Écouter et lire

Entrez dans un monde infini d'histoires

  • Lire et écouter autant que vous le voulez
  • Plus d'un million de titres
  • Titres exclusifs + créations originales Storytel
  • 14 jours d'essai gratuit, puis 9,99 € par mois
  • Annulation facile à tout moment
Essayer gratuitement
Details page - Device banner - 894x1036

Cybersecurity For Beginners: Incident Management And Cybersecurity Awareness | 2 Books In 1

1 Évaluations

5

Durée
10H 17min
Langues
Anglais
Format
Catégorie

Documents et essais

2 AUDIOBOOKS IN 1!

• Book 1 - Incident Management Best Practices • Book 2 - Cybersecurity Awareness for Employees

BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!

You will learn:

AUDIOBOOK 1:

•How to create an Incident Response Team

•IR Team Roles and Responsibilities

•What Skillset the Response Team must have

•How to train the IR Team

•Must have IR Team Tools and Equipment

•How to create an Incident Response Team

•How to communicate with IR Stakeholders

•How to Escalate an incident

•How to Collect Data

•How to Schedule an IR Test

•How to Execute an IR Test

•How to Conclude the Root Cause

•How to upgrade our Controls

•How to Evaluate the Response

•What is FISMA, NIST, HIPAA, PCI-DSS

AUDIOBOOK 2:

*Viruses, Cryptomalware and Ransomware, Trojans, Rootkits, Keyloggers, Adware, Spyware

*Botnets, Logic Bomb, Backdoors, Social Engineering, Social Engineering Attacks

*Vishing, Tailgaiting, Impersonation, Dumpster Diving, Shoulder Surfing, Hoaxes

*Watering Hole Attack, DDoS Attack, Replay Attacks, Man in the Middle Attack

*Buffer Overflow Attack, SQL Injection Attack, LDAP Injection Attack

*XML Injection Attack, Cross-Site Scripting, Cross-Site Request Forgery

*Privilege Escalation, ARP Poisoning, Smurf Attack, DNS Poisoning

*Typo Squatting and URL Hijacking, Shimming, Refactoring, IP/MAC Spoofing

*Wireless Replay Attacks, IV Attack, Rogue Access Points, Evil Twin, WPS Attacks

*Bluejacking and Bluesnarfing, NFC Attacks, Dissociation Attack,Brute Force Attack

*Dictionary Attacks, Birthday Attack, Rainbow Tables, Collision and Downgrade Attack

*Pen Testing vs. Vulnerability Scanning, Red vs. Blue Teams and more...

© 2020 Mike Miller (Livre audio ): 9781664954304

Date de sortie

Livre audio : 26 novembre 2020

Mots-clés

    D'autres ont également apprécié ...

    L’offre Storytel :

    • Accès à la bibliothèque complète

    • Mode enfant

    • Annulez à tout moment

    15 heures

    Pour accompagner vos loisirs

    9.99€ /mois
    30 jours gratuits
    • 1 compte

    • 15 heures/mois

    Essayer maintenant

    30 heures

    Pour vos trajets quotidiens

    14.99€ /mois
    30 jours gratuits
    • 1 compte

    • 30 heures/mois

    Essayer maintenant

    45 heures

    Pour écouter tous les jours

    17.99€ /mois
    30 jours gratuits
    • 1 compte

    • 45 heures/mois

    Essayer maintenant