CyberSecurity Summary

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed. You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cyber_security_summary

Episodes

October 14, 2025 37 mins
An introduction to Power BI, outlining its use in business intelligence applications. It covers fundamental concepts like data modeling, DAX calculations, and various visualization types such as bar, line, waterfall, scatter, donut, treemap, and map charts. The text also explains how to connect and shape data from diverse sources using Power Query Editor, optimize data models, implement Data Analysis Expressions (DAX) for calculate...
Mark as Played
A practical resource for developing, deploying, and scaling containerized applications. It covers fundamental concepts like containerization versus virtual machines, Kubernetes architecture, and various Azure container services, alongside advanced topics such as serverless Kubernetes, Windows containers, and integrating with Azure DevOps for continuous integration and deployment. The text also includes hands-on instructions for man...
Mark as Played
Discuss artificial intelligence and deep learning techniques applied to malware analysis and detection, as well as other cybersecurity challenges. They cover various neural network architectures like MLPs, CNNs, RNNs, LSTMs, and GANs, and their effectiveness in tasks such as classifying malware families, identifying malicious URLs, and detecting anomalies in network traffic or system logs. The papers also explore methods for featur...
Mark as Played
October 11, 2025 22 mins
A comprehensive guide to the security architecture of mobile telecommunications systems, particularly focusing on Long Term Evolution (LTE). It details the evolution of cellular security from analogue systems to 2G (GSM), 3G (UMTS), and the Evolved Packet System (EPS), highlighting common vulnerabilities and subsequent design improvements. The text covers fundamental cryptographic concepts, key hierarchies, authentication protocols...
Mark as Played
A practical guide to Narrowband Internet of Things (NB-IoT), detailing its underlying cellular communication technologies like 4G and 5G LTE, and its applications in Machine Type Communication (MTC). The text covers Arduino-based projects for developers, showcasing the use of an NB-IoT hardware board with a microcontroller (MCU) and Quectel BG96 modem. It explores various data serialization protocols like JSON and CBOR, the integra...
Mark as Played
A comprehensive guide to the LLVM compiler infrastructure. It covers various aspects of LLVM, including its build system, testing utilities like LIT, and the domain-specific language TableGen. The text explores frontend development with Clang, explaining its architecture, preprocessing, Abstract Syntax Tree (AST) handling, and custom toolchain creation. Furthermore, it details working with LLVM's PassManager and AnalysisManager for...
Mark as Played
October 8, 2025 12 mins
A comprehensive exploration of the Linux operating system, covering its core concepts and programming aspects. It begins with an introduction to Linux and Unix history, discussing the role of the shell as an interpreter and detailing essential Linux commands. The text then progresses to advanced topics, including regular expressions, filters like sed and awk, and shell scripting for automation. Furthermore, it examines Linux system...
Mark as Played
October 7, 2025 22 mins
Focusing on the installation, security, and administration of the Linux operating system. It covers setting up Linux on virtual machines, exploring various distributions, and managing user account security by detailing practices like avoiding root logins, implementing password policies, and restricting SSH access. The text also explains server security through firewalls and regular updates, along with various encryption methods and...
Mark as Played
Serves as a comprehensive interview guide for Java professionals, covering a wide array of topics essential for technical interviews. It begins by outlining non-technical aspects of job searching, such as recruitment processes, interview types (telephonic, technical, personal), and strategies for success, including resume preparation and soft skills. The bulk of the guide then explores core Java concepts like architecture, JVM, obj...
Mark as Played
Serves as a comprehensive guide for IT professionals, offering both theoretical knowledge and practical application of ITIL 4 service management principles. It covers key concepts, roles, the four dimensions of service management, the Service Value System (SVS), guiding principles, governance, the service value chain, and various ITIL practices. The text also provides specific guidance for those preparing for the ITIL 4 Foundation ...
Mark as Played
Provides comprehensive guidance on implementing the ISO/IEC 27001:2013 standard for information security management systems (ISMS). The text details requirements for risk assessment, risk treatment, and the creation of a Statement of Applicability (SOA), offering practical methodologies like the event-consequence approach and various control types. It also presents examples of documented information for processes and results, outli...
Mark as Played
