Listen and read

Step into an infinite world of stories

  • Read and listen as much as you want
  • Over 1 million titles
  • Exclusive titles + Storytel Originals
  • 7 days free trial, then €9.99/month
  • Easy to cancel anytime
Subscribe Now
Details page - Device banner - 894x1036

CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

2 Ratings

2.5

Duration
14H 21min
Language
English
Format
Category

Non-fiction

★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★

★ 3 AUDIOBOOKS IN 1 DEAL ★

BOOK 1 - HOW TO ESTABLISH EFFECTIVE SECURITY MANAGEMENT FUNCTIONS BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK BOOK 3 - ETHICAL HACKING AND WIRELESS PENETRATION TESTING WITH KALI LINUX

BOOK 1:

• HOW TO APPLY SECURITY CONTROLS • SECURITY CONTROL FUNCTIONS • HOW TO ESTABLISH ORGANIZATIONAL GOVERNANCE • SECURITY STRATEGY & GOVERNANCE SCENARIO • INFORMATION SECURITY RELATIONSHIPS • BUSINESS, COMPLIANCE, AND SECURITY • MANAGEMENT ROLES AND RESPONSIBILITIES • SECURITY ROLES AND RESPONSIBILITIES • SECURITY MANAGEMENT PROGRAM STRUCTURE • HOW TO DECIPHER THE RISK MANAGEMENT PROGRAM

BOOK 2:

• COMPLIANCE, SECURITY, RISK • HOW TO BE COMPLIANT AND SECURE • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS • CSF CONSTRUCTION AND CSF TIERS AND PROFILES • ESSENTIAL RMF CONCEPTS • RISK TIERS AND SYSTEMS AND AUTHORIZATION • ROLES AND RESPONSIBILITIES

BOOK 3:

• HOW TO IMPLEMENT WPA DICTIONARY ATTACK + COUNTERMEASURES • HOW TO DEPLOY PASSIVE RECONNAISSANCE + COUNTERMEASURES • HOW TO DEPLOY MITM ATTACK USING ETTERCAP, MITM ATTACK USING ROGUE ACCESS POINT, DEAUTHENTICATION ATTACK AGAINST ROGUE AP, DENIAL OF SERVICE ATTACK USING MKD3, EVIL TWIN DE-AUTH USING MDK3 • ENCRYPTION TERMINOLOGY FUNDAMENTALS • WIRELESS ENCRYPTION ALTERNATIVES AND TKIP FUNDAMENTALS • CCMP & AES FUNDAMENTALS AND MORE...

© 2021 John Knowles (Audiobook): 9781667094588

Release date

Audiobook: November 28, 2021

Others also enjoyed ...

  1. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  2. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  3. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  4. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  5. Cybersecurity For Dummies Joseph Steinberg
  6. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  7. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
  8. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Incident Management & Security Management Ethics HUGO HOFFMAN
  9. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  10. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  11. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  12. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  13. Cloud Security For Dummies Ted Coombs
  14. The Art of Deception: Controlling the Human Element of Security William L. Simon
  15. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  16. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
  17. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  18. Cybersecurity For Beginners: How to apply the NIST Risk Management Framework John Knowles
  19. CISSP All-in-One Exam Guide, Ninth Edition Fernando Maymi
  20. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
  21. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  22. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  23. If It's Smart, It's Vulnerable Mikko Hypponen
  24. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  25. Cyberdeterrence and Cyberwar Martin C. Libicki
  26. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  27. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
  28. Ethical Hacking Introbooks Team
  29. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  30. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  31. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  32. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
  33. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  34. Cybercrime Investigators Handbook Graeme Edwards
  35. Security Awareness For Dummies Ira Winkler, CISSP
  36. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
  37. Blockchain For Dummies Tiana Laurence
  38. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  39. Cyber Security for Decision Makers Jarno Limnéll
  40. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
  41. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Mike Chapple
  42. Tor and the Dark Art of Anonymity Lance Henderson
  43. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
  44. Biggest Cyber Crimes in the History Introbooks Team
  45. What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  46. Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Helen Patton
  47. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden

This is why you’ll love Storytel

  • Listen and read without limits

  • 800 000+ stories in 40 languages

  • Kids Mode (child-safe environment)

  • Cancel anytime

Unlimited stories, anytime
Time limited offer

Unlimited

Listen and read as much as you want

9.99 € /month
  • 1 account

  • Unlimited Access

  • Offline Mode

  • Kids Mode

  • Cancel anytime

Try now