Podcast Episodes
Back to Search
FIREWALLS DON'T STOP DRAGONS: A STEP-BY-STEP GUIDE TO COMPUTER SECURITY FOR NON-TECHIES
The Book provide an extensive guide to cybersecurity and privacy, using an analogy of a medieval castle to explain the importance of building strong …
1 year, 2 months ago
Finding Beacons in the Dark
This research Book explores the Cobalt Strike framework, a popular tool used by both red teams and malicious actors for penetration testing and cyber…
1 year, 2 months ago
Ethical Hacking 101: How to conduct professional pentestings in 21 days or less!
This excerpt is from a book that teaches aspiring ethical hackers how to conduct penetration tests. The book provides a framework for ethical hacking…
1 year, 2 months ago
Ethical Hacker's Certification Guide (CEHv11)
This excerpt is from a book on ethical hacking and penetration testing, specifically geared toward preparing individuals for the Certified Ethical Ha…
1 year, 2 months ago
Ethical Hacking-Joe Grant
This Book is an introduction to ethical hacking, using the Kali Linux operating system. It covers a range of topics related to information security, …
1 year, 2 months ago
Ethical Hacking: Techniques, Tools, and Countermeasures
The source Book provides a comprehensive overview of ethical hacking techniques, tools, and countermeasures for information security professionals. T…
1 year, 2 months ago
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
The Book are chapters from a book titled "Essential Cybersecurity Science" by Josiah Dykstra, which explores the application of the scientific method…
1 year, 2 months ago
Essential Of Artificial Intelligence
The Book provide an extensive overview of Python fundamentals, covering the basics of programming using Python, including data types, operators, func…
1 year, 2 months ago
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World
The source is a book excerpt on enterprise-level security. It focuses on a security model called ELS (Enterprise Level Security) and its practical im…
1 year, 2 months ago
Enterprise Level Security 1 & 2
The Book is a comprehensive guide to enterprise-level security for information systems. It explains principles, architectures, and techniques for sec…
1 year, 2 months ago