1136 Episoade

  1. Cybersecurity and Third-Party Risk: Third Party Threat Hunting

    Publicat: 07.12.2025
  2. Cracking the Coding Interview: 189 Programming Questions and Solutions

    Publicat: 06.12.2025
  3. Computer Networks, Global Edition

    Publicat: 05.12.2025
  4. Computer Forensics: Incident Response Essentials

    Publicat: 04.12.2025
  5. CompTIA Pentest+ (Practice Exams)

    Publicat: 03.12.2025
  6. CISA – Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual

    Publicat: 02.12.2025
  7. Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing

    Publicat: 01.12.2025
  8. The Active Defender: Immersion in the Offensive Security Mindset (Tech Today)

    Publicat: 30.11.2025
  9. The Cybersecurity Manager's Guide: The Art of Building Your Security Program

    Publicat: 29.11.2025
  10. Certificate of Cloud Auditing Knowledge Study Guide

    Publicat: 28.11.2025
  11. Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime

    Publicat: 27.11.2025
  12. Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals

    Publicat: 26.11.2025
  13. Wireless Network Simulation: A Guide using Ad Hoc Networks and the ns-3 Simulator

    Publicat: 25.11.2025
  14. Zabbix 5 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 5 for designing, building, and maintaining your Zabbix

    Publicat: 24.11.2025
  15. Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions

    Publicat: 23.11.2025
  16. UX for XR: User Experience Design and Strategies for Immersive Technologies (Design Thinking)

    Publicat: 22.11.2025
  17. Visual Studio Code for Python Programmers

    Publicat: 21.11.2025
  18. Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future

    Publicat: 20.11.2025
  19. Hands-on Data Virtualization with Polybase: Administer Big Data, SQL Queries and Data Accessibility Across Hadoop, Azure, Spark, Cassandra

    Publicat: 19.11.2025
  20. Hands-on DevOps with Linux: Build and Deploy DevOps Pipelines Using Linux Commands, Terraform, Docker, Vagrant, and Kubernetes

    Publicat: 18.11.2025

2 / 57

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary

Visit the podcast's native language site