Cybersecurity For Beginners: Incident Management And Cybersecurity Awareness 2 Books In 1

2 AUDIOBOOKS IN 1!

  • Book 1 - Incident Management Best Practices
  • Book 2 - Cybersecurity Awareness for Employees

BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!

You will learn:

AUDIOBOOK 1:

¿How to create an Incident Response Team

¿IR Team Roles and Responsibilities

¿What Skillset the Response Team must have

¿How to train the IR Team

¿Must have IR Team Tools and Equipment

¿How to create an Incident Response Team

¿How to communicate with IR Stakeholders

¿How to Escalate an incident

¿How to Collect Data

¿How to Schedule an IR Test

¿How to Execute an IR Test

¿How to Conclude the Root Cause

¿How to upgrade our Controls

¿How to Evaluate the Response

¿What is FISMA, NIST, HIPAA, PCI-DSS


AUDIOBOOK 2:

*Viruses, Cryptomalware and Ransomware, Trojans, Rootkits, Keyloggers, Adware, Spyware

*Botnets, Logic Bomb, Backdoors, Social Engineering, Social Engineering Attacks

*Vishing, Tailgaiting, Impersonation, Dumpster Diving, Shoulder Surfing, Hoaxes

*Watering Hole Attack, DDoS Attack, Replay Attacks, Man in the Middle Attack

*Buffer Overflow Attack, SQL Injection Attack, LDAP Injection Attack

*XML Injection Attack, Cross-Site Scripting, Cross-Site Request Forgery

*Privilege Escalation, ARP Poisoning, Smurf Attack, DNS Poisoning

*Typo Squatting and URL Hijacking, Shimming, Refactoring, IP/MAC Spoofing

*Wireless Replay Attacks, IV Attack, Rogue Access Points, Evil Twin, WPS Attacks

*Bluejacking and Bluesnarfing, NFC Attacks, Dissociation Attack,Brute Force Attack

*Dictionary Attacks, Birthday Attack, Rainbow Tables, Collision and Downgrade Attack

*Pen Testing vs. Vulnerability Scanning, Red vs. Blue Teams and more...

BUY THIS BOOK NOW AND GET STARTED TODAY!

1140082937
Cybersecurity For Beginners: Incident Management And Cybersecurity Awareness 2 Books In 1

2 AUDIOBOOKS IN 1!

  • Book 1 - Incident Management Best Practices
  • Book 2 - Cybersecurity Awareness for Employees

BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!

You will learn:

AUDIOBOOK 1:

¿How to create an Incident Response Team

¿IR Team Roles and Responsibilities

¿What Skillset the Response Team must have

¿How to train the IR Team

¿Must have IR Team Tools and Equipment

¿How to create an Incident Response Team

¿How to communicate with IR Stakeholders

¿How to Escalate an incident

¿How to Collect Data

¿How to Schedule an IR Test

¿How to Execute an IR Test

¿How to Conclude the Root Cause

¿How to upgrade our Controls

¿How to Evaluate the Response

¿What is FISMA, NIST, HIPAA, PCI-DSS


AUDIOBOOK 2:

*Viruses, Cryptomalware and Ransomware, Trojans, Rootkits, Keyloggers, Adware, Spyware

*Botnets, Logic Bomb, Backdoors, Social Engineering, Social Engineering Attacks

*Vishing, Tailgaiting, Impersonation, Dumpster Diving, Shoulder Surfing, Hoaxes

*Watering Hole Attack, DDoS Attack, Replay Attacks, Man in the Middle Attack

*Buffer Overflow Attack, SQL Injection Attack, LDAP Injection Attack

*XML Injection Attack, Cross-Site Scripting, Cross-Site Request Forgery

*Privilege Escalation, ARP Poisoning, Smurf Attack, DNS Poisoning

*Typo Squatting and URL Hijacking, Shimming, Refactoring, IP/MAC Spoofing

*Wireless Replay Attacks, IV Attack, Rogue Access Points, Evil Twin, WPS Attacks

*Bluejacking and Bluesnarfing, NFC Attacks, Dissociation Attack,Brute Force Attack

*Dictionary Attacks, Birthday Attack, Rainbow Tables, Collision and Downgrade Attack

*Pen Testing vs. Vulnerability Scanning, Red vs. Blue Teams and more...

BUY THIS BOOK NOW AND GET STARTED TODAY!

25.0 In Stock
Cybersecurity For Beginners: Incident Management And Cybersecurity Awareness 2 Books In 1

Cybersecurity For Beginners: Incident Management And Cybersecurity Awareness 2 Books In 1

by Mike Miller

Narrated by Scott Clem

Unabridged — 10 hours, 17 minutes

Cybersecurity For Beginners: Incident Management And Cybersecurity Awareness 2 Books In 1

Cybersecurity For Beginners: Incident Management And Cybersecurity Awareness 2 Books In 1

by Mike Miller

Narrated by Scott Clem

Unabridged — 10 hours, 17 minutes

Audiobook (Digital)

$20.50
FREE With a B&N Audiobooks Subscription | Cancel Anytime
$0.00

Free with a B&N Audiobooks Subscription | Cancel Anytime

$25.00 Save 18% Current price is $20.5, Original price is $25. You Save 18%.
START FREE TRIAL

Already Subscribed? 

Sign in to Your BN.com Account


Listen on the free Barnes & Noble NOOK app


Related collections and offers

FREE

with a B&N Audiobooks Subscription

Or Pay $20.50 $25.00

Overview

2 AUDIOBOOKS IN 1!

  • Book 1 - Incident Management Best Practices
  • Book 2 - Cybersecurity Awareness for Employees

BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!

You will learn:

AUDIOBOOK 1:

¿How to create an Incident Response Team

¿IR Team Roles and Responsibilities

¿What Skillset the Response Team must have

¿How to train the IR Team

¿Must have IR Team Tools and Equipment

¿How to create an Incident Response Team

¿How to communicate with IR Stakeholders

¿How to Escalate an incident

¿How to Collect Data

¿How to Schedule an IR Test

¿How to Execute an IR Test

¿How to Conclude the Root Cause

¿How to upgrade our Controls

¿How to Evaluate the Response

¿What is FISMA, NIST, HIPAA, PCI-DSS


AUDIOBOOK 2:

*Viruses, Cryptomalware and Ransomware, Trojans, Rootkits, Keyloggers, Adware, Spyware

*Botnets, Logic Bomb, Backdoors, Social Engineering, Social Engineering Attacks

*Vishing, Tailgaiting, Impersonation, Dumpster Diving, Shoulder Surfing, Hoaxes

*Watering Hole Attack, DDoS Attack, Replay Attacks, Man in the Middle Attack

*Buffer Overflow Attack, SQL Injection Attack, LDAP Injection Attack

*XML Injection Attack, Cross-Site Scripting, Cross-Site Request Forgery

*Privilege Escalation, ARP Poisoning, Smurf Attack, DNS Poisoning

*Typo Squatting and URL Hijacking, Shimming, Refactoring, IP/MAC Spoofing

*Wireless Replay Attacks, IV Attack, Rogue Access Points, Evil Twin, WPS Attacks

*Bluejacking and Bluesnarfing, NFC Attacks, Dissociation Attack,Brute Force Attack

*Dictionary Attacks, Birthday Attack, Rainbow Tables, Collision and Downgrade Attack

*Pen Testing vs. Vulnerability Scanning, Red vs. Blue Teams and more...

BUY THIS BOOK NOW AND GET STARTED TODAY!


Product Details

BN ID: 2940178804810
Publisher: Mike Miller
Publication date: 11/24/2020
Edition description: Unabridged
From the B&N Reads Blog

Customer Reviews