Podcast Episodes

Back to Search
The Cybersecurity Manager's Guide: The Art of Building Your Security Program

The Cybersecurity Manager's Guide: The Art of Building Your Security Program



Outlines a seven-step methodology for building an effective InfoSec program by focusing on the "art," or people side, of security. The author, Todd, draws on over two decades of experience to argue t…


Published on 16 hours ago

Certificate of Cloud Auditing Knowledge Study Guide

Certificate of Cloud Auditing Knowledge Study Guide



Focusing heavily on the complexities of cloud governance, compliance, and auditing. A significant portion of the text is dedicated to the Cloud Controls Matrix (CCM), an industry-specific framework d…


Published on 1 day, 16 hours ago

Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime

Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime



Explains the nature of cybercrime and the three primary levels of the internet: the Surface Web, Deep Web, and Dark Web. A significant portion of the material details the major criminal activities fo…


Published on 2 days, 16 hours ago

Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals

Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals



Serves as an in-depth textbook resource, outlining the foundational concepts of cybersecurity, beginning with definitions of data, information, and networking. It extensively covers the history and e…


Published on 3 days, 16 hours ago

Wireless Network Simulation: A Guide using Ad Hoc Networks and the ns-3 Simulator

Wireless Network Simulation: A Guide using Ad Hoc Networks and the ns-3 Simulator



Focusing on Ad Hoc Networks and utilizing the ns-3 simulator. The material covers both the theoretical and practical aspects of simulation, including the formal definition and characteristics of Mobi…


Published on 4 days, 16 hours ago

Zabbix 5 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 5 for designing, building, and maintaining your Zabbix

Zabbix 5 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 5 for designing, building, and maintaining your Zabbix



A technical resource aimed at IT engineers looking to utilize Zabbix 5 for monitoring their environments. Authored by Nathan Liefting and Brian van Baekel, the book is structured as a recipe-style gu…


Published on 5 days, 16 hours ago

Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions

Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions



A deep foundation in blockchain technology, starting with a historical context of money and the centralized systems it relies upon, before introducing the decentralized, trustless model of blockchain…


Published on 6 days, 16 hours ago

UX for XR: User Experience Design and Strategies for Immersive Technologies (Design Thinking)

UX for XR: User Experience Design and Strategies for Immersive Technologies (Design Thinking)



Focusing on the application of user experience (UX) principles to Extended Reality (XR), which includes Virtual Reality (VR) and Augmented Reality (AR). The content explores the history of XR, the ri…


Published on 1 week ago

Visual Studio Code for Python Programmers

Visual Studio Code for Python Programmers



An extensive table of contents and introductory material for a guide on using the popular code editor for Python development. The source details fundamental setup procedures such as installing Visual…


Published on 1 week, 1 day ago

Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future

Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future



Argues that cybersecurity is primarily a behavioral challenge rather than a technological one, emphasizing that people are the cause of nearly all security incidents. The book introduces and elaborat…


Published on 1 week, 2 days ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate