Loading...
Welcome
Sign up
Login
Browse Books
Deals
VIP
0
Loading...
CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
Written by:
John Knowles
Narrated by:
Khai Lannor
,
Scott Clem
A free trial credit cannot be used on this title
Unabridged Audiobook
Listen Now
as an Audiobooks.com member
Add to Cart - $15.23
Remove from Cart
Give as a gift
Ratings
Book
Narrator
Release Date
October 2021
Duration
16 hours 15 minutes
Summary
★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★
IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!
★ 3 AUDIOBOOKS IN 1★
- BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK
- BOOK 2 - HOW TO MANAGE RISK, USING THE NIST CYBERSECURITY FRAMEWORK
- BOOK 3 - CYBERSECURITY CAREER GUIDE TO BE A CERTIFIED ETHICAL HACKER
BUY THIS BOOK NOW AND GET STARTED TODAY!:
BOOK 1:
- COMPLIANCE, SECURITY, RISK
- HOW TO BE COMPLIANT AND SECURE
- INTRODUCTION TO RISK MANAGEMENT FRAMEWORK
- INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS
- INTRODUCTION TO THE RMF PUBLICATIONS
- ESSENTIAL RMF CONCEPTS
- RISK TIERS AND SYSTEMS AND AUTHORIZATION
- ROLES AND RESPONSIBILITIES
- HOW TO PREPARE FOR RMF
BOOK 2:
- HOW TO REASSESS RISK
- HOW TO IMPLEMENT RISK RESPONSE
- RISK RESPONSE OPTION BASICS
- HOW TO RESPOND TO RISK
- INTRODUCTION TO CONTROL TYPES
- CONTROL FUNCTION BASICS
- UNDERSTANDING SECURITY CONTROLS
- RISK FACTORS AND RISK METRICS
- HOW TO DEVELOP AND USE KPIS
- HOW TO MONITOR RISK FACTORS
- UNDERSTANDING RISK INDICATORS
- REPORTING COMPLIANCE BASICS
BOOK 3:
- HOW TO USE METASPLOITABLE
- HOW TO SPIDER WITH SQL INJECTION
- HOW TO SETUP A BURP SUITE PROXY
- HOW TO DEPLOY SYN SCAN ATTACK
- HOW TO CAPTURE TRAFFIC USING PORT MIRRORING
- HOW TO DEPLOY A MITM ATTACK USING ETTERCAP
- HOW TO IMPLEMENT MITM ATTACK USING SSLSTRIP
- HOW TO DEPLOY HAIL MARY USING ARMITAGE
- HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE…
BUY THIS BOOK NOW AND GET STARTED TODAY!
Browse By Category
Business & Economics
>
Business & Career Development
Non-Fiction
>
Computers & Technology
1 book added to cart
CISSP And Cybersecurity For Begin...
John Knowles
Subtotal
$15.23
View Cart
Continue Browsing
~~title~~
~~carousel-body~~
Back
Next
~~book-title~~
By: ~~author-single-string~~
~~tag-text~~
© Copyright 2011 - 2024 Storytel Audiobooks USA LLC. All Rights Reserved.