Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis
Økonomi & Business
★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★
★ 3 AUDIOBOOKS IN 1★
BOOK 1:
• COMPLIANCE, SECURITY, RISK • HOW TO BE COMPLIANT AND SECURE • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS • INTRODUCTION TO THE RMF PUBLICATIONS • ESSENTIAL RMF CONCEPTS • RISK TIERS AND SYSTEMS AND AUTHORIZATION • ROLES AND RESPONSIBILITIES • HOW TO PREPARE FOR RMF
BOOK 2:
• HOW TO REASSESS RISK • HOW TO IMPLEMENT RISK RESPONSE • RISK RESPONSE OPTION BASICS • HOW TO RESPOND TO RISK • INTRODUCTION TO CONTROL TYPES • CONTROL FUNCTION BASICS • UNDERSTANDING SECURITY CONTROLS • RISK FACTORS AND RISK METRICS • HOW TO DEVELOP AND USE KPIS • HOW TO MONITOR RISK FACTORS • UNDERSTANDING RISK INDICATORS • REPORTING COMPLIANCE BASICS
BOOK 3:
• HOW TO USE METASPLOITABLE • HOW TO SPIDER WITH SQL INJECTION • HOW TO SETUP A BURP SUITE PROXY • HOW TO DEPLOY SYN SCAN ATTACK • HOW TO CAPTURE TRAFFIC USING PORT MIRRORING • HOW TO DEPLOY A MITM ATTACK USING ETTERCAP • HOW TO IMPLEMENT MITM ATTACK USING SSL STRIP • HOW TO DEPLOY HAIL MARY USING ARMITAGE • HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE…
© 2021 John Knowles (Lydbog): 9781667080574
Release date
Lydbog: 28. november 2021
Tags
Økonomi & Business
★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★
★ 3 AUDIOBOOKS IN 1★
BOOK 1:
• COMPLIANCE, SECURITY, RISK • HOW TO BE COMPLIANT AND SECURE • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS • INTRODUCTION TO THE RMF PUBLICATIONS • ESSENTIAL RMF CONCEPTS • RISK TIERS AND SYSTEMS AND AUTHORIZATION • ROLES AND RESPONSIBILITIES • HOW TO PREPARE FOR RMF
BOOK 2:
• HOW TO REASSESS RISK • HOW TO IMPLEMENT RISK RESPONSE • RISK RESPONSE OPTION BASICS • HOW TO RESPOND TO RISK • INTRODUCTION TO CONTROL TYPES • CONTROL FUNCTION BASICS • UNDERSTANDING SECURITY CONTROLS • RISK FACTORS AND RISK METRICS • HOW TO DEVELOP AND USE KPIS • HOW TO MONITOR RISK FACTORS • UNDERSTANDING RISK INDICATORS • REPORTING COMPLIANCE BASICS
BOOK 3:
• HOW TO USE METASPLOITABLE • HOW TO SPIDER WITH SQL INJECTION • HOW TO SETUP A BURP SUITE PROXY • HOW TO DEPLOY SYN SCAN ATTACK • HOW TO CAPTURE TRAFFIC USING PORT MIRRORING • HOW TO DEPLOY A MITM ATTACK USING ETTERCAP • HOW TO IMPLEMENT MITM ATTACK USING SSL STRIP • HOW TO DEPLOY HAIL MARY USING ARMITAGE • HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE…
© 2021 John Knowles (Lydbog): 9781667080574
Release date
Lydbog: 28. november 2021
Tags
Dansk
Danmark