CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1

CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1

Written by:
John Knowles
Narrated by:
Khai Lannor , Scott Clem
A free trial credit cannot be used on this title

Unabridged Audiobook

Ratings
Book
Narrator
Release Date
October 2021
Duration
16 hours 15 minutes
Summary
★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★

IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!

★ 3 AUDIOBOOKS IN 1★


- BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK
- BOOK 2 - HOW TO MANAGE RISK, USING THE NIST CYBERSECURITY FRAMEWORK
- BOOK 3 - CYBERSECURITY CAREER GUIDE TO BE A CERTIFIED ETHICAL HACKER

BUY THIS BOOK NOW AND GET STARTED TODAY!:

BOOK 1:


- COMPLIANCE, SECURITY, RISK
- HOW TO BE COMPLIANT AND SECURE
- INTRODUCTION TO RISK MANAGEMENT FRAMEWORK
- INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS
- INTRODUCTION TO THE RMF PUBLICATIONS
- ESSENTIAL RMF CONCEPTS
- RISK TIERS AND SYSTEMS AND AUTHORIZATION
- ROLES AND RESPONSIBILITIES
- HOW TO PREPARE FOR RMF

BOOK 2:


- HOW TO REASSESS RISK
- HOW TO IMPLEMENT RISK RESPONSE
- RISK RESPONSE OPTION BASICS
- HOW TO RESPOND TO RISK
- INTRODUCTION TO CONTROL TYPES
- CONTROL FUNCTION BASICS
- UNDERSTANDING SECURITY CONTROLS     
- RISK FACTORS AND RISK METRICS
- HOW TO DEVELOP AND USE KPIS
- HOW TO MONITOR RISK FACTORS
- UNDERSTANDING RISK INDICATORS
- REPORTING COMPLIANCE BASICS

BOOK 3:


- HOW TO USE METASPLOITABLE
- HOW TO SPIDER WITH SQL INJECTION
- HOW TO SETUP A BURP SUITE PROXY
- HOW TO DEPLOY SYN SCAN ATTACK
- HOW TO CAPTURE TRAFFIC USING PORT MIRRORING
- HOW TO DEPLOY A MITM ATTACK USING ETTERCAP
- HOW TO IMPLEMENT MITM ATTACK USING SSLSTRIP
- HOW TO DEPLOY HAIL MARY USING ARMITAGE
- HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE…

BUY THIS BOOK NOW AND GET STARTED TODAY!
1 book added to cart
Subtotal
$15.23
View Cart