CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
By John Knowles
Read by Scott Clem and Khai Lannor
-
1 Format: Digital Download
-
$15.23or 1 Credit
ISBN: 9781667080574
★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★ IF YOUR ANSWER IS YES, BUY THIS BOOK NOW! ★ 3 AUDIOBOOKS IN 1★ BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK BOOK 2 - HOW TO MANAGE RISK, USING THE NIST CYBERSECURITY FRAMEWORK BOOK 3 - CYBERSECURITY CAREER GUIDE TO BE A CERTIFIED ETHICAL HACKER BUY THIS BOOK NOW AND GET STARTED TODAY!: BOOK 1: COMPLIANCE, SECURITY, RISK HOW TO BE COMPLIANT AND SECURE INTRODUCTION TO RISK MANAGEMENT FRAMEWORK INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS INTRODUCTION TO THE RMF PUBLICATIONS ESSENTIAL RMF CONCEPTS RISK TIERS AND SYSTEMS AND AUTHORIZATION ROLES AND RESPONSIBILITIES HOW TO PREPARE FOR RMF BOOK 2: HOW TO REASSESS RISK HOW TO IMPLEMENT RISK RESPONSE RISK RESPONSE OPTION BASICS HOW TO RESPOND TO RISK INTRODUCTION TO CONTROL TYPES CONTROL FUNCTION BASICS UNDERSTANDING SECURITY CONTROLS RISK FACTORS AND RISK METRICS HOW TO DEVELOP AND USE KPIS HOW TO MONITOR RISK FACTORS UNDERSTANDING RISK INDICATORS REPORTING COMPLIANCE BASICS BOOK 3: HOW TO USE METASPLOITABLE HOW TO SPIDER WITH SQL INJECTION HOW TO SETUP A BURP SUITE PROXY HOW TO DEPLOY SYN SCAN ATTACK HOW TO CAPTURE TRAFFIC USING PORT MIRRORING HOW TO DEPLOY A MITM ATTACK USING ETTERCAP HOW TO IMPLEMENT MITM ATTACK USING SSLSTRIP HOW TO DEPLOY HAIL MARY USING ARMITAGE HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE… BUY THIS BOOK NOW AND GET STARTED TODAY!
Learn More- Only $12.99/month gets you 1 Credit/month
- Cancel anytime
- Hate a book? Then we do too, and we'll exchange it.
Summary
Summary
★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★
IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!
★ 3 AUDIOBOOKS IN 1★
- BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK
- BOOK 2 - HOW TO MANAGE RISK, USING THE NIST CYBERSECURITY FRAMEWORK
- BOOK 3 - CYBERSECURITY CAREER GUIDE TO BE A CERTIFIED ETHICAL HACKER
BUY THIS BOOK NOW AND GET STARTED TODAY!:
BOOK 1:
- COMPLIANCE, SECURITY, RISK
- HOW TO BE COMPLIANT AND SECURE
- INTRODUCTION TO RISK MANAGEMENT FRAMEWORK
- INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS
- INTRODUCTION TO THE RMF PUBLICATIONS
- ESSENTIAL RMF CONCEPTS
- RISK TIERS AND SYSTEMS AND AUTHORIZATION
- ROLES AND RESPONSIBILITIES
- HOW TO PREPARE FOR RMF
BOOK 2:
- HOW TO REASSESS RISK
- HOW TO IMPLEMENT RISK RESPONSE
- RISK RESPONSE OPTION BASICS
- HOW TO RESPOND TO RISK
- INTRODUCTION TO CONTROL TYPES
- CONTROL FUNCTION BASICS
- UNDERSTANDING SECURITY CONTROLS
- RISK FACTORS AND RISK METRICS
- HOW TO DEVELOP AND USE KPIS
- HOW TO MONITOR RISK FACTORS
- UNDERSTANDING RISK INDICATORS
- REPORTING COMPLIANCE BASICS
BOOK 3:
- HOW TO USE METASPLOITABLE
- HOW TO SPIDER WITH SQL INJECTION
- HOW TO SETUP A BURP SUITE PROXY
- HOW TO DEPLOY SYN SCAN ATTACK
- HOW TO CAPTURE TRAFFIC USING PORT MIRRORING
- HOW TO DEPLOY A MITM ATTACK USING ETTERCAP
- HOW TO IMPLEMENT MITM ATTACK USING SSLSTRIP
- HOW TO DEPLOY HAIL MARY USING ARMITAGE
- HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE…
BUY THIS BOOK NOW AND GET STARTED TODAY!
Details
Details
Available Formats : | Digital Download |
Category: | Nonfiction/Technology & Engineering |
Runtime: | 16.25 |
Audience: | Adult |
Language: | English |
To listen to this title you will need our latest app
Due to publishing rights this title requires DRM and can only be listened to in the Urban Audio Books app