Écouter et lire

Entrez dans un monde infini d'histoires

  • Lire et écouter autant que vous le voulez
  • Plus d'un million de titres
  • Titres exclusifs + créations originales Storytel
  • 14 jours d'essai gratuit, puis 9,99 € par mois
  • Annulation facile à tout moment
Essayer gratuitement
Details page - Device banner - 894x1036
Cover for CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

2 évaluations

2.5

Durée
14h 21min
Langue
Anglais
Format
Catégorie

Documents et essais

★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★

★ 3 AUDIOBOOKS IN 1 DEAL ★

BOOK 1 - HOW TO ESTABLISH EFFECTIVE SECURITY MANAGEMENT FUNCTIONS BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK BOOK 3 - ETHICAL HACKING AND WIRELESS PENETRATION TESTING WITH KALI LINUX

BOOK 1:

• HOW TO APPLY SECURITY CONTROLS • SECURITY CONTROL FUNCTIONS • HOW TO ESTABLISH ORGANIZATIONAL GOVERNANCE • SECURITY STRATEGY & GOVERNANCE SCENARIO • INFORMATION SECURITY RELATIONSHIPS • BUSINESS, COMPLIANCE, AND SECURITY • MANAGEMENT ROLES AND RESPONSIBILITIES • SECURITY ROLES AND RESPONSIBILITIES • SECURITY MANAGEMENT PROGRAM STRUCTURE • HOW TO DECIPHER THE RISK MANAGEMENT PROGRAM

BOOK 2:

• COMPLIANCE, SECURITY, RISK • HOW TO BE COMPLIANT AND SECURE • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS • CSF CONSTRUCTION AND CSF TIERS AND PROFILES • ESSENTIAL RMF CONCEPTS • RISK TIERS AND SYSTEMS AND AUTHORIZATION • ROLES AND RESPONSIBILITIES

BOOK 3:

• HOW TO IMPLEMENT WPA DICTIONARY ATTACK + COUNTERMEASURES • HOW TO DEPLOY PASSIVE RECONNAISSANCE + COUNTERMEASURES • HOW TO DEPLOY MITM ATTACK USING ETTERCAP, MITM ATTACK USING ROGUE ACCESS POINT, DEAUTHENTICATION ATTACK AGAINST ROGUE AP, DENIAL OF SERVICE ATTACK USING MKD3, EVIL TWIN DE-AUTH USING MDK3 • ENCRYPTION TERMINOLOGY FUNDAMENTALS • WIRELESS ENCRYPTION ALTERNATIVES AND TKIP FUNDAMENTALS • CCMP & AES FUNDAMENTALS AND MORE...

© 2021 John Knowles (Livre audio): 9781667094588

Date de publication

Livre audio : 28 novembre 2021

Mots-clés

    D'autres ont également apprécié ...

    1. Certified Information Security Manager CISM Study Guide
      Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    2. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    3. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
      (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    4. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
      8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    5. Cloud Security For Dummies
      Cloud Security For Dummies Ted Coombs
    6. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
      CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    7. Auto Repair For Dummies: 2nd Edition
      Auto Repair For Dummies: 2nd Edition Deanna Sclar
    8. The Art of Attack: Attacker Mindset for Security Professionals
      The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
    9. Distrust: Big Data, Data-Torturing, and the Assault on Science
      Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
    10. Web3: Charting the Internet's Next Economic and Cultural Frontier
      Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
    11. Completing Capitalism: Heal Business to Heal the World
      Completing Capitalism: Heal Business to Heal the World Bruno Roche
    12. 3D Printing
      3D Printing John M. Jordan
    13. Fake Photos
      Fake Photos Hany Farid
    14. Bridgebuilders: How Government Can Transcend Boundaries to Solve Big Problems
      Bridgebuilders: How Government Can Transcend Boundaries to Solve Big Problems Donald F. Kettl
    15. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
      Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    16. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
      The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
    17. AI Ethics
      AI Ethics Mark Coeckelbergh
    18. Esports For Dummies
      Esports For Dummies Phill Alexander
    19. Running A Bar for Dummies
      Running A Bar for Dummies Heather Dismore
    20. Sports Betting For Dummies
      Sports Betting For Dummies Swain Scheps
    21. CISSP All-in-One Exam Guide, Ninth Edition
      CISSP All-in-One Exam Guide, Ninth Edition Fernando Maymi
    22. The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World
      The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World Shaun Rein
    23. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
      The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
    24. The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age
      The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age Nicholas Sullivan
    25. Cybercrime Investigators Handbook
      Cybercrime Investigators Handbook Graeme Edwards
    26. The Great Persuasion: Reinventing Free Markets Since the Depression
      The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
    27. Haptics
      Haptics Lynette Jones
    28. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
      The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    29. Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval
      Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval Jon Hilsenrath
    30. Saint Francis: A Biography of a Man from Assisi Who Embraced Simplicity, Poverty, and Devotion to God
      Saint Francis: A Biography of a Man from Assisi Who Embraced Simplicity, Poverty, and Devotion to God Robert West
    31. Medical Terminology For Dummies: 3rd Edition
      Medical Terminology For Dummies: 3rd Edition Jennifer L. Dorsey, PhD
    32. Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science
      Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science Peter J. Hotez
    33. Business Ethics for Better Behavior
      Business Ethics for Better Behavior Jason Brennan
    34. Raising Goats For Dummies
      Raising Goats For Dummies Cheryl K. Smith
    35. Exchange-Traded Funds For Dummies
      Exchange-Traded Funds For Dummies Russell Wild
    36. Farnsworth's Classical English Argument
      Farnsworth's Classical English Argument Ward Farnsworth

    L’offre Storytel :

    • Accès à la bibliothèque complète

    • Mode enfant

    • Annulez à tout moment

    15 heures

    Pour accompagner vos loisirs

    9.99 € /mois

    30 jours gratuits
    Essayer maintenant

    30 heures

    Pour vos trajets quotidiens

    14.99 € /mois

    30 jours gratuits
    Essayer maintenant

    45 heures

    Pour écouter tous les jours

    17.99 € /mois

    30 jours gratuits
    Essayer maintenant