998 Episodes

  1. Distributed Denial of Service Attacks: Real-world Detection and Mitigation

    Published: 7/7/2025
  2. Distributed Artificial Intelligence: A Modern Approach (Internet of Everything (IoE))

    Published: 7/7/2025
  3. Deep Reinforcement Learning with Python: Master classic RL, deep RL, distributional RL, inverse RL, and more with OpenAI Gym and TensorFlow

    Published: 7/6/2025
  4. Deep Learning with PyTorch 1.x: Implement deep learning techniques and neural network architecture variants using Python

    Published: 7/6/2025
  5. Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

    Published: 7/5/2025
  6. Cyber-Security Threats, Actors, and Dynamic Mitigation

    Published: 7/5/2025
  7. Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques

    Published: 7/4/2025
  8. Cyber Security: Threats and Responses for Government and Business

    Published: 7/4/2025
  9. Cyber Security: The CISO Quick Start Guide: Enterprise Security Operations Risk Management Architecture for Chief Information Security

    Published: 7/3/2025
  10. Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices)

    Published: 7/3/2025
  11. Cyber Victimology: Decoding Cyber-Crime Victimisation

    Published: 7/2/2025
  12. Cyber Arms

    Published: 7/2/2025
  13. Create Graphical User Interfaces with Python: How to build windows, buttons, and widgets for your Python projects

    Published: 7/1/2025
  14. C++ Primer (5th Edition)

    Published: 7/1/2025
  15. Computer Networking: A Top-Down Approach

    Published: 6/30/2025
  16. Classic Computer Science Problems in Python

    Published: 6/30/2025
  17. Building Computer Vision Applications Using Artificial Neural Networks: With Step-by-Step Examples in OpenCV and TensorFlow with Python

    Published: 6/29/2025
  18. Building Android Apps in Python Using Kivy with Android Studio: With Pyjnius, Plyer, and Buildozer

    Published: 6/29/2025
  19. Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications

    Published: 6/28/2025
  20. The Little Black Book of Computer Viruses: The Basic Technology

    Published: 6/28/2025

7 / 50

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary