Browse audiobooks by John Knowles, listen to samples and when you're ready head over to Audiobooks.com where you can get 3 FREE audiobooks on us
CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Thre
★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★ IF YOUR ANSWER IS YES, BUY THIS BOOK NOW! ★ 3 AUDIOBOOKS IN 1 DEAL ★ - BOOK 1 - HOW TO ESTABLISH EFFECTIVE SECURITY MANAGEMENT FUNCTIONS - BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK - BOOK 3 - ETHICAL HACKING AND WIRELESS PENETRATION TESTING WITH KALI LINUX BUY THIS BOOK NOW AND GET STARTED TODAY! BOOK 1: - HOW TO APPLY SECURITY CONTROLS - SECURITY CONTROL FUNCTIONS - HOW TO ESTABLISH ORGANIZATIONAL GOVERNANCE - SECURITY STRATEGY & GOVERNANCE SCENARIO - INFORMATION SECURITY RELATIONSHIPS - BUSINESS, COMPLIANCE, AND SECURITY - MANAGEMENT ROLES AND RESPONSIBILITIES - SECURITY ROLES AND RESPONSIBILITIES - SECURITY MANAGEMENT PROGRAM STRUCTURE - HOW TO DECIPHER THE RISK MANAGEMENT PROGRAM BOOK 2: - COMPLIANCE, SECURITY, RISK - HOW TO BE COMPLIANT AND SECURE - INTRODUCTION TO RISK MANAGEMENT FRAMEWORK - INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS - CSF CONSTRUCTION AND CSF TIERS AND PROFILES - ESSENTIAL RMF CONCEPTS - RISK TIERS AND SYSTEMS AND AUTHORIZATION - ROLES AND RESPONSIBILITIES BOOK 3: - HOW TO IMPLEMENT WPA DICTIONARY ATTACK + COUNTERMEASURES - HOW TO DEPLOY PASSIVE RECONNAISSANCE + COUNTERMEASURES - HOW TO DEPLOY MITM ATTACK USING ETTERCAP, MITM ATTACK USING ROGUE ACCESS POINT, DEAUTHENTICATION ATTACK AGAINST ROGUE AP, DENIAL OF SERVICE ATTACK USING MKD3, EVIL TWIN DE-AUTH USING MDK3 - ENCRYPTION TERMINOLOGY FUNDAMENTALS - WIRELESS ENCRYPTION ALTERNATIVES AND TKIP FUNDAMENTALS - CCMP & AES FUNDAMENTALS AND MORE... BUY THIS BOOK NOW AND GET STARTED TODAY!
John Knowles (Author), Khai Lannor, Marty Ravenel, Scott Clem (Narrator)
Audiobook
CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend
★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★ IF YOUR ANSWER IS YES, BUY THIS BOOK NOW! ★ 3 AUDIOBOOKS IN 1★ - BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORK - BOOK 2 - HOW TO MANAGE RISK, USING THE NIST CYBERSECURITY FRAMEWORK - BOOK 3 - CYBERSECURITY CAREER GUIDE TO BE A CERTIFIED ETHICAL HACKER BUY THIS BOOK NOW AND GET STARTED TODAY!: BOOK 1: - COMPLIANCE, SECURITY, RISK - HOW TO BE COMPLIANT AND SECURE - INTRODUCTION TO RISK MANAGEMENT FRAMEWORK - INTRODUCTION TO THE NIST SPECIAL PUBLICATIONS - INTRODUCTION TO THE RMF PUBLICATIONS - ESSENTIAL RMF CONCEPTS - RISK TIERS AND SYSTEMS AND AUTHORIZATION - ROLES AND RESPONSIBILITIES - HOW TO PREPARE FOR RMF BOOK 2: - HOW TO REASSESS RISK - HOW TO IMPLEMENT RISK RESPONSE - RISK RESPONSE OPTION BASICS - HOW TO RESPOND TO RISK - INTRODUCTION TO CONTROL TYPES - CONTROL FUNCTION BASICS - UNDERSTANDING SECURITY CONTROLS - RISK FACTORS AND RISK METRICS - HOW TO DEVELOP AND USE KPIS - HOW TO MONITOR RISK FACTORS - UNDERSTANDING RISK INDICATORS - REPORTING COMPLIANCE BASICS BOOK 3: - HOW TO USE METASPLOITABLE - HOW TO SPIDER WITH SQL INJECTION - HOW TO SETUP A BURP SUITE PROXY - HOW TO DEPLOY SYN SCAN ATTACK - HOW TO CAPTURE TRAFFIC USING PORT MIRRORING - HOW TO DEPLOY A MITM ATTACK USING ETTERCAP - HOW TO IMPLEMENT MITM ATTACK USING SSLSTRIP - HOW TO DEPLOY HAIL MARY USING ARMITAGE - HOW TO CAPTURE TRAFFIC USING XPLICO AND MORE… BUY THIS BOOK NOW AND GET STARTED TODAY!
John Knowles (Author), Khai Lannor, Scott Clem (Narrator)
Audiobook
Cybersecurity For Beginners: How to Manage Risk, Using the NIST Cybersecurity Framework
In this audiobook, you are going to learn what it takes to manage risk in your organization specifically risk that has to do with information with information systems, with data, and so on. You are going to learn about a wide variety of topics. You are going to learn about assets and what they are, what are the elements of risks, risk analysis, risk assessments, managing and monitoring risk and more. CLICK BUY NOW TO GET STARTED TODAY! You will learn: •How to Understand Asset Value •How to place Value on the Company’s Information Assets •How to Classify Information Assets •Information Asset and Risk Ownership •Understanding Information Asset and Risk Ownership •Assigning Information Asset Value •How to Assign Value to our company’s Assets •How to Determine Legal Requirements and Risk •Understanding FISMA, NIST, HIPAA and PCI-DSS •How to Describe Risk •Risk Management Scenario •Risk Scenarios •Risk Assessments •How to Reassess Risk •Risk Assessments Scenario •How to Implement Risk Response •Risk Response Option Basics •How to Analyse Cost & Benefit •How to Prioritize Risk Response Options •How to Respond to Risk •Introduction to Control Types •Control Function Basics •Understanding Security Controls •Control Standards Assessment, and Analysis •Understanding Risk Factors and Risk Metrics •How to Develop and Use KPIs •How to Monitor Risk Factors •Understanding Risk Indicators •Reporting Compliance Basics CLICK BUY NOW TO GET STARTED TODAY!
John Knowles (Author), Scott Clem (Narrator)
Audiobook
Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1
3 Audiobooks In 1 Deal: •Book 1: How to Establish Effective Security Management Functions •Book 2: How to Apply the NIST Risk Management Framework •Book 3: How to Manage Risk, Using the NIST Cybersecurity Framework CLICK BUY NOW TO GET STARTED TODAY! You will learn in Book 1: •Objectives of Security Management •Security Management Principles •Defense in Depth •How to apply Security Controls •Security Control Functions •Security Strategy & Governance Scenario •Information Security Relationships •Business, Compliance, and Security •Management Roles and Responsibilities •Security Roles and Responsibilities •How to decipher the Risk Management Program and more… You will learn in Book 2: •Compliance, Security, Risk •How to be Compliant and Secure •Introduction to Risk Management Framework •Introduction to the RMF Publications •Understanding the Cybersecurity Framework •Comprehending the CSF Tiers and Profiles •Essential RMF Concepts •Understanding Risk Tiers •Understanding Systems and Authorization •Introduction to Roles and Responsibilities •How to prepare for Organization-level Tasks and more… You will learn in Book 3: •How to Reassess Risk •How to Implement Risk Response •Risk Response Option Basics •How to Analyse Cost & Benefit •How to Prioritize Risk Response Options •How to Respond to Risk •Introduction to Control Types •Control Function Basics •Understanding Security Controls •How to Develop and Use KPIs •How to Monitor Risk Factors and more... CLICK BUY NOW TO GET STARTED TODAY!
