Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
By HUGO HOFFMAN
Read by Matyas J. and Scott Clem
-
1 Format: Digital Download
-
Regular Price: $13.99
Special Price $11.19
or 1 CreditISBN: 9781664975125
2 AUDIOBOOKS IN 1! Book 1 - 25 Most Common Security Threats & How To Avoid Them Book 2 - 21 Steps For Implementing The NIST Cybersecurity Framework BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY! You will learn: AUDIOBOOK 1: Basic Cybersecurity concepts •How to write a security policy •IT staff and end-user education •Physical & Perimeter security •Client Traffic Analytics •Password management •Patch Management Deployment •HTTP, HTTPS, SSL & TLS •Scanning with NMAP •Patch Management with Ivanti •Deploying AV processes •McAfee Policy Orchestrator •Access Control Deployments •Data in Transit Security •IDS & IPS Systems & Proxy Servers •Data Loss Prevention & RAID •Incremental VS Differential Backup •Data Backup Solutions AUDIOBOOK 2: •Software Bugs and Buffer Overflow •Weak Passwords •Path Traversal •SQL Injection •Cross Site Scripting •Cross-site forgery request •Viruses & Malware •Trojan & Ransomware •Rootkits & Worms •DoS Attacks •Man-in-the-middle attacks •Social Engineering and Phishing Attacks •Cloud Services Attacks •ARP Poisoning •Rogue Access Points •Man in the Middle on Wireless Networks •De-Authentication Attack •Wireless Collision Attack •Wireless Replay Attacks and much more... BUY THIS BOOK NOW AND GET STARTED TODAY!
Learn More- Only $12.99/month gets you 1 Credit/month
- Cancel anytime
- Hate a book? Then we do too, and we'll exchange it.
Summary
Summary
2 AUDIOBOOKS IN 1!
- Book 1 - 25 Most Common Security Threats & How To Avoid Them
- Book 2 - 21 Steps For Implementing The NIST Cybersecurity Framework
BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!
You will learn:
AUDIOBOOK 1:
Basic Cybersecurity concepts
•How to write a security policy
•IT staff and end-user education
•Physical & Perimeter security
•Client Traffic Analytics
•Password management
•Patch Management Deployment
•HTTP, HTTPS, SSL & TLS
•Scanning with NMAP
•Patch Management with Ivanti
•Deploying AV processes
•McAfee Policy Orchestrator
•Access Control Deployments
•Data in Transit Security
•IDS & IPS Systems & Proxy Servers
•Data Loss Prevention & RAID
•Incremental VS Differential Backup
•Data Backup Solutions
AUDIOBOOK 2:
•Software Bugs and Buffer Overflow
•Weak Passwords
•Path Traversal
•SQL Injection
•Cross Site Scripting
•Cross-site forgery request
•Viruses & Malware
•Trojan & Ransomware
•Rootkits & Worms
•DoS Attacks
•Man-in-the-middle attacks
•Social Engineering and Phishing Attacks
•Cloud Services Attacks
•ARP Poisoning
•Rogue Access Points
•Man in the Middle on Wireless Networks
•De-Authentication Attack
•Wireless Collision Attack
•Wireless Replay Attacks and much more...
BUY THIS BOOK NOW AND GET STARTED TODAY!
Details
Details
Available Formats : | Digital Download |
Category: | Nonfiction |
Runtime: | 3.46 |
Audience: | Adult |
Language: | English |
To listen to this title you will need our latest app
Due to publishing rights this title requires DRM and can only be listened to in the Downpour app