CISSP Exam Study Guide For Information Security Professionals by John Knowles audiobook

CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

By John Knowles
Read by Scott Clem, Marty Ravenel and Khai Lannor

John Knowles
14.36 Hours Unabridged
Format : Digital Download (In Stock)
  • Regular Price: $14.18

    Special Price $11.34

    or 1 Credit

    ISBN: 9781667094588

★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★ IF YOUR ANSWER IS YES, BUY THIS BOOK NOW! ★ 3 AUDIOBOOKS IN 1 DEAL ★ BOOK 1 - HOW TO ESTABLISH EFFECTIVE SECURITY MANAGEMENT FUNCTIONS BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK BOOK 3 - ETHICAL HACKING AND WIRELESS PENETRATION TESTING WITH KALI LINUX BUY THIS BOOK NOW AND GET STARTED TODAY! BOOK 1: HOW TO APPLY SECURITY CONTROLS SECURITY CONTROL FUNCTIONS HOW TO ESTABLISH ORGANIZATIONAL GOVERNANCE SECURITY STRATEGY & GOVERNANCE SCENARIO INFORMATION SECURITY RELATIONSHIPS BUSINESS, COMPLIANCE, AND SECURITY MANAGEMENT ROLES AND RESPONSIBILITIES SECURITY ROLES AND RESPONSIBILITIES SECURITY MANAGEMENT PROGRAM STRUCTURE HOW TO DECIPHER THE RISK MANAGEMENT PROGRAM BOOK 2: COMPLIANCE, SECURITY, RISK HOW TO BE COMPLIANT AND SECURE INTRODUCTION TO RISK MANAGEMENT FRAMEWORK INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS CSF CONSTRUCTION AND CSF TIERS AND PROFILES ESSENTIAL RMF CONCEPTS RISK TIERS AND SYSTEMS AND AUTHORIZATION ROLES AND RESPONSIBILITIES BOOK 3: HOW TO IMPLEMENT WPA DICTIONARY ATTACK + COUNTERMEASURES HOW TO DEPLOY PASSIVE RECONNAISSANCE + COUNTERMEASURES HOW TO DEPLOY MITM ATTACK USING ETTERCAP, MITM ATTACK USING ROGUE ACCESS POINT, DEAUTHENTICATION ATTACK AGAINST ROGUE AP,  DENIAL OF SERVICE ATTACK USING MKD3, EVIL TWIN DE-AUTH USING MDK3 ENCRYPTION TERMINOLOGY FUNDAMENTALS WIRELESS ENCRYPTION ALTERNATIVES AND TKIP FUNDAMENTALS CCMP & AES FUNDAMENTALS AND MORE... BUY THIS BOOK NOW AND GET STARTED TODAY!

Learn More
Membership Details
  • Only $12.99/month gets you 1 Credit/month
  • Cancel anytime
  • Hate a book? Then we do too, and we'll exchange it.
See how it works in 15 seconds

Summary

Summary

★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★

IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!

★ 3 AUDIOBOOKS IN 1 DEAL ★

  • BOOK 1 - HOW TO ESTABLISH EFFECTIVE SECURITY MANAGEMENT FUNCTIONS
  • BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK
  • BOOK 3 - ETHICAL HACKING AND WIRELESS PENETRATION TESTING WITH KALI LINUX

BUY THIS BOOK NOW AND GET STARTED TODAY!

BOOK 1:

  • HOW TO APPLY SECURITY CONTROLS
  • SECURITY CONTROL FUNCTIONS
  • HOW TO ESTABLISH ORGANIZATIONAL GOVERNANCE
  • SECURITY STRATEGY & GOVERNANCE SCENARIO
  • INFORMATION SECURITY RELATIONSHIPS
  • BUSINESS, COMPLIANCE, AND SECURITY
  • MANAGEMENT ROLES AND RESPONSIBILITIES
  • SECURITY ROLES AND RESPONSIBILITIES
  • SECURITY MANAGEMENT PROGRAM STRUCTURE
  • HOW TO DECIPHER THE RISK MANAGEMENT PROGRAM

BOOK 2:

  • COMPLIANCE, SECURITY, RISK
  • HOW TO BE COMPLIANT AND SECURE
  • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK
  • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS
  • CSF CONSTRUCTION AND CSF TIERS AND PROFILES
  • ESSENTIAL RMF CONCEPTS
  • RISK TIERS AND SYSTEMS AND AUTHORIZATION
  • ROLES AND RESPONSIBILITIES

BOOK 3:

  • HOW TO IMPLEMENT WPA DICTIONARY ATTACK + COUNTERMEASURES
  • HOW TO DEPLOY PASSIVE RECONNAISSANCE + COUNTERMEASURES
  • HOW TO DEPLOY MITM ATTACK USING ETTERCAP, MITM ATTACK USING ROGUE ACCESS POINT, DEAUTHENTICATION ATTACK AGAINST ROGUE AP,  DENIAL OF SERVICE ATTACK USING MKD3, EVIL TWIN DE-AUTH USING MDK3
  • ENCRYPTION TERMINOLOGY FUNDAMENTALS
  • WIRELESS ENCRYPTION ALTERNATIVES AND TKIP FUNDAMENTALS
  • CCMP & AES FUNDAMENTALS AND MORE...

BUY THIS BOOK NOW AND GET STARTED TODAY!

Reviews

Reviews

Author

Author Bio: John Knowles

Author Bio: John Knowles

Titles by Author

See All

Details

Details

Available Formats : Digital Download
Category: Nonfiction/Technology & Engineering
Runtime: 14.36
Audience: Adult
Language: English