Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
Audiobook16 hours

CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1

Written by John Knowles

Narrated by Scott Clem and Khai Lannor

Rating: 5 out of 5 stars

5/5

()

About this audiobook

★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★

IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!

★ 3 AUDIOBOOKS IN 1★

  • BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK
  • BOOK 2 - HOW TO MANAGE RISK, USING THE NIST CYBERSECURITY FRAMEWORK
  • BOOK 3 - CYBERSECURITY CAREER GUIDE TO BE A CERTIFIED ETHICAL HACKER

BUY THIS BOOK NOW AND GET STARTED TODAY!:

BOOK 1:

  • COMPLIANCE, SECURITY, RISK
  • HOW TO BE COMPLIANT AND SECURE
  • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK
  • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS
  • INTRODUCTION TO THE RMF PUBLICATIONS
  • ESSENTIAL RMF CONCEPTS
  • RISK TIERS AND SYSTEMS AND AUTHORIZATION
  • ROLES AND RESPONSIBILITIES
  • HOW TO PREPARE FOR RMF

BOOK 2:

  • HOW TO REASSESS RISK
  • HOW TO IMPLEMENT RISK RESPONSE
  • RISK RESPONSE OPTION BASICS
  • HOW TO RESPOND TO RISK
  • INTRODUCTION TO CONTROL TYPES
  • CONTROL FUNCTION BASICS
  • UNDERSTANDING SECURITY CONTROLS     
  • RISK FACTORS AND RISK METRICS
  • HOW TO DEVELOP AND USE KPIS
  • HOW TO MONITOR RISK FACTORS
  • UNDERSTANDING RISK INDICATORS
  • REPORTING COMPLIANCE BASICS

BOOK 3:

  • HOW TO USE METASPLOITABLE
  • HOW TO SPIDER WITH SQL INJECTION
  • HOW TO SETUP A BURP SUITE PROXY
  • HOW TO DEPLOY SYN SCAN ATTACK
  • HOW TO CAPTURE TRAFFIC USING PORT MIRRORING
  • HOW TO DEPLOY A MITM ATTACK USING ETTERCAP
  • HOW TO IMPLEMENT MITM ATTACK USING SSLSTRIP
  • HOW TO DEPLOY HAIL MARY USING ARMITAGE
  • HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE…

BUY THIS BOOK NOW AND GET STARTED TODAY!

LanguageEnglish
PublisherJohn Knowles
Release dateOct 24, 2021
ISBN9781667080574
CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1

More audiobooks from John Knowles

Related to CISSP And Cybersecurity For Beginners

Related audiobooks

Security For You

View More

Related articles

Reviews for CISSP And Cybersecurity For Beginners

Rating: 5 out of 5 stars
5/5

1 rating0 reviews

What did you think?

Tap to rate

Review must be at least 10 words