Browse audiobooks by Hugo Hoffman, listen to samples and when you're ready head over to Audiobooks.com where you can get 3 FREE audiobooks on us
CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Incident Ma
2 AUDIOBOOKS IN 1 DEAL! - BOOK 1 - INCIDENT MANAGEMENT HANDBOOK: BEGINNERS GUIDE TO INCIDENT MANAGEMENT PROCESSES AND PROCEDURES FOR OPERATIONS - BOOK 2 - SECURITY MANAGEMENT ETHICS HANDBOOK: BEGINNERS GUIDE TO CYBERSECURITY FRAMEWORK AND SECURITY MANAGEMENT FUNCTIONS In book 1 you will discover: - DEFINING INCIDENT RESPONSES - BUSINESS CONTINUITY PLAN - PLANNING FOR DISASTER RECOVERY - HOW TO CREATE AN INCIDENT RESPONSE TEAM - IR TEAM ROLES AND RESPONSIBILITIES - WHAT SKILLSET THE RESPONSE TEAM MUST HAVE - HOW TO COMMUNICATE WITH IR STAKEHOLDERS - HOW TO COMMUNICATE INCIDENT RESPONSES - HOW TO MONITOR INCIDENT RESPONSE PERFORMANCE - HOW TO ESCALATE AN INCIDENT In book 2 you will discover: - SECURITY MANAGEMENT ETHICS - DEFENSE IN DEPTH - SECURITY CONTROL FUNCTIONS FUNDAMENTALS - HOW TO ESTABLISH ORGANIZATIONAL GOVERNANCE - SECURITY STRATEGY & GOVERNANCE SCENARIO BASICS - BUSINESS COMPLIANCE FUNDAMENTALS - MANAGEMENT ROLES AND RESPONSIBILITIES - HOW TO CREATE & STRUCTURE A SECURITY MANAGEMENT PROGRAM - HOW TO DECRYPT THE RISK MANAGEMENT PROGRAM - RISK STRATEGY & RISK MANAGEMENT SCENARIO - HOW TO CONDUCT RISK ASSESSMENTS & HOW TO ASSESS RISK - HOW TO RESPOND & MONITOR RISK - RESILIENCY & BUSINESS IMPACT ANALYSIS - INCIDENT RESPONSE FUNDAMENTALS - DISASTER RECOVERY & BUSINESS CONTINUITY ★ Buy this Audiobook now and get started today! ★
Hugo Hoffman (Author), Khai Lannor (Narrator)
Audiobook
CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybers
2 AUDIOBOOKS IN 1 DEAL! - BOOK 1 - NIST CYBERSECURITY FRAMEWORK: BEGINNERS GUIDE TO MEASURE RISK, SYSTEMS, SECURITY CONTROLS AND MONITORING - BOOK 2 - RISK MANAGEMENT GOVERNANCE STRATEGIES: RISK OWNERSHIP STRATEGIES, RISK ANALYSIS, RISK RESPONSE & RISK MONITORING ★ Buy this Audiobook now and get started today! ★ In book 1 you will discover: - COMPLIANCE, SECURITY & RISK - RISK MANAGEMENT FRAMEWORK FUNDAMENTALS - NIST CYBERSECURITY FRAMEWORK FUNDAMENTALS - RISK TIERS, SYSTEMS AND AUTHORIZATION - ROLES AND RESPONSIBILITIES & PRIVACY - HOW TO PREPARE FOR SYSTEM-LEVEL TASKS - HOW TO SELECT SECURITY CONTROLS - HOW TO ASSESS SECURITY CONTROLS - RMF SPECIFIC TASKS FUNDAMENTALS - HOW TO AUTHORIZE INFORMATION SYSTEMS - HOW TO MONITOR SECURITY CONTROLS - HOW TO MONITOR SYSTEMS - INCIDENT RESPONSE TEAM ROLES, SKILLS, AND TOOLS In book 2 you will discover: - INFORMATION ASSETS FUNDAMENTALS - INFORMATION ASSET & RISK OWNERSHIP - FISMA NIST, HIPAA AND PCI-DSS - RISK MANAGEMENT GOVERNANCE & RISK STRATEGY - LIKELIHOOD, IMPACT & RISK - INTERNAL AND EXTERNAL RISK FACTORS - RISK ASSESSMENTS & RISK SCENARIOS - HOW TO CONDUCT THE NIST ASSESSMENT - HOW TO CALCULATE & REASSESS RISK - HOW TO IMPLEMENT RISK RESPONSE - HOW TO ANALYSE COST & BENEFIT - HOW TO PRIORITIZE & RESPOND TO RISK - CONTROL TYPES & CONTROL FUNCTIONS AND MORE... ★ Buy this Audiobook now and get started today! ★
Hugo Hoffman (Author), Khai Lannor (Narrator)
Audiobook
Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In
2 AUDIOBOOKS IN 1! - Book 1 - Wireless Hacking with Kali Linux - Book 2 - Ethical Hacking With Kali Linux BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY! You will learn: AUDIOBOOK 1: •WPA/WPA2 Dictionary Attack •Countermeasures to Dictionary Attacks •Deploying Passive Reconnaissance with Kali Linux •Countermeasures Against Passive Reconnaissance •How to Decrypt Traffic with Wireshark •How to implement MITM Attack with Ettercap •Countermeasures to Protect Wireless Traffic •How to Secure Ad Hoc Networks •How to Physically Secure your Network •How to deploy Rogue Access Point using MITM Attack •How to use Wi-Spy DGx & Chanalyzer •How to implement Deauthentication Attack against a Rogue AP •How to deploy Evil Twin Deauthentication Attack with mdk3 •How to deploy DoS Attack with MKD3 •Encryption Terminology & Wireless Encryption Options AUDIOBOOK 2: •How to Install Virtual Box & Kali Linux •Pen Testing @ Stage 1, Stage 2 and Stage 3 •How to deploy SQL Injection with SQLmap •How to implement Dictionary Attack with Airodump-ng •How to deploy ARP Poisoning with EtterCAP •How to capture Traffic with Port Mirroring & with Xplico •How to deploy Passive Reconnaissance •How to implement MITM Attack with Ettercap & SSLstrip •How to Manipulate Packets with Scapy •How to deploy Deauthentication Attack •How to capture IPv6 Packets with Parasite6 •How to deploy Evil Twin Deauthentication Attack with mdk3 •How to deploy DoS Attack with MKD3 •How to implement Brute Force Attack with TCP Hydra •How to deploy Armitage Hail Mary •The Metasploit Framework •How to use SET aka Social-Engineering Toolkit and more. BUY THIS BOOK NOW AND GET STARTED TODAY!
Hugo Hoffman (Author), Scott Clem (Narrator)
Audiobook
Hacking Wireless With Kali Linux: Learn Fast How To Penetrate Any Wireless Network | 2 Books In 1
2 AUDIOBOOKS IN 1! - Book 1 - Wireless Technology Fundamentals - Book 2 - Wireless Hacking with Kali Linux BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY! You will learn: AUDIOBOOK 1: •Electromagnetic Spectrum •RF Basics •Antenna Types •2.4 GHz & 5 GHz Band •Legal Requirements for Access Points •Wireless Network Categories •Modulation Basics •Radio Frequency Encoding •Influencing RF Signals •Path Loss aka Attenuation •Signal to Interference Ratio •Link Budget Calculation •Understanding Decibels •Channel Bonding •Beacons •Active & Passive Scanning •Authentication & Association Requests •Medium Access •Frame Types •802.11ax / WiFI 6 and more. AUDIOBOOK 2: •What Wireless Adapters & Wireless Cards are best for Penetration Testing •How to Install Vitrual Box & Kali Linux •Wireless Password Attacks •WPA/WPA2 Dictionary Attack •Countermeasures to Dictionary Attacks •Deploying Passive Reconnaissance with Kali Linux •Countermeasures Against Passive Reconnaissance •How to Decrypt Traffic with Wireshark •How to implement MITM Attack with Ettercap •Countermeasures to Protect Wireless Traffic •How to Secure Ad Hoc Networks •How to Physically Secure your Network •How to deploy Rogue Access Point using MITM Attack •How to use Wi-Spy DGx & Chanalyzer •How to implement Deauthentication Attack against a Rogue AP •How to deploy Evil Twin Deauthentication Attack with mdk3 •How to deploy DoS Attack with MKD3 •Encryption Terminology & Wireless Encryption Options BUY THIS BOOK NOW AND GET STARTED TODAY!
Hugo Hoffman (Author), Scott Clem (Narrator)
Audiobook
Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Se
2 AUDIOBOOKS IN 1! - Book 1 - 25 Most Common Security Threats & How To Avoid Them - Book 2 - 21 Steps For Implementing The NIST Cybersecurity Framework BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY! You will learn: AUDIOBOOK 1: Basic Cybersecurity concepts •How to write a security policy •IT staff and end-user education •Physical & Perimeter security •Client Traffic Analytics •Password management •Patch Management Deployment •HTTP, HTTPS, SSL & TLS •Scanning with NMAP •Patch Management with Ivanti •Deploying AV processes •McAfee Policy Orchestrator •Access Control Deployments •Data in Transit Security •IDS & IPS Systems & Proxy Servers •Data Loss Prevention & RAID •Incremental VS Differential Backup •Data Backup Solutions AUDIOBOOK 2: •Software Bugs and Buffer Overflow •Weak Passwords •Path Traversal •SQL Injection •Cross Site Scripting •Cross-site forgery request •Viruses & Malware •Trojan & Ransomware •Rootkits & Worms •DoS Attacks •Man-in-the-middle attacks •Social Engineering and Phishing Attacks •Cloud Services Attacks •ARP Poisoning •Rogue Access Points •Man in the Middle on Wireless Networks •De-Authentication Attack •Wireless Collision Attack •Wireless Replay Attacks and much more... BUY THIS BOOK NOW AND GET STARTED TODAY!
Hugo Hoffman (Author), Matyas J., Scott Clem (Narrator)
Audiobook
Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cyber
2 AUDIOBOOKS IN 1! - Book 1 - Cryptography Fundamentals & Network Security - Book 2 - How To Get Into Cybersecurity Without Technical Background BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY! You will learn: AUDIOBOOK 1: What is Confidentiality, Integrity, Availability •Security Incident Events and Monitoring •Security Terminologies, Security Zones •TCP SYN Flood attack, Ping of death attack •Botnet, IP & MAC Address Spoofing •DHCP Server & Client Spoofing •Social Engineering & Phishing •Spear phishing, Whaling & Pharming •Watering hole attack & Smishing •Brute Force & Dictionary Attacks •Securing and Managing Endpoints •Securing and Managing Network Devices •BYOD Security •Email Security and Blacklisting •Data Loss Prevention and more AUDIOBOOK 2: •You will learn the pros and cons of Cybersecurity Jobs, so you can have a better understanding of this industry. •You will learn a strategy that you use to comprehend the demand for Cybersecurity Professionals within your area. •You will learn what salary you can expect in the field of Cybersecurity. •You will learn the differences between security certification and what value each has when you enter this industry. •You will learn about Cybersecurity skills that you must have before entering this field. •You will learn ways to think outside the box and quickly adopt a “Cybersecurity Mindset”, •You will learn how you can get working experience and references while you can also get paid. •You will learn how to create a Professional LinkedIn Profile step by step that will help you get noticed, and begin socializing with other Cybersecurity Professionals and more… BUY THIS BOOK NOW AND GET STARTED TODAY!
Hugo Hoffman (Author), Matyas J., Scott Clem (Narrator)
Audiobook
Ethical Hacking Bible: Cybersecurity, Cryptography, Network Security, Wireless Technology and Wirele
This Audiobook Bundle Includes 7 Books: - Book 1 - 25 Most Common Security Threats & How To Avoid Them - Book 2 - 21 Steps For Implementing The Nist Cybersecurity Framework - Book 3 - Cryptography Fundamentals & Network Security - Book 4 - How to Get Into Cybersecurity Without Technical Background - Book 5 - Wireless Technology Fundamentals - Book 6 - Learn Fast How To Hack Any Wireless Networks - Book 7 - Learn Fast How To Hack Like A Pro Both Wired and Wireless Pen Testing has become a key skill amongst professional hackers using Kali Linux. If you want to become a Cybersecurity Professional, Ethical Hacker, or a Penetration Tester, BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY! This Book will cover: - Cross Site Scripting, Cross-site forgery request, Viruses & Malware - ARP Poisoning, Rogue Access Points, Man in the Middle on Wireless Networks - De-Authentication Attack, Wireless Collision Attack, Wireless Replay Attacks - Access Control Deployments, Data in Transit Security, IDS & IPS Systems & Proxy Servers - Cryptography Basics, Hashing & MD5 Checksum, Hash Algorithms and Encryption Basics - PenTest Tools / Wireless Adapters & Wireless Cards for Penetration Testing - How to implement MITM Attack with Ettercap, How to deploy Rogue Access Point using MITM Attack - How to deploy Evil Twin Deauthentication Attack with mdk3, How to deploy DoS Attack with MKD3 - How to implement Dictionary Attack with Airodump-ng, How to deploy ARP Poisoning with EtterCAP - How to implement MITM Attack with Ettercap & SSLstrip, How to Manipulate Packets with Scapy - How to deploy Deauthentication Attack, How to capture IPv6 Packets with Parasite6 and more... BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!
Hugo Hoffman (Author), David Knowles, Matyas J., Scott Clem (Narrator)
Audiobook
©PTC International Ltd T/A LoveReading is registered in England. Company number: 10193437. VAT number: 270 4538 09. Registered address: 157 Shooters Hill, London, SE18 3HP.
Terms & Conditions | Privacy Policy | Disclaimer