Skip content
Become a member to shop our buy-one-get-one sale! Get started
CISSP And Cybersecurity For Beginners by John Knowles
  Send as gift   Add to Wish List

Almost ready!

In order to save audiobooks to your Wish List you must be signed in to your account.

      Log in       Create account
Buy one get one is metallic balloons

One week only!

Become a member and shop our members-only buy-one-get-one sale in support of local bookstores.

Get started
Phone showing make the switch message

Limited-time offer

Get two free audiobooks!

Now’s a great time to shop indie. When you start a new one credit per month membership supporting local bookstores with promo code SWITCH, we’ll give you two bonus audiobook credits at sign-up.

Sign up today

CISSP And Cybersecurity For Beginners

Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1

$17.51

Get for $14.99 with membership
Length 16 hours 14 minutes
Language English
Narrators Scott Clem & Khai Lannor

This audiobook uses AI narration.

We’re taking steps to make sure AI narration is transparent.

Learn more
  Send as gift   Add to Wish List

Almost ready!

In order to save audiobooks to your Wish List you must be signed in to your account.

      Log in       Create account

Summary

★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★

IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!

★ 3 AUDIOBOOKS IN 1★


  • BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK

  • BOOK 2 - HOW TO MANAGE RISK, USING THE NIST CYBERSECURITY FRAMEWORK

  • BOOK 3 - CYBERSECURITY CAREER GUIDE TO BE A CERTIFIED ETHICAL HACKER

BUY THIS BOOK NOW AND GET STARTED TODAY!:

BOOK 1:


  • COMPLIANCE, SECURITY, RISK

  • HOW TO BE COMPLIANT AND SECURE

  • INTRODUCTION TO RISK MANAGEMENT FRAMEWORK

  • INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS

  • INTRODUCTION TO THE RMF PUBLICATIONS

  • ESSENTIAL RMF CONCEPTS

  • RISK TIERS AND SYSTEMS AND AUTHORIZATION

  • ROLES AND RESPONSIBILITIES

  • HOW TO PREPARE FOR RMF

BOOK 2:


  • HOW TO REASSESS RISK

  • HOW TO IMPLEMENT RISK RESPONSE

  • RISK RESPONSE OPTION BASICS

  • HOW TO RESPOND TO RISK

  • INTRODUCTION TO CONTROL TYPES

  • CONTROL FUNCTION BASICS

  • UNDERSTANDING SECURITY CONTROLS     

  • RISK FACTORS AND RISK METRICS

  • HOW TO DEVELOP AND USE KPIS

  • HOW TO MONITOR RISK FACTORS

  • UNDERSTANDING RISK INDICATORS

  • REPORTING COMPLIANCE BASICS

BOOK 3:


  • HOW TO USE METASPLOITABLE

  • HOW TO SPIDER WITH SQL INJECTION

  • HOW TO SETUP A BURP SUITE PROXY

  • HOW TO DEPLOY SYN SCAN ATTACK

  • HOW TO CAPTURE TRAFFIC USING PORT MIRRORING

  • HOW TO DEPLOY A MITM ATTACK USING ETTERCAP

  • HOW TO IMPLEMENT MITM ATTACK USING SSLSTRIP

  • HOW TO DEPLOY HAIL MARY USING ARMITAGE

  • HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE…

BUY THIS BOOK NOW AND GET STARTED TODAY!

Buy one get one is metallic balloons

One week only!

Become a member and shop our members-only buy-one-get-one sale in support of local bookstores.

Get started
Phone showing make the switch message

Limited-time offer

Get two free audiobooks!

Now’s a great time to shop indie. When you start a new one credit per month membership supporting local bookstores with promo code SWITCH, we’ll give you two bonus audiobook credits at sign-up.

Sign up today
Become a member to shop our buy-one-get-one sale! Get started