CyberSecurity Summary

10 Episodes
Subscribe

By: CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary

Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications
Yesterday at 6:26 PM

This excerpt from "Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications" by Kim Crawley serves as a comprehensive guide to penetration testing within major cloud platforms. It covers essential concepts, security implications, and practical techniques for assessing the security of applications and networks hosted on AWS, Azure, and GCP. The text details cloud-specific challenges, attack methodologies, and the shared responsibility model. It introduces various native and third-party tools for vulnerability scanning and exploitation within these environments, along with best practices for conducting tests and reporting findings, including the importance of purple teaming. Ultimately, the...


C# 12 and .NET 8 – Modern Cross-Platform Development Fundamentals: Start building websites and services with ASP.NET Core 8, Blazor
Yesterday at 6:24 PM

The provided Book is primarily from a book titled "C# 12 and .NET 8 – Modern Cross-Platform Development Fundamentals: Start building websites and services with ASP.NET Core 8, Blazor" offering comprehensive instruction on developing applications using the latest versions of C# and the .NET platform. It covers fundamental object-oriented programming concepts like interfaces and inheritance, as well as practical aspects such as packaging and deploying .NET applications across different operating systems. The text introduces the C# development environment, including Visual Studio 2022 and Visual Studio Code with the C# Dev Kit extension, and explains the compilation process to Intermediate Language (IL) and its ex...


Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot
Last Tuesday at 6:25 PM

The provided Book is primarily from the Book "Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot", which guides readers through the concepts and practical implementation of such systems. The initial chapters lay the groundwork by defining real-time analytics, its benefits, and the necessary ecosystem of tools and technologies. Later sections introduce a case study involving a pizza delivery service to illustrate the building of various real-time analytics applications, including internal dashboards, tracking product changes using change data capture, and handling evolving data with upserts. The book also explores production considerations like data partitioning...


Black Hat Bash: Creative Scripting for Hackers and Pentesters
Last Tuesday at 6:23 PM

The provided Book, primarily from "Black Hat Bash: Creative Scripting for Hackers and Pentesters" serves as a guide for security professionals and penetration testers looking to leverage the Bash scripting language for various tasks. It begins by introducing fundamental Bash concepts, including syntax, environment setup, and basic commands. The text then progresses to more advanced topics such as flow control, functions, and text manipulation within Bash scripts. Furthermore, it details the process of setting up a hacking lab environment using virtual machines and Docker for practicing penetration testing techniques. Finally, the material covers reconnaissance activities like host discovery, port...


Applied Data Science: Data Translators Across the Disciplines
Last Monday at 6:17 PM

This collection of writings examines the crucial role of data translators in various fields, emphasizing the need to bridge the gap between data science and domain-specific knowledge. Several chapters explore practical applications of data translation across disciplines like astronomy, public health, business, linguistics, and even video game analytics, highlighting the unique challenges and methodologies in each area. The volume also addresses pedagogical strategies for training effective data translators, advocating for interdisciplinary approaches, knowledge exchange frameworks, and language calibration in educational settings. Furthermore, it investigates the communication of data-driven insights to diverse audiences, including policymakers and the public, and considers...


An In-Depth Guide to Mobile Device Forensics
Last Monday at 6:16 PM

This Book offers a comprehensive guide to mobile device forensics, beginning with foundational concepts of wireless communication, including electromagnetic waves, radio frequencies, and various multiple access techniques like FDMA, TDMA, CDMA, and QDMA. It then details the hardware and operating systems of mobile devices, specifically exploring iOS and Android, discussing file systems like APFS and F2FS, security measures, and diagnostic tools such as ADB. The content progresses to cover advanced forensic techniques like JTAG and Chip-Off for direct data extraction, analyzing SQLite databases often used by mobile applications, and performing cell site analysis to determine location information. Finally...


An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers
Last Sunday at 9:23 PM

This collection of Book originates from a Book titled "An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments" published by Packt Publishing Ltd. in December 2022, and authored by cybersecurity expert Kushantha Gunawardana. The excerpts cover various aspects of online privacy and anonymity, detailing how sensitive information is defined and exposed, the methods attackers use to compromise systems and collect data, and techniques and tools for maintaining anonymity. Topics range from understanding different forms of sensitive data and the risks associated with social media and unsecure connections, to exploring...


Accelerate DevOps with GitHub: Enhance software delivery performance with GitHub Issues, Projects, Actions, and Advanced Security
Last Sunday at 9:21 PM

This collection of excerpts focuses on accelerating software delivery performance through effective DevOps practices, primarily leveraging the GitHub platform. Key areas explored include team collaboration and development workflows, such as pull requests and asynchronous work, the influence of open and inner source strategies, and crucial engineering practices. These practices encompass automation with GitHub Actions for CI/CD, managing packages and dependencies, implementing feature flags, and prioritizing shift-left testing and security. Additionally, the text discusses the importance of software architecture, such as loosely coupled systems and microservices, empowering teams through organizational structure, and applying lean product development principles, including experimentation...


Advanced IPv6
Last Saturday at 10:40 PM

This Book is a training manual for a course on Advanced IPv6. It is broken down into various sections that explain IPv6 concepts, including packet format, routing basics, OSPFv3, BGP, host configuration, security, NAT64, DNS64, IP address management, and other topics. The manual provides examples of configurations, exercises, and troubleshooting tips for implementing IPv6 in a variety of network environments. The goal of the training manual is to prepare users to effectively manage and utilize IPv6 in their networks.

You can listen and download our episodes for free on more than 10 different platforms:
<...


Information Security Management Handbook, 6th Edition
Last Saturday at 10:37 PM

The Book is a compilation of information security management principles and best practices, drawn from the Information Security Management Handbook. The book covers a wide range of topics, including security architecture, risk management, threat intelligence, access control, data encryption, incident response, and compliance. The authors, comprised of industry experts, explore the historical development of information security alongside current challenges and emerging trends. The book emphasizes the importance of integrating information security into the overall business strategy, while offering practical guidelines for achieving and sustaining a secure digital environment.

You can listen and download our episodes...