854 Episodes

  1. Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing

    Published: 5/3/2025
  2. Data Science and Analytics Strategy: An Emergent Design Approach

    Published: 5/3/2025
  3. Critical Visualization: Rethinking the Representation of Data

    Published: 5/2/2025
  4. Data Visualization: A Practical Introduction

    Published: 5/2/2025
  5. Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue

    Published: 5/1/2025
  6. Concurrency with Modern C++: What every professional C++ programmer should know about concurrency

    Published: 5/1/2025
  7. Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications

    Published: 4/30/2025
  8. C# 12 and .NET 8 – Modern Cross-Platform Development Fundamentals: Start building websites and services with ASP.NET Core 8, Blazor

    Published: 4/30/2025
  9. Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot

    Published: 4/29/2025
  10. Black Hat Bash: Creative Scripting for Hackers and Pentesters

    Published: 4/29/2025
  11. Applied Data Science: Data Translators Across the Disciplines

    Published: 4/28/2025
  12. An In-Depth Guide to Mobile Device Forensics

    Published: 4/28/2025
  13. An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers

    Published: 4/27/2025
  14. Accelerate DevOps with GitHub: Enhance software delivery performance with GitHub Issues, Projects, Actions, and Advanced Security

    Published: 4/27/2025
  15. Advanced IPv6

    Published: 4/26/2025
  16. Information Security Management Handbook, 6th Edition

    Published: 4/26/2025
  17. AZ-900: Microsoft Azure Fundamentals: Study Guide with Practice Questions & Labs

    Published: 4/25/2025
  18. Powershell Step-by Step

    Published: 4/25/2025
  19. Beginner's Guide to Exploitation on ARM Vol 2

    Published: 4/24/2025
  20. Beginner's Guide to Exploitation on ARM Vol 1

    Published: 4/24/2025

6 / 43

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary