Podcast Episodes

Back to Search
Practical Automation with PowerShell: Effective scripting from the console to the cloud

Practical Automation with PowerShell: Effective scripting from the console to the cloud



The Book Practical Automation with PowerShell focuses on building automations in a secure and reliable manner. It explains concepts like using secure objects for sensitive data, creating data-driven …


Published on 6 months, 3 weeks ago

Penetration Testing with Shellcode

Penetration Testing with Shellcode



The Book titled "Penetration Testing with Shellcode" by Hamza Megahed. This book provides a comprehensive guide to detecting, exploiting, and securing network-level and operating system vulnerabiliti…


Published on 6 months, 3 weeks ago

Agile Security Operations: Engineering for agility in cyber defense, detection, and response

Agile Security Operations: Engineering for agility in cyber defense, detection, and response



This book, "Agile Security Operations," provides a comprehensive guide to modern cybersecurity practices, focusing on an approach that integrates active defense, incident response, and threat intelli…


Published on 6 months, 3 weeks ago

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA



The provided Book is from a book titled "Cisco Networks," which appears to be a guide to networking concepts and technologies, specifically focusing on Cisco products and technologies. The text cover…


Published on 6 months, 3 weeks ago

Cisco Catalyst 9000 - A new era of intent-based networking

Cisco Catalyst 9000 - A new era of intent-based networking



This Book, written by a team of Cisco engineers, aims to introduce the Cisco Catalyst 9000 family of switches. It highlights the new era of intent-based networking, outlining the Catalyst 9000's key …


Published on 6 months, 3 weeks ago

CISA Review Manual, 27th Edition

CISA Review Manual, 27th Edition



The Book is a portion of a review manual for the Certified Information Systems Auditor (CISA) exam. It covers various aspects of information systems auditing and assurance, including IT governance, i…


Published on 6 months, 3 weeks ago

CISA Review Manual, 26th Edition

CISA Review Manual, 26th Edition



The provided Book is an excerpt from the CISA Review Manual, 26th Edition, a study guide that prepares individuals for the Certified Information Systems Auditor (CISA) exam. The CISA exam tests an in…


Published on 6 months, 3 weeks ago

Certified Application Security Engineer | JAVA: Technology Workbook

Certified Application Security Engineer | JAVA: Technology Workbook



This Book is a textbook for the Certified Application Security Engineer (CASE) exam, focusing specifically on Java technology. The book covers a wide range of topics related to application security, …


Published on 6 months, 3 weeks ago

The Official (ISC)2 CCSP CBK Reference

The Official (ISC)2 CCSP CBK Reference



The Book are chapters from a guidebook about cloud computing security, providing in-depth information for security professionals. They cover a wide range of cloud security topics, including cloud con…


Published on 6 months, 3 weeks ago

Certified Blackhat: Methodology to Unethical Hacking

Certified Blackhat: Methodology to Unethical Hacking



This Book is a guide for ethical hacking written by a cybersecurity professional. It aims to teach readers how to understand hacking methodologies, including techniques like footprinting, gaining acc…


Published on 6 months, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate