This Book is an introduction to ethical hacking, using the Kali Linux operating system. It covers a range of topics related to information security, including network reconnaissance, vulnerability sc…
00:26:43  |   Tue 03 Dec 2024
Ethical Hacking: Techniques, Tools, and Countermeasures

Ethical Hacking: Techniques, Tools, and Countermeasures

The source Book provides a comprehensive overview of ethical hacking techniques, tools, and countermeasures for information security professionals. The text covers a wide range of topics, including t…
00:17:37  |   Tue 03 Dec 2024
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

The Book are chapters from a book titled "Essential Cybersecurity Science" by Josiah Dykstra, which explores the application of the scientific method to various aspects of cybersecurity. The book cov…
00:15:51  |   Tue 03 Dec 2024
Essential Of Artificial Intelligence

Essential Of Artificial Intelligence

The Book provide an extensive overview of Python fundamentals, covering the basics of programming using Python, including data types, operators, functions, object-oriented programming, iterators, gen…
00:31:52  |   Tue 03 Dec 2024
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World

Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World

The source is a book excerpt on enterprise-level security. It focuses on a security model called ELS (Enterprise Level Security) and its practical implementation within a variety of contexts, from cl…
00:22:31  |   Mon 02 Dec 2024
Enterprise Level Security 1 & 2

Enterprise Level Security 1 & 2

The Book is a comprehensive guide to enterprise-level security for information systems. It explains principles, architectures, and techniques for securing sensitive data in the context of distributed…
00:26:01  |   Mon 02 Dec 2024
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions

The sources provide an extensive overview of enterprise integration patterns, focusing on the use of messaging systems for connecting applications. It explores various messaging patterns, including m…
00:19:12  |   Mon 02 Dec 2024
Enterprise Cloud Adminstration (ECA) 5.15 - Course Guide

Enterprise Cloud Adminstration (ECA) 5.15 - Course Guide

The provided Book comes from a Nutanix Enterprise Cloud Administration (ECA) course guide. The guide outlines the various components and features of the Nutanix platform, covering topics such as clus…
00:13:59  |   Mon 02 Dec 2024
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

This excerpt from "Engineering Trustworthy Systems" is a guide for cybersecurity professionals, focusing on how to design and build trustworthy systems that minimize risk to an organization's mission…
00:26:47  |   Mon 02 Dec 2024
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.