Escucha y lee

Descubre un mundo infinito de historias

  • Lee y escucha todo lo que quieras
  • Más de 500 000 títulos
  • Títulos exclusivos + Storytel Originals
  • 14 días de prueba gratis, luego $24,900 COP/al mes
  • Cancela cuando quieras
Descarga la app
CO -Device Banner Block 894x1036

CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1

Duración
16H 15min
Idioma
Inglés
Format
Categoría

Negocios y finanzas

★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★

★ 3 AUDIOBOOKS IN 1★

BOOK 1:

• COMPLIANCE, SECURITY, RISK • HOW TO BE COMPLIANT AND SECURE • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS • INTRODUCTION TO THE RMF PUBLICATIONS • ESSENTIAL RMF CONCEPTS • RISK TIERS AND SYSTEMS AND AUTHORIZATION • ROLES AND RESPONSIBILITIES • HOW TO PREPARE FOR RMF

BOOK 2:

• HOW TO REASSESS RISK • HOW TO IMPLEMENT RISK RESPONSE • RISK RESPONSE OPTION BASICS • HOW TO RESPOND TO RISK • INTRODUCTION TO CONTROL TYPES • CONTROL FUNCTION BASICS • UNDERSTANDING SECURITY CONTROLS • RISK FACTORS AND RISK METRICS • HOW TO DEVELOP AND USE KPIS • HOW TO MONITOR RISK FACTORS • UNDERSTANDING RISK INDICATORS • REPORTING COMPLIANCE BASICS

BOOK 3:

• HOW TO USE METASPLOITABLE • HOW TO SPIDER WITH SQL INJECTION • HOW TO SETUP A BURP SUITE PROXY • HOW TO DEPLOY SYN SCAN ATTACK • HOW TO CAPTURE TRAFFIC USING PORT MIRRORING • HOW TO DEPLOY A MITM ATTACK USING ETTERCAP • HOW TO IMPLEMENT MITM ATTACK USING SSL STRIP • HOW TO DEPLOY HAIL MARY USING ARMITAGE • HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE…

© 2021 John Knowles (Audiolibro ): 9781667080574

Fecha de lanzamiento

Audiolibro : 28 de noviembre de 2021

Otros también disfrutaron ...