Podcast Episodes

Back to Search
Penetration Testing with Kali NetHunter: Hands-on Android and iOS penetration testing
Penetration Testing with Kali NetHunter: Hands-on Android and iOS penetration testing

Outlines comprehensive mobile penetration testing, covering Android and iOS application security. It describes essential methodologies like reconnais…

2 months, 3 weeks ago

Short Long
View Episode
Penetration Testing Step-By-Step Guide
Penetration Testing Step-By-Step Guide

A practical, step-by-step guide to penetration testing, designed for individuals new to ethical hacking. It covers a comprehensive range of topics, s…

2 months, 3 weeks ago

Short Long
View Episode
React in Depth
React in Depth

Offers an in-depth exploration of React development, focusing on advanced concepts and practical application. It covers core React patterns such as P…

2 months, 3 weeks ago

Short Long
View Episode
Kubernetes for Developers
Kubernetes for Developers

Focusing on Google Kubernetes Engine (GKE), the book serves as a practical guide for developers to understand and utilize Kubernetes for application …

2 months, 3 weeks ago

Short Long
View Episode
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld

A comprehensive analysis of the evolving landscape of cyber warfare, information warfare, and artificial intelligence. It examines how these domains …

2 months, 3 weeks ago

Short Long
View Episode
Improving your Penetration Testing Skills: Strengthen your defense against web attacks with Kali Linux and Metasploit
Improving your Penetration Testing Skills: Strengthen your defense against web attacks with Kali Linux and Metasploit

Focusing heavily on web application security and the powerful Metasploit Framework. It covers essential stages of penetration testing, including reco…

2 months, 3 weeks ago

Short Long
View Episode
Component-Based Rails Applications: Large Domains Under Control
Component-Based Rails Applications: Large Domains Under Control

It details how to extract, refactor, and manage components using Rails engines, addressing dependency management, database migration, and continuous …

2 months, 3 weeks ago

Short Long
View Episode
Hacker: Hack The System: The "Ethical" Python Hacking Guide
Hacker: Hack The System: The "Ethical" Python Hacking Guide

An educational guide on ethical hacking and cybersecurity. The content focuses on utilizing Python for various security-related tasks, including expl…

2 months, 4 weeks ago

Short Long
View Episode
Ruby Programming: Building Future-proof Scalable Applications
Ruby Programming: Building Future-proof Scalable Applications

A comprehensive guide to mastering Ruby for creating robust and adaptable software. The book introduces fundamental concepts like object-oriented pro…

2 months, 4 weeks ago

Short Long
View Episode
Password Cracking with Kali Linux
Password Cracking with Kali Linux

A comprehensive guide for computer security professionals and students interested in password security and ethical hacking. It explores various metho…

3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us