1134 Epizód

  1. Computer Networks, Global Edition

    Közzétéve: 2025. 12. 05.
  2. Computer Forensics: Incident Response Essentials

    Közzétéve: 2025. 12. 04.
  3. CompTIA Pentest+ (Practice Exams)

    Közzétéve: 2025. 12. 03.
  4. CISA – Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual

    Közzétéve: 2025. 12. 02.
  5. Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing

    Közzétéve: 2025. 12. 01.
  6. The Active Defender: Immersion in the Offensive Security Mindset (Tech Today)

    Közzétéve: 2025. 11. 30.
  7. The Cybersecurity Manager's Guide: The Art of Building Your Security Program

    Közzétéve: 2025. 11. 29.
  8. Certificate of Cloud Auditing Knowledge Study Guide

    Közzétéve: 2025. 11. 28.
  9. Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime

    Közzétéve: 2025. 11. 27.
  10. Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals

    Közzétéve: 2025. 11. 26.
  11. Wireless Network Simulation: A Guide using Ad Hoc Networks and the ns-3 Simulator

    Közzétéve: 2025. 11. 25.
  12. Zabbix 5 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 5 for designing, building, and maintaining your Zabbix

    Közzétéve: 2025. 11. 24.
  13. Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions

    Közzétéve: 2025. 11. 23.
  14. UX for XR: User Experience Design and Strategies for Immersive Technologies (Design Thinking)

    Közzétéve: 2025. 11. 22.
  15. Visual Studio Code for Python Programmers

    Közzétéve: 2025. 11. 21.
  16. Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future

    Közzétéve: 2025. 11. 20.
  17. Hands-on Data Virtualization with Polybase: Administer Big Data, SQL Queries and Data Accessibility Across Hadoop, Azure, Spark, Cassandra

    Közzétéve: 2025. 11. 19.
  18. Hands-on DevOps with Linux: Build and Deploy DevOps Pipelines Using Linux Commands, Terraform, Docker, Vagrant, and Kubernetes

    Közzétéve: 2025. 11. 18.
  19. Hands-on Penetration Testing for Web Applications: Run Web Security Testing on Modern Applications Using Nmap, Burp Suite and Wireshark

    Közzétéve: 2025. 11. 17.
  20. IBM Watson Solutions for Machine Learning: Achieving Successful Results Across Computer Vision, Natural Language Processing and AI Projects

    Közzétéve: 2025. 11. 16.

2 / 57

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary

Visit the podcast's native language site