-
CISSP: 3 in 1
- Beginner's Guide + Guide to learn CISSP Principles + The Fundamentals of Information Security Systems for CISSP Exam
- Narrated by: William Bahl
- Length: 13 hrs and 21 mins
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $24.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
Cyber Security
- A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk Management, Social Engineering, and Information Security.
- By: Kevin Kali
- Narrated by: Tom Brooks
- Length: 3 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you want to protect yourself from Cyber Security attacks? If so then keep reading. There have been various solutions given to decrease your attack surface and mitigate the risks of cyberattacks. These can also be used on a small scale to protect yourself as an individual from such infiltrations. To avoid cybercrime from evolving, and to not become better at infiltration and such, cyber security needs to stay a practice that adapts to growing problems, thus far, the hackers/attackers are outpacing defenders.
-
-
Great overall high-level
- By Autumn P Corea on 02-29-20
By: Kevin Kali
-
CISSP Exam Audio Study Guide! Practice Questions Edition!
- Ultimate CISSP Test Prep Review Book! Covers All CISSP Body of Knowledge
- By: Seth Castro
- Narrated by: Matyas J.
- Length: 6 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to pass the CISSP exam, but don’t have a lot of time for studying, try this audiobook. It can be challenging to find the time to read your textbook in preparation for the CISSP Exam. However, the truth is that the CISSP exam is a challenging test, and currently costs $699 just to take the exam! Thorough preparation cannot be overlooked. That is why the author Seth Castro developed the CISSP Exam Audio Study Guide! This edition is a practice questions edition. It contains hundreds of sample questions.
-
-
Very Straightforward
- By Caroline Boone on 10-29-19
By: Seth Castro
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge
- By: Phil Martin
- Narrated by: Phil Martin
- Length: 17 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The CISSP certification is the gold standard for security professionals, but ISC2‘s official study guide is anything but easy to read. Many books have tried to simplify this but fail to leave behind the $100 words and run-on sentences. An update to the original Simple CISSP book, Essential CISSP Exam Guide takes the entire official study guide and breaks it down into easy-to-absorb chapters with simple language. Tons of examples are included to drive the points home in a way that makes it effortless to remember.
-
-
Great descriptions of somewhat dry content
- By Chelsi P. on 08-27-19
By: Phil Martin
-
Cybersecurity Bible
- Security Threats, Frameworks, Cryptography & Network Security: 4 Books in 1
- By: Hugo Hoffman
- Narrated by: Matyas J.
- Length: 11 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Bible is a book bundle that includes four books: 25 Most Common Security Threats & How To Avoid Them, 21 Steps for Implementing the NIST Cybersecurity Framework, Cryptography Fundamentals & Network Security, and How to Get into Cybersecurity Without Technical Background.
-
-
This book is a waste of time and money
- By Richard Sikes on 04-04-21
By: Hugo Hoffman
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- By: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Great Resource for CCSP Study
- By PNewton on 07-11-22
By: Ben Malisow
-
Cyber Security
- A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk Management, Social Engineering, and Information Security.
- By: Kevin Kali
- Narrated by: Tom Brooks
- Length: 3 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you want to protect yourself from Cyber Security attacks? If so then keep reading. There have been various solutions given to decrease your attack surface and mitigate the risks of cyberattacks. These can also be used on a small scale to protect yourself as an individual from such infiltrations. To avoid cybercrime from evolving, and to not become better at infiltration and such, cyber security needs to stay a practice that adapts to growing problems, thus far, the hackers/attackers are outpacing defenders.
-
-
Great overall high-level
- By Autumn P Corea on 02-29-20
By: Kevin Kali
-
CISSP Exam Audio Study Guide! Practice Questions Edition!
- Ultimate CISSP Test Prep Review Book! Covers All CISSP Body of Knowledge
- By: Seth Castro
- Narrated by: Matyas J.
- Length: 6 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to pass the CISSP exam, but don’t have a lot of time for studying, try this audiobook. It can be challenging to find the time to read your textbook in preparation for the CISSP Exam. However, the truth is that the CISSP exam is a challenging test, and currently costs $699 just to take the exam! Thorough preparation cannot be overlooked. That is why the author Seth Castro developed the CISSP Exam Audio Study Guide! This edition is a practice questions edition. It contains hundreds of sample questions.
-
-
Very Straightforward
- By Caroline Boone on 10-29-19
By: Seth Castro
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge
- By: Phil Martin
- Narrated by: Phil Martin
- Length: 17 hrs
- Unabridged
-
Overall
-
Performance
-
Story
The CISSP certification is the gold standard for security professionals, but ISC2‘s official study guide is anything but easy to read. Many books have tried to simplify this but fail to leave behind the $100 words and run-on sentences. An update to the original Simple CISSP book, Essential CISSP Exam Guide takes the entire official study guide and breaks it down into easy-to-absorb chapters with simple language. Tons of examples are included to drive the points home in a way that makes it effortless to remember.
-
-
Great descriptions of somewhat dry content
- By Chelsi P. on 08-27-19
By: Phil Martin
-
Cybersecurity Bible
- Security Threats, Frameworks, Cryptography & Network Security: 4 Books in 1
- By: Hugo Hoffman
- Narrated by: Matyas J.
- Length: 11 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Bible is a book bundle that includes four books: 25 Most Common Security Threats & How To Avoid Them, 21 Steps for Implementing the NIST Cybersecurity Framework, Cryptography Fundamentals & Network Security, and How to Get into Cybersecurity Without Technical Background.
-
-
This book is a waste of time and money
- By Richard Sikes on 04-04-21
By: Hugo Hoffman
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- By: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Great Resource for CCSP Study
- By PNewton on 07-11-22
By: Ben Malisow
-
CISSP Exam Study Guide
- Cybersecurity and Ethical Hacking to Information Security Professionals: Comprehensive Guide to Threats, Ethical Hacking, Defense Techniques & Cybersecurity Frameworks 5 Book
- By: John Knowles
- Narrated by: Scott Clem, Marty Ravenel, Khai Lannor
- Length: 26 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you want to discover what it takes to become a CISSP? If your answer is yes, buy this book now!
-
-
Terrible narration
- By Nick on 02-15-22
By: John Knowles
-
Essential CISSP Test Questions
- Updated for the 2018 CISSP Body of Knowledge
- By: Phil Martin
- Narrated by: Phil Martin
- Length: 18 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
An update to Simple CISSP Exam Questions, Essential CISSP Test Questions tests your CISSP knowledge using more than 2,400 unique test questions in a multiple-choice format, just like the actual exam.
-
-
A touch of silver but not yet gold
- By Thoughts_of_Mine on 01-08-20
By: Phil Martin
-
CISSP: A Comprehensive Beginner’s Guide to Learn the Fundamentals of Information System Security for CISSP Exam
- By: Robert Preston
- Narrated by: Dan Waters
- Length: 3 hrs and 52 mins
- Unabridged
-
Overall
-
Performance
-
Story
The CISSP® (Accredited Info Systems Security Professional) eligibility is one of the most respected certifications in the information security industry, demonstrating an advanced comprehension of cybersecurity. In this book, we will cover all the relevant topics related to the CISSP examination.
-
-
Narrator is so sweet
- By Ryland on 02-22-21
By: Robert Preston
-
Simple CISSP
- By: Phil Martin
- Narrated by: Phil Martin
- Length: 16 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
The CISSP certification is the gold standard for security professionals. This exam resource is up to date for the 2015 CISSP Common Body of Knowledge created by ISC2. Simple CISSP has been intentionally kept as brief as possible without the "fluff" many other tomes include. The book is narrated by the author to ensure all information is conveyed by someone who understands the industry. As a result, all acronyms and security terminology is correctly pronounced and described.
-
-
Great information, but,,,
- By Amazon Customer on 01-28-18
By: Phil Martin
-
Ethical Hacking
- A Beginner’s Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment
- By: Zach Codings
- Narrated by: Donald Cuddington
- Length: 3 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you feel that informatics is indispensable in today’s increasingly digital world? Do you want to introduce yourself to the world of hacking? Do you want to have a head start in the job market by learning some of the most important future skills? First of all, we’ll need to look at what an ethical hacker actually is. This audiobook is filled with reasons why you should learn Ethical hacking, as well as a few helpful tutorials to help you learn in the quickest way. This audiobook assumes no programming knowledge at the start, so we’ll be teaching you from the ground up.
-
-
Extremely Prescribed Book
- By Michele Dale on 11-11-19
By: Zach Codings
-
Machine Learning with Python
- A Step-by-Step Guide to Learn and Master Python Machine Learning
- By: Mr Hein Smith
- Narrated by: William Bahl
- Length: 1 hr and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
A Step-by-Step Guide to Learn and Master Python Machine Learning walks you through steps for getting started with machine learning with Python.
