Podcast Episodes

Back to Search
Building Virtual Pentesting Labs for Advanced Penetration Testing
Building Virtual Pentesting Labs for Advanced Penetration Testing

A comprehensive guide for creating simulated environments to practice cybersecurity assessments. The text establishes a foundational security testing…

13 hours ago

Short Long
View Episode
Building Telegram Bots: Develop Bots in 12 Programming Languages using the Telegram Bot API
Building Telegram Bots: Develop Bots in 12 Programming Languages using the Telegram Bot API

Teaches readers how to create automated chat programs using the Telegram Bot API. This instructional text is structured as a multi-week course, cover…

1 day, 13 hours ago

Short Long
View Episode
What You Need to Know about Docker: The absolute essentials you need to get Docker up and running
What You Need to Know about Docker: The absolute essentials you need to get Docker up and running

A practical manual for technical professionals, detailing the transition from traditional virtual machines to lightweight containerization. It provid…

2 days, 13 hours ago

Short Long
View Episode
Build Your Own Website: A Comic Guide to HTML, CSS, and WordPress
Build Your Own Website: A Comic Guide to HTML, CSS, and WordPress

A comic book format to teach the fundamentals of web development. The narrative follows a character named Kim and her dog, Tofu, as they learn from v…

3 days, 13 hours ago

Short Long
View Episode
Azure DevOps Explained: Get started with Azure DevOps and develop your DevOps practices
Azure DevOps Explained: Get started with Azure DevOps and develop your DevOps practices

A comprehensive guide is designed to help software developers and project managers implement modern development practices using Microsoft’s SaaS plat…

4 days, 13 hours ago

Short Long
View Episode
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

A comprehensive guide for individuals interested in information security. It begins by defining the core principles of cybersecurity—confidentiality,…

5 days, 13 hours ago

Short Long
View Episode
Bash Cookbook 1st Edition
Bash Cookbook 1st Edition

A comprehensive manual for users of the GNU Bourne Again Shell. It provides practical solutions for system administrators, programmers, and enthusias…

6 days, 13 hours ago

Short Long
View Episode
bash Cookbook: Solutions and Examples for bash Users 2nd Edition
bash Cookbook: Solutions and Examples for bash Users 2nd Edition

A comprehensive technical guide designed to help users solve practical problems through shell scripting. Serving as a "how-to" resource, the text pro…

1 week ago

Short Long
View Episode
Beginning Ethical Hacking with Python
Beginning Ethical Hacking with Python

An introductory guide to ethical hacking using the Python 3 programming language, specifically for those with no prior experience. It outlines the le…

1 week, 1 day ago

Short Long
View Episode
Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook
Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook

A comprehensive technical guide designed to help security professionals understand and mirror the tactics used by malicious actors. The authors, who …

1 week, 2 days ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us