Podcast Episodes

Back to Search
FIREWALLS DON'T STOP DRAGONS: A STEP-BY-STEP GUIDE TO COMPUTER SECURITY FOR NON-TECHIES
FIREWALLS DON'T STOP DRAGONS: A STEP-BY-STEP GUIDE TO COMPUTER SECURITY FOR NON-TECHIES

The Book provide an extensive guide to cybersecurity and privacy, using an analogy of a medieval castle to explain the importance of building strong …

1 year, 2 months ago

Short Long
View Episode
Finding Beacons in the Dark
Finding Beacons in the Dark

This research Book explores the Cobalt Strike framework, a popular tool used by both red teams and malicious actors for penetration testing and cyber…

1 year, 2 months ago

Short Long
View Episode
Ethical Hacking 101: How to conduct professional pentestings in 21 days or less!
Ethical Hacking 101: How to conduct professional pentestings in 21 days or less!

This excerpt is from a book that teaches aspiring ethical hackers how to conduct penetration tests. The book provides a framework for ethical hacking…

1 year, 2 months ago

Short Long
View Episode
Ethical Hacker's Certification Guide (CEHv11)
Ethical Hacker's Certification Guide (CEHv11)

This excerpt is from a book on ethical hacking and penetration testing, specifically geared toward preparing individuals for the Certified Ethical Ha…

1 year, 2 months ago

Short Long
View Episode
Ethical Hacking-Joe Grant
Ethical Hacking-Joe Grant

This Book is an introduction to ethical hacking, using the Kali Linux operating system. It covers a range of topics related to information security, …

1 year, 2 months ago

Short Long
View Episode
Ethical Hacking: Techniques, Tools, and Countermeasures
Ethical Hacking: Techniques, Tools, and Countermeasures

The source Book provides a comprehensive overview of ethical hacking techniques, tools, and countermeasures for information security professionals. T…

1 year, 2 months ago

Short Long
View Episode
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

The Book are chapters from a book titled "Essential Cybersecurity Science" by Josiah Dykstra, which explores the application of the scientific method…

1 year, 2 months ago

Short Long
View Episode
Essential Of Artificial Intelligence
Essential Of Artificial Intelligence

The Book provide an extensive overview of Python fundamentals, covering the basics of programming using Python, including data types, operators, func…

1 year, 2 months ago

Short Long
View Episode
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World

The source is a book excerpt on enterprise-level security. It focuses on a security model called ELS (Enterprise Level Security) and its practical im…

1 year, 2 months ago

Short Long
View Episode
Enterprise Level Security 1 & 2
Enterprise Level Security 1 & 2

The Book is a comprehensive guide to enterprise-level security for information systems. It explains principles, architectures, and techniques for sec…

1 year, 2 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us