972 Episodes

  1. IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT

    Published: 12/17/2024
  2. iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

    Published: 12/17/2024
  3. iOS Application Security: The Definitive Guide for Hackers and Developers

    Published: 12/17/2024
  4. iOS 14 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics

    Published: 12/17/2024
  5. Investigating Windows Systems

    Published: 12/16/2024
  6. Investigating Internet Crimes

    Published: 12/16/2024
  7. Introduction to Computer Organization

    Published: 12/16/2024
  8. Introduction to Compiler Design

    Published: 12/16/2024
  9. Incident Response Techniques for Ransomware Attacks

    Published: 12/16/2024
  10. Incident Response with Threat Intelligence

    Published: 12/16/2024
  11. Incident Response & Computer Forensics, Third Edition

    Published: 12/15/2024
  12. Implementing VxRail HCI Solutions: A complete guide to VxRail Appliance administration and configuration

    Published: 12/15/2024
  13. Implementing Effective Code Reviews: How to Build and Maintain Clean Code

    Published: 12/15/2024
  14. Implementing Cryptography Using Python

    Published: 12/15/2024
  15. Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide

    Published: 12/15/2024
  16. Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking,

    Published: 12/15/2024
  17. Implementing Cisco IP Switch Networks (300-115)

    Published: 12/15/2024
  18. IEEE 802.3BW-2015 EEE Standard for Ethernet Amendment 1: Physical Layer Specifications and Management Parameters for 100 Mb/s Operation over

    Published: 12/15/2024
  19. IBM b-type Gen 7 Installation, Migration, and Best Practices Guide

    Published: 12/15/2024
  20. Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud

    Published: 12/15/2024

28 / 49

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary