Hlustaðu og lestu

Stígðu inn í heim af óteljandi sögum

  • Lestu og hlustaðu eins mikið og þú vilt
  • Þúsundir titla
  • Getur sagt upp hvenær sem er
  • Engin skuldbinding
Prófa frítt
is Device Banner Block 894x1036
Cover for CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

2 einkunn

2.5

Lengd
14 Klst. 21 mín.
Tungumál
enska
Snið
Bókaflokkur

Óskáldað efni

★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★

★ 3 AUDIOBOOKS IN 1 DEAL ★

BOOK 1 - HOW TO ESTABLISH EFFECTIVE SECURITY MANAGEMENT FUNCTIONS BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK BOOK 3 - ETHICAL HACKING AND WIRELESS PENETRATION TESTING WITH KALI LINUX

BOOK 1:

• HOW TO APPLY SECURITY CONTROLS • SECURITY CONTROL FUNCTIONS • HOW TO ESTABLISH ORGANIZATIONAL GOVERNANCE • SECURITY STRATEGY & GOVERNANCE SCENARIO • INFORMATION SECURITY RELATIONSHIPS • BUSINESS, COMPLIANCE, AND SECURITY • MANAGEMENT ROLES AND RESPONSIBILITIES • SECURITY ROLES AND RESPONSIBILITIES • SECURITY MANAGEMENT PROGRAM STRUCTURE • HOW TO DECIPHER THE RISK MANAGEMENT PROGRAM

BOOK 2:

• COMPLIANCE, SECURITY, RISK • HOW TO BE COMPLIANT AND SECURE • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS • CSF CONSTRUCTION AND CSF TIERS AND PROFILES • ESSENTIAL RMF CONCEPTS • RISK TIERS AND SYSTEMS AND AUTHORIZATION • ROLES AND RESPONSIBILITIES

BOOK 3:

• HOW TO IMPLEMENT WPA DICTIONARY ATTACK + COUNTERMEASURES • HOW TO DEPLOY PASSIVE RECONNAISSANCE + COUNTERMEASURES • HOW TO DEPLOY MITM ATTACK USING ETTERCAP, MITM ATTACK USING ROGUE ACCESS POINT, DEAUTHENTICATION ATTACK AGAINST ROGUE AP, DENIAL OF SERVICE ATTACK USING MKD3, EVIL TWIN DE-AUTH USING MDK3 • ENCRYPTION TERMINOLOGY FUNDAMENTALS • WIRELESS ENCRYPTION ALTERNATIVES AND TKIP FUNDAMENTALS • CCMP & AES FUNDAMENTALS AND MORE...

© 2021 John Knowles (Hljóðbók): 9781667094588

Útgáfudagur

Hljóðbók: 28 november 2021

Aðrir höfðu einnig áhuga á...

  1. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  2. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
    Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  3. Certified Information Security Manager CISM Study Guide
    Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  4. Hacking: How to Hack
    Hacking: How to Hack Alex Wagner
  5. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
    CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
  6. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  7. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  8. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  9. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  10. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  11. Cloud Security For Dummies
    Cloud Security For Dummies Ted Coombs
  12. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
    CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  13. Auto Repair For Dummies: 2nd Edition
    Auto Repair For Dummies: 2nd Edition Deanna Sclar
  14. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
    Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
  15. Software Development Fundamentals
    Software Development Fundamentals Introbooks Team
  16. Fake Photos
    Fake Photos Hany Farid
  17. 3D Printing
    3D Printing John M. Jordan
  18. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
    Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  19. Web3: Charting the Internet's Next Economic and Cultural Frontier
    Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
  20. Deep Learning: Guide to Machine Learning and Artificial Intelligence
    Deep Learning: Guide to Machine Learning and Artificial Intelligence David Feldspar
  21. Completing Capitalism: Heal Business to Heal the World
    Completing Capitalism: Heal Business to Heal the World Bruno Roche
  22. Mastering Research Papers: A Guide for PhD Students
    Mastering Research Papers: A Guide for PhD Students Arvind Chopra
  23. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
    Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  24. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  25. YouTube’s Algorithm Explained
    YouTube’s Algorithm Explained IntroBooks Team
  26. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  27. The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age
    The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age Nicholas Sullivan
  28. Bridgebuilders: How Government Can Transcend Boundaries to Solve Big Problems
    Bridgebuilders: How Government Can Transcend Boundaries to Solve Big Problems Donald F. Kettl
  29. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
    The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
  30. Sports Betting For Dummies
    Sports Betting For Dummies Swain Scheps
  31. Spatial Computing
    Spatial Computing Pamela Vold
  32. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
    Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
  33. Distrust: Big Data, Data-Torturing, and the Assault on Science
    Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
  34. Haptics
    Haptics Lynette Jones
  35. Spotify Algorithms: Learn How To Use The Spotify Algorithm To Rapidly Grow Your Fanbase
    Spotify Algorithms: Learn How To Use The Spotify Algorithm To Rapidly Grow Your Fanbase Andrew Southworth
  36. Microsoft Teams For Dummies
    Microsoft Teams For Dummies Rosemarie Withee
  37. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  38. The Legal Analyst: A Toolkit for Thinking about the Law
    The Legal Analyst: A Toolkit for Thinking about the Law Ward Farnsworth
  39. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
    The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
  40. Esports For Dummies
    Esports For Dummies Phill Alexander
  41. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  42. The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World
    The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World Shaun Rein
  43. GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights
    GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Ferris Eanfar
  44. The Great Persuasion: Reinventing Free Markets Since the Depression
    The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
  45. Isaac Newton: A Biography of an Inventor, Astronomer, Physicist, and Philosopher
    Isaac Newton: A Biography of an Inventor, Astronomer, Physicist, and Philosopher Mitch Stokes
  46. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  47. Medical Terminology For Dummies: 3rd Edition
    Medical Terminology For Dummies: 3rd Edition Jennifer L. Dorsey, PhD
  48. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
    Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  49. Social Capital: Life online in the shadow of Ireland’s tech boom
    Social Capital: Life online in the shadow of Ireland’s tech boom Aoife Barry
  50. Running A Bar for Dummies
    Running A Bar for Dummies Heather Dismore
  51. Disrupting Sacred Cows
    Disrupting Sacred Cows Garrett Gunderson
  52. Running a Restaurant For Dummies
    Running a Restaurant For Dummies Heather Dismore
  53. CISSP All-in-One Exam Guide, Ninth Edition
    CISSP All-in-One Exam Guide, Ninth Edition Fernando Maymi
  54. Artificial Intelligence: Data Analytics and Robot Learning in Practice and Theory
    Artificial Intelligence: Data Analytics and Robot Learning in Practice and Theory John Cobar
  55. Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments
    Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments Erik van Mechelen
  56. Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval
    Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval Jon Hilsenrath
  57. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  58. Waves
    Waves Fredric Raichlen
  59. The International Space Station: The History and Legacy of the Multinational Space Research Lab
    The International Space Station: The History and Legacy of the Multinational Space Research Lab Charles River Editors
  60. Cybersecurity For Dummies
    Cybersecurity For Dummies Joseph Steinberg
  61. Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English
    Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English Donald B. Grey
  62. Catching Lightning in a Bottle: How Merrill Lynch Revolutionized the Financial World
    Catching Lightning in a Bottle: How Merrill Lynch Revolutionized the Financial World Winthrop H. Smith

Veldu áskrift

  • Yfir 900.000 hljóð- og rafbækur

  • Yfir 400 titlar frá Storytel Original

  • Barnvænt viðmót með Kids Mode

  • Vistaðu bækurnar fyrir ferðalögin

Vinsælast

Unlimited

Besti valkosturinn fyrir einn notanda

3290 kr /mánuði
3 dagar frítt
  • 1 aðgangur

  • Ótakmörkuð hlustun

  • Yfir 900.000 hljóð- og rafbækur

  • Engin skuldbinding

  • Getur sagt upp hvenær sem er

Prófaðu frítt

Family

Fyrir þau sem vilja deila sögum með fjölskyldu og vinum.

Frá 3990 kr/mánuði
3 dagar frítt
  • 2-6 aðgangar

  • 100 klst/mán fyrir hvern aðgang

  • Yfir 900.000 hljóð- og rafbækur

  • ‎Engin skuldbinding

  • Getur sagt upp hvenær sem er

2 aðgangar

3990 kr /á mánuði
Prófaðu frítt