menu
{ "item_title" : "Cybersecurity For Beginners", "item_author" : [" "], "item_description" : "2 AUDIOBOOKS IN 1!Book 1 - 25 Most Common Security Threats & How To Avoid ThemBook 2 - 21 Steps For Implementing The NIST Cybersecurity Framework BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!You will learn:AUDIOBOOK 1:Basic Cybersecurity concepts•How to write a security policy•IT staff and end-user education•Physical & Perimeter security•Client Traffic Analytics•Password management•Patch Management Deployment•HTTP, HTTPS, SSL & TLS•Scanning with NMAP•Patch Management with Ivanti•Deploying AV processes•McAfee Policy Orchestrator•Access Control Deployments•Data in Transit Security•IDS & IPS Systems & Proxy Servers•Data Loss Prevention & RAID•Incremental VS Differential Backup•Data Backup SolutionsAUDIOBOOK 2:•Software Bugs and Buffer Overflow•Weak Passwords•Path Traversal•SQL Injection•Cross Site Scripting•Cross-site forgery request•Viruses & Malware•Trojan & Ransomware•Rootkits & Worms•DoS Attacks•Man-in-the-middle attacks•Social Engineering and Phishing Attacks•Cloud Services Attacks•ARP Poisoning•Rogue Access Points•Man in the Middle on Wireless Networks•De-Authentication Attack•Wireless Collision Attack•Wireless Replay Attacks and much more...BUY THIS BOOK NOW AND GET STARTED TODAY!", "item_img_path" : "https://covers2.booksamillion.com/covers/audiobook/25/51/9781664975125_CD2578376_b.jpg", "price_data" : { "retail_price" : "13.99", "our_price" : "13.99", "club_price" : "13.99", "savings_amt" : "0.00", "savings_pct" : "0", "discount_pct" : "10", "club_savings_amt" : "0.00" } }
Cybersecurity For Beginners|HOFFMAN, HUGO

Cybersecurity For Beginners : How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1

Digital Audiobook
Listen in the BAM! Audiobooks App
Purchases appear in the BAM Audiobooks App. Available in iOS or Android Device. Stream or Download Audiobooks for Offline Listening. How it works


Overview

2 AUDIOBOOKS IN 1!

  • Book 1 - 25 Most Common Security Threats & How To Avoid Them
  • Book 2 - 21 Steps For Implementing The NIST Cybersecurity Framework 

BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!

You will learn:

AUDIOBOOK 1:

Basic Cybersecurity concepts

•How to write a security policy

•IT staff and end-user education

•Physical & Perimeter security

•Client Traffic Analytics

•Password management

•Patch Management Deployment

•HTTP, HTTPS, SSL & TLS

•Scanning with NMAP

•Patch Management with Ivanti

•Deploying AV processes

•McAfee Policy Orchestrator

•Access Control Deployments

•Data in Transit Security

•IDS & IPS Systems & Proxy Servers

•Data Loss Prevention & RAID

•Incremental VS Differential Backup

•Data Backup Solutions


AUDIOBOOK 2:

•Software Bugs and Buffer Overflow

•Weak Passwords

•Path Traversal

•SQL Injection

•Cross Site Scripting

•Cross-site forgery request

•Viruses & Malware

•Trojan & Ransomware

•Rootkits & Worms

•DoS Attacks

•Man-in-the-middle attacks

•Social Engineering and Phishing Attacks

•Cloud Services Attacks

•ARP Poisoning

•Rogue Access Points

•Man in the Middle on Wireless Networks

•De-Authentication Attack

•Wireless Collision Attack

•Wireless Replay Attacks and much more...


BUY THIS BOOK NOW AND GET STARTED TODAY!

Details

  • ISBN-13: 9781664975125
  • Publisher: HUGO HOFFMAN
  • Publish Date: Nov 2020
  • Author: HUGO HOFFMAN
  • Narrator: Matyas J.
  • Duration: 03:27:29

BAM Customer Reviews