Podcast Episodes

Back to Search
FIREWALLS DON'T STOP DRAGONS: A STEP-BY-STEP GUIDE TO COMPUTER SECURITY FOR NON-TECHIES

FIREWALLS DON'T STOP DRAGONS: A STEP-BY-STEP GUIDE TO COMPUTER SECURITY FOR NON-TECHIES



The Book provide an extensive guide to cybersecurity and privacy, using an analogy of a medieval castle to explain the importance of building strong defenses against cyber threats. The book details h…


Published on 11 months ago

Finding Beacons in the Dark

Finding Beacons in the Dark



This research Book explores the Cobalt Strike framework, a popular tool used by both red teams and malicious actors for penetration testing and cyberattacks. The authors present a comprehensive analy…


Published on 11 months ago

Ethical Hacking 101: How to conduct professional pentestings in 21 days or less!

Ethical Hacking 101: How to conduct professional pentestings in 21 days or less!



This excerpt is from a book that teaches aspiring ethical hackers how to conduct penetration tests. The book provides a framework for ethical hacking, which involves performing simulated cyberattacks…


Published on 11 months ago

Ethical Hacker's Certification Guide (CEHv11)

Ethical Hacker's Certification Guide (CEHv11)



This excerpt is from a book on ethical hacking and penetration testing, specifically geared toward preparing individuals for the Certified Ethical Hacker (CEH) certification. The book is divided into…


Published on 11 months ago

Ethical Hacking-Joe Grant

Ethical Hacking-Joe Grant



This Book is an introduction to ethical hacking, using the Kali Linux operating system. It covers a range of topics related to information security, including network reconnaissance, vulnerability sc…


Published on 11 months ago

Ethical Hacking: Techniques, Tools, and Countermeasures

Ethical Hacking: Techniques, Tools, and Countermeasures



The source Book provides a comprehensive overview of ethical hacking techniques, tools, and countermeasures for information security professionals. The text covers a wide range of topics, including t…


Published on 11 months ago

Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems



The Book are chapters from a book titled "Essential Cybersecurity Science" by Josiah Dykstra, which explores the application of the scientific method to various aspects of cybersecurity. The book cov…


Published on 11 months ago

Essential Of Artificial Intelligence

Essential Of Artificial Intelligence



The Book provide an extensive overview of Python fundamentals, covering the basics of programming using Python, including data types, operators, functions, object-oriented programming, iterators, gen…


Published on 11 months ago

Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World

Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World



The source is a book excerpt on enterprise-level security. It focuses on a security model called ELS (Enterprise Level Security) and its practical implementation within a variety of contexts, from cl…


Published on 11 months, 1 week ago

Enterprise Level Security 1 & 2

Enterprise Level Security 1 & 2



The Book is a comprehensive guide to enterprise-level security for information systems. It explains principles, architectures, and techniques for securing sensitive data in the context of distributed…


Published on 11 months, 1 week ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate