1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Education News Arts Books Tech News
Update frequency
every day
Average duration
24 minutes
Episodes
1002
Years Active
2024 - 2025
Share to:
Warez: The Infrastructure and Aesthetics of Piracy

Warez: The Infrastructure and Aesthetics of Piracy

This summary is talking about the Book "Warez: The Infrastructure and Aesthetics of Piracy".

Explores the history and culture of the Warez Scene, a global network of pirates who distribute copyrighted…
00:15:28  |   Sat 02 Nov 2024
Reactive Programming with Kotlin (Second Edition): Learn RX with RxJava, RxKotlin and RxAndroid

Reactive Programming with Kotlin (Second Edition): Learn RX with RxJava, RxKotlin and RxAndroid

This summary is talking about the Book "Reactive Programming with Kotlin (Second Edition): Learn RX with RxJava, RxKotlin and RxAndroid".

This text provides an overview of reactive programming using R…
00:34:18  |   Sat 02 Nov 2024
Ransomware and Cybercrime

Ransomware and Cybercrime

This summary is talking about the Book "Ransomware and Cybercrime".

The excerpt from Ransomware and Cybercrime by Andrew Jenkinson focuses on the rising threat of ransomware and cybercrime. It examine…
00:14:05  |   Sat 02 Nov 2024
Unauthorised Access: Physical Penetration Testing For IT Security Teams

Unauthorised Access: Physical Penetration Testing For IT Security Teams

This summary is talking about the Book "Unauthorised Access: Physical Penetration Testing For IT Security Teams".

The sources are a compilation of excerpts from a book titled "Unauthorized Access", wh…
00:28:23  |   Thu 31 Oct 2024
Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic

Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic

This summary is talking about the Book "Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic".

The sources provide a comprehensive guide to Wireshark, an open-source netw…
00:13:22  |   Thu 31 Oct 2024
Response Evidence Preservation and Collection

Response Evidence Preservation and Collection

This summary is talking about the Book "Response Evidence Preservation and Collection".

The provided text is a collection of excerpts from a PDF document about digital evidence preservation and collec…
00:09:42  |   Thu 31 Oct 2024
RTFM - Red Team Field Manual v2

RTFM - Red Team Field Manual v2

This summary is talking about the Book "RTFM - Red Team Field Manual v2".

This document, titled "RTFM - Red Team Field Manual," serves as a comprehensive guide for cybersecurity professionals conducti…
00:15:11  |   Thu 31 Oct 2024
Real-World Bug Hunting: A Field Guide to Web Hacking

Real-World Bug Hunting: A Field Guide to Web Hacking

This summary is talking about the Book "Real-World Bug Hunting: A Field Guide to Web Hacking".

This book is a comprehensive guide to web hacking, focusing on finding and exploiting security vulnerabil…
00:20:57  |   Wed 30 Oct 2024
Red Team Guide A Practical Guide For Red Team And Offensive Security

Red Team Guide A Practical Guide For Red Team And Offensive Security

This summary is talking about the Book "Red Team Guide A Practical Guide For Red Team And Offensive Security".

The provided text is an excerpt from a "Red Team Guide," which serves as a practical manu…
00:19:18  |   Wed 30 Oct 2024
Seeking the Truth from Mobile Evidence

Seeking the Truth from Mobile Evidence

This summary is talking about the Book "Seeking the Truth from Mobile Evidence".

This text comes from the book Seeking the Truth from Mobile Evidence, which is a guide for forensic examiners on how to…
00:12:10  |   Wed 30 Oct 2024
SQL kurz und gut

SQL kurz und gut

This summary is talking about the Book "SQL kurz und gut".

This document provides a comprehensive guide to SQL, a language used for managing and querying data in databases. It covers fundamental conce…
00:10:43  |   Wed 30 Oct 2024
Spring Security in Action

Spring Security in Action

This summary is talking about the Book "Spring Security in Action".

This book, Spring Security In Action, teaches Java developers how to secure their Spring applications. The text is divided into two …
00:10:05  |   Wed 30 Oct 2024
The PowerShell Scripting & Toolmaking Book

The PowerShell Scripting & Toolmaking Book

This summary is talking about the Book "The PowerShell Scripting & Toolmaking Book".

It is a comprehensive guide to building PowerShell tools and scripts. It covers a wide range of topics, including t…
00:32:42  |   Mon 28 Oct 2024
Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication

Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication

This summary is talking about the Book "Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication".

Explains the history of social engineerin…
00:11:41  |   Mon 28 Oct 2024
The Cybersecurity Playbook for Modern Enterprises

The Cybersecurity Playbook for Modern Enterprises

This summary is talking about the Book "The Cybersecurity Playbook for Modern Enterprises".

The source is a cybersecurity playbook for modern enterprises, aimed at preventing data breaches and cyberat…
00:22:44  |   Sat 26 Oct 2024
The Complete Book Of Locks And Locksmithing

The Complete Book Of Locks And Locksmithing

This summary is talking about the Book "The Complete Book Of Locks And Locksmithing".

Provides a comprehensive guide to locksmithing, covering a wide range of topics from the history of locks to moder…
00:16:48  |   Sat 26 Oct 2024
Ten Strategies of a World Class Cybersecurity Operations Center

Ten Strategies of a World Class Cybersecurity Operations Center

This summary is talking about the Book "Ten Strategies of a World Class Cybersecurity Operations Center".

The document, authored by Carson Zimmerman of The MITRE Corporation, is a guide for cybersecur…
00:14:13  |   Sat 26 Oct 2024
The Practice of Network Security Monitoring

The Practice of Network Security Monitoring

This summary is talking about the Book "The Practice of Network Security Monitoring".

The book focuses on the implementation of Network Security Monitoring (NSM) techniques to detect and respond to cy…
00:27:00  |   Sat 26 Oct 2024
The Nmap cookbook Beat the Beast

The Nmap cookbook Beat the Beast

This summary is talking about the Book "The Nmap cookbook Beat the Beast".

Provides a comprehensive guide to using Nmap, an open-source network scanner, for penetration testing and ethical hacking. Th…
00:15:41  |   Sat 26 Oct 2024
The 8 Layers of the OSI Cake: A Forensic Taste of Each Layer (Cyber Secrets)

The 8 Layers of the OSI Cake: A Forensic Taste of Each Layer (Cyber Secrets)

This summary is talking about the Book "The 8 Layers of the OSI Cake: A Forensic Taste of Each Layer (Cyber Secrets)".

This collection of articles is a deep-dive into the world of digital forensics an…
00:15:02  |   Sat 26 Oct 2024
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.