1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books Arts News Education Tech News
Update frequency
every day
Average duration
24 minutes
Episodes
1004
Years Active
2024 - 2025
Share to:
Building an Effective Security Program

Building an Effective Security Program

This Book presents a comprehensive guide to building an effective cybersecurity program, covering all aspects from identifying threats and vulnerabilities to measuring performance and responding to i…
00:44:19  |   Fri 15 Nov 2024
Building Mobile Apps at Scale: 39 Engineering Challenges

Building Mobile Apps at Scale: 39 Engineering Challenges

The Book is a collection of excerpts from "Building Mobile Apps at Scale," which provides advice and insights on the complexities and challenges of building and maintaining mobile apps at scale. The …
00:31:29  |   Fri 15 Nov 2024
Bug Bounty Automation With Python

Bug Bounty Automation With Python

This excerpt from the book Bug Bounty Automation With Python: The Secrets of Bug Hunting provides a comprehensive introduction to automating bug bounty hunting using Python. The author, a security en…
00:17:38  |   Fri 15 Nov 2024
Cybersecurity Blue Team Strategies

Cybersecurity Blue Team Strategies

The Book provides a detailed guide to building and managing a cybersecurity blue team. It covers a range of topics, including the roles and responsibilities of different blue team members, the import…
00:19:09  |   Thu 14 Nov 2024
Blockchains for Network Security: Principles, technologies and applications

Blockchains for Network Security: Principles, technologies and applications

The book chapter excerpt that focuses on the integration of blockchain technology with various applications, specifically in the context of network security, Internet of Things (IoT), Geographic Info…
00:33:04  |   Thu 14 Nov 2024
Blockchain for Cybersecurity and Privacy

Blockchain for Cybersecurity and Privacy

The provided Book explore the potential applications of blockchain technology in a variety of contexts, including cybersecurity, supply chain management, healthcare, digital forensics, real estate tr…
00:14:45  |   Thu 14 Nov 2024
Black Hat GraphQL: Attacking Next Generation APIs

Black Hat GraphQL: Attacking Next Generation APIs

"Black Hat GraphQL" is a guide for security professionals interested in learning how to attack GraphQL APIs. The book explains the fundamentals of GraphQL, including its schema, type system, and quer…
00:22:48  |   Thu 14 Nov 2024
Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

The Book is a compilation of research papers on cybersecurity, specifically focusing on methods to detect and classify cyber threats. These papers explore the application of machine learning techniqu…
00:21:15  |   Thu 14 Nov 2024
Big Data Forensics: Learning Hadoop Investigations

Big Data Forensics: Learning Hadoop Investigations

This book, Big Data Forensics - Learning Hadoop Investigations, is a guide for IT professionals interested in the field of digital forensics as it applies to Big Data systems. It focuses on the ident…
00:21:23  |   Thu 14 Nov 2024
Beyond the Basic Stuff with Python: Best Practices for Writing Clean Code

Beyond the Basic Stuff with Python: Best Practices for Writing Clean Code

This is a guide for intermediate Python programmers who want to expand their knowledge beyond basic syntax. The text covers advanced best practices such as choosing understandable names for variables…
00:14:41  |   Thu 14 Nov 2024
Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition

Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition

This excerpt from the book "Beyond BIOS: Developing with the Unified Extensible Firmware Interface" by Vincent Zimmer, Suresh Marisetty, and Michael Rothman, provides an in-depth look at the Unified …
00:22:02  |   Thu 14 Nov 2024
Beginning Flutter: A Hands On Guide to App Development

Beginning Flutter: A Hands On Guide to App Development

The provided text excerpts come from the book "Beginning Flutter: A Hands-On Guide to App Development" by Marco L. Napoli. The book provides a comprehensive guide for learning how to build Flutter ap…
00:10:55  |   Thu 14 Nov 2024
Beginning Security with Microsoft Technologies

Beginning Security with Microsoft Technologies

This excerpt is from the book Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data by Vasantha Lakshmi. The book focuses on securing enterprise environments using …
00:19:13  |   Thu 14 Nov 2024
Networking with MikroTik: MTCNA Study Guide

Networking with MikroTik: MTCNA Study Guide

This study guide from Manito Networks, LLC is designed to help individuals prepare for the MikroTik Certified Network Associate (MTCNA) exam. The guide covers a wide range of topics related to config…
00:39:24  |   Thu 14 Nov 2024
Becoming The Hacker

Becoming The Hacker

The source text provides a comprehensive guide to web application security from the perspective of a hacker. The text covers common web vulnerabilities, including SQL injection, Cross-Site Scripting …
00:24:38  |   Thu 14 Nov 2024
Basic Security Testing With Kali Linux, Third Edition

Basic Security Testing With Kali Linux, Third Edition

This source is a book about computer security testing, specifically focused on using Kali Linux as a platform for ethical hacking. The book covers a wide range of topics, including basic security tes…
00:20:52  |   Thu 14 Nov 2024
Bash Quick Start Guide: Get up and running with shell scripting with Bash

Bash Quick Start Guide: Get up and running with shell scripting with Bash

The provided text comes from the Bash Quick Start Guide, a guide to programming with the Bash shell. The guide starts with the basics of Bash, such as command structure and quoting, before moving on …
00:24:50  |   Wed 13 Nov 2024
Azure Security Cookbook

Azure Security Cookbook

The sources are from an Azure Security Cookbook, a guide for implementing Azure security features and tools. The cookbook explains how to secure Azure AD identities, Azure networks, remote access, vi…
00:27:38  |   Wed 13 Nov 2024
AWS Penetration Testing

AWS Penetration Testing

The Book provides a comprehensive guide to penetration testing AWS environments, covering various AWS services such as S3 buckets, RDS databases, Lambda functions, and API Gateway. It explains the me…
00:14:49  |   Wed 13 Nov 2024
AWS Certified Solutions Architect Associate: The ultimate guide for the SAA-C02 exam

AWS Certified Solutions Architect Associate: The ultimate guide for the SAA-C02 exam

This guide provides an introduction to AWS, a cloud computing platform, and details key concepts and services for the AWS Certified Solutions Architect Associate exam. It explains various AWS service…
00:17:34  |   Wed 13 Nov 2024
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.