A comprehensive overview of penetration testing concepts and methodologies, covering various attack types and the tools used by security professionals. They detail social engineering techniques like …
Published on 17 hours ago
Offers an in-depth look at the Certified Information Systems Auditor (CISA) certification. It covers critical aspects of information systems auditing, including processes, risk management, business r…
Published on 1 day, 17 hours ago
A preparation guide for Certified Ethical Hacker (CEH) certification, focusing on a wide array of cybersecurity topics. It covers fundamental concepts such as ethical hacking, vulnerabilities, and ty…
Published on 2 days, 17 hours ago
Focusing on cybersecurity defense through the lens of offensive security. The material covers the evolution of cybersecurity practices, critiques the traditional passive and reactive defense posture,…
Published on 3 days, 17 hours ago
Outlines a seven-step methodology for building an effective InfoSec program by focusing on the "art," or people side, of security. The author, Todd, draws on over two decades of experience to argue t…
Published on 4 days, 17 hours ago
Focusing heavily on the complexities of cloud governance, compliance, and auditing. A significant portion of the text is dedicated to the Cloud Controls Matrix (CCM), an industry-specific framework d…
Published on 5 days, 17 hours ago
Explains the nature of cybercrime and the three primary levels of the internet: the Surface Web, Deep Web, and Dark Web. A significant portion of the material details the major criminal activities fo…
Published on 6 days, 17 hours ago
Serves as an in-depth textbook resource, outlining the foundational concepts of cybersecurity, beginning with definitions of data, information, and networking. It extensively covers the history and e…
Published on 1 week ago
Focusing on Ad Hoc Networks and utilizing the ns-3 simulator. The material covers both the theoretical and practical aspects of simulation, including the formal definition and characteristics of Mobi…
Published on 1 week, 1 day ago
A technical resource aimed at IT engineers looking to utilize Zabbix 5 for monitoring their environments. Authored by Nathan Liefting and Brian van Baekel, the book is structured as a recipe-style gu…
Published on 1 week, 2 days ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate