Master the CompTIA Server+ exam with the Server+ Audio Course—your complete audio companion for learning server hardware, administration, security, storage, and troubleshooting. Each episode breaks down the official exam objectives into clear, practical lessons designed for listening and learning on the go. You’ll gain a deep understanding of physical and virtual server environments, network integration, performance monitoring, and disaster recovery planning—all explained in simple, direct l ...
…
continue reading
Server Administration Podcasts
A Podcast about servers and Networking
…
continue reading
HashiCast is a podcast about the world of DevOps and cloud technology produced by HashiCorp, an IBM company.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
1
Five Principles for Deploying and Managing Linux in the Cloud
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46A comprehensive guide for migrating and optimizing Linux environments in cloud architectures, with a specific focus on Microsoft Azure but also referencing AWS and other cloud vendors. The content is structured around five core principles, addressing critical topics such as cloud readiness assessment, high availability, performance monitoring, secu…
…
continue reading
1
Implementing Always On VPN: Modern Mobility with Microsoft Windows 10 and Windows Server 2022
18:25
18:25
Play later
Play later
Lists
Like
Liked
18:25A practical implementation guide for information technology administrators seeking to plan, design, and deploy Always On VPN using current best practices and various Microsoft technologies. Key technical topics covered include infrastructure prerequisites such as certificate management with PKI and Intune, network configuration with Routing and Rem…
…
continue reading
1
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success
13:43
13:43
Play later
Play later
Lists
Like
Liked
13:43A comprehensive guide for individuals aiming to become Security Operations Center (SOC) analysts, covering the essential knowledge, prerequisite technical skills like networking and endpoint security, and the tools critical to the role, such as SIEM and SOAR platforms. The chapters discuss the high demand and career trajectory within the cybersecur…
…
continue reading
1
Losing the Cybersecurity War And What We Can Do to Stop It
15:38
15:38
Play later
Play later
Lists
Like
Liked
15:38A fundamental shift in cybersecurity strategy toward a Zero Trust architecture. The author, an experienced former CIO, identifies five critical battlefields where defenders are currently disadvantaged: Education, Technology, Information, Economics, and Leadership. Testimonials and content previews affirm that the book details the history of this di…
…
continue reading
1
Mastering Go: Harness the power of Go to build professional utilities and concurrent servers and services
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25An extensive overview of the Go programming language. It introduces fundamental concepts such as variables, functions, packages, program flow control, and data types like arrays and slices. Advanced topics covered include Go concurrency with goroutines and channels, systems programming, file I/O, networking (TCP/IP, HTTP, WebSockets, RESTful APIs),…
…
continue reading
1
CHANGELOG - Terraform Stacks, Terraform Search, Terraform Actions & Project InfraGraph
27:21
27:21
Play later
Play later
Lists
Like
Liked
27:21Michael Kosir and Kerim Satirli (developer advocates at HashiCorp, an IBM Company) discuss what's new in Terraform and Vault, including Terraform Stacks, Terraform Search, Terraform Actions as well as the future of agentic infrastructure automation with Project Infragraph.Podcast Notes:- https://www.hashicorp.com/en/blog/day-2-infrastructure-manage…
…
continue reading
1
MS-900 :Microsoft 365 Fundamentals: Exam Cram Notes
16:43
16:43
Play later
Play later
Lists
Like
Liked
16:43A comprehensive overview of Microsoft 365 and related cloud concepts. The text thoroughly explains cloud computing fundamentals, including the benefits, economic models, and types like IaaS, PaaS, and SaaS. A significant portion details the diverse Microsoft 365 services covering productivity, collaboration (Teams, Viva, SharePoint), endpoint manag…
…
continue reading
A comprehensive career guide for individuals in or entering the cybersecurity field. The book structures its advice around common career stages, addressing topics such as finding one's "why" for pursuing a security role, developing necessary technical and soft skills like emotional intelligence and effective communication, and strategies for managi…
…
continue reading
1
Red Hat Enterprise Linux 8 Administration: Master Linux administration skills and prepare for the RHCSA certification exam
20:18
20:18
