CyberSecurity Summary
Technology
About
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed. You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cyber_security_summary
Episodes
- Data Science from Scratch: First Principles with Python
This episode details the book "Data Science from Scratch" which teaches the fundamentals of data science by having readers build their own tools and algorithms. It covers practical data problems using a hypothetical social network and incl…
- Practical Data Science: A Guide to Building the Technology Stack for Turning Data Lakes into Business Assets
This episode details a Data Science Technology Stack and HORUS methodology for converting data lakes into business assets, using fictional company VKHCG for examples. It emphasizes a Center of Excellence model for scalability and efficienc…
- Practical Cloud Security: A Guide for Secure Design and Deployment
This episode covers practical cloud security, detailing a framework for secure design and deployment. It explains the shared responsibility model, risk management strategies like least privilege and defense in depth, and technical safeguar…
- LINUX FOR BEGINNERS: How to Master the Linux Operating System and Command Line from Scratch
This episode covers mastering the Linux operating system and command line from scratch. It details the OS architecture, its open-source nature, stability, and applications, compares distributions like Ubuntu and Debian, explains installati…
- Geek House: 10 Hardware Hacking Projects for Around Home (ExtremeTech)
The 'Geek House: Hardware Hacking Projects' episode discusses a technical guide by Barry and Marcia Press, published by Wiley. It empowers enthusiasts to automate homes using computer-driven appliances and electronic minions for tasks like…
- Doing Math with Python: Use Programming to Explore Algebra, Statistics, Calculus, and More
This episode explores using Python 3 to solve high school math problems in algebra, statistics, calculus, and geometry. It covers building practical tools, using libraries like SymPy and matplotlib, and making math exploration more engagin…
- Gamechanger AI: How Artificial Intelligence is Transforming our World
This episode discusses the significant impact of artificial intelligence on society, drawing parallels to historical technological shifts like the printing press. It covers the technical development of AI, the emergence of machine consciou…
- Cyber-Physical Security and Privacy in the Electric Smart Grid (Synthesis Lectures on Information Security, Privacy, & Trust)
This episode defines the smart grid as a cyber-physical system, integrating digital computation and power delivery. It examines security concepts like confidentiality, integrity, and availability, and explores advanced defense mechanisms l…
- CYBOK: The Cyber Security Body of Knowledge
CYBOK is a comprehensive framework funded by the UK’s National Cyber Security Programme. It codifies foundational cybersecurity concepts, providing a structured overview of nineteen distinct Knowledge Areas.
- Dark Web Investigation (Security Informatics and Law Enforcement)
This episode discusses dark web investigations in law enforcement, differentiating it from the surface and deep web. It covers the infrastructure of anonymity, practical hurdles for investigators, and the dual-use nature of these networks.
- Persistence in PHP with the Doctrine ORM
This episode discusses data persistence in PHP using the Doctrine ORM framework. It covers architectural patterns, defining entities, managing relationships, and advanced data retrieval techniques like DQL and Query Builder.
- CISSP All-in-One Exam Guide, Eighth Edition
This episode provides a comprehensive overview of the CISSP All-in-One Exam Guide, 8th Edition. It covers the book's reputation, authors, the eight domains of the Common Body of Knowledge, and core cybersecurity principles.
- Cyber Security Intelligence and Analytics (Advances in Intelligent Systems and Computing, 928)
This episode focuses on the integration of big data analytics, machine learning, and intelligent systems for enhanced threat detection and combating cybercrime. Key topics include digital forensics, incident response, and the application o…
- CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007)
This episode reviews the CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007). It highlights professional advantages of certification, foundational networking models, and various networking topics from physi…
- ITF+ CompTIA IT Fundamentals All-in-One Exam Guide, Second Edition (Exam FC0-U61)
This episode features the ITF+ CompTIA IT Fundamentals All-in-One Exam Guide, Second Edition (Exam FC0-U61). It is a comprehensive resource for students and aspiring technicians, covering essential computing categories, hardware, software…
- CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61
This episode discusses a study guide for the CompTIA IT Fundamentals (ITF+) certification exam FC0-U61. It covers essential domains such as IT concepts, infrastructure, software development, and security, and provides practical exercises a…
- Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
This episode focuses on "Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition." The book serves as a guide for security professionals, covering topics like vulnerability research, exploit development, and malware analysis across…
- Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
This episode focuses on "Gray Hat Hacking: The Ethical Hacker's Handbook." It covers mastering offensive techniques for defensive purposes, including exploit development, penetration testing, and red teaming operations. The discussion incl…
- CCNA Certification Study Guide: Exam 200-301, Volume 2 (Sybex Study Guide)
This episode discusses a study guide for the Cisco CCNA 200-301 exam. It covers networking fundamentals, IP addressing, subnetting, Next-Generation Firewalls, wireless technologies, virtualization, and automation tools.
- Computer Networks: A Systems Approach (The Morgan Kaufmann Series in Networking)
This episode reviews "Computer Networks: A Systems Approach," a textbook that covers the design and operation of data communication systems. It emphasizes a systems-oriented perspective, updated to include cloudification, 5G, and software-…
- Practical Guide to Security in the AWS Cloud
This episode provides a guide to securing AWS cloud environments. It focuses on using the NIST Cybersecurity Framework, covering identity and access management, network microsegmentation, and data protection.
- C++ For Dummies
This episode provides an educational guide to the C++ language, focusing on fundamental programming concepts, object-oriented programming, and secure coding practices. It also includes instructions for setting up the Code::Blocks developme…
- Cisco Unified Contact Center Enterprise (Networking Technology: IP Communications)
This episode provides a comprehensive guide to Cisco Unified Contact Center Enterprise (UCCE), detailing its evolution, underlying architecture, various deployment models, and platform redundancy. It also covers software installation, data…
- 5G Mobile and Wireless Communications Technology
This episode discusses 5G mobile and wireless communications technology. It covers essential innovations and its impact on various economic sectors and the future of mobile infrastructure.
- Learn Linux Quickly: A beginner-friendly guide to getting up and running with the world's most powerful operating system
This episode discusses an introductory guide to Linux for beginners. It covers setting up a virtual machine, basic file manipulation, command-line navigation, Bash scripting, and disk management.
- Cisco Voice Gateways and Gatekeepers (Networking Technology)
This episode of CyberSecurity Summary discusses the integration of Cisco voice gateways and gatekeepers into enterprise VoIP networks. It covers communication protocols, practical strategies for connecting IP systems to PSTN and PBX infras…
- Exam Ref AZ-204 Developing Solutions for Microsoft Azure
This episode summarizes a study guide for the Microsoft AZ-204 certification. It covers creating professional solutions within the Azure cloud ecosystem, including development pillars, security practices, and application performance.
- Write Great Code, Volume 3: Engineering Software
This episode focuses on the transition from basic coding to professional software engineering. It defines great code as efficient, robust, meticulously documented, and easy to maintain, and discusses system documentation, including UML dia…
- Building Virtual Pentesting Labs for Advanced Penetration Testing
This episode discusses building virtual pentesting labs for advanced penetration testing. It covers foundational security testing methodologies, validation of vulnerabilities, and the use of technical tools like Nmap, Nexpose, and Metasplo…
- Building Telegram Bots: Develop Bots in 12 Programming Languages using the Telegram Bot API
This episode discusses building Telegram bots using the Telegram Bot API. It covers development in 12 programming languages, including environment setup and practical coding applications.
- What You Need to Know about Docker: The absolute essentials you need to get Docker up and running
This episode provides a practical manual for technical professionals transitioning to Docker containerization. It details core Docker components, managing images and registries, creating custom containers, and optimizing deployment. The gu…
- Build Your Own Website: A Comic Guide to HTML, CSS, and WordPress
This episode discusses a comic guide to building websites using HTML, CSS, and WordPress. It covers fundamental concepts of web development, including content structuring, visual styling, and essential tools like web browsers and text edit…
- Azure DevOps Explained: Get started with Azure DevOps and develop your DevOps practices
This episode explains Azure DevOps, detailing its services like Azure Boards, Azure Repos, and Azure Pipelines. It covers transitioning from traditional waterfall methods to more agile, customer-centric workflows in modern development prac…
- Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
This episode provides a guide to beginning ethical hacking with Kali Linux. It covers cybersecurity principles, reconnaissance techniques, and how to set up a virtual laboratory for safe and legal penetration testing.
- Bash Cookbook 1st Edition
This episode, "Bash Cookbook 1st Edition," is a comprehensive manual for users of the GNU Bourne Again Shell. It provides practical solutions for system administrators, programmers, and enthusiasts across Linux, Unix, and Windows platforms…
- bash Cookbook: Solutions and Examples for bash Users 2nd Edition
This episode discusses the "bash Cookbook," a technical guide providing solutions and examples for bash users. It covers a wide range of topics from basic terminal navigation to advanced security and system administration, aiming to increa…
- Beginning Ethical Hacking with Python
This episode introduces ethical hacking with Python 3 for beginners. It covers legal aspects, virtual machine setup, Linux commands, networking principles, and Python for security tasks.
- Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook
This episode reviews 'Gray Hat Hacking, Second Edition,' a technical guide for security professionals. It details how understanding attacker tactics, advanced tools, and the evolving threat landscape is crucial for proactive cybersecurity.
- Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
This episode reviews Gray Hat Hacking: The Ethical Hacker’s Handbook, Third Edition, a technical guide for security professionals. It covers legal frameworks, exploitation techniques for Linux/Windows, penetration testing, social engineeri…
- Autonomic Computing and Networking
This episode introduces an autonomic computing framework designed for self-managing IT systems. The framework utilizes a reconfigurable policy engine and probabilistic model checking to optimize system behavior, aiming to reduce complexity…
- Android Cookbook: Problems and Solutions for Android Developers
This episode discusses the 'Android Cookbook: Problems and Solutions for Android Developers,' a technical guide for app development. It covers Android Nougat 7.0, app architecture, development tools, and advanced features.
- The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
This episode covers memory forensics techniques for detecting malware and threats across Windows, Linux, and Mac. It details PC architecture, virtual memory concepts, and the process of virtual-to-physical address translation for reconstru…
- 31 Days Before Your CCNA Security Exam: A Day-By-Day Review Guide for the IINS 210-260 Certification Exam
This episode reviews a 31-day study guide for the CCNA Security certification exam. It covers network defense concepts, cryptography, network attacks and mitigation strategies, firewall configurations, VPNs, and modern security challenges.
- 31 Days Before Your CCNA Routing & Switching Exam: A Day-by-Day Review Guide for the ICND1/CCent (100-105), ICND2 (200-105)
This episode provides a detailed review for the CCNA Routing and Switching exam, covering essential topics like the OSI and TCP/IP models, IP addressing, routing protocols, Cisco IOS device management, virtualization, cloud computing, and…
- Implement NLP use-cases using BERT: Top Expert-Led Coding Interview Question Bank for Python Aspirants
This episode details implementing BERT for Natural Language Processing (NLP) tasks, including sentiment analysis, named entity recognition, and chatbots, using Python. It covers essential concepts like data vectorization, morphological ana…
- CompTIA CySA+ Practice Exams: A Time Compressed Resource to Passing the CompTIA CySA+ (CS0-002) Exam on the First Attempt
This episode focuses on the CompTIA CySA+ (CS0-002) certification exam. It covers five key domains and provides practice questions, exam tips, and detailed answers to help students achieve certification.
- Demystifying Azure DevOps Services: A Guide to Architect, Deploy, and Administer DevOps Using Microsoft Azure DevOps Services
This episode explains how to use Azure DevOps Services, covering aspects like project administration, user permissions, Kanban boards, CI/CD pipelines, Git version control, and automated testing for efficient software delivery.
- MongoDB Complete Guide: Develop Strong Understanding of Administering MongoDB, CRUD Operations, MongoDB Commands, MongoDB Compass
This episode provides a technical guide to MongoDB, detailing its setup, NoSQL document storage, and differences between Community and Enterprise editions. It covers essential operations like CRUD via the MongoDB Shell, architectural featu…
- Wi-Fi Hacking For Everyone
This episode introduces wireless networking and cybersecurity, focusing on the educational practice of penetration testing. It covers Wi-Fi architecture, setting up a lab with Kali Linux, and various hacking techniques, while stressing eth…
- TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS
This episode delves into TLS cryptography, exploring its foundational principles, historical development, and the algorithms supporting confidentiality, integrity, and authentication. It also examines real-world vulnerabilities and practic…