PodcastsKunstCyberSecurity Summary

CyberSecurity Summary

CyberSecurity Summary
CyberSecurity Summary
Neueste Episode

1147 Episoden

  • CyberSecurity Summary

    Cybersecurity for Scada Systems

    18.03.2026 | 22 Min.
    A comprehensive guide to protecting industrial control systems and critical infrastructure. The text outlines the historical transition from isolated, "dumb" hardware to modern smart devices that utilize complex networking protocols and internet connectivity. It provides deep technical insights into telecommunications, explaining how T1/T3 circuits, Ethernet switches, and TCP/IP architectures underpin operational technology. Beyond hardware, the author emphasizes security countermeasures such as firewalls, intrusion detection systems, and the necessity of formalized employee procedures. Readers are introduced to sophisticated defense strategies like network hardening, encryption, and the management of known vulnerabilities listed in CVE databases. Ultimately, the source highlights the evolving threat landscape, where social engineering and malware necessitate a layered, proactive approach to protecting vital utility networks.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Cybersecurity-Scada-Systems-William-Shaw/dp/1593705069?&linkCode=ll2&tag=cvthunderx-20&linkId=ae7c779a6e84d64fd4c3b9636130582f&language=en_US&ref_=as_li_ss_tl

    Discover our free courses in tech and cybersecurity, Start learning today:
    https://linktr.ee/cybercode_academy
  • CyberSecurity Summary

    Network Forensics with Wireshark: Build Practical Expertise in Network Monitoring, Threat Detection, and Cyber Forensics with Wireshark

    17.03.2026 | 21 Min.
    A comprehensive guide to network forensics and traffic analysis using tools like Wireshark and Pyshark. The text establishes a foundation by comparing the OSI and TCP/IP models, specifically illustrating these concepts through the lens of modern automotive infotainment systems and the CAN protocol. Practical chapters detail the mechanics of SSL/TLS handshakes, including the use of pre-master secrets and private keys to decrypt secure communications. The material also covers advanced security topics such as covert timing channels, malware analysis for threats like Gootloader, and the application of the Attack Kill Chain model to investigate data breaches. Additionally, the guide offers technical instructions on configuring firewall rules, creating display filter macros, and automating packet inspection with Python-based tools.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Network-Forensics-Wireshark-Bhavik-Shah/dp/9349888459?&linkCode=ll2&tag=cvthunderx-20&linkId=8ab9ab0982bd84535469a7096da0586f&language=en_US&ref_=as_li_ss_tl

    Discover our free courses in tech and cybersecurity, Start learning today:
    https://linktr.ee/cybercode_academy
  • CyberSecurity Summary

    VCP-DCV for vSphere 7.x (Exam 2V0-21.20) Official Cert Guide (VMware Press Certification)

    16.03.2026 | 18 Min.
    Outlines the essential technical operations for managing a vSphere 7.x environment. The documentation details critical network security policies, such as forged transmits and port mirroring, alongside sophisticated automation tools like vRealize Automation for lifecycle management. It further explains storage configuration, including the deployment of virtual volumes and the management of protocol endpoints. Detailed instructions are provided for identity management, focusing on certificate requirements and security algorithms to protect virtual infrastructure. Finally, the text serves as a technical reference for administrators, offering specific command-line examples and administrative workflows for vCenter Server maintenance and firewall rule adjustments.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/VCP-DCV-Official-Guide-VMware-Certification/dp/0135898196?&linkCode=ll2&tag=cvthunderx-20&linkId=57c484c6a79bf0411b1aa03ac4602562&language=en_US&ref_=as_li_ss_tl

    Discover our free courses in tech and cybersecurity, Start learning today:
    https://linktr.ee/cybercode_academy
  • CyberSecurity Summary

    Practical Purple Teaming: The Art of Collaborative Defense

    15.03.2026 | 18 Min.
    A comprehensive guide for improving organizational security through the collaborative integration of offensive and defensive strategies. The text details various emulation methodologies, ranging from isolated atomic test cases to complex, scenario-based attack chains that mimic real-world adversaries. It provides technical instructions for utilizing modern security tooling such as MITRE Caldera, Mythic, and Splunk to validate detection capabilities. Beyond technical execution, the source emphasizes the importance of structured reporting and the evaluation of people, processes, and technology. Ultimately, it aims to help security professionals harden defenses by identifying and remediating visibility gaps across enterprise environments.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Practical-Purple-Teaming-Collaborative-Defense-ebook/dp/B0F1F4XX59?&linkCode=ll2&tag=cvthunderx-20&linkId=9153cf7e115b9cd9a085ee24097fb364&language=en_US&ref_=as_li_ss_tl

    Discover our free courses in tech and cybersecurity, Start learning today:
    https://linktr.ee/cybercode_academy
  • CyberSecurity Summary

    AWS Certified Cloud Practitioner CLF-C02 Cert Guide (Certification Guide)

    14.03.2026 | 20 Min.
    A comprehensive educational resource for individuals preparing for the foundational Amazon Web Services exam. The text explores core cloud service models such as SaaS and PaaS alongside essential infrastructure concepts like Regions and Availability Zones. Detailed chapters cover a wide array of tools, including compute, storage, and networking services, while providing practical walk-throughs for using the AWS Free Tier. Beyond technical definitions, the source explains governance and security frameworks such as Trusted Advisor and the Well-Architected Framework. Finally, the book includes interactive quizzes and glossaries to reinforce the student's understanding of the global AWS ecosystem.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Certified-Cloud-Practitioner-Clf-c02-Certification/dp/0138285993?&linkCode=ll2&tag=cvthunderx-20&linkId=d1e9d8c37406add0aaa13284bb5a1088&language=en_US&ref_=as_li_ss_tl

    Discover our free courses in tech and cybersecurity, Start learning today:
    https://linktr.ee/cybercode_academy

Weitere Kunst Podcasts

Über CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary
Podcast-Website

Höre CyberSecurity Summary, Constantly Changing Constantly K und viele andere Podcasts aus aller Welt mit der radio.at-App

Hol dir die kostenlose radio.at App

  • Sender und Podcasts favorisieren
  • Streamen via Wifi oder Bluetooth
  • Unterstützt Carplay & Android Auto
  • viele weitere App Funktionen
Rechtliches
Social
v8.8.0 | © 2007-2026 radio.de GmbH
Generated: 3/18/2026 - 9:10:17 AM