Podcast Episodes

Back to Search
Perform a web penetration test
Perform a web penetration test

This Book teaches readers how to perform a web penetration test. The course explains the stages of a penetration test, beginning with understanding t…

1 year, 3 months ago

Short Long
View Episode
Penetration Testing With Perl
Penetration Testing With Perl

This excerpt from the Book "Pentesting With Perl" describes how to use Perl programming for penetration testing. The book covers a wide range of topi…

1 year, 3 months ago

Short Long
View Episode
Linux Forensics
Linux Forensics

This Book, Linux Forensics, aims to provide a comprehensive guide to digital forensics using Linux. It explores various techniques for collecting, an…

1 year, 3 months ago

Short Long
View Episode
Pentest Secrets: Breaking The Unbreakable Enterprise Security
Pentest Secrets: Breaking The Unbreakable Enterprise Security

The excerpt is a section from the book "Pentest Secrets," which details the author's experience with a double-blind penetration test. The author, Sag…

1 year, 3 months ago

Short Long
View Episode
Penetration Testing With the Bash Shell: Make the Most of the Bash Shell and Kali Linux's Command-Line-Based Security Assessment Tools
Penetration Testing With the Bash Shell: Make the Most of the Bash Shell and Kali Linux's Command-Line-Based Security Assessment Tools

Penetration Testing with the Bash Shell is a guide to using the Bash shell and Kali Linux command-line tools for penetration testing. The book covers…

1 year, 3 months ago

Short Long
View Episode
Penetration Testing For Dummies
Penetration Testing For Dummies

This Book is a compilation of excerpts from Penetration Testing for Dummies by Robert Shimonski. The book provides a comprehensive guide to penetrati…

1 year, 3 months ago

Short Long
View Episode
PASS the CompTIA Network+ Exam N10-007
PASS the CompTIA Network+ Exam N10-007

This Book provides an extensive overview of network concepts, devices, and protocols with a particular focus on CompTIA Network+ exam preparation. It…

1 year, 3 months ago

Short Long
View Episode
Hands-On Red Team Tactics
Hands-On Red Team Tactics

The Book is a guide to ethical hacking and penetration testing, focusing on red team tactics. The guide outlines common penetration testing standards…

1 year, 3 months ago

Short Long
View Episode
Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats
Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats

The provided Book "Cybersecurity Threats, Malware Trends, and Strategies," by Tim Rains. This book explains how to mitigate cybersecurity risks for o…

1 year, 3 months ago

Short Long
View Episode
Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities
Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities

This Book "Metasploit 5.x for Beginners - Second Edition" by Sagar Rahalkar. The book aims to teach readers how to effectively use the Metasploit fra…

1 year, 3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us