Podcast Episodes
Back to Search
Wi-Fi Hacking For Everyone
A comprehensive introduction to wireless networking and cybersecurity, specifically focusing on the educational practice of penetration testing. It b…
43 minutes ago
TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS
A comprehensive technical exploration of the Transport Layer Security protocol and the foundational cryptographic primitives that sustain it. The tex…
1 day ago
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
A guide that bridges the gap between theoretical encryption and practical security implementation. The source details the evolution of cryptographic …
2 days ago
The Book of Batch Scripting: From Fundamentals to Advanced Automation
A comprehensive guide to mastering the Windows command-line language, moving from basic file creation to sophisticated automation techniques. The boo…
3 days ago
CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide (Certification Guide)
This comprehensive study guide prepares networking professionals for the CCNP and CCIE Security Core SCOR 350-701 certification exam. It covers funda…
4 days ago
Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW)
A comprehensive technical guide for configuring and managing Cisco Firepower Threat Defense (FTD) and the Firepower Management Center (FMC). It outli…
5 days ago
Computer Security: Principles and Practice
A comprehensive guide to information security, specifically aligning its content with the CISSP certification requirements. It examines various digit…
6 days ago
Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons
Examines the transformative impact of artificial intelligence and autonomous systems on modern global security and military strategy. The authors ana…
1 week ago
Cybersecurity for Scada Systems
A comprehensive guide to protecting industrial control systems and critical infrastructure. The text outlines the historical transition from isolated…
1 week, 1 day ago
Network Forensics with Wireshark: Build Practical Expertise in Network Monitoring, Threat Detection, and Cyber Forensics with Wireshark
A comprehensive guide to network forensics and traffic analysis using tools like Wireshark and Pyshark. The text establishes a foundation by comparin…
1 week, 2 days ago