Ouça e leia

Entre em um mundo infinito de histórias

  • Ler e ouvir tanto quanto você quiser
  • Com mais de 500.000 títulos
  • Títulos exclusivos + Storytel Originals
  • 7 dias de teste gratuito, depois R$19,90/mês
  • Fácil de cancelar a qualquer momento
Assine agora
br bdp devices

CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1

Duração
16H 15min
Idiomas
Inglês
Format
Categoria

Economia & Negócios

★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★

★ 3 AUDIOBOOKS IN 1★

BOOK 1:

• COMPLIANCE, SECURITY, RISK • HOW TO BE COMPLIANT AND SECURE • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS • INTRODUCTION TO THE RMF PUBLICATIONS • ESSENTIAL RMF CONCEPTS • RISK TIERS AND SYSTEMS AND AUTHORIZATION • ROLES AND RESPONSIBILITIES • HOW TO PREPARE FOR RMF

BOOK 2:

• HOW TO REASSESS RISK • HOW TO IMPLEMENT RISK RESPONSE • RISK RESPONSE OPTION BASICS • HOW TO RESPOND TO RISK • INTRODUCTION TO CONTROL TYPES • CONTROL FUNCTION BASICS • UNDERSTANDING SECURITY CONTROLS • RISK FACTORS AND RISK METRICS • HOW TO DEVELOP AND USE KPIS • HOW TO MONITOR RISK FACTORS • UNDERSTANDING RISK INDICATORS • REPORTING COMPLIANCE BASICS

BOOK 3:

• HOW TO USE METASPLOITABLE • HOW TO SPIDER WITH SQL INJECTION • HOW TO SETUP A BURP SUITE PROXY • HOW TO DEPLOY SYN SCAN ATTACK • HOW TO CAPTURE TRAFFIC USING PORT MIRRORING • HOW TO DEPLOY A MITM ATTACK USING ETTERCAP • HOW TO IMPLEMENT MITM ATTACK USING SSL STRIP • HOW TO DEPLOY HAIL MARY USING ARMITAGE • HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE…

© 2021 John Knowles (Audiolivros): 9781667080574

Data de lançamento

Audiolivros: 28 de novembro de 2021

Outros também usufruíram...