ฟังและอ่าน

ก้าวเข้าสู่โลกแห่งเรื่องราวอันไม่มีที่สิ้นสุด

  • อ่านและฟังได้มากเท่าที่คุณต้องการ
  • มากกว่า 1 ล้านชื่อ
  • Storytel Originals ผลงานเฉพาะบน Storytel
  • 199บ./ด.
  • ยกเลิกได้ทุกเมื่อ
เริ่ม
Details page - Device banner - 894x1036
Cover for CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

2 คะแนน

2.5

ระยะเวลา
14 ชม. 21 น.
ภาษา
ภาษาอังกฤษ
รูปแบบ
คอลเลกชัน

นอนฟิกชั่น

★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★

★ 3 AUDIOBOOKS IN 1 DEAL ★

BOOK 1 - HOW TO ESTABLISH EFFECTIVE SECURITY MANAGEMENT FUNCTIONS BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK BOOK 3 - ETHICAL HACKING AND WIRELESS PENETRATION TESTING WITH KALI LINUX

BOOK 1:

• HOW TO APPLY SECURITY CONTROLS • SECURITY CONTROL FUNCTIONS • HOW TO ESTABLISH ORGANIZATIONAL GOVERNANCE • SECURITY STRATEGY & GOVERNANCE SCENARIO • INFORMATION SECURITY RELATIONSHIPS • BUSINESS, COMPLIANCE, AND SECURITY • MANAGEMENT ROLES AND RESPONSIBILITIES • SECURITY ROLES AND RESPONSIBILITIES • SECURITY MANAGEMENT PROGRAM STRUCTURE • HOW TO DECIPHER THE RISK MANAGEMENT PROGRAM

BOOK 2:

• COMPLIANCE, SECURITY, RISK • HOW TO BE COMPLIANT AND SECURE • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS • CSF CONSTRUCTION AND CSF TIERS AND PROFILES • ESSENTIAL RMF CONCEPTS • RISK TIERS AND SYSTEMS AND AUTHORIZATION • ROLES AND RESPONSIBILITIES

BOOK 3:

• HOW TO IMPLEMENT WPA DICTIONARY ATTACK + COUNTERMEASURES • HOW TO DEPLOY PASSIVE RECONNAISSANCE + COUNTERMEASURES • HOW TO DEPLOY MITM ATTACK USING ETTERCAP, MITM ATTACK USING ROGUE ACCESS POINT, DEAUTHENTICATION ATTACK AGAINST ROGUE AP, DENIAL OF SERVICE ATTACK USING MKD3, EVIL TWIN DE-AUTH USING MDK3 • ENCRYPTION TERMINOLOGY FUNDAMENTALS • WIRELESS ENCRYPTION ALTERNATIVES AND TKIP FUNDAMENTALS • CCMP & AES FUNDAMENTALS AND MORE...

© 2021 John Knowles (หนังสือเสียง): 9781667094588

วันเปิดตัว

หนังสือเสียง: 28 พฤศจิกายน 2564

แท็ก

    คนอื่นก็สนุก...

    1. Certified Information Security Manager CISM Study Guide
      Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    2. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
      Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    3. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
      8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    4. Cloud Security For Dummies
      Cloud Security For Dummies Ted Coombs
    5. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
      CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    6. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
      CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    7. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
      (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    8. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
      Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
    9. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
      A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    10. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    11. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
      Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
    12. Biggest Cyber Crimes in the History
      Biggest Cyber Crimes in the History Introbooks Team
    13. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
      Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
    14. The Language of Deception: Weaponizing Next Generation AI
      The Language of Deception: Weaponizing Next Generation AI Justin Hutchens
    15. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
      RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
    16. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
      The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    17. Hacking: How to Hack
      Hacking: How to Hack Alex Wagner
    18. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
      Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
    19. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
      Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    20. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
      Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    21. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
      Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    22. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
      Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
    23. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
      Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
    24. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
      CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
    25. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
      The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
    26. Designing the Urban Future: Smart Cities
      Designing the Urban Future: Smart Cities Scientific American
    27. The Art of Attack: Attacker Mindset for Security Professionals
      The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
    28. Food, Science, and the Human Body
      Food, Science, and the Human Body The Great Courses
    29. The Spiritual Brain: Science and Religious Experience
      The Spiritual Brain: Science and Religious Experience Andrew Newberg
    30. Medical School for Everyone: Emergency Medicine
      Medical School for Everyone: Emergency Medicine The Great Courses
    31. The Surveillance State: Big Data, Freedom, and You
      The Surveillance State: Big Data, Freedom, and You The Great Courses
    32. Programming Interviews For Dummies
      Programming Interviews For Dummies Eric Butow
    33. Knowledge and Power: The Information Theory of Capitalism and How It Is Revolutionizing Our World
      Knowledge and Power: The Information Theory of Capitalism and How It Is Revolutionizing Our World George Gilder
    34. Contraception: A Concise History
      Contraception: A Concise History Donna J. Drucker
    35. Mastering Research Papers: A Guide for PhD Students
      Mastering Research Papers: A Guide for PhD Students Arvind Chopra
    36. Software Development Fundamentals
      Software Development Fundamentals Introbooks Team
    37. Virtual You: How Building Your Digital Twin Will Revolutionize Medicine and Change Your Life
      Virtual You: How Building Your Digital Twin Will Revolutionize Medicine and Change Your Life Roger Highfield
    38. Everyday Calculus: Discovering the Hidden Math All around Us
      Everyday Calculus: Discovering the Hidden Math All around Us Oscar E. Fernandez
    39. Deep Learning: Guide to Machine Learning and Artificial Intelligence
      Deep Learning: Guide to Machine Learning and Artificial Intelligence David Feldspar
    40. Artificial Intelligence: Modern Magic or Dangerous Future?
      Artificial Intelligence: Modern Magic or Dangerous Future? Yorick Wilks
    41. Microsoft Teams For Dummies
      Microsoft Teams For Dummies Rosemarie Withee
    42. Auto Repair For Dummies: 2nd Edition
      Auto Repair For Dummies: 2nd Edition Deanna Sclar
    43. Completing Capitalism: Heal Business to Heal the World
      Completing Capitalism: Heal Business to Heal the World Bruno Roche
    44. Machine Learning: Deep Learning, Text Analytics, and Reinforcement Learning with Big Data
      Machine Learning: Deep Learning, Text Analytics, and Reinforcement Learning with Big Data David Feldspar
    45. Web3: Charting the Internet's Next Economic and Cultural Frontier
      Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
    46. The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age
      The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age Nicholas Sullivan

    ทุกที่ ทุกเวลากับ Storytel:

    • กว่า 500 000 รายการ

    • Kids Mode (เนื้อหาที่ปลอดภัยสำหรับเด็ก)

    • ดาวน์โหลดหนังสือสำหรับการเข้าถึงแบบออฟไลน์

    • ยกเลิกได้ตลอดเวลา

    ที่นิยมมากที่สุด

    Unlimited

    สำหรับผู้ที่ต้องการฟังและอ่านอย่างไม่จำกัด

    199 บ. /เดือน
    • 1 บัญชี

    • การเข้าถึงแบบไม่ จำกัด

    • 1 บัญชี

    • ยกเลิกได้ทุกเมื่อ

    เริ่ม

    Family

    สำหรับผู้ที่ต้องการแบ่งปันเรื่องราวกับครอบครัวและเพื่อน

    349 บ. /เดือน
    • 3 บัญชี

    • การเข้าถึงแบบไม่ จำกัด

    • ฟังได้ไม่จำกัด

    • ยกเลิกได้ทุกเมื่อ

    เริ่ม