858 Episodes

  1. Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide

    Published: 12/15/2024
  2. Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking,

    Published: 12/15/2024
  3. Implementing Cisco IP Switch Networks (300-115)

    Published: 12/15/2024
  4. IEEE 802.3BW-2015 EEE Standard for Ethernet Amendment 1: Physical Layer Specifications and Management Parameters for 100 Mb/s Operation over

    Published: 12/15/2024
  5. IBM b-type Gen 7 Installation, Migration, and Best Practices Guide

    Published: 12/15/2024
  6. Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud

    Published: 12/15/2024
  7. How Linux Works, 3rd Edition: What Every Superuser Should Know

    Published: 12/15/2024
  8. How to Measure Anything in Cybersecurity Risk

    Published: 12/15/2024
  9. How to Hack Like a Legend: Breaking Windows

    Published: 12/13/2024
  10. How to Catch a Phish: A Practical Guide to Detecting Phishing Emails

    Published: 12/13/2024
  11. History of REvil

    Published: 12/13/2024
  12. Hiding from the Internet: Eliminating Personal Online Information

    Published: 12/13/2024
  13. Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

    Published: 12/12/2024
  14. Hash Crack: Password Cracking Manual v.3

    Published: 12/12/2024
  15. The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

    Published: 12/12/2024
  16. Hardware Security: A Hands-on Learning Approach

    Published: 12/12/2024
  17. Hands-On Penetration Testing on Windows

    Published: 12/11/2024
  18. Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

    Published: 12/11/2024
  19. Hands-On Chatbots and Conversational UI Development

    Published: 12/11/2024
  20. Hands-On Penetration Testing with Kali NetHunter

    Published: 12/11/2024

23 / 43

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary