CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
1140444372
¿ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ¿
IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!
¿ 3 AUDIOBOOKS IN 1¿
- BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK
- BOOK 2 - HOW TO MANAGE RISK, USING THE NIST CYBERSECURITY FRAMEWORK
- BOOK 3 - CYBERSECURITY CAREER GUIDE TO BE A CERTIFIED ETHICAL HACKER
BUY THIS BOOK NOW AND GET STARTED TODAY!:
BOOK 1:
- COMPLIANCE, SECURITY, RISK
- HOW TO BE COMPLIANT AND SECURE
- INTRODUCTION TO RISK MANAGEMENT FRAMEWORK
- INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS
- INTRODUCTION TO THE RMF PUBLICATIONS
- ESSENTIAL RMF CONCEPTS
- RISK TIERS AND SYSTEMS AND AUTHORIZATION
- ROLES AND RESPONSIBILITIES
- HOW TO PREPARE FOR RMF
BOOK 2:
- HOW TO REASSESS RISK
- HOW TO IMPLEMENT RISK RESPONSE
- RISK RESPONSE OPTION BASICS
- HOW TO RESPOND TO RISK
- INTRODUCTION TO CONTROL TYPES
- CONTROL FUNCTION BASICS
- UNDERSTANDING SECURITY CONTROLS
- RISK FACTORS AND RISK METRICS
- HOW TO DEVELOP AND USE KPIS
- HOW TO MONITOR RISK FACTORS
- UNDERSTANDING RISK INDICATORS
- REPORTING COMPLIANCE BASICS
BOOK 3:
- HOW TO USE METASPLOITABLE
- HOW TO SPIDER WITH SQL INJECTION
- HOW TO SETUP A BURP SUITE PROXY
- HOW TO DEPLOY SYN SCAN ATTACK
- HOW TO CAPTURE TRAFFIC USING PORT MIRRORING
- HOW TO DEPLOY A MITM ATTACK USING ETTERCAP
- HOW TO IMPLEMENT MITM ATTACK USING SSLSTRIP
- HOW TO DEPLOY HAIL MARY USING ARMITAGE
- HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE...
BUY THIS BOOK NOW AND GET STARTED TODAY!
CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
¿ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ¿
IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!
¿ 3 AUDIOBOOKS IN 1¿
- BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK
- BOOK 2 - HOW TO MANAGE RISK, USING THE NIST CYBERSECURITY FRAMEWORK
- BOOK 3 - CYBERSECURITY CAREER GUIDE TO BE A CERTIFIED ETHICAL HACKER
BUY THIS BOOK NOW AND GET STARTED TODAY!:
BOOK 1:
- COMPLIANCE, SECURITY, RISK
- HOW TO BE COMPLIANT AND SECURE
- INTRODUCTION TO RISK MANAGEMENT FRAMEWORK
- INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS
- INTRODUCTION TO THE RMF PUBLICATIONS
- ESSENTIAL RMF CONCEPTS
- RISK TIERS AND SYSTEMS AND AUTHORIZATION
- ROLES AND RESPONSIBILITIES
- HOW TO PREPARE FOR RMF
BOOK 2:
- HOW TO REASSESS RISK
- HOW TO IMPLEMENT RISK RESPONSE
- RISK RESPONSE OPTION BASICS
- HOW TO RESPOND TO RISK
- INTRODUCTION TO CONTROL TYPES
- CONTROL FUNCTION BASICS
- UNDERSTANDING SECURITY CONTROLS
- RISK FACTORS AND RISK METRICS
- HOW TO DEVELOP AND USE KPIS
- HOW TO MONITOR RISK FACTORS
- UNDERSTANDING RISK INDICATORS
- REPORTING COMPLIANCE BASICS
BOOK 3:
- HOW TO USE METASPLOITABLE
- HOW TO SPIDER WITH SQL INJECTION
- HOW TO SETUP A BURP SUITE PROXY
- HOW TO DEPLOY SYN SCAN ATTACK
- HOW TO CAPTURE TRAFFIC USING PORT MIRRORING
- HOW TO DEPLOY A MITM ATTACK USING ETTERCAP
- HOW TO IMPLEMENT MITM ATTACK USING SSLSTRIP
- HOW TO DEPLOY HAIL MARY USING ARMITAGE
- HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE...
BUY THIS BOOK NOW AND GET STARTED TODAY!
15.23
In Stock
5
1

CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1

CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
FREE
with a B&N Audiobooks Subscription
Or Pay
$15.23
15.23
In Stock
Product Details
BN ID: | 2940176252538 |
---|---|
Publisher: | John Knowles |
Publication date: | 10/24/2021 |
Edition description: | Unabridged |
Videos

From the B&N Reads Blog