Podcast Episodes

Back to Search
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption

A guide that bridges the gap between theoretical encryption and practical security implementation. The source details the evolution of cryptographic …

20 hours ago

Short Long
View Episode
The Book of Batch Scripting: From Fundamentals to Advanced Automation
The Book of Batch Scripting: From Fundamentals to Advanced Automation

A comprehensive guide to mastering the Windows command-line language, moving from basic file creation to sophisticated automation techniques. The boo…

1 day, 20 hours ago

Short Long
View Episode
CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide (Certification Guide)
CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide (Certification Guide)

This comprehensive study guide prepares networking professionals for the CCNP and CCIE Security Core SCOR 350-701 certification exam. It covers funda…

2 days, 20 hours ago

Short Long
View Episode
Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW)
Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW)

A comprehensive technical guide for configuring and managing Cisco Firepower Threat Defense (FTD) and the Firepower Management Center (FMC). It outli…

3 days, 20 hours ago

Short Long
View Episode
Computer Security: Principles and Practice
Computer Security: Principles and Practice

A comprehensive guide to information security, specifically aligning its content with the CISSP certification requirements. It examines various digit…

4 days, 20 hours ago

Short Long
View Episode
Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons
Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons

Examines the transformative impact of artificial intelligence and autonomous systems on modern global security and military strategy. The authors ana…

5 days, 20 hours ago

Short Long
View Episode
Cybersecurity for Scada Systems
Cybersecurity for Scada Systems

A comprehensive guide to protecting industrial control systems and critical infrastructure. The text outlines the historical transition from isolated…

6 days, 20 hours ago

Short Long
View Episode
Network Forensics with Wireshark: Build Practical Expertise in Network Monitoring, Threat Detection, and Cyber Forensics with Wireshark
Network Forensics with Wireshark: Build Practical Expertise in Network Monitoring, Threat Detection, and Cyber Forensics with Wireshark

A comprehensive guide to network forensics and traffic analysis using tools like Wireshark and Pyshark. The text establishes a foundation by comparin…

1 week ago

Short Long
View Episode
VCP-DCV for vSphere 7.x (Exam 2V0-21.20) Official Cert Guide (VMware Press Certification)
VCP-DCV for vSphere 7.x (Exam 2V0-21.20) Official Cert Guide (VMware Press Certification)

Outlines the essential technical operations for managing a vSphere 7.x environment. The documentation details critical network security policies, suc…

1 week, 1 day ago

Short Long
View Episode
Practical Purple Teaming: The Art of Collaborative Defense
Practical Purple Teaming: The Art of Collaborative Defense

A comprehensive guide for improving organizational security through the collaborative integration of offensive and defensive strategies. The text det…

1 week, 2 days ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us