John Knowles (Author), Scott Clem (Narrator)
Audiobook
Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
Data breaches and network intrusions are constantly in front page headline news. No matter how the data was lost or the network invaded, tracing the root cause of IT security problems usually leads back to ineffective management of security programs. In this book, you'll gain solid foundational knowledge and skills you can use to effectively manage security in your organization. CLICK BUY NOW TO GET STARTED TODAY! You will learn: - Objectives of Security Management - How to support Security Goals - Security Management Principles - Defense in Depth - How to apply Security Controls - Security Control Functions - How to establish Organizational Governance - Security Strategy & Governance Scenario - Information Security Relationships - Business, Compliance, and Security - Management Roles and Responsibilities - Security Roles and Responsibilities - How to create a Security Management Program - Security Management Program Structure - How to decipher the Risk Management Program - Risk Strategy Fundamentals - Risk Management Scenario - Risk within the Organization - How to conduct Risk Assessments - How to assess risk - How to respond to Risk - How to monitor Risk - Resiliency Concepts - Business Impact Analysis - Business Impact Analysis - Incident Response - Disaster Recovery - Business Continuity Fundamentals - Alternative Processing Sites - How to maintain Business Continuity CLICK BUY NOW TO GET STARTED TODAY!
John Knowles (Author), Scott Clem (Narrator)
Audiobook
Cybersecurity For Beginners: How to apply the NIST Risk Management Framework
Handling risk is one of the chief goals of organizations, mainly in the InfoSec program. Risk management delivers the vehicle for the balance between compliance and security. Businesses need to defend their data by launching and upholding an operational risk management platform. Organizations must considered their environment, resources, threats, and sensitivity of their data. In this book, you will learn the fundamentals of risk management with security, and how to deploy the RMF to efficiently deal with compliance and risk within your business. CLICK BUY NOW TO GET STARTED TODAY! You will learn: •Compliance, Security, Risk •How to be Compliant and Secure •Introduction to Risk Management Framework •Introduction to the NIST Special Publications •Introduction to the RMF Publications •Understanding the Cybersecurity Framework •Comprehending the CSF Construction •Comprehending the CSF Tiers and Profiles •Essential RMF Concepts •Understanding Risk Tiers •Understanding Systems and Authorization •Introduction to Roles and Responsibilities •Comprehending Security and Privacy in the RMF •How to prepare for RMF •How to prepare for Organization-level Tasks •How to prepare for System-level Tasks •How to Categorize Information Systems •Comprehending RMF Categorization Tasks •Understanding Categorizing Systems •How to Select Security Controls •How to Select Controls and Baselines •How to Implement Security Controls •How to Implement Controls •How to Assess Security Controls •Understanding RMF Assess Tasks •How to Assess Systems •How to Authorize Information Systems •How to Monitor Security Controls •How to Monitor Tasks •How to Monitor Systems CLICK BUY NOW TO GET STARTED TODAY!
John Knowles (Author), Scott Clem (Narrator)
Audiobook
Devon School, an exclusive prep school for boys in New Hampshire, is a world unto itself. But it's the summer of 1942 and the massive thundercloud of World War II threatens the school's peaceful environment. Paralleling the war, where enemies real and imagined are sometimes collaborated with and sometimes destroyed, is the friendship between Gene and Phineas, two students attending the 1942 summer session at Devon. Their idyllic world begins to fall apart as the war escalates, and suspicion and the complexities of adolescence result in violence and betrayal. A Separate Peace has become a modern classic.
John Knowles (Author), Scott Snively (Narrator)
Audiobook
Gene was a lonely, introverted intellectual. Phineas was a handsome, taunting, daredevil athlete. What happened between them at school one summer during the early years of World War II is the subject of A Separate Peace. A great bestseller for over thirty years--one of the most starkly moving parables ever written of the dark forces that brood over the tortured world of adolescence.
John Knowles (Author), Matthew Modine (Narrator)
Audiobook
Even though the war had thrown a shroud over the outside world, Phineas and Gene remained untouched by it. In the summer of '42, the Devon school was a lot like Camelot, fairly bursting with adventure and promise. As much as Gene resisted it, there had been something eternal and unforgettable about that summer. And by the time he understood what life without Phineas could be-it was too late.
John Knowles (Author), Spike McClure (Narrator)
Audiobook
©PTC International Ltd T/A LoveReading is registered in England. Company number: 10193437. VAT number: 270 4538 09. Registered address: 157 Shooters Hill, London, SE18 3HP.
Terms & Conditions | Privacy Policy | Disclaimer