Podcast Episodes
Back to Search
Perform a web penetration test
This Book teaches readers how to perform a web penetration test. The course explains the stages of a penetration test, beginning with understanding t…
1 year, 3 months ago
Penetration Testing With Perl
This excerpt from the Book "Pentesting With Perl" describes how to use Perl programming for penetration testing. The book covers a wide range of topi…
1 year, 3 months ago
Linux Forensics
This Book, Linux Forensics, aims to provide a comprehensive guide to digital forensics using Linux. It explores various techniques for collecting, an…
1 year, 3 months ago
Pentest Secrets: Breaking The Unbreakable Enterprise Security
The excerpt is a section from the book "Pentest Secrets," which details the author's experience with a double-blind penetration test. The author, Sag…
1 year, 3 months ago
Penetration Testing With the Bash Shell: Make the Most of the Bash Shell and Kali Linux's Command-Line-Based Security Assessment Tools
Penetration Testing with the Bash Shell is a guide to using the Bash shell and Kali Linux command-line tools for penetration testing. The book covers…
1 year, 3 months ago
Penetration Testing For Dummies
This Book is a compilation of excerpts from Penetration Testing for Dummies by Robert Shimonski. The book provides a comprehensive guide to penetrati…
1 year, 3 months ago
PASS the CompTIA Network+ Exam N10-007
This Book provides an extensive overview of network concepts, devices, and protocols with a particular focus on CompTIA Network+ exam preparation. It…
1 year, 3 months ago
Hands-On Red Team Tactics
The Book is a guide to ethical hacking and penetration testing, focusing on red team tactics. The guide outlines common penetration testing standards…
1 year, 3 months ago
Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats
The provided Book "Cybersecurity Threats, Malware Trends, and Strategies," by Tim Rains. This book explains how to mitigate cybersecurity risks for o…
1 year, 3 months ago
Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities
This Book "Metasploit 5.x for Beginners - Second Edition" by Sagar Rahalkar. The book aims to teach readers how to effectively use the Metasploit fra…
1 year, 3 months ago