PodcastsArteCyberSecurity Summary

CyberSecurity Summary

CyberSecurity Summary
CyberSecurity Summary
Último episódio

1131 episódios

  • CyberSecurity Summary

    Okta Administration: Up and Running: Implement enterprise-grade identity and access management for on-premises and cloud apps

    02/03/2026 | 14min
    A comprehensive technical guide for managing Okta, a leading Identity and Access Management (IAM) platform designed for modern cloud and hybrid environments. The text details the transition from traditional network perimeters to Zero Trust security models, emphasizing the use of multifactor authentication, adaptive policies, and automated lifecycle management. Readers learn to integrate various directories like Active Directory and LDAP, configure Single Sign-On (SSO) via protocols such as SAML, and utilize the Okta Integration Network (OIN). Advanced sections explore API security, server access management, and the creation of automated workflows to enhance organizational security. Ultimately, the source serves as a practical manual for administrators to secure user identities, devices, and applications through centralized governance.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Okta-Administration-enterprise-grade-management-premises/dp/1800566646?&linkCode=ll2&tag=cvthunderx-20&linkId=ab77354e9b129bf75c92e3ed3cc6a44b&language=en_US&ref_=as_li_ss_tl

    Discover our free courses in tech and cybersecurity, Start learning today:
    https://linktr.ee/cybercode_academy
  • CyberSecurity Summary

    Microsoft Azure Administrator Exam Prep (AZ-104): Make Your Career with Microsoft Azure Platform Using Azure Administered Exam Prep

    01/03/2026 | 17min
    A comprehensive technical guide for Microsoft Azure administration, specifically tailored for the AZ-104 exam. It provides step-by-step instructions for managing identity, including the bulk or individual creation of users within Azure Active Directory. The text outlines various subscription models, such as Enterprise Agreements and free trials, while detailing procedures for cost analysis and policy enforcement. Technical specifications for Azure Storage are extensively covered, highlighting different redundancy levels, access tiers, and performance options. Furthermore, the guide explains how to deploy container instances, secure web applications with TLS/SSL certificates, and troubleshoot connectivity using Network Watcher. Finally, it includes practice exam questions and monitoring strategies to ensure infrastructure compliance and operational efficiency.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/-/en/Lalit-Rawat-ebook/dp/B08R3JNHHY?&linkCode=ll2&tag=cvthunderx-20&linkId=5969135c3e7d201a8b6140800ab9c1d4&language=en_US&ref_=as_li_ss_tl

    Discover our free courses in tech and cybersecurity, Start learning today:
    https://linktr.ee/cybercode_academy
  • CyberSecurity Summary

    Buffer Overflow Attacks: Detect, Exploit, Prevent

    28/02/2026 | 16min
    Provides an in-depth analysis of buffer overflow attacks, covering their identification, exploitation, and prevention. The text features contributions from several security experts who detail various vulnerability types, including stack overflows, heap corruption, and format string bugs. Readers are introduced to essential concepts like assembly language, memory allocation, and the development of shellcode for diverse operating systems. Practical case studies illustrate real-world risks in platforms like Windows and Linux, while also highlighting the importance of secure coding practices. Furthermore, the sources evaluate automated tools like Flawfinder and Fortify that assist developers in auditing source code to eliminate security flaws before deployment. Overall, the material serves as a comprehensive guide for understanding the technical mechanics of modern software exploits.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Buffer-Overflow-Attacks-Exploit-Prevent/dp/1932266674?&linkCode=ll1&tag=cvthunderx-20&linkId=ee1833c1fe129434819af2cd5578da64&language=en_US&ref_=as_li_ss_tl

    Discover our free courses in tech and cybersecurity, Start learning today:
    https://linktr.ee/cybercode_academy
  • CyberSecurity Summary

    Cisco CCNA Command Guide: An Introductory Guide for CCNA & Computer Networking Beginners

    27/02/2026 | 35min
    A comprehensive resource for Cisco Certified Networking Associate (CCNA) exam preparation, focusing on Cisco Routing & Switching. It systematically breaks down complex networking concepts into four modules, covering essential Cisco IOS commands, configuration scenarios, and troubleshooting techniques. The guide explains crucial topics such as subnetting, VLANs, routing protocols like OSPF and EIGRP, security features like ACLs and VPNs, and other vital network services, making it a practical tool for aspiring Cisco technology specialists.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Cisco-CCNA-Command-Guide-Introductory/dp/1731124279?&linkCode=ll1&tag=cvthunderx-20&linkId=a566ef440bfe50fc7b27e62702d861ac&language=en_US&ref_=as_li_ss_tl

    Discover our free courses in tech and cybersecurity, Start learning today:
    https://linktr.ee/cybercode_academy
  • CyberSecurity Summary

    Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh

    26/02/2026 | 34min
    Focusing on deploying and utilizing Wazuh for enhanced cybersecurity. Authored by Rajneesh Gupta, a seasoned expert, and endorsed by Santiago Bassett, CEO of Wazuh, the book targets security analysts, SOC analysts, and security architects. It covers threat detection through integration with tools like Suricata and malware detection using Wazuh's FIM and VirusTotal. Furthermore, the text explores threat intelligence, automation, and incident response with platforms such as MISP, TheHive, and Cortex, alongside proactive threat hunting methods. Finally, it details compliance management across standards like PCI DSS, NIST 800-53, and HIPAA, offering custom rules for various security events.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Security-Monitoring-Wazuh-hands-enterprise-ebook/dp/B0CTXL5G49?&linkCode=ll1&tag=cvthunderx-20&linkId=0b967ee7cdb5413ad57807734ab049ca&language=en_US&ref_=as_li_ss_tl

    Discover our free courses in tech and cybersecurity, Start learning today:
    https://linktr.ee/cybercode_academy

Mais podcasts de Arte

Sobre CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary
Site de podcast

Ouça CyberSecurity Summary, Os 7 Hábitos das Pessoas Altamente Eficazes e muitos outros podcasts de todo o mundo com o aplicativo o radio.net

Obtenha o aplicativo gratuito radio.net

  • Guardar rádios e podcasts favoritos
  • Transmissão via Wi-Fi ou Bluetooth
  • Carplay & Android Audo compatìvel
  • E ainda mais funções
Informação legal
Aplicações
Social
v8.7.2 | © 2007-2026 radio.de GmbH
Generated: 3/2/2026 - 10:30:20 PM