Podcast Episodes

Back to Search
Enterprise Security Architecture: A Business-Driven Approach
Enterprise Security Architecture: A Business-Driven Approach

An extensive overview of enterprise security architecture, emphasizing a business-driven approach. It introduces the SABSA Model, a six-layer framewo…

1 month, 4 weeks ago

Short Long
View Episode
Embracing Technology: Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media Applications
Embracing Technology: Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media Applications

An extensive overview of digital literacy and technology, covering a broad range of topics from basic computer and smartphone functionality to advanc…

1 month, 4 weeks ago

Short Long
View Episode
Data Scientist Pocket Guide: Over 600 Concepts, Terminologies, and Processes of Machine Learning and Deep Learning Assembled Together
Data Scientist Pocket Guide: Over 600 Concepts, Terminologies, and Processes of Machine Learning and Deep Learning Assembled Together

A pocket guide offering a comprehensive overview of over 600 concepts, terminologies, and processes in the fields of machine learning and deep learni…

2 months ago

Short Long
View Episode
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
Cybersecurity and Third-Party Risk: Third Party Threat Hunting

A structured approach to managing third-party risk. The book covers fundamental concepts such as the CIA Triad (Confidentiality, Integrity, Availabil…

2 months ago

Short Long
View Episode
Cracking the Coding Interview: 189 Programming Questions and Solutions
Cracking the Coding Interview: 189 Programming Questions and Solutions

A comprehensive guide for technical interviews in the software industry, particularly focusing on algorithm, coding, and design questions. It offers …

2 months ago

Short Long
View Episode
Computer Networks, Global Edition
Computer Networks, Global Edition

A comprehensive overview of computer networking principles and technologies. The text explores foundational concepts such as gateways, routers, and n…

2 months ago

Short Long
View Episode
Computer Forensics: Incident Response Essentials
Computer Forensics: Incident Response Essentials

A practical guide for investigating computer crimes, focusing on methodologies and tools for digital evidence acquisition and analysis. The text cove…

2 months ago

Short Long
View Episode
CompTIA Pentest+ (Practice Exams)
CompTIA Pentest+ (Practice Exams)

A comprehensive overview of penetration testing concepts and methodologies, covering various attack types and the tools used by security professional…

2 months ago

Short Long
View Episode
CISA – Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual
CISA – Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual

Offers an in-depth look at the Certified Information Systems Auditor (CISA) certification. It covers critical aspects of information systems auditing…

2 months ago

Short Long
View Episode
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing

A preparation guide for Certified Ethical Hacker (CEH) certification, focusing on a wide array of cybersecurity topics. It covers fundamental concept…

2 months, 1 week ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us