الاستماع والقراءة

خطوة إلى عالم لا حدود له من القصص

  • اقرأ واستمع إلى ما تريده
  • أكثر من مليون عنوان
  • العناوين الحصرية + أصول القصة
  • 7 يوم تجربة مجانية، ثم 9.99$ يورو في الشهر
  • من السهل الإلغاء في أي وقت
جرب مجانا
Details page - Device banner - 894x1036

Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1

المدة
14H {m}دقيقة
اللغة
اللغة الإنجليزية
Format
الفئة

كتب واقعية

3 Audiobooks In 1 Deal:

•Book 1: How to Establish Effective Security Management Functions

•Book 2: How to Apply the NIST Risk Management Framework

•Book 3: How to Manage Risk, Using the NIST Cybersecurity Framework

You will learn in Book 1:

•Objectives of Security Management •Security Management Principles •Defense in Depth •How to apply Security Controls •Security Control Functions •Security Strategy & Governance Scenario •Information Security Relationships •Business, Compliance, and Security •Management Roles and Responsibilities •Security Roles and Responsibilities •How to decipher the Risk Management Program and more…

You will learn in Book 2:

•Compliance, Security, Risk •How to be Compliant and Secure •Introduction to Risk Management Framework •Introduction to the RMF Publications •Understanding the Cybersecurity Framework •Comprehending the CSF Tiers and Profiles •Essential RMF Concepts •Understanding Risk Tiers •Understanding Systems and Authorization •Introduction to Roles and Responsibilities •How to prepare for Organization-level Tasks and more…

You will learn in Book 3:

•How to Reassess Risk •How to Implement Risk Response •Risk Response Option Basics •How to Analyse Cost & Benefit •How to Prioritize Risk Response Options •How to Respond to Risk •Introduction to Control Types •Control Function Basics •Understanding Security Controls •How to Develop and Use KPIs •How to Monitor Risk Factors and more...

© 2020 John Knowles (دفتر الصوت ): 9781662299476

تاريخ الإصدار

دفتر الصوت : 7 أكتوبر 2020

الوسوم

    واستمتع آخرون أيضًا...

    1. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    2. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    3. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    4. Cybersecurity For Beginners: How to apply the NIST Risk Management Framework John Knowles
    5. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    6. Cybersecurity For Dummies Joseph Steinberg
    7. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    8. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    9. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    10. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    11. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    12. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
    13. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
    14. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    15. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    16. Cybersecutity First Principles Rick Howard
    17. Cyberdeterrence and Cyberwar Martin C. Libicki
    18. Ethical Hacking Bible: Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux | 7 books in 1 HUGO HOFFMAN
    19. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    20. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
    21. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    22. Tor and the Dark Art of Anonymity Lance Henderson
    23. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    24. Cloud Security For Dummies Ted Coombs
    25. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    26. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
    27. Social Engineering: The Art of Human Hacking Christopher Hadnagy
    28. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    29. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
    30. Hacking: How to Hack Alex Wagner
    31. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    32. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    33. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
    34. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    35. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
    36. Security Awareness For Dummies Ira Winkler, CISSP
    37. Cybercrime Investigators Handbook Graeme Edwards
    38. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
    39. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
    40. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
    41. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
    42. The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter
    43. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
    44. If It's Smart, It's Vulnerable Mikko Hypponen
    45. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    46. Networking For Dummies (11th Edition): 11th Edition Doug Lowe
    1. A Country Doctor Sarah Orne Jewett
      2.8
    2. PMP Pro: Transform Your Exam Success with Game-Changing Secrets: "Elevate your PMP exam results! Dive into transformative audio lessons for peak performance on test day." Arden Blakewood
    3. Summary - I’m Still Here: Based On The Book By Austin Channing Brown Library Of Stories
      1
    4. Desconexión Digital: Meditaciones Guiadas para Calma y Claridad Refeser
    5. Summary - Emotional Intelligence 2.0.: Based On The Book By Travis Bradberry And Jean Greaves Fastbooks Publishing
    6. Nature’s Symphony of Serene Forest Cricket Sounds Mixed With Piano Rhythms For Deep Calm & Relaxation: Experience Soothing Nights for Restful Sleep & Mindfulness Using Enhanced BGM 8D Audio Cedar Skye
    7. Summary - Freakonomics: Based On The Book By Steven Levitt And Stephen Dubner Fastbooks Publishing
      4
    8. Django Unchained - The Ultimate Trivia Collection: From The Movie Directed By Quentin Tarantino Film Trivia Metaverse
    9. 100 Quotes About Inner Peace That Will Transform Your Life: Finding Serenity Amidst Life's Turmoil The Quotes Library
    10. GED Secrets: Elevate Your Success and Conquer the Exam Today: "Boost your GED prep! Unlock engaging audio lessons for ultimate exam success today!" Ronan Cade
    11. Extended Summary - Maybe You Should Talk To Someone: Based On The Book By Lori Gottlieb Quick Reading Library
    12. Extended Summary - Braving The Wilderness: Based On The Book By Brene Brown Quick Reading Library
      2
    13. Summary - Eat To Live: Based On The Book By Dr. Joel Fuhrman Fastbooks Publishing
    14. Summary - 1620 - A Critical Response To The 1619 Project: Based On The Book By Peter W. Wood Library Of Stories
    15. Summary - Everything Is F*Cked: Based On The Book By Mark Manson Fastbooks Publishing

    دائمًا برفقة Storytel

    • أكثر من 200000 عنوان

    • وضع الأطفال (بيئة آمنة للأطفال)

    • تنزيل الكتب للوصول إليها دون الاتصال بالإنترنت

    • الإلغاء في أي وقت

    الكتب الأكثر استماعًا

    شهري

    قصص لكل المناسبات.

    9.99 $ / شهر
    7 يومًا مجانًا
    • حساب واحد

    • حساب بلا حدود

    • 1 حساب

    • استماع بلا حدود

    • إلغاء في أي وقت

    جرب الآن

    سنويا

    قصص لكل المناسبات.

    83.88 $ /سنة
    7 يومًا مجانًا
    وفر 30%
    • حساب واحد

    • حساب بلا حدود

    • 1 حساب

    • استماع بلا حدود

    • إلغاء في أي وقت

    جرب الآن

    6 أشهر

    قصص لكل المناسبات.

    53.64 $ /6 أشهر
    7 يومًا مجانًا
    وفر 11%
    • حساب واحد

    • حساب بلا حدود

    • 1 حساب

    • استماع بلا حدود

    • إلغاء في أي وقت

    جرب الآن