
CISSP And Cybersecurity For Beginners
John Knowles
★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★
IF YOUR ANSWER IS YES, BUY THIS BOOK NOW!
★ 3 AUDIOBOOKS IN 1★
BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORKBOOK 2 - HOW TO MANAGE RISK, USING THE NIST CYBERSECURITY...
Location:
United States
Description:
★ DO YOU WANT TO DISCOVER WHAT IT TAKES TO BECOME A CISSP? ★ IF YOUR ANSWER IS YES, BUY THIS BOOK NOW! ★ 3 AUDIOBOOKS IN 1★ BOOK 2 - HOW TO APPLY THE NIST RISK MANAGEMENT FRAMEWORKBOOK 2 - HOW TO MANAGE RISK, USING THE NIST CYBERSECURITY FRAMEWORKBOOK 3 - CYBERSECURITY CAREER GUIDE TO BE A CERTIFIED ETHICAL HACKERBUY THIS BOOK NOW AND GET STARTED TODAY!: BOOK 1: BOOK 2: BOOK 3: BUY THIS BOOK NOW AND GET STARTED TODAY! Duration - 16h 14m. Author - John Knowles. Narrator - Scott Clem. Published Date - Sunday, 22 January 2023. Copyright - © 2021 John Knowles ©.
Language:
English
Opening Credits
Duration:00:00:19
Opening credits
Duration:00:00:17
Introduction
Duration:00:03:22
Chapter 1 understanding compliance
Duration:00:07:50
Chapter 2 understanding security
Duration:00:05:39
Chapter 3 understanding risk
Duration:00:07:04
Chapter 4 understanding compliance vs security
Duration:00:08:48
Chapter 5 how to be compliant and secure
Duration:00:10:11
Chapter 6 introduction to risk management framework
Duration:00:05:43
Chapter 7 introduction to the nist special publications
Duration:00:08:48
Chapter 8 introduction to the rmf publications
Duration:00:33:20
Chapter 9 understanding the cybersecurity framework
Duration:00:03:49
Chapter 10 comprehending the csf construction
Duration:00:09:48
Chapter 11 comprehending the csf tiers and profiles
Duration:00:08:42
Chapter 12 essential rmf concepts
Duration:00:07:55
Chapter 13 understanding risk tiers
Duration:00:04:00
Chapter 14 understanding systems and authorization
Duration:00:03:36
Chapter 15 introduction to roles and responsibilities
Duration:00:07:02
Chapter 16 comprehending security and privacy in the rmf
Duration:00:02:57
Chapter 17 how to prepare for rmf
Duration:00:03:46
Chapter 18 how to prepare for organization level tasks
Duration:00:07:42
Chapter 19 how to prepare for system level tasks
Duration:00:13:41
Chapter 20 how to categorize information systems
Duration:00:18:27
Chapter 21 comprehending rmf categorization tasks
Duration:00:02:51
Chapter 22 understanding categorizing systems
Duration:00:02:46
Chapter 23 how to select security controls
Duration:00:21:09
Chapter 24 how to select controls and baselines
Duration:00:02:51
Chapter 25 how to implement security controls
Duration:00:06:25
Chapter 26 how to implement controls
Duration:00:08:27
Chapter 27 how to assess security controls
Duration:00:17:21
Chapter 28 understanding rmf assess tasks
Duration:00:05:52
Chapter 29 how to assess systems
Duration:00:03:06
Chapter 30 how to authorize information systems
Duration:00:09:58
Chapter 31 how to monitor security controls
Duration:00:07:39
Chapter 32 how to monitor tasks
Duration:00:05:33
Chapter 33 how to monitor systems
Duration:00:03:38
Closing credits
Duration:00:00:27
Introduction to information assets
Duration:00:08:49
Chapter 1 how to understand asset value
Duration:00:04:02
Chapter 2 how to place value on the company’s information assets
Duration:00:03:54
Chapter 3 how to classify information assets
Duration:00:09:32
Chapter 4 information asset and risk ownership
Duration:00:03:26
Chapter 5 understanding information asset and risk ownership
Duration:00:05:05
Chapter 6 assigning information asset value
Duration:00:08:55
Chapter 7 how to assign value to our company’s assets
Duration:00:05:43
Chapter 8 how to determine legal requirements and risk
Duration:00:06:49
Chapter 9 understanding fisma and nist
Duration:00:05:45
Chapter 10 understanding hipaa
Duration:00:04:00
Chapter 11 understanding pci dss
Duration:00:03:59
Chapter 12 additional regulatory risk management requirements
Duration:00:05:09
Chapter 13 introduction to risk management governance
Duration:00:03:10
Chapter 14 how to describe risk
Duration:00:04:08
Chapter 15 risk strategy basics
Duration:00:05:55
Chapter 16 understanding the component of risk
Duration:00:04:51
Chapter 17 understanding likelihood
Duration:00:01:59
Chapter 18 understanding impact
Duration:00:02:00
Chapter 19 understanding risk as a whole
Duration:00:05:34
Chapter 20 risk management scenario
Duration:00:02:19
Chapter 21 internal and external risk factors
Duration:00:09:27
Chapter 22 internal and external influences on risk
Duration:00:05:21
Chapter 23 risk scenarios
Duration:00:04:12
Chapter 24 risk assessments
Duration:00:04:31
Chapter 25 how to conduct the nist assessment
Duration:00:11:28
Chapter 26 quantitative and qualitative risk analysis
Duration:00:04:41
Chapter 27 how to calculate risk
Duration:00:04:17
Chapter 28 how to reassess risk
Duration:00:03:38
Chapter 29 risk assessments scenario
Duration:00:04:57
Chapter 30 how to implement risk response
Duration:00:01:48
Chapter 31 risk response option basics
Duration:00:07:52
Chapter 32 how to analyse cost & benefit
Duration:00:07:25
Chapter 33 how to prioritize risk response options
Duration:00:03:10
Chapter 34 how to respond to risk
Duration:00:10:28
Chapter 35 introduction to control types
Duration:00:04:40
Chapter 36 control function basics
Duration:00:05:11
Chapter 37 understanding security controls
Duration:00:06:39
Chapter 38 control standards assessment, and analysis
Duration:00:14:13
Chapter 39 understanding control effectiveness
Duration:00:03:00
Chapter 40 how to integrate information risk into business and it
Duration:00:14:42
Chapter 41 understanding it risk
Duration:00:05:20
Chapter 42 how to integrate business and it risk
Duration:00:08:16
Chapter 43 understanding risk factors
Duration:00:08:50
Chapter 44 understanding risk metrics
Duration:00:11:25
Chapter 45 how to develop and use kp is
Duration:00:10:01
Chapter 46 how to monitor risk factors
Duration:00:04:20
Chapter 47 understanding risk indicators
Duration:00:04:41
Chapter 48 reporting compliance basics
Duration:00:06:41
Chapter 49 reporting likelihood and impact basics
Duration:00:02:10
Chapter 50 how to translate it risk to business risk
Duration:00:09:04
Chapter 51 risk reports and practices
Duration:00:05:11
Chapter 1 linux fundamentals
Duration:00:26:22
Chapter 2 must have pen testing software & hardware
Duration:00:09:39
Chapter 3 how to install virtual box & kali linux
Duration:00:22:25
Chapter 4 penetration testing fundamentals
Duration:00:15:36
Chapter 5 penetration testing types & standards
Duration:00:17:47
Chapter 6 pen testing stage 1 to stage 3
Duration:00:28:18
Chapter 7 how to discover hosts using port scanning
Duration:00:31:34
Chapter 8 footprinting fundamentals
Duration:00:08:12
Chapter 9 how to use metasploitable
Duration:00:10:10
Chapter 10 how to spider with sql injection
Duration:00:13:38
Chapter 11 how to setup a burp suite proxy
Duration:00:04:02
Chapter 12 how to discover devices using hping3
Duration:00:11:23
Chapter 13 how to deploy sql injection using sq lmap
Duration:00:04:14
Chapter 14 how to deploy arp poisoning using etter cap
Duration:00:04:34
Chapter 15 how to randomize session tokens
Duration:00:03:01
Chapter 16 how to deploy passive reconnaissance using kali linux
Duration:00:09:53
Chapter 17 how to deploy dictionary attack using airodump ng
Duration:00:07:25
Chapter 18 how to deploy syn scan attack
Duration:00:05:59
Chapter 19 how to capture traffic using port mirroring
Duration:00:05:01
Chapter 20 how to deploy a mitm attack using ettercap
Duration:00:07:28
Chapter 21 how to implement mitm attack using ss lstrip
Duration:00:26:07
Chapter 22 how to deploy deauthentication attack
Duration:00:10:01
Chapter 23 how to manipulate packet using scapy
Duration:00:06:27
Chapter 24 how to implement evil twin de auth attack using mdk3
Duration:00:30:49
Chapter 25 how to deploy hail mary using armitage
Duration:00:07:53
Chapter 26 how to use the metasploit framework
Duration:00:12:18
Chapter 27 how to deploy do s attack using mkd3
Duration:00:06:59
Chapter 28 how to use the social engineering toolkit
Duration:00:07:37
Chapter 29 how to capture i pv6 packet using parasite6
Duration:00:06:52
Chapter 30 how to implement brute force attack using tcp hydra
Duration:00:04:39
Chapter 31 how to capture traffic using xplico
Duration:00:04:14
About john knowles
Duration:00:00:50
Conclusion
Duration:00:00:18
Ending Credits
Duration:00:00:29