Podcast Episodes

Back to Search
Pentest Secrets: Breaking The Unbreakable Enterprise Security

Pentest Secrets: Breaking The Unbreakable Enterprise Security



The excerpt is a section from the book "Pentest Secrets," which details the author's experience with a double-blind penetration test. The author, Sagar Bansal, describes his team's process of gaining…


Published on 4 months, 2 weeks ago

Penetration Testing With the Bash Shell: Make the Most of the Bash Shell and Kali Linux's Command-Line-Based Security Assessment Tools

Penetration Testing With the Bash Shell: Make the Most of the Bash Shell and Kali Linux's Command-Line-Based Security Assessment Tools



Penetration Testing with the Bash Shell is a guide to using the Bash shell and Kali Linux command-line tools for penetration testing. The book covers fundamental Bash skills, customizing the shell en…


Published on 4 months, 2 weeks ago

Penetration Testing For Dummies

Penetration Testing For Dummies



This Book is a compilation of excerpts from Penetration Testing for Dummies by Robert Shimonski. The book provides a comprehensive guide to penetration testing, covering various aspects from fundamen…


Published on 4 months, 2 weeks ago

PASS the CompTIA Network+ Exam N10-007

PASS the CompTIA Network+ Exam N10-007



This Book provides an extensive overview of network concepts, devices, and protocols with a particular focus on CompTIA Network+ exam preparation. It covers fundamental network components like router…


Published on 4 months, 2 weeks ago

Hands-On Red Team Tactics

Hands-On Red Team Tactics



The Book is a guide to ethical hacking and penetration testing, focusing on red team tactics. The guide outlines common penetration testing standards and techniques, exploring tools such as Metasploi…


Published on 4 months, 2 weeks ago

Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats

Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats



The provided Book "Cybersecurity Threats, Malware Trends, and Strategies," by Tim Rains. This book explains how to mitigate cybersecurity risks for organizations by providing in-depth knowledge about…


Published on 4 months, 2 weeks ago

Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities

Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities



This Book "Metasploit 5.x for Beginners - Second Edition" by Sagar Rahalkar. The book aims to teach readers how to effectively use the Metasploit framework, a powerful tool for penetration testing. T…


Published on 4 months, 2 weeks ago

Cybersecurity Attacks - Red Team Strategies

Cybersecurity Attacks - Red Team Strategies



This Book is a comprehensive guide to building and managing a red team program within an organization. The text covers essential topics such as defining the mission of a red team, gaining leadership …


Published on 4 months, 2 weeks ago

Practical Web Penetration Testing

Practical Web Penetration Testing



The source Book "Practical Web Penetration Testing" by Gus Khawaja, published by Packt Publishing. The book is a guide for security professionals and enthusiasts who want to learn how to conduct pene…


Published on 4 months, 2 weeks ago

Network Security with pfSense

Network Security with pfSense



The provided Book "Network Security with pfSense" by Manuj Aggarwal and published by Packt Publishing. This comprehensive guide covers installing, configuring, and using pfSense, an open-source firew…


Published on 4 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate