Author: John Knowles
Narrator: Scott Clem, Khai Lannor, Marty Ravenel
Unabridged: 14 hr 21 min
Format: Digital Audiobook
Publisher: Findaway Voices
Published: 10/24/2021
? DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ?
IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!
? 3 AUDIOBOOKS IN 1 DEAL ?
BOOK 1 - HOW TO ESTABLISH EFFECTIVE SECURITY MANAGEMENT FUNCTIONSBOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORKBOOK 3 - ETHICAL HACKING AND WIRELESS PENETRATION TESTING WITH KALI LINUXBUY THIS BOOK NOW AND GET STARTED TODAY!
BOOK 1:
HOW TO APPLY SECURITY CONTROLSSECURITY CONTROL FUNCTIONSHOW TO ESTABLISH ORGANIZATIONAL GOVERNANCESECURITY STRATEGY & GOVERNANCE SCENARIOINFORMATION SECURITY RELATIONSHIPSBUSINESS, COMPLIANCE, AND SECURITYMANAGEMENT ROLES AND RESPONSIBILITIESSECURITY ROLES AND RESPONSIBILITIESSECURITY MANAGEMENT PROGRAM STRUCTUREHOW TO DECIPHER THE RISK MANAGEMENT PROGRAMBOOK 2:
COMPLIANCE, SECURITY, RISKHOW TO BE COMPLIANT AND SECUREINTRODUCTION TO RISK MANAGEMENT FRAMEWORKINTRODUCTION TO THE NIST SPECIAL PUBLICATIONSCSF CONSTRUCTION AND CSF TIERS AND PROFILESESSENTIAL RMF CONCEPTSRISK TIERS AND SYSTEMS AND AUTHORIZATIONROLES AND RESPONSIBILITIESBOOK 3:
HOW TO IMPLEMENT WPA DICTIONARY ATTACK + COUNTERMEASURESHOW TO DEPLOY PASSIVE RECONNAISSANCE + COUNTERMEASURESHOW TO DEPLOY MITM ATTACK USING ETTERCAP, MITM ATTACK USING ROGUE ACCESS POINT, DEAUTHENTICATION ATTACK AGAINST ROGUE AP, DENIAL OF SERVICE ATTACK USING MKD3, EVIL TWIN DE-AUTH USING MDK3ENCRYPTION TERMINOLOGY FUNDAMENTALSWIRELESS ENCRYPTION ALTERNATIVES AND TKIP FUNDAMENTALSCCMP & AES FUNDAMENTALS AND MORE...BUY THIS BOOK NOW AND GET STARTED TODAY!