Podcast Episodes

Back to Search
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks

The Book material provides a comprehensive guide to phishing attacks, exploring various types, tactics, communication channels, and legal aspects. It…

1 year, 2 months ago

Short Long
View Episode
PGP & GPG: Email for the Practical Paranoid
PGP & GPG: Email for the Practical Paranoid

This excerpt from the Book "PGP & GPG: Email for the Practical Paranoid" by Michael W. Lucas provides an overview of the open-source encryption progr…

1 year, 2 months ago

Short Long
View Episode
Personal Digital Security: Protecting Yourself from Online Crime
Personal Digital Security: Protecting Yourself from Online Crime

This excerpt from the Book, "Personal Digital Security: Protecting Yourself from Online Crime" provides advice on how to keep personal computers and …

1 year, 2 months ago

Short Long
View Episode
Perform a web penetration test
Perform a web penetration test

This Book teaches readers how to perform a web penetration test. The course explains the stages of a penetration test, beginning with understanding t…

1 year, 2 months ago

Short Long
View Episode
Penetration Testing With Perl
Penetration Testing With Perl

This excerpt from the Book "Pentesting With Perl" describes how to use Perl programming for penetration testing. The book covers a wide range of topi…

1 year, 2 months ago

Short Long
View Episode
Linux Forensics
Linux Forensics

This Book, Linux Forensics, aims to provide a comprehensive guide to digital forensics using Linux. It explores various techniques for collecting, an…

1 year, 2 months ago

Short Long
View Episode
Pentest Secrets: Breaking The Unbreakable Enterprise Security
Pentest Secrets: Breaking The Unbreakable Enterprise Security

The excerpt is a section from the book "Pentest Secrets," which details the author's experience with a double-blind penetration test. The author, Sag…

1 year, 2 months ago

Short Long
View Episode
Penetration Testing With the Bash Shell: Make the Most of the Bash Shell and Kali Linux's Command-Line-Based Security Assessment Tools
Penetration Testing With the Bash Shell: Make the Most of the Bash Shell and Kali Linux's Command-Line-Based Security Assessment Tools

Penetration Testing with the Bash Shell is a guide to using the Bash shell and Kali Linux command-line tools for penetration testing. The book covers…

1 year, 2 months ago

Short Long
View Episode
Penetration Testing For Dummies
Penetration Testing For Dummies

This Book is a compilation of excerpts from Penetration Testing for Dummies by Robert Shimonski. The book provides a comprehensive guide to penetrati…

1 year, 2 months ago

Short Long
View Episode
PASS the CompTIA Network+ Exam N10-007
PASS the CompTIA Network+ Exam N10-007

This Book provides an extensive overview of network concepts, devices, and protocols with a particular focus on CompTIA Network+ exam preparation. It…

1 year, 2 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us