Podcast Episodes

Back to Search
PowerShell for Sysadmins: Workflow Automation Made Easy
PowerShell for Sysadmins: Workflow Automation Made Easy

The provided Book "PowerShell for Sysadmins: Workflow Automation Made Easy" by Adam Bertram. The excerpt is a guide to using PowerShell for automatin…

1 year, 3 months ago

Short Long
View Episode
PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems
PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems

The provided Book is an excerpt from a book titled "PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems," focu…

1 year, 3 months ago

Short Long
View Episode
Power BI: Moving Beyond the Basics of Power BI and Learning about DAX Language
Power BI: Moving Beyond the Basics of Power BI and Learning about DAX Language

The Book provides a comprehensive guide to Microsoft Power BI, a powerful business intelligence tool. It begins with a basic overview of Power BI's c…

1 year, 3 months ago

Short Long
View Episode
PoC or GTFO, Volume 2
PoC or GTFO, Volume 2

This Book, "PoC or GTFO, Volume 2," is a compilation of articles written by a variety of authors on the subject of software exploitation. The article…

1 year, 3 months ago

Short Long
View Episode
PoC or GTFO, Volume 3
PoC or GTFO, Volume 3

The Book titled "PoC or GTFO, Volume 3" which contains various articles discussing "Proof of Concept" exploits for a wide range of systems and device…

1 year, 3 months ago

Short Long
View Episode
PoC or GTFO, Volume 1
PoC or GTFO, Volume 1

The Book, "PoC or GTFO, Volume 1" is a collection of articles and essays from various authors on the topic of computer security and reverse engineeri…

1 year, 3 months ago

Short Long
View Episode
Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology
Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology

The Book, Physical Red Team Operations: Physical Penetration Testing, is a guide for security professionals on how to plan and execute physical red t…

1 year, 3 months ago

Short Long
View Episode
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks

The Book material provides a comprehensive guide to phishing attacks, exploring various types, tactics, communication channels, and legal aspects. It…

1 year, 3 months ago

Short Long
View Episode
PGP & GPG: Email for the Practical Paranoid
PGP & GPG: Email for the Practical Paranoid

This excerpt from the Book "PGP & GPG: Email for the Practical Paranoid" by Michael W. Lucas provides an overview of the open-source encryption progr…

1 year, 3 months ago

Short Long
View Episode
Personal Digital Security: Protecting Yourself from Online Crime
Personal Digital Security: Protecting Yourself from Online Crime

This excerpt from the Book, "Personal Digital Security: Protecting Yourself from Online Crime" provides advice on how to keep personal computers and …

1 year, 3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us