Escucha y lee

Entra en un mundo infinito de historias

  • Vive la experiencia de leer y escuchar todo lo que quieras
  • Más de 650.000 títulos
  • Títulos en exclusiva y Storytel Originals
  • Primeros 14 días gratis, luego 8,99 €/mes
  • Cancela cuando quieras
Suscríbete ahora
Details page - Device banner - 894x1036
Cover for CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

2 Valoraciones

2.5

Duración
14 Hora 21 min
Idioma
Inglés
Formato
Categoría

No ficción

★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★

★ 3 AUDIOBOOKS IN 1 DEAL ★

BOOK 1 - HOW TO ESTABLISH EFFECTIVE SECURITY MANAGEMENT FUNCTIONS BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK BOOK 3 - ETHICAL HACKING AND WIRELESS PENETRATION TESTING WITH KALI LINUX

BOOK 1:

• HOW TO APPLY SECURITY CONTROLS • SECURITY CONTROL FUNCTIONS • HOW TO ESTABLISH ORGANIZATIONAL GOVERNANCE • SECURITY STRATEGY & GOVERNANCE SCENARIO • INFORMATION SECURITY RELATIONSHIPS • BUSINESS, COMPLIANCE, AND SECURITY • MANAGEMENT ROLES AND RESPONSIBILITIES • SECURITY ROLES AND RESPONSIBILITIES • SECURITY MANAGEMENT PROGRAM STRUCTURE • HOW TO DECIPHER THE RISK MANAGEMENT PROGRAM

BOOK 2:

• COMPLIANCE, SECURITY, RISK • HOW TO BE COMPLIANT AND SECURE • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS • CSF CONSTRUCTION AND CSF TIERS AND PROFILES • ESSENTIAL RMF CONCEPTS • RISK TIERS AND SYSTEMS AND AUTHORIZATION • ROLES AND RESPONSIBILITIES

BOOK 3:

• HOW TO IMPLEMENT WPA DICTIONARY ATTACK + COUNTERMEASURES • HOW TO DEPLOY PASSIVE RECONNAISSANCE + COUNTERMEASURES • HOW TO DEPLOY MITM ATTACK USING ETTERCAP, MITM ATTACK USING ROGUE ACCESS POINT, DEAUTHENTICATION ATTACK AGAINST ROGUE AP, DENIAL OF SERVICE ATTACK USING MKD3, EVIL TWIN DE-AUTH USING MDK3 • ENCRYPTION TERMINOLOGY FUNDAMENTALS • WIRELESS ENCRYPTION ALTERNATIVES AND TKIP FUNDAMENTALS • CCMP & AES FUNDAMENTALS AND MORE...

© 2021 John Knowles (Audiolibro): 9781667094588

Fecha de lanzamiento

Audiolibro: 28 de noviembre de 2021

Etiquetas

    Otros también disfrutaron ...

    1. Certified Information Security Manager CISM Study Guide
      Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    2. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    3. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
      (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    4. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
      8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    5. Cloud Security For Dummies
      Cloud Security For Dummies Ted Coombs
    6. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
      CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    7. Auto Repair For Dummies: 2nd Edition
      Auto Repair For Dummies: 2nd Edition Deanna Sclar
    8. The Art of Attack: Attacker Mindset for Security Professionals
      The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
    9. Distrust: Big Data, Data-Torturing, and the Assault on Science
      Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
    10. Web3: Charting the Internet's Next Economic and Cultural Frontier
      Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
    11. Completing Capitalism: Heal Business to Heal the World
      Completing Capitalism: Heal Business to Heal the World Bruno Roche
    12. 3D Printing
      3D Printing John M. Jordan
    13. Fake Photos
      Fake Photos Hany Farid
    14. Bridgebuilders: How Government Can Transcend Boundaries to Solve Big Problems
      Bridgebuilders: How Government Can Transcend Boundaries to Solve Big Problems Donald F. Kettl
    15. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
      Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    16. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
      The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
    17. AI Ethics
      AI Ethics Mark Coeckelbergh
    18. Esports For Dummies
      Esports For Dummies Phill Alexander
    19. Running A Bar for Dummies
      Running A Bar for Dummies Heather Dismore
    20. Sports Betting For Dummies
      Sports Betting For Dummies Swain Scheps
    21. CISSP All-in-One Exam Guide, Ninth Edition
      CISSP All-in-One Exam Guide, Ninth Edition Fernando Maymi
    22. The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World
      The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World Shaun Rein
    23. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
      The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
    24. The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age
      The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age Nicholas Sullivan
    25. Cybercrime Investigators Handbook
      Cybercrime Investigators Handbook Graeme Edwards
    26. The Great Persuasion: Reinventing Free Markets Since the Depression
      The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
    27. Haptics
      Haptics Lynette Jones
    28. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
      The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    29. Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval
      Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval Jon Hilsenrath
    30. Saint Francis: A Biography of a Man from Assisi Who Embraced Simplicity, Poverty, and Devotion to God
      Saint Francis: A Biography of a Man from Assisi Who Embraced Simplicity, Poverty, and Devotion to God Robert West
    31. Medical Terminology For Dummies: 3rd Edition
      Medical Terminology For Dummies: 3rd Edition Jennifer L. Dorsey, PhD
    32. Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science
      Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science Peter J. Hotez
    33. Business Ethics for Better Behavior
      Business Ethics for Better Behavior Jason Brennan
    34. Raising Goats For Dummies
      Raising Goats For Dummies Cheryl K. Smith
    35. Exchange-Traded Funds For Dummies
      Exchange-Traded Funds For Dummies Russell Wild
    36. Farnsworth's Classical English Argument
      Farnsworth's Classical English Argument Ward Farnsworth

    Elige el plan:

    • Más de 650.000 títulos

    • Kids mode

    • Modo sin conexión

    • Cancela cuando quieras

    Más popular

    Unlimited

    La vida es mejor con un audiolibro.

    8.99 € /mes

    14 días gratis
    Ahorra 34%
    • Escucha y lee los títulos que quieras

    • Modo sin conexión + Kids Mode

    • Cancela en cualquier momento

    Suscríbete ahora

    Family

    Para los que quieren compartir historias con su familia y amigos.

    Desde 15.99 € /mes

    • Escucha y lee los títulos que quieras

    • Modo sin conexión + Kids Mode

    • Cancela en cualquier momento

    Tú + 1 miembro de la familia2 cuentas

    15.99 € /mes

    Pruébalo ahora