Provides a detailed guide for network engineers to transition into network automation. It commences with fundamental Python concepts, covering data types, syntax, and error handling through numerous exercises. The book then progresses to Linux administration essentials, emphasizing the creation and management of virtual environments using VMware Workstation and GNS3 to simulate network devices. Throughout the latter chapters, the a...
Mark as Played
Introduces intelligent reliability analysis using MATLAB and AI, focusing on failure analysis and reliability engineering. It covers foundational concepts like reliability fundamentals, measures of reliability such as MTBF and MTTF, and remaining useful lifetime (RUL) estimation techniques. The sources also explore experimental methodologies like accelerated life testing for various electronic components and intelligent modeling ap...
Mark as Played
A comprehensive guide to VMware Dynamic Environment Manager (DEM), a solution for managing end-user desktop experiences. It details the installation and initial configuration of DEM, including setting up Group Policy Objects (GPOs) and understanding the NoAD mode. The text explores various aspects of desktop management, such as user personalization for applications, configuring environment settings like drive mappings, application ...
Mark as Played
Explores the evolution of DevOps and its contemporary challenges, particularly the issue of fragmented toolchains and the necessity of standardization. It details how cloud-native and data-centric architectures, including microservices, containers, and Infrastructure as Code (IaC), establish a robust foundation for modern software delivery. A significant portion of the material then focuses on the transformative role of Generative ...
Mark as Played
A practical guide for building intelligent applications using the OpenAI API. The book provides step-by-step instructions on leveraging various OpenAI endpoints, including Chat Completions, Images, and Audio, to create diverse applications like chatbots, virtual assistants, and content generators. It explains how to interact with the API through tools like Postman and the OpenAI Python library, and discusses the impact of key param...
Mark as Played
A comprehensive guide for Natural Language Processing (NLP) professionals, focusing on advanced techniques and applications using the spaCy library. The text covers various topics, including linguistic feature extraction, rule-based matching, utilizing transformer models like BERT and RoBERTa within spaCy, and integrating Large Language Models (LLMs) with spacy-llm for tasks like summarization and custom applications. Additionally,...
Mark as Played
A comprehensive guide for network professionals transitioning from traditional Multiprotocol Label Switching (MPLS) to Segment Routing MPLS (SR-MPLS). It aims to simplify this complex shift through theoretical explanations and practical lab exercises, using network emulators like EVE-NG and virtual Cisco XRv9k routers. The text explores fundamental concepts such as IP addressing, Interior Gateway Protocols (IGP) like IS-IS, Label D...
Mark as Played
A reference for Ruby programming. It covers a vast array of topics, beginning with fundamental data types like strings and numbers, and progressing through complex data structures such as arrays, hashes, and trees. The material also explores object-oriented programming (OOP) principles, file I/O and data storage methods, graphical user interface (GUI) development using various toolkits, and network programming concepts. Furthermore...
Mark as Played
A comprehensive guide to developing sophisticated 3D game character animations and virtual worlds. The content covers a wide array of topics, starting with fundamental concepts like loading models and basic animations and progressing to advanced techniques such as GPU-accelerated calculations using compute shaders. Readers will learn about implementing collision detection with various spatial partitioning methods (quadtrees, octree...
Mark as Played

Popular Podcasts

    My Favorite Murder is a true crime comedy podcast hosted by Karen Kilgariff and Georgia Hardstark. Each week, Karen and Georgia share compelling true crimes and hometown stories from friends and listeners. Since MFM launched in January of 2016, Karen and Georgia have shared their lifelong interest in true crime and have covered stories of infamous serial killers like the Night Stalker, mysterious cold cases, captivating cults, incredible survivor stories and important events from history like the Tulsa race massacre of 1921. My Favorite Murder is part of the Exactly Right podcast network that provides a platform for bold, creative voices to bring to life provocative, entertaining and relatable stories for audiences everywhere. The Exactly Right roster of podcasts covers a variety of topics including historic true crime, comedic interviews and news, science, pop culture and more. Podcasts on the network include Buried Bones with Kate Winkler Dawson and Paul Holes, That's Messed Up: An SVU Podcast, This Podcast Will Kill You, Bananas and more.

    24/7 News: The Latest

    The latest news in 4 minutes updated every hour, every day.

    Dateline NBC

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

    Stuff You Should Know

    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

    The Bobby Bones Show

    Listen to 'The Bobby Bones Show' by downloading the daily full replay.

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.