Play later
Play later
Lists
Like
Liked
20:18A comprehensive guide for Red Hat Enterprise Linux 8 (RHEL8) administration, detailing various system management topics. The sources cover initial RHEL8 installation on both physical and virtual machines, including advanced options like cloud deployments and automated installation techniques. A significant portion focuses on core administration ski…
…
continue reading
1
Solutions Architect's Handbook: Kick-start your solutions architect career by learning architecture design principles and strategies
13:39
13:39
Play later
Play later
Lists
Like
Liked
13:39A comprehensive overview of the role and responsibilities of a Solutions Architect, focusing heavily on cloud computing environments. The text explores various architectural principles, including the importance of scalability and elasticity, security and compliance, and operational excellence in solution design. It details several architectural pat…
…
continue reading
1
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery)
16:13
16:13
Play later
Play later
Lists
Like
Liked
16:13Focused on mastering the Secure Shell (SSH) protocol, primarily using OpenSSH and the Windows client PuTTY. The book is designed to guide both system administrators and general users beyond basic command-line usage, covering advanced topics such as encryption fundamentals, server and client configuration (including specific files like sshd_config a…
…
continue reading
Aims to teach the Go programming language through an engaging, "brain-friendly" approach. It covers fundamental Go concepts such as variables, data types (including arrays, slices, maps, and structs), functions, packages, and control flow (conditionals and loops). The text also introduces advanced topics like pointers, methods, interfaces, error ha…
…
continue reading
1
HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide
16:27
16:27
Play later
Play later
Lists
Like
Liked
16:27A comprehensive overview of healthcare information security and privacy for practitioners, focusing on the HCISPP certification. It covers critical areas such as medical coding systems (DRG, ICD, SNOMED CT), revenue cycle management, and workflow management in clinical and business settings. A significant portion addresses the regulatory environmen…
…
continue reading
1
Hands-on Pipeline as YAML with Jenkins: A Beginner's Guide to Implement CI/CD Pipelines for Mobile, Hybrid, and Web Applications
26:33
26:33
Play later
Play later
Lists
Like
Liked
26:33A beginner's guide to implementing CI/CD pipelines using Jenkins and YAML for various applications, including mobile, hybrid, and web. The author, a DevOps engineer, emphasizes DevOps as a cultural transformation driven by people, processes, and tools. The text introduces Jenkins, its evolution, and different pipeline types like Scripted, Declarati…
…
continue reading
1
Hacking with Spring Boot 2.4: Classic Edition
21:46
21:46
Play later
Play later
Lists
Like
Liked
21:46A structured approach to developing applications using Spring Boot. It covers foundational concepts like building web apps, data access, and developer tools, while also exploring advanced topics such as testing, production operations (including Docker and GraalVM), and building robust APIs. The book further examines messaging solutions and securing…
…
continue reading
A comprehensive overview of fundamental networking concepts. It introduces various network components like RAM, NICs, hubs, switches, and routers, explaining their functions and interactions within a network. The material also details network topologies, including bus, ring, and star, alongside logical and physical implementations. A significant po…
…
continue reading
1
From GSM to LTE-Advanced Pro and 5G: An Introduction to Mobile Networks and Mobile Broadband
19:26
19:26
Play later
Play later
Lists
Like
Liked
19:26A comprehensive exploration of mobile network technologies, detailing the evolution from GSM and UMTS to LTE and 5G New Radio. It outlines the intricate architecture, protocols, and operational procedures that underpin these wireless communication systems, including channel structures, mobility management, and call establishment. Furthermore, the t…
…
continue reading
1
Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders
26:38
26:38
Play later
Play later
Lists
Like
Liked
26:38Provides an extensive overview of modern cybersecurity strategies, emphasizing the evolving role of the Chief Information Security Officer (CISO) from a technical expert to a strategic business leader. It covers critical aspects such as building a culture of security, managing diverse threat actors (nation-states, cybercriminals, hacktivists, and i…
…
continue reading
1
Secure Access Service Edge (SASE) For Dummies
14:40
14:40
Play later
Play later
Lists
Like
Liked
14:40Serves as an in-depth guide to Secure Access Service Edge (SASE). It explores the evolution of network security from traditional WANs to modern, cloud-centric architectures, emphasizing the need for SASE in today's distributed and dynamic enterprise environments. The source details SASE's foundational components, including SD-WAN, various security …
…
continue reading
1
Machine Learning for High-Risk Applications: Approaches to Responsible AI
30:48
30:48
Play later
Play later
Lists
Like
Liked
30:48A field guide for designing, building, and assessing machine learning and AI systems. The book addresses the risks of AI failures, such as algorithmic discrimination and data privacy violations, which have become more common with wider adoption of ML technologies. It outlines a holistic approach to risk mitigation, combining technical practices, bu…
…
continue reading
1
Reinventing ITIL in the Age of DevOps: Innovative Techniques to Make Processes Agile and Relevant
25:06
25:06
Play later
Play later
Lists
Like
Liked
25:06Explores the integration of ITIL (Information Technology Infrastructure Library) principles with DevOps methodologies, offering innovative techniques for their combined application. It provides an in-depth look at ITIL's foundational concepts, including service lifecycle phases like strategy, design, transition, and operation, alongside essential p…
…
continue reading
1
Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34An introductory guide to cybersecurity and ethical hacking using Python. It covers fundamental concepts such as network basics, the CIA triad (Confidentiality, Integrity, and Availability), and different types of hackers, including black hat, white hat, and script kiddies. The book outlines the phases and methodologies of hacking, from reconnaissan…
…
continue reading
1
Opportunistic Networks: Fundamentals, Applications and Emerging Trends
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20Explores various facets of opportunistic networks (OppNets), which are dynamic, infrastructure-less wireless networks leveraging mobile device interactions for data transfer, often via a "store-carry-forward" mechanism. It details different routing protocols, categorizing them by approaches like replication-based (e.g., Epidemic, Spray and Wait), s…
…
continue reading
1
Open Source Security: Your Network More Secure With Open Source Tools
16:37
16:37
Play later
Play later
Lists
Like
Liked
16:37A comprehensive guide to enhancing network security using open-source tools. It begins by emphasizing the importance of strong password management and multi-factor authentication, before moving into detailed discussions of firewall configuration for network perimeter defense. The text then explores Host Intrusion Detection Systems (HIDS) for server…
…
continue reading
Explores the multifaceted field of network science, detailing various network types such as social, biological, and technological systems like the Internet and telephone networks. It examines fundamental network properties including paths, connectivity, and the small-world effect, alongside different mathematical representations of networks. The so…
…
continue reading
1
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
32:30
32:30
Play later
Play later
Lists
Like
Liked
32:30Explores various facets of network security and performance, providing practical guidance for hardening systems and optimizing network elements. It covers topics such as client and server security configurations, including detailed steps for Windows and Linux environments, and the benefits of virtualization for disaster recovery and elastic perform…
…
continue reading
1
Mastering Tableau 2021: Implement advanced business intelligence techniques and analytics with Tableau
16:45
16:45
Play later
Play later
Lists
Like
Liked
16:45An extensive guide to Mastering Tableau, a prominent business intelligence tool, focusing on its advanced features for data analysis and visualization. It covers best practices for visual design, including formatting, color usage, and reducing clutter to create impactful data stories. Readers will learn about data preparation and handling using Tab…
…
continue reading
1
MCSA Guide to Installation, Storage, and Compute with Microsoft Windows Server 2016, Exam 70-740 (Networking)
27:15
27:15
Play later
Play later
Lists
Like
Liked
27:15Detailing its installation, configuration, and management for various IT infrastructure needs. It covers fundamental concepts like server roles, disk management, networking protocols, and PowerShell cmdlets for administration. The text also thoroughly explores advanced topics such as virtualization with Hyper-V, including virtual disks, networks, a…
…
continue reading
1
Mastering Power BI: Build Business Intelligence Applications Powered with DAX Calculations, Insightful Visualizations, Advanced BI Technique
37:00
37:00
Play later
Play later
Lists
Like
Liked
37:00An introduction to Power BI, outlining its use in business intelligence applications. It covers fundamental concepts like data modeling, DAX calculations, and various visualization types such as bar, line, waterfall, scatter, donut, treemap, and map charts. The text also explains how to connect and shape data from diverse sources using Power Query …
…
continue reading
1
Welcome to the CompTIA Server+ Certification
2:08
2:08
Play later
Play later
Lists
Like
Liked
2:08By Jason Edwards
…
continue reading
1
Mastering Azure Kubernetes Service (AKS): Rapidly Build and Scale Your Containerized Applications with Microsoft Azure Kubernetes Service
24:50
24:50
Play later
Play later
Lists
Like
Liked
24:50A practical resource for developing, deploying, and scaling containerized applications. It covers fundamental concepts like containerization versus virtual machines, Kubernetes architecture, and various Azure container services, alongside advanced topics such as serverless Kubernetes, Windows containers, and integrating with Azure DevOps for contin…
…
continue reading
1
Malware Analysis Using Artificial Intelligence and Deep Learning
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38Discuss artificial intelligence and deep learning techniques applied to malware analysis and detection, as well as other cybersecurity challenges. They cover various neural network architectures like MLPs, CNNs, RNNs, LSTMs, and GANs, and their effectiveness in tasks such as classifying malware families, identifying malicious URLs, and detecting an…
…
continue reading
A comprehensive guide to the security architecture of mobile telecommunications systems, particularly focusing on Long Term Evolution (LTE). It details the evolution of cellular security from analogue systems to 2G (GSM), 3G (UMTS), and the Evolved Packet System (EPS), highlighting common vulnerabilities and subsequent design improvements. The text…
…
continue reading
1
LTE Cellular Narrowband Internet of Things (NB-IoT): Practical Projects for the Cloud and Data Visualization
17:13
17:13
Play later
Play later
Lists
Like
Liked
17:13A practical guide to Narrowband Internet of Things (NB-IoT), detailing its underlying cellular communication technologies like 4G and 5G LTE, and its applications in Machine Type Communication (MTC). The text covers Arduino-based projects for developers, showcasing the use of an NB-IoT hardware board with a microcontroller (MCU) and Quectel BG96 mo…
…
continue reading
1
LLVM Techniques, Tips, and Best Practices Clang and Middle-End Libraries: Design powerful and reliable compilers using the latest libraries
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57A comprehensive guide to the LLVM compiler infrastructure. It covers various aspects of LLVM, including its build system, testing utilities like LIT, and the domain-specific language TableGen. The text explores frontend development with Clang, explaining its architecture, preprocessing, Abstract Syntax Tree (AST) handling, and custom toolchain crea…
…
continue reading
By CyberSecurity Summary
…
continue reading
By CyberSecurity Summary
…
continue reading
1
Java Professional Interview Guide: Learn About Java Interview Questions and Practise Answering About Concurrency, JDBC, Exception Handling
28:21
28:21
Play later
Play later
Lists
Like
Liked
28:21Serves as a comprehensive interview guide for Java professionals, covering a wide array of topics essential for technical interviews. It begins by outlining non-technical aspects of job searching, such as recruitment processes, interview types (telephonic, technical, personal), and strategies for success, including resume preparation and soft skill…
…
continue reading
1
ITIL 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50Serves as a comprehensive guide for IT professionals, offering both theoretical knowledge and practical application of ITIL 4 service management principles. It covers key concepts, roles, the four dimensions of service management, the Service Value System (SVS), guiding principles, governance, the service value chain, and various ITIL practices. Th…
…
continue reading
1
ISO/IEC 27001:2013 – Mastering Risk Assessment and the Statement of Applicability
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47Provides comprehensive guidance on implementing the ISO/IEC 27001:2013 standard for information security management systems (ISMS). The text details requirements for risk assessment, risk treatment, and the creation of a Statement of Applicability (SOA), offering practical methodologies like the event-consequence approach and various control types.…
…
continue reading
1
Introduction to Python Network Automation: The First Journey
19:48
19:48
Play later
Play later
Lists
Like
Liked
19:48Provides a detailed guide for network engineers to transition into network automation. It commences with fundamental Python concepts, covering data types, syntax, and error handling through numerous exercises. The book then progresses to Linux administration essentials, emphasizing the creation and management of virtual environments using VMware Wo…
…
continue reading
1
Intelligent Reliability Analysis Using MATLAB and AI: Perform Failure Analysis and Reliability Engineering using MATLAB and Artificial Intel
15:04
15:04
Play later
Play later
Lists
Like
Liked
15:04Introduces intelligent reliability analysis using MATLAB and AI, focusing on failure analysis and reliability engineering. It covers foundational concepts like reliability fundamentals, measures of reliability such as MTBF and MTTF, and remaining useful lifetime (RUL) estimation techniques. The sources also explore experimental methodologies like a…
…
continue reading
1
Implementing VMware Dynamic Environment Manager:: Manage, Administer and Control VMware DEM, Dynamic Desktop, User Policies
19:41
19:41
Play later
Play later
Lists
Like
Liked
19:41A comprehensive guide to VMware Dynamic Environment Manager (DEM), a solution for managing end-user desktop experiences. It details the installation and initial configuration of DEM, including setting up Group Policy Objects (GPOs) and understanding the NoAD mode. The text explores various aspects of desktop management, such as user personalization…
…
continue reading
1
OpenAI API Cookbook: Build intelligent applications including chatbots, virtual assistants, and content generators
18:31
18:31
Play later
Play later
Lists
Like
Liked
18:31A practical guide for building intelligent applications using the OpenAI API. The book provides step-by-step instructions on leveraging various OpenAI endpoints, including Chat Completions, Images, and Audio, to create diverse applications like chatbots, virtual assistants, and content generators. It explains how to interact with the API through to…
…
continue reading
1
NoOps: How AI Agents Are Reinventing DevOps and Software
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50Explores the evolution of DevOps and its contemporary challenges, particularly the issue of fragmented toolchains and the necessity of standardization. It details how cloud-native and data-centric architectures, including microservices, containers, and Infrastructure as Code (IaC), establish a robust foundation for modern software delivery. A signi…
…
continue reading
1
Mastering spaCy: Build structured NLP solutions with custom components and models powered by spacy-llm
37:46
37:46
Play later
Play later
Lists
Like
Liked
37:46A comprehensive guide for Natural Language Processing (NLP) professionals, focusing on advanced techniques and applications using the spaCy library. The text covers various topics, including linguistic feature extraction, rule-based matching, utilizing transformer models like BERT and RoBERTa within spaCy, and integrating Large Language Models (LLM…
…
continue reading
1
Segment Routing in MPLS Networks: Transition from traditional MPLS to SR-MPLS with TI-LFA FRR
23:12
23:12
Play later
Play later
Lists
Like
Liked
23:12A comprehensive guide for network professionals transitioning from traditional Multiprotocol Label Switching (MPLS) to Segment Routing MPLS (SR-MPLS). It aims to simplify this complex shift through theoretical explanations and practical lab exercises, using network emulators like EVE-NG and virtual Cisco XRv9k routers. The text explores fundamental…
…
continue reading
1
Mastering C++ Game Animation Programming: Enhance your skills with advanced game animation techniques in C++, OpenGL
19:52
19:52
Play later
Play later
Lists
Like
Liked
19:52A comprehensive guide to developing sophisticated 3D game character animations and virtual worlds. The content covers a wide array of topics, starting with fundamental concepts like loading models and basic animations and progressing to advanced techniques such as GPU-accelerated calculations using compute shaders. Readers will learn about implemen…
…
continue reading
1
Ruby Way, The: Solutions and Techniques in Ruby Programming (Addison-Wesley Professional Ruby Series)
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58A reference for Ruby programming. It covers a vast array of topics, beginning with fundamental data types like strings and numbers, and progressing through complex data structures such as arrays, hashes, and trees. The material also explores object-oriented programming (OOP) principles, file I/O and data storage methods, graphical user interface (G…
…
continue reading