Listen and read

Step into an infinite world of stories

  • Listen and read as much as you want
  • Over 400 000+ titles
  • Bestsellers in 10+ Indian languages
  • Exclusive titles + Storytel Originals
  • Easy to cancel anytime
Subscribe now
Details page - Device banner - 894x1036

CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1

Duration
16H 15min
Language
English
Format
Category

Economy & Business

★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★

★ 3 AUDIOBOOKS IN 1★

BOOK 1:

• COMPLIANCE, SECURITY, RISK • HOW TO BE COMPLIANT AND SECURE • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS • INTRODUCTION TO THE RMF PUBLICATIONS • ESSENTIAL RMF CONCEPTS • RISK TIERS AND SYSTEMS AND AUTHORIZATION • ROLES AND RESPONSIBILITIES • HOW TO PREPARE FOR RMF

BOOK 2:

• HOW TO REASSESS RISK • HOW TO IMPLEMENT RISK RESPONSE • RISK RESPONSE OPTION BASICS • HOW TO RESPOND TO RISK • INTRODUCTION TO CONTROL TYPES • CONTROL FUNCTION BASICS • UNDERSTANDING SECURITY CONTROLS • RISK FACTORS AND RISK METRICS • HOW TO DEVELOP AND USE KPIS • HOW TO MONITOR RISK FACTORS • UNDERSTANDING RISK INDICATORS • REPORTING COMPLIANCE BASICS

BOOK 3:

• HOW TO USE METASPLOITABLE • HOW TO SPIDER WITH SQL INJECTION • HOW TO SETUP A BURP SUITE PROXY • HOW TO DEPLOY SYN SCAN ATTACK • HOW TO CAPTURE TRAFFIC USING PORT MIRRORING • HOW TO DEPLOY A MITM ATTACK USING ETTERCAP • HOW TO IMPLEMENT MITM ATTACK USING SSL STRIP • HOW TO DEPLOY HAIL MARY USING ARMITAGE • HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE…

© 2021 John Knowles (Audiobook): 9781667080574

Release date

Audiobook: 28 November 2021

Others also enjoyed ...