• Cyber Security

  • The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
  • De: Noah Zhang
  • Narrado por: Gary Westphalen
  • Duración: 2 h y 1 m
  • 4.6 out of 5 stars (26 calificaciones)

Prime logotipo Exclusivo para miembros Prime: ¿Nuevo en Audible? Obtén 2 audiolibros gratis con tu prueba.
Elige 1 audiolibro al mes de nuestra inigualable colección.
Escucha todo lo que quieras de entre miles de audiolibros, Originals y podcasts incluidos.
Accede a ofertas y descuentos exclusivos.
Premium Plus se renueva automáticamente por $14.95 al mes después de 30 días. Cancela en cualquier momento.
Cyber Security  Por  arte de portada

Cyber Security

De: Noah Zhang
Narrado por: Gary Westphalen
Prueba por $0.00

US$14.95 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por US$6.95

Compra ahora por US$6.95

la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.

Resumen del Editor

Cyber security is here to stay.

Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”?

Do you own a business and now becoming aware of how dangerous the cyber threats are to your assets? Would you like to know how to quickly create a cyber security plan for your business, without dealing with any technical jargon?

Are you interested in pursuing a career in cyber security? Did you know that the average starting salary of a cyber security professional ranges from $65,000 to $80,000 and jumps to multiple figures in a few years, depending on how far you want to go.

Here is an interesting statistic, you are already compromised. Yes, at some point, one of your digital devices or activities has been hacked and your information has been sold. If you knew how bad the threats really are, you would never go online again or you would be very paranoid.

And we’re not talking about those ads that suddenly pop up and follow you around everywhere because you were looking at sunglasses for sale on google or Amazon, that’s called retargeting marketing and is totally legal and legitimate.

We’re talking about malware that hides deep in your device watching everything you do and type, just as one example among hundreds

Our society has become saturated with internet-connected devices and trackers everywhere.

From home routers to your mobile phones, most people are easily hacked if targeted. But it gets even deeper than this; technology has advanced now to where most hacks are automated, by software. International hackers have vast networks and computers set up to conduct non-stop scans, pings, and probes for weaknesses in millions of IP addresses and network domains, such as businesses and residential home routers.

Check your router log and you’ll see it yourself. Now most devices have firewalls but still, that is what’s called an persistent threat that is here to stay, it’s growing and we all need to be aware of how to protect ourselves starting today.

In this introductory audiobook, we will cover verified steps and tactics on how to increase the level of cyber security in an organization and as an individual. It sheds light on the potential weak points which are used as infiltration points and gives examples of these breaches. We will also talk about cyber crime in a technologically-dependent world (Think IoT).

Cyber security has come a long way from the days that hacks could only be perpetrated by a handful of individuals, and they were mostly done on the larger firms or government databases. Now, everyone with a mobile device, home system, car infotainment, or any other computing device is a point of weakness for malware or concerted attacks from hackers, real or automated.

We have adopted anti-viruses and several firewalls to help prevent these issues to the point we have become oblivious to the majority of the attacks. The assistance of malware blocking tools allows our computing devices to fight thousands of attacks per day. Interestingly, cyber crime is a very lucrative industry, as has been proven by the constant investment by criminals on public information. It would be wise to pay at least half as much attention to your security.

What are you waiting for, get this audiobook now to get started instantly!

©2019 Noah Zhang (P)2019 Noah Zhang

Lo que los oyentes dicen sobre Cyber Security

Calificaciones medias de los clientes
Total
  • 4.5 out of 5 stars
  • 5 estrellas
    20
  • 4 estrellas
    4
  • 3 estrellas
    1
  • 2 estrellas
    0
  • 1 estrella
    1
Ejecución
  • 4.5 out of 5 stars
  • 5 estrellas
    19
  • 4 estrellas
    4
  • 3 estrellas
    1
  • 2 estrellas
    0
  • 1 estrella
    2
Historia
  • 4.5 out of 5 stars
  • 5 estrellas
    20
  • 4 estrellas
    4
  • 3 estrellas
    0
  • 2 estrellas
    0
  • 1 estrella
    1

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.

Ordenar por:
Filtrar por:
  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

It's good

Great information here in this audio book, I would recommend giving it a listen 👍🏼

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars
El oyente recibió este título gratis

This book contains some very unique and powerful

This book contains some very unique and powerful strategy concepts not found in ANY other Product Management books. This is a terrific overview of what executive-level Product Management people do for a living. Greg lists the key elements of doing Product Management -- but then he discusses why you should be doing these tasks.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars
El oyente recibió este título gratis

good easy to understand cyber security

Very holistic and thorough account of how cybersecurity happened...with cat videos to help keep it pithy. I know more than ever about cyber threats to our digital world because of this book

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

esto le resultó útil a 1 persona

  • Total
    4 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    4 out of 5 stars
El oyente recibió este título gratis

It is quite helpful, too!

I learned so much information and events about cybersecurity that I once never knew! Very helpful for getting into the field. Covers the basics and informative

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars
El oyente recibió este título gratis

excellent overview of cyber security

highly recommended for a birds eye view of personal cyber security. I recommend following the guidelines provided in the book to protect yourself. if you live on the internet, this is a great manual to use for protection guidance.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    4 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars
El oyente recibió este título gratis

Good Overview of Cybersecurity

All the information in the book is from a high level with only a basic amount of technical information. There are several sections that give some detail on particular incidents of hacking (such as Stuxnet), but these too only give enough technical detail to help the reader understand what happened.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

esto le resultó útil a 1 persona

  • Total
    5 out of 5 stars
  • Ejecución
    4 out of 5 stars
  • Historia
    4 out of 5 stars
El oyente recibió este título gratis

A good general explanation of Cybersecurity

A well thought out, intelligently written book on digital security issues and how to combat them, both before and after an attack. Great use of index of terms with their definitions at the end of the book.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars
El oyente recibió este título gratis

Great book on the future of cyber!

This was a required book for one of my graduate school courses and I highly recommend it to anyone interested in the subject. Only criticism is when the narrator correctly pronounced Chinese names, but somehow mispronounces well known military acronyms.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

esto le resultó útil a 1 persona

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars
El oyente recibió este título gratis

Lovely Cybersecurity Book.

There are some parts, have to admit, i skimmed. But in general it is an outstanding book for anyone who doesn't know where to start!

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars
El oyente recibió este título gratis

Learned a lot

The book was informative if you know nothing about cyber security. A well thought out, intelligently written book on digital security issues and how to combat them, both before and after an attack. I found this book to be incredibly insightful. I would recommend this book.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña