1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books Arts News Education Tech News
Update frequency
every day
Average duration
24 minutes
Episodes
1004
Years Active
2024 - 2025
Share to:
Principles of Computer Security: CompTIA Security+ and Beyond, Sixth Edition

Principles of Computer Security: CompTIA Security+ and Beyond, Sixth Edition

The Book "Principles of Computer Security: CompTIA Security+ and Beyond" provides a comprehensive overview of computer security, encompassing a wide range of topics. It explains the principles of int…
00:23:35  |   Sun 17 Nov 2024
Practical Go: Building Scalable Network and Non-Network Applications

Practical Go: Building Scalable Network and Non-Network Applications

The Book provided is an excerpt from the table of contents and introductory materials of a book titled "Practical Go: Building Scalable Network and Non-Network Applications." The book aims to guide r…
00:19:54  |   Sun 17 Nov 2024
Practical Automation with PowerShell: Effective scripting from the console to the cloud

Practical Automation with PowerShell: Effective scripting from the console to the cloud

The Book Practical Automation with PowerShell focuses on building automations in a secure and reliable manner. It explains concepts like using secure objects for sensitive data, creating data-driven …
00:20:23  |   Sun 17 Nov 2024
Penetration Testing with Shellcode

Penetration Testing with Shellcode

The Book titled "Penetration Testing with Shellcode" by Hamza Megahed. This book provides a comprehensive guide to detecting, exploiting, and securing network-level and operating system vulnerabiliti…
00:10:53  |   Sun 17 Nov 2024
Agile Security Operations: Engineering for agility in cyber defense, detection, and response

Agile Security Operations: Engineering for agility in cyber defense, detection, and response

This book, "Agile Security Operations," provides a comprehensive guide to modern cybersecurity practices, focusing on an approach that integrates active defense, incident response, and threat intelli…
00:25:26  |   Sun 17 Nov 2024
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

The provided Book is from a book titled "Cisco Networks," which appears to be a guide to networking concepts and technologies, specifically focusing on Cisco products and technologies. The text cover…
00:21:02  |   Sun 17 Nov 2024
Cisco Catalyst 9000 - A new era of intent-based networking

Cisco Catalyst 9000 - A new era of intent-based networking

This Book, written by a team of Cisco engineers, aims to introduce the Cisco Catalyst 9000 family of switches. It highlights the new era of intent-based networking, outlining the Catalyst 9000's key …
00:24:06  |   Sun 17 Nov 2024
CISA Review Manual, 27th Edition

CISA Review Manual, 27th Edition

The Book is a portion of a review manual for the Certified Information Systems Auditor (CISA) exam. It covers various aspects of information systems auditing and assurance, including IT governance, i…
00:29:59  |   Sun 17 Nov 2024
CISA Review Manual, 26th Edition

CISA Review Manual, 26th Edition

The provided Book is an excerpt from the CISA Review Manual, 26th Edition, a study guide that prepares individuals for the Certified Information Systems Auditor (CISA) exam. The CISA exam tests an in…
00:10:59  |   Sun 17 Nov 2024
Certified Application Security Engineer | JAVA: Technology Workbook

Certified Application Security Engineer | JAVA: Technology Workbook

This Book is a textbook for the Certified Application Security Engineer (CASE) exam, focusing specifically on Java technology. The book covers a wide range of topics related to application security, …
00:31:05  |   Sun 17 Nov 2024
The Official (ISC)2 CCSP CBK Reference

The Official (ISC)2 CCSP CBK Reference

The Book are chapters from a guidebook about cloud computing security, providing in-depth information for security professionals. They cover a wide range of cloud security topics, including cloud con…
00:45:57  |   Sat 16 Nov 2024
Certified Blackhat: Methodology to Unethical Hacking

Certified Blackhat: Methodology to Unethical Hacking

This Book is a guide for ethical hacking written by a cybersecurity professional. It aims to teach readers how to understand hacking methodologies, including techniques like footprinting, gaining acc…
00:26:07  |   Sat 16 Nov 2024
Carrier sense multiple access  with collision detection (CSMA/CD)  access method and physical layer  specifications

Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications

This Book, IEEE Std 802.3-2002, is a standard for local and metropolitan area networks (LANs) that defines the specifications for the Physical and Data Link layers of the Open Systems Interconnection…
00:26:51  |   Sat 16 Nov 2024
CCNP R&S Practical Workbook

CCNP R&S Practical Workbook

This Book"CCNP R&S Practical Workbook" provides a comprehensive guide for configuring and troubleshooting networking technologies, specifically focusing on routing protocols such as EIGRP, OSPF, and …
00:08:42  |   Sat 16 Nov 2024
CCNA Voice Lab Manual

CCNA Voice Lab Manual

The Book is a lab manual for Cisco's CCNA Voice certification, covering the configuration and troubleshooting of Cisco Unified Communications Manager Express (CUCME) and Cisco Unified Communications …
00:23:18  |   Sat 16 Nov 2024
CC Certified in Cybersecurity All-in-One Exam Guide

CC Certified in Cybersecurity All-in-One Exam Guide

This excerpt from the Certified in Cybersecurity All-in-One Exam Guide details the foundational knowledge needed for individuals pursuing the Certified in Cybersecurity (CC) credential. The text expl…
00:44:40  |   Sat 16 Nov 2024
Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence

Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence

This Book "Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence", a Book written by Kevin Cardwell. It focuses on using the network analysis…
00:21:35  |   Sat 16 Nov 2024
The Car Hacker's Handbook: A Guide for the Penetration Tester

The Car Hacker's Handbook: A Guide for the Penetration Tester

"The Car Hacker's Handbook" is a guide for penetration testers focused on automotive security. It teaches readers how to assess vulnerabilities in modern cars, which are becoming increasingly compute…
00:17:46  |   Sat 16 Nov 2024
C++20: Get the Details

C++20: Get the Details

The Book is a detailed explanation of the new features in C++20, including the Ranges library, Coroutines, Concepts, and Modules. The document also provides an overview of upcoming features in C++23,…
00:18:09  |   Fri 15 Nov 2024
C How to Program

C How to Program

The Book provide an extensive overview of the C programming language, encompassing its fundamental concepts, syntax, and practical applications. The text covers topics such as data types, operators, …
00:12:44  |   Fri 15 Nov 2024
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.