CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1

¿ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ¿

IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!

¿ 3 AUDIOBOOKS IN 1¿

  • BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK
  • BOOK 2 - HOW TO MANAGE RISK, USING THE NIST CYBERSECURITY FRAMEWORK
  • BOOK 3 - CYBERSECURITY CAREER GUIDE TO BE A CERTIFIED ETHICAL HACKER

BUY THIS BOOK NOW AND GET STARTED TODAY!:

BOOK 1:

  • COMPLIANCE, SECURITY, RISK
  • HOW TO BE COMPLIANT AND SECURE
  • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK
  • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS
  • INTRODUCTION TO THE RMF PUBLICATIONS
  • ESSENTIAL RMF CONCEPTS
  • RISK TIERS AND SYSTEMS AND AUTHORIZATION
  • ROLES AND RESPONSIBILITIES
  • HOW TO PREPARE FOR RMF

BOOK 2:

  • HOW TO REASSESS RISK
  • HOW TO IMPLEMENT RISK RESPONSE
  • RISK RESPONSE OPTION BASICS
  • HOW TO RESPOND TO RISK
  • INTRODUCTION TO CONTROL TYPES
  • CONTROL FUNCTION BASICS
  • UNDERSTANDING SECURITY CONTROLS     
  • RISK FACTORS AND RISK METRICS
  • HOW TO DEVELOP AND USE KPIS
  • HOW TO MONITOR RISK FACTORS
  • UNDERSTANDING RISK INDICATORS
  • REPORTING COMPLIANCE BASICS

BOOK 3:

  • HOW TO USE METASPLOITABLE
  • HOW TO SPIDER WITH SQL INJECTION
  • HOW TO SETUP A BURP SUITE PROXY
  • HOW TO DEPLOY SYN SCAN ATTACK
  • HOW TO CAPTURE TRAFFIC USING PORT MIRRORING
  • HOW TO DEPLOY A MITM ATTACK USING ETTERCAP
  • HOW TO IMPLEMENT MITM ATTACK USING SSLSTRIP
  • HOW TO DEPLOY HAIL MARY USING ARMITAGE
  • HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE...

BUY THIS BOOK NOW AND GET STARTED TODAY!

1140444372
CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1

¿ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ¿

IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!

¿ 3 AUDIOBOOKS IN 1¿

  • BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK
  • BOOK 2 - HOW TO MANAGE RISK, USING THE NIST CYBERSECURITY FRAMEWORK
  • BOOK 3 - CYBERSECURITY CAREER GUIDE TO BE A CERTIFIED ETHICAL HACKER

BUY THIS BOOK NOW AND GET STARTED TODAY!:

BOOK 1:

  • COMPLIANCE, SECURITY, RISK
  • HOW TO BE COMPLIANT AND SECURE
  • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK
  • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS
  • INTRODUCTION TO THE RMF PUBLICATIONS
  • ESSENTIAL RMF CONCEPTS
  • RISK TIERS AND SYSTEMS AND AUTHORIZATION
  • ROLES AND RESPONSIBILITIES
  • HOW TO PREPARE FOR RMF

BOOK 2:

  • HOW TO REASSESS RISK
  • HOW TO IMPLEMENT RISK RESPONSE
  • RISK RESPONSE OPTION BASICS
  • HOW TO RESPOND TO RISK
  • INTRODUCTION TO CONTROL TYPES
  • CONTROL FUNCTION BASICS
  • UNDERSTANDING SECURITY CONTROLS     
  • RISK FACTORS AND RISK METRICS
  • HOW TO DEVELOP AND USE KPIS
  • HOW TO MONITOR RISK FACTORS
  • UNDERSTANDING RISK INDICATORS
  • REPORTING COMPLIANCE BASICS

BOOK 3:

  • HOW TO USE METASPLOITABLE
  • HOW TO SPIDER WITH SQL INJECTION
  • HOW TO SETUP A BURP SUITE PROXY
  • HOW TO DEPLOY SYN SCAN ATTACK
  • HOW TO CAPTURE TRAFFIC USING PORT MIRRORING
  • HOW TO DEPLOY A MITM ATTACK USING ETTERCAP
  • HOW TO IMPLEMENT MITM ATTACK USING SSLSTRIP
  • HOW TO DEPLOY HAIL MARY USING ARMITAGE
  • HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE...

BUY THIS BOOK NOW AND GET STARTED TODAY!

15.23 In Stock
CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1

CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1

by John Knowles

Narrated by Scott Clem, Khai Lannor

Unabridged — 16 hours, 15 minutes

CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1

CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1

by John Knowles

Narrated by Scott Clem, Khai Lannor

Unabridged — 16 hours, 15 minutes

Audiobook (Digital)

$15.23
FREE With a B&N Audiobooks Subscription | Cancel Anytime
$0.00

Free with a B&N Audiobooks Subscription | Cancel Anytime

START FREE TRIAL

Already Subscribed? 

Sign in to Your BN.com Account


Listen on the free Barnes & Noble NOOK app


Related collections and offers

FREE

with a B&N Audiobooks Subscription

Or Pay $15.23

Overview

¿ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ¿

IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!

¿ 3 AUDIOBOOKS IN 1¿

  • BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK
  • BOOK 2 - HOW TO MANAGE RISK, USING THE NIST CYBERSECURITY FRAMEWORK
  • BOOK 3 - CYBERSECURITY CAREER GUIDE TO BE A CERTIFIED ETHICAL HACKER

BUY THIS BOOK NOW AND GET STARTED TODAY!:

BOOK 1:

  • COMPLIANCE, SECURITY, RISK
  • HOW TO BE COMPLIANT AND SECURE
  • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK
  • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS
  • INTRODUCTION TO THE RMF PUBLICATIONS
  • ESSENTIAL RMF CONCEPTS
  • RISK TIERS AND SYSTEMS AND AUTHORIZATION
  • ROLES AND RESPONSIBILITIES
  • HOW TO PREPARE FOR RMF

BOOK 2:

  • HOW TO REASSESS RISK
  • HOW TO IMPLEMENT RISK RESPONSE
  • RISK RESPONSE OPTION BASICS
  • HOW TO RESPOND TO RISK
  • INTRODUCTION TO CONTROL TYPES
  • CONTROL FUNCTION BASICS
  • UNDERSTANDING SECURITY CONTROLS     
  • RISK FACTORS AND RISK METRICS
  • HOW TO DEVELOP AND USE KPIS
  • HOW TO MONITOR RISK FACTORS
  • UNDERSTANDING RISK INDICATORS
  • REPORTING COMPLIANCE BASICS

BOOK 3:

  • HOW TO USE METASPLOITABLE
  • HOW TO SPIDER WITH SQL INJECTION
  • HOW TO SETUP A BURP SUITE PROXY
  • HOW TO DEPLOY SYN SCAN ATTACK
  • HOW TO CAPTURE TRAFFIC USING PORT MIRRORING
  • HOW TO DEPLOY A MITM ATTACK USING ETTERCAP
  • HOW TO IMPLEMENT MITM ATTACK USING SSLSTRIP
  • HOW TO DEPLOY HAIL MARY USING ARMITAGE
  • HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE...

BUY THIS BOOK NOW AND GET STARTED TODAY!


Product Details

BN ID: 2940176252538
Publisher: John Knowles
Publication date: 10/24/2021
Edition description: Unabridged
From the B&N Reads Blog

Customer Reviews