836 Episodes

  1. Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

    Published: 2/25/2025
  2. Security Automation with Ansible 2

    Published: 2/25/2025
  3. Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

    Published: 2/24/2025
  4. Secure Programming with Static Analysis

    Published: 2/24/2025
  5. Secure PHP Development: Building 50 Practical Applications

    Published: 2/23/2025
  6. Automated Machine Learning with Microsoft Azure: Build highly accurate and scalable end-to-end AI solutions with Azure AutoML

    Published: 2/23/2025
  7. Rust Web Programming: A hands-on guide to developing fast and secure web apps with the Rust programming language

    Published: 2/22/2025
  8. Modern Vulnerability Management: Predictive Cybersecurity

    Published: 2/22/2025
  9. Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

    Published: 2/21/2025
  10. Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel

    Published: 2/21/2025
  11. RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200)

    Published: 2/20/2025
  12. Reverse Engineering Questions and Answers - George Duckett

    Published: 2/20/2025
  13. Red Team Development and Operations: A practical guide

    Published: 2/19/2025
  14. Red Hat Linux Security and Optimization

    Published: 2/19/2025
  15. Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)

    Published: 2/18/2025
  16. The Red Team Handbook - The Army's Guide To Making Better Decisions

    Published: 2/18/2025
  17. Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)

    Published: 2/18/2025
  18. Real-World Python: A Hacker's Guide to Solving Problems with Code

    Published: 2/17/2025
  19. Raspberry Pi Assembly Language Programming: ARM Processor Coding

    Published: 2/17/2025
  20. Ransomware and Cyber Extortion: Response and Prevention

    Published: 2/17/2025

11 / 42

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary