Powered by RND
PodcastsArtsCyberSecurity Summary

CyberSecurity Summary

CyberSecurity Summary
CyberSecurity Summary
Latest episode

Available Episodes

5 of 90
  • Game Theory and Machine Learning for Cyber Security
    Offers an extensive overview of computer hacking, basic security, and penetration testing. The book aims to equip readers with the knowledge of how hacking operates, enabling them to protect their systems by understanding both criminal and ethical hacking techniques. It covers various aspects, including identifying hacker motivations and targets, mapping out hacking plans and system vulnerabilities, and understanding different types of attacks, such as passive and active exploits. Furthermore, the guide introduces common hacking tools and details methods for fooling targets through spoofing and man-in-the-middle attacks, cracking passwords, and exploiting network connections, including Wi-Fi and mobile devices. Finally, it discusses the critical role of social engineering and physical attacks in breaching security, alongside providing strategies to mitigate such risks.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/Theory-Machine-Learning-Cyber-Security/dp/1119723922?&linkCode=ll1&tag=cvthunderx-20&linkId=6c3c3ada6f8b4ab4a4a004c4086a8ec0&language=en_US&ref_=as_li_ss_tl
    --------  
    38:47
  • Fundamentals of Quantum Computing: Theory and Practice
    Serves as a practical guide for building and operating a "Tiger Box," a system designed to identify and analyze network security vulnerabilities. It covers installation and configuration details for various operating systems like Windows NT, Windows 2000, Linux, and Mac OS X, along with a suite of security analysis tools. The source explains the functionality, installation, and usage of several prominent scanning and penetration testing applications, such as Cerberus Internet Scanner, CyberCop Scanner, Internet Scanner, STAT Scanner, TigerSuite, Nessus, Nmap, SAINT, and SARA. Furthermore, it discusses common network vulnerabilities, provides guidance on mitigating them, and offers extensive command-line references for Linux and Unix systems to aid in security auditing and administration.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/Fundamentals-Quantum-Computing-Theory-Practice/dp/3030636917?&linkCode=ll1&tag=cvthunderx-20&linkId=ebd8767afcf00607b9878395baf30bda&language=en_US&ref_=as_li_ss_tl
    --------  
    13:33
  • From Hacking to Report Writing: An Introduction to Security and Penetration Testing
    Provides an introduction to security and penetration testing, offering practical guidance from initial setup to report writing. It covers various types of security tests, including black, white, and gray box approaches, explaining their advantages and disadvantages. The material also discusses vulnerability identification and exploitation, detailing methods such as network scanning with Nmap, password attacks using Hydra and Medusa, and exploiting web application flaws like SQL injection based on the OWASP Top Ten. Furthermore, the text addresses technical preparations for security testers, emphasizing the importance of tools, data handling, and ethical considerations like obtaining proper authorization and liability insurance, all while providing insights into real-world hacking examples and offering advice on becoming a more effective security tester.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/Hacking-Report-Writing-Introduction-Penetration/dp/1484222822?&linkCode=ll1&tag=cvthunderx-20&linkId=638886205c4e28502ab35f8c9564ba04&language=en_US&ref_=as_li_ss_tl
    --------  
    42:51
  • Foundations of Information Security: A Straightforward Introduction
    Serves as a comprehensive guide to fundamental information security concepts, suitable for beginners and professionals alike. It covers a broad spectrum of topics, including authentication, authorization, data confidentiality, encryption, compliance with laws and regulations, operational security, and various types of cyberattacks like buffer overflows and race conditions. Additionally, the excerpts introduce essential security tools, such as anti-malware applications, firewalls, and intrusion detection systems, and discuss the importance of physical security and human element awareness in maintaining a secure environment.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/Foundations-Information-Security-Straightforward-Introduction/dp/1718500041?&linkCode=ll1&tag=cvthunderx-20&linkId=95cac06e55f49336463cf7baad206789&language=en_US&ref_=as_li_ss_tl
    --------  
    41:27
  • Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro
    Serves as a comprehensive guide to ethical hacking and penetration testing using Kali Linux. It outlines the fundamental concepts of Linux, various software and hardware recommendations for security professionals, and step-by-step instructions for installing and configuring Kali Linux in a virtual environment. The book systematically explores different stages and methodologies of penetration testing, including reconnaissance, footprinting, and various attack types such as SQL injection, dictionary attacks, Man-in-the-Middle (MITM) attacks, and denial-of-service (DoS) attacks. Furthermore, it introduces powerful hacking tools and frameworks like Burp Suite, SQLmap, Airodump-ng, EtterCAP, Scapy, Armitage, Metasploit, and the Social-Engineering Toolkit, emphasizing their ethical use for vulnerability assessment and security improvement while cautioning against unauthorized or illegal activities.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary
    --------  
    45:54

More Arts podcasts

About CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary
Podcast website

Listen to CyberSecurity Summary, 99% Invisible and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v7.20.2 | © 2007-2025 radio.de GmbH
Generated: 7/14/2025 - 2:01:45 AM