Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036
Cover for CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

2 Bedømmelse

2.5

Varighed
14T 21M
Sprog
Engelsk
Format
Kategori

Fakta

★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★

★ 3 AUDIOBOOKS IN 1 DEAL ★

BOOK 1 - HOW TO ESTABLISH EFFECTIVE SECURITY MANAGEMENT FUNCTIONS BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK BOOK 3 - ETHICAL HACKING AND WIRELESS PENETRATION TESTING WITH KALI LINUX

BOOK 1:

• HOW TO APPLY SECURITY CONTROLS • SECURITY CONTROL FUNCTIONS • HOW TO ESTABLISH ORGANIZATIONAL GOVERNANCE • SECURITY STRATEGY & GOVERNANCE SCENARIO • INFORMATION SECURITY RELATIONSHIPS • BUSINESS, COMPLIANCE, AND SECURITY • MANAGEMENT ROLES AND RESPONSIBILITIES • SECURITY ROLES AND RESPONSIBILITIES • SECURITY MANAGEMENT PROGRAM STRUCTURE • HOW TO DECIPHER THE RISK MANAGEMENT PROGRAM

BOOK 2:

• COMPLIANCE, SECURITY, RISK • HOW TO BE COMPLIANT AND SECURE • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS • CSF CONSTRUCTION AND CSF TIERS AND PROFILES • ESSENTIAL RMF CONCEPTS • RISK TIERS AND SYSTEMS AND AUTHORIZATION • ROLES AND RESPONSIBILITIES

BOOK 3:

• HOW TO IMPLEMENT WPA DICTIONARY ATTACK + COUNTERMEASURES • HOW TO DEPLOY PASSIVE RECONNAISSANCE + COUNTERMEASURES • HOW TO DEPLOY MITM ATTACK USING ETTERCAP, MITM ATTACK USING ROGUE ACCESS POINT, DEAUTHENTICATION ATTACK AGAINST ROGUE AP, DENIAL OF SERVICE ATTACK USING MKD3, EVIL TWIN DE-AUTH USING MDK3 • ENCRYPTION TERMINOLOGY FUNDAMENTALS • WIRELESS ENCRYPTION ALTERNATIVES AND TKIP FUNDAMENTALS • CCMP & AES FUNDAMENTALS AND MORE...

© 2021 John Knowles (Lydbog): 9781667094588

Udgivelsesdato

Lydbog: 28. november 2021

Andre kan også lide...

  1. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  2. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
    Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  3. Certified Information Security Manager CISM Study Guide
    Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  4. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  5. Hacking: How to Hack
    Hacking: How to Hack Alex Wagner
  6. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  7. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
    CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  8. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
    CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
  9. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  10. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  11. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  12. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
    Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
  13. Mastering Research Papers: A Guide for PhD Students
    Mastering Research Papers: A Guide for PhD Students Arvind Chopra
  14. Cloud Security For Dummies
    Cloud Security For Dummies Ted Coombs
  15. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
    Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  16. Auto Repair For Dummies: 2nd Edition
    Auto Repair For Dummies: 2nd Edition Deanna Sclar
  17. Causal Inference
    Causal Inference Paul R. Rosenbaum
  18. Web3: Charting the Internet's Next Economic and Cultural Frontier
    Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
  19. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
    Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  20. Software Development Fundamentals
    Software Development Fundamentals Introbooks Team
  21. Completing Capitalism: Heal Business to Heal the World
    Completing Capitalism: Heal Business to Heal the World Bruno Roche
  22. Deep Learning: Guide to Machine Learning and Artificial Intelligence
    Deep Learning: Guide to Machine Learning and Artificial Intelligence David Feldspar
  23. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  24. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
    RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
  25. Distrust: Big Data, Data-Torturing, and the Assault on Science
    Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
  26. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
    Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
  27. Bridgebuilders: How Government Can Transcend Boundaries to Solve Big Problems
    Bridgebuilders: How Government Can Transcend Boundaries to Solve Big Problems Donald F. Kettl
  28. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  29. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
    The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
  30. Haptics
    Haptics Lynette Jones
  31. Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments
    Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments Erik van Mechelen
  32. Isaac Newton: A Biography of an Inventor, Astronomer, Physicist, and Philosopher
    Isaac Newton: A Biography of an Inventor, Astronomer, Physicist, and Philosopher Mitch Stokes
  33. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  34. Medical Terminology For Dummies: 3rd Edition
    Medical Terminology For Dummies: 3rd Edition Jennifer L. Dorsey, PhD
  35. CISSP All-in-One Exam Guide, Ninth Edition
    CISSP All-in-One Exam Guide, Ninth Edition Fernando Maymi
  36. The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World
    The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World Shaun Rein
  37. Fake Photos
    Fake Photos Hany Farid
  38. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  39. 3D Printing
    3D Printing John M. Jordan
  40. YouTube’s Algorithm Explained
    YouTube’s Algorithm Explained IntroBooks Team
  41. The Great Persuasion: Reinventing Free Markets Since the Depression
    The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
  42. Biggest Cyber Crimes in the History
    Biggest Cyber Crimes in the History Introbooks Team
  43. Sports Betting For Dummies
    Sports Betting For Dummies Swain Scheps
  44. Breached!: Why Data Security Law Fails and How to Improve It
    Breached!: Why Data Security Law Fails and How to Improve It Daniel J. Solove
  45. The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age
    The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age Nicholas Sullivan
  46. Artificial Intelligence: Data Analytics and Robot Learning in Practice and Theory
    Artificial Intelligence: Data Analytics and Robot Learning in Practice and Theory John Cobar
  47. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
    Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  48. Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval
    Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval Jon Hilsenrath
  49. GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights
    GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Ferris Eanfar
  50. Edge of Armageddon: The Imminent Nuclear Consequence
    Edge of Armageddon: The Imminent Nuclear Consequence Robert Enochs
  51. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
    The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
  52. The International Space Station: The History and Legacy of the Multinational Space Research Lab
    The International Space Station: The History and Legacy of the Multinational Space Research Lab Charles River Editors
  53. Running A Bar for Dummies
    Running A Bar for Dummies Heather Dismore
  54. Cybersecurity For Dummies
    Cybersecurity For Dummies Joseph Steinberg
  55. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  56. Microsoft Teams For Dummies
    Microsoft Teams For Dummies Rosemarie Withee
  57. Machine Learning
    Machine Learning Introbooks Team
  58. Esports For Dummies
    Esports For Dummies Phill Alexander

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned
  • 1 konto

  • 100 timer/måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

159 kr. /måned
  • 1 konto

  • Ubegrænset adgang

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned
  • 2-6 konti

  • 100 timer/måned pr. konto

  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

2 konti

179 kr. /måned
Start tilbuddet

Flex

For dig som vil prøve Mofibo.

89 kr. /måned
  • 1 konto

  • 20 timer/måned

  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis