Podcast Episodes
Back to Search
PowerShell for Sysadmins: Workflow Automation Made Easy
The provided Book "PowerShell for Sysadmins: Workflow Automation Made Easy" by Adam Bertram. The excerpt is a guide to using PowerShell for automatin…
1 year, 3 months ago
PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems
The provided Book is an excerpt from a book titled "PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems," focu…
1 year, 3 months ago
Power BI: Moving Beyond the Basics of Power BI and Learning about DAX Language
The Book provides a comprehensive guide to Microsoft Power BI, a powerful business intelligence tool. It begins with a basic overview of Power BI's c…
1 year, 3 months ago
PoC or GTFO, Volume 2
This Book, "PoC or GTFO, Volume 2," is a compilation of articles written by a variety of authors on the subject of software exploitation. The article…
1 year, 3 months ago
PoC or GTFO, Volume 3
The Book titled "PoC or GTFO, Volume 3" which contains various articles discussing "Proof of Concept" exploits for a wide range of systems and device…
1 year, 3 months ago
PoC or GTFO, Volume 1
The Book, "PoC or GTFO, Volume 1" is a collection of articles and essays from various authors on the topic of computer security and reverse engineeri…
1 year, 3 months ago
Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology
The Book, Physical Red Team Operations: Physical Penetration Testing, is a guide for security professionals on how to plan and execute physical red t…
1 year, 3 months ago
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
The Book material provides a comprehensive guide to phishing attacks, exploring various types, tactics, communication channels, and legal aspects. It…
1 year, 3 months ago
PGP & GPG: Email for the Practical Paranoid
This excerpt from the Book "PGP & GPG: Email for the Practical Paranoid" by Michael W. Lucas provides an overview of the open-source encryption progr…
1 year, 3 months ago
Personal Digital Security: Protecting Yourself from Online Crime
This excerpt from the Book, "Personal Digital Security: Protecting Yourself from Online Crime" provides advice on how to keep personal computers and …
1 year, 3 months ago