CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

¿ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ¿

IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!

¿ 3 AUDIOBOOKS IN 1 DEAL ¿

  • BOOK 1 - HOW TO ESTABLISH EFFECTIVE SECURITY MANAGEMENT FUNCTIONS
  • BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK
  • BOOK 3 - ETHICAL HACKING AND WIRELESS PENETRATION TESTING WITH KALI LINUX

BUY THIS BOOK NOW AND GET STARTED TODAY!

BOOK 1:

  • HOW TO APPLY SECURITY CONTROLS
  • SECURITY CONTROL FUNCTIONS
  • HOW TO ESTABLISH ORGANIZATIONAL GOVERNANCE
  • SECURITY STRATEGY & GOVERNANCE SCENARIO
  • INFORMATION SECURITY RELATIONSHIPS
  • BUSINESS, COMPLIANCE, AND SECURITY
  • MANAGEMENT ROLES AND RESPONSIBILITIES
  • SECURITY ROLES AND RESPONSIBILITIES
  • SECURITY MANAGEMENT PROGRAM STRUCTURE
  • HOW TO DECIPHER THE RISK MANAGEMENT PROGRAM

BOOK 2:

  • COMPLIANCE, SECURITY, RISK
  • HOW TO BE COMPLIANT AND SECURE
  • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK
  • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS
  • CSF CONSTRUCTION AND CSF TIERS AND PROFILES
  • ESSENTIAL RMF CONCEPTS
  • RISK TIERS AND SYSTEMS AND AUTHORIZATION
  • ROLES AND RESPONSIBILITIES

BOOK 3:

  • HOW TO IMPLEMENT WPA DICTIONARY ATTACK + COUNTERMEASURES
  • HOW TO DEPLOY PASSIVE RECONNAISSANCE + COUNTERMEASURES
  • HOW TO DEPLOY MITM ATTACK USING ETTERCAP, MITM ATTACK USING ROGUE ACCESS POINT, DEAUTHENTICATION ATTACK AGAINST ROGUE AP,  DENIAL OF SERVICE ATTACK USING MKD3, EVIL TWIN DE-AUTH USING MDK3
  • ENCRYPTION TERMINOLOGY FUNDAMENTALS
  • WIRELESS ENCRYPTION ALTERNATIVES AND TKIP FUNDAMENTALS
  • CCMP & AES FUNDAMENTALS AND MORE...

BUY THIS BOOK NOW AND GET STARTED TODAY!

1140444370
CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

¿ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ¿

IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!

¿ 3 AUDIOBOOKS IN 1 DEAL ¿

  • BOOK 1 - HOW TO ESTABLISH EFFECTIVE SECURITY MANAGEMENT FUNCTIONS
  • BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK
  • BOOK 3 - ETHICAL HACKING AND WIRELESS PENETRATION TESTING WITH KALI LINUX

BUY THIS BOOK NOW AND GET STARTED TODAY!

BOOK 1:

  • HOW TO APPLY SECURITY CONTROLS
  • SECURITY CONTROL FUNCTIONS
  • HOW TO ESTABLISH ORGANIZATIONAL GOVERNANCE
  • SECURITY STRATEGY & GOVERNANCE SCENARIO
  • INFORMATION SECURITY RELATIONSHIPS
  • BUSINESS, COMPLIANCE, AND SECURITY
  • MANAGEMENT ROLES AND RESPONSIBILITIES
  • SECURITY ROLES AND RESPONSIBILITIES
  • SECURITY MANAGEMENT PROGRAM STRUCTURE
  • HOW TO DECIPHER THE RISK MANAGEMENT PROGRAM

BOOK 2:

  • COMPLIANCE, SECURITY, RISK
  • HOW TO BE COMPLIANT AND SECURE
  • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK
  • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS
  • CSF CONSTRUCTION AND CSF TIERS AND PROFILES
  • ESSENTIAL RMF CONCEPTS
  • RISK TIERS AND SYSTEMS AND AUTHORIZATION
  • ROLES AND RESPONSIBILITIES

BOOK 3:

  • HOW TO IMPLEMENT WPA DICTIONARY ATTACK + COUNTERMEASURES
  • HOW TO DEPLOY PASSIVE RECONNAISSANCE + COUNTERMEASURES
  • HOW TO DEPLOY MITM ATTACK USING ETTERCAP, MITM ATTACK USING ROGUE ACCESS POINT, DEAUTHENTICATION ATTACK AGAINST ROGUE AP,  DENIAL OF SERVICE ATTACK USING MKD3, EVIL TWIN DE-AUTH USING MDK3
  • ENCRYPTION TERMINOLOGY FUNDAMENTALS
  • WIRELESS ENCRYPTION ALTERNATIVES AND TKIP FUNDAMENTALS
  • CCMP & AES FUNDAMENTALS AND MORE...

BUY THIS BOOK NOW AND GET STARTED TODAY!

14.18 In Stock
CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

by John Knowles

Narrated by Scott Clem, Khai Lannor, Marty Ravenel

Unabridged — 14 hours, 21 minutes

CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1

by John Knowles

Narrated by Scott Clem, Khai Lannor, Marty Ravenel

Unabridged — 14 hours, 21 minutes

Audiobook (Digital)

$14.18
FREE With a B&N Audiobooks Subscription | Cancel Anytime
$0.00

Free with a B&N Audiobooks Subscription | Cancel Anytime

START FREE TRIAL

Already Subscribed? 

Sign in to Your BN.com Account


Listen on the free Barnes & Noble NOOK app


Related collections and offers

FREE

with a B&N Audiobooks Subscription

Or Pay $14.18

Overview

¿ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ¿

IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!

¿ 3 AUDIOBOOKS IN 1 DEAL ¿

  • BOOK 1 - HOW TO ESTABLISH EFFECTIVE SECURITY MANAGEMENT FUNCTIONS
  • BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK
  • BOOK 3 - ETHICAL HACKING AND WIRELESS PENETRATION TESTING WITH KALI LINUX

BUY THIS BOOK NOW AND GET STARTED TODAY!

BOOK 1:

  • HOW TO APPLY SECURITY CONTROLS
  • SECURITY CONTROL FUNCTIONS
  • HOW TO ESTABLISH ORGANIZATIONAL GOVERNANCE
  • SECURITY STRATEGY & GOVERNANCE SCENARIO
  • INFORMATION SECURITY RELATIONSHIPS
  • BUSINESS, COMPLIANCE, AND SECURITY
  • MANAGEMENT ROLES AND RESPONSIBILITIES
  • SECURITY ROLES AND RESPONSIBILITIES
  • SECURITY MANAGEMENT PROGRAM STRUCTURE
  • HOW TO DECIPHER THE RISK MANAGEMENT PROGRAM

BOOK 2:

  • COMPLIANCE, SECURITY, RISK
  • HOW TO BE COMPLIANT AND SECURE
  • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK
  • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS
  • CSF CONSTRUCTION AND CSF TIERS AND PROFILES
  • ESSENTIAL RMF CONCEPTS
  • RISK TIERS AND SYSTEMS AND AUTHORIZATION
  • ROLES AND RESPONSIBILITIES

BOOK 3:

  • HOW TO IMPLEMENT WPA DICTIONARY ATTACK + COUNTERMEASURES
  • HOW TO DEPLOY PASSIVE RECONNAISSANCE + COUNTERMEASURES
  • HOW TO DEPLOY MITM ATTACK USING ETTERCAP, MITM ATTACK USING ROGUE ACCESS POINT, DEAUTHENTICATION ATTACK AGAINST ROGUE AP,  DENIAL OF SERVICE ATTACK USING MKD3, EVIL TWIN DE-AUTH USING MDK3
  • ENCRYPTION TERMINOLOGY FUNDAMENTALS
  • WIRELESS ENCRYPTION ALTERNATIVES AND TKIP FUNDAMENTALS
  • CCMP & AES FUNDAMENTALS AND MORE...

BUY THIS BOOK NOW AND GET STARTED TODAY!


Product Details

BN ID: 2940175414555
Publisher: John Knowles
Publication date: 10/24/2021
Edition description: Unabridged
From the B&N Reads Blog

Customer Reviews