1133 Afleveringen

  1. Computer Forensics: Incident Response Essentials

    Gepubliceerd: 4-12-2025
  2. CompTIA Pentest+ (Practice Exams)

    Gepubliceerd: 3-12-2025
  3. CISA – Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual

    Gepubliceerd: 2-12-2025
  4. Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing

    Gepubliceerd: 1-12-2025
  5. The Active Defender: Immersion in the Offensive Security Mindset (Tech Today)

    Gepubliceerd: 30-11-2025
  6. The Cybersecurity Manager's Guide: The Art of Building Your Security Program

    Gepubliceerd: 29-11-2025
  7. Certificate of Cloud Auditing Knowledge Study Guide

    Gepubliceerd: 28-11-2025
  8. Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime

    Gepubliceerd: 27-11-2025
  9. Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals

    Gepubliceerd: 26-11-2025
  10. Wireless Network Simulation: A Guide using Ad Hoc Networks and the ns-3 Simulator

    Gepubliceerd: 25-11-2025
  11. Zabbix 5 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 5 for designing, building, and maintaining your Zabbix

    Gepubliceerd: 24-11-2025
  12. Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions

    Gepubliceerd: 23-11-2025
  13. UX for XR: User Experience Design and Strategies for Immersive Technologies (Design Thinking)

    Gepubliceerd: 22-11-2025
  14. Visual Studio Code for Python Programmers

    Gepubliceerd: 21-11-2025
  15. Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future

    Gepubliceerd: 20-11-2025
  16. Hands-on Data Virtualization with Polybase: Administer Big Data, SQL Queries and Data Accessibility Across Hadoop, Azure, Spark, Cassandra

    Gepubliceerd: 19-11-2025
  17. Hands-on DevOps with Linux: Build and Deploy DevOps Pipelines Using Linux Commands, Terraform, Docker, Vagrant, and Kubernetes

    Gepubliceerd: 18-11-2025
  18. Hands-on Penetration Testing for Web Applications: Run Web Security Testing on Modern Applications Using Nmap, Burp Suite and Wireshark

    Gepubliceerd: 17-11-2025
  19. IBM Watson Solutions for Machine Learning: Achieving Successful Results Across Computer Vision, Natural Language Processing and AI Projects

    Gepubliceerd: 16-11-2025
  20. Google Analytics Kickstarter Guide: Get Tips to Boost Your Traffic and Sales Using Google Analytics

    Gepubliceerd: 15-11-2025

2 / 57

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary

Visit the podcast's native language site