Cybersecurity For Beginners by HUGO HOFFMAN audiobook

Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1

By HUGO HOFFMAN
Read by Matyas J.  and Scott Clem

HUGO HOFFMAN
3.46 Hours Unabridged
Format : Digital Download (In Stock)
  • Regular Price: $13.99

    Special Price $11.19

    or 1 Credit

    ISBN: 9781664975125

2 AUDIOBOOKS IN 1! Book 1 - 25 Most Common Security Threats & How To Avoid Them Book 2 - 21 Steps For Implementing The NIST Cybersecurity Framework  BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY! You will learn: AUDIOBOOK 1: Basic Cybersecurity concepts •How to write a security policy •IT staff and end-user education •Physical & Perimeter security •Client Traffic Analytics •Password management •Patch Management Deployment •HTTP, HTTPS, SSL & TLS •Scanning with NMAP •Patch Management with Ivanti •Deploying AV processes •McAfee Policy Orchestrator •Access Control Deployments •Data in Transit Security •IDS & IPS Systems & Proxy Servers •Data Loss Prevention & RAID •Incremental VS Differential Backup •Data Backup Solutions AUDIOBOOK 2: •Software Bugs and Buffer Overflow •Weak Passwords •Path Traversal •SQL Injection •Cross Site Scripting •Cross-site forgery request •Viruses & Malware •Trojan & Ransomware •Rootkits & Worms •DoS Attacks •Man-in-the-middle attacks •Social Engineering and Phishing Attacks •Cloud Services Attacks •ARP Poisoning •Rogue Access Points •Man in the Middle on Wireless Networks •De-Authentication Attack •Wireless Collision Attack •Wireless Replay Attacks and much more... BUY THIS BOOK NOW AND GET STARTED TODAY!

Learn More
Membership Details
  • Only $12.99/month gets you 1 Credit/month
  • Cancel anytime
  • Hate a book? Then we do too, and we'll exchange it.
See how it works in 15 seconds

Summary

Summary

2 AUDIOBOOKS IN 1!

  • Book 1 - 25 Most Common Security Threats & How To Avoid Them
  • Book 2 - 21 Steps For Implementing The NIST Cybersecurity Framework 

BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!

You will learn:

AUDIOBOOK 1:

Basic Cybersecurity concepts

•How to write a security policy

•IT staff and end-user education

•Physical & Perimeter security

•Client Traffic Analytics

•Password management

•Patch Management Deployment

•HTTP, HTTPS, SSL & TLS

•Scanning with NMAP

•Patch Management with Ivanti

•Deploying AV processes

•McAfee Policy Orchestrator

•Access Control Deployments

•Data in Transit Security

•IDS & IPS Systems & Proxy Servers

•Data Loss Prevention & RAID

•Incremental VS Differential Backup

•Data Backup Solutions

AUDIOBOOK 2:

•Software Bugs and Buffer Overflow

•Weak Passwords

•Path Traversal

•SQL Injection

•Cross Site Scripting

•Cross-site forgery request

•Viruses & Malware

•Trojan & Ransomware

•Rootkits & Worms

•DoS Attacks

•Man-in-the-middle attacks

•Social Engineering and Phishing Attacks

•Cloud Services Attacks

•ARP Poisoning

•Rogue Access Points

•Man in the Middle on Wireless Networks

•De-Authentication Attack

•Wireless Collision Attack

•Wireless Replay Attacks and much more...

BUY THIS BOOK NOW AND GET STARTED TODAY!

Reviews

Reviews

Author

Author Bio: HUGO HOFFMAN

Author Bio: HUGO HOFFMAN

Titles by Author

See All

Details

Details

Available Formats : Digital Download
Category: Nonfiction
Runtime: 3.46
Audience: Adult
Language: English