Podcast Episodes

Back to Search
Ethical Hacker's Certification Guide (CEHv11)
Ethical Hacker's Certification Guide (CEHv11)

This excerpt is from a book on ethical hacking and penetration testing, specifically geared toward preparing individuals for the Certified Ethical Ha…

1 year, 3 months ago

Short Long
View Episode
Ethical Hacking-Joe Grant
Ethical Hacking-Joe Grant

This Book is an introduction to ethical hacking, using the Kali Linux operating system. It covers a range of topics related to information security, …

1 year, 3 months ago

Short Long
View Episode
Ethical Hacking: Techniques, Tools, and Countermeasures
Ethical Hacking: Techniques, Tools, and Countermeasures

The source Book provides a comprehensive overview of ethical hacking techniques, tools, and countermeasures for information security professionals. T…

1 year, 3 months ago

Short Long
View Episode
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

The Book are chapters from a book titled "Essential Cybersecurity Science" by Josiah Dykstra, which explores the application of the scientific method…

1 year, 3 months ago

Short Long
View Episode
Essential Of Artificial Intelligence
Essential Of Artificial Intelligence

The Book provide an extensive overview of Python fundamentals, covering the basics of programming using Python, including data types, operators, func…

1 year, 3 months ago

Short Long
View Episode
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World

The source is a book excerpt on enterprise-level security. It focuses on a security model called ELS (Enterprise Level Security) and its practical im…

1 year, 3 months ago

Short Long
View Episode
Enterprise Level Security 1 & 2
Enterprise Level Security 1 & 2

The Book is a comprehensive guide to enterprise-level security for information systems. It explains principles, architectures, and techniques for sec…

1 year, 3 months ago

Short Long
View Episode
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions

The sources provide an extensive overview of enterprise integration patterns, focusing on the use of messaging systems for connecting applications. I…

1 year, 3 months ago

Short Long
View Episode
Enterprise Cloud Adminstration (ECA) 5.15 - Course Guide
Enterprise Cloud Adminstration (ECA) 5.15 - Course Guide

The provided Book comes from a Nutanix Enterprise Cloud Administration (ECA) course guide. The guide outlines the various components and features of …

1 year, 3 months ago

Short Long
View Episode
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

This excerpt from "Engineering Trustworthy Systems" is a guide for cybersecurity professionals, focusing on how to design and build trustworthy syste…

1 year, 3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us