-
-
Learn by doing
- By Dollie Ring on 07-18-20
By: Mr Hein Smith
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
-
Cybersecurity: The Advance Guide in System Security and Defense Strategies in Cybersecurity
- By: Zach Webber
- Narrated by: William Bahl
- Length: 1 hr and 26 mins
- Unabridged
-
Overall
-
Performance
-
Story
The audiobook considers the problems related to cybersecurity in the individual as well as the organizational setting. Cybersecurity is essential to the organization considering the growing technological dependencies that organizations are continuously facing. The audiobook considers the nature of threats of cybercrime from hacking to data manipulation.
-
-
Really good course
- By Arthur on 04-01-21
By: Zach Webber
-
Cybersecurity: The Ultimate Beginners Guide to Learn and Understand Cybersecurity Measures Effectively
- By: Zach Webber
- Narrated by: William Bahl
- Length: 1 hr and 26 mins
- Unabridged
-
Overall
-
Performance
-
Story
Each week it seems that some major corporation or another is having serious issues thanks to the leaks of some malicious hacker. Hearing stories like this can make it seem difficult, if not impossible for individuals and smaller organizations to ensure their own cybersecurity to keep their own information private; after all, if the big guys can’t manage, then it can be hard to see the point. This defeatist attitude is just what the criminals want. However, the truth of the matter is there is plenty you can do to improve your cybersecurity, right now.
-
-
Statistics brings a lot of value
- By Dollie Ring on 06-01-20
By: Zach Webber
-
Essential CISM: Updated for the 15th Edition CISM Review Manual
- By: Phil Martin
- Narrated by: Phil Martin
- Length: 11 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
Essential CISM has been written with a single goal in mind - to present the CISM material in a way that is easy to absorb without leaving any content behind. Plenty of examples are included to drive the points home so that when it comes time to take the CISM exam, you are ready! The book is broken down into two sections. Section 1 covers basic concepts you will need to understand before hitting each domain. The CISM official exam guide is redundant across the domains, and so in this book you will encounter each topic once instead of having to rehash the same subject in different ways.
-
-
Helpful as an addition for the CISM exam Prep.
- By Alex Syvorotka on 05-06-19
By: Phil Martin
-
AWS Certified Solutions Architect Associate
- The Ultimate Guide for the SAA-C02 Exam
- By: Jonathan Anderson
- Narrated by: Tyla Shandro
- Length: 4 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
As the so-called AWS, Amazon Web Services, has been the front runner in cloud computing products and services, and for this reason there is a great demand in this field. The exam may seem complicated for most people, but with this guide, you will no longer have a reason to worry. You'll find the benefits of AWS Cloud and the services that make up the platform, alongside six chapters on experience in designing large-scale distribution systems, an overview of global AWS infrastructure and network technologies, and much more.
-
-
Another poor book with fake positive reviews
- By CZ on 05-19-21
-
Essential CISA Exam Guide: Updated for the 26th Edition
- By: Phil Martin
- Narrated by: Phil Martin
- Length: 22 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Essential CISA has been made with a single goal in mind - to present the CISA material in a way that is easy to absorb without leaving any content behind. Plenty of examples are included to drive the points home so when it comes time to take the CISA exam, you are ready!
-
-
Good material, besides being the currently only
- By Ariel on 12-22-19
By: Phil Martin
Publisher's Summary
The Certified Information System Security Practitioner (CISSP) is the most dominant, most mature and vendor-neutral information security certification.
The CISSP: A Comprehensive Beginners Guide to Learn and Understand the Realms of CISSP from A-Z is aligned to provide a simplified, easy-to-understand, and concise learning pack to get started and prepared for the examination. This book covers A-Z on CISSP, in other words, all the eight domains and nothing less. The content included in the book provides the latest information according to the most recent CISSP exam curriculum.
- Security and Risk Management
- Asset Security
- Security Architecture and Engineering
- Communication and Network Security
- Identity and Access Management (IAM)
- Security Assessment and Testing
- Security Operations
- Software Development Security
The book includes additional information for difficult topics, including tables, and graphics. The topics also include references to resources, including the links to governing bodies, compliance requirements, issues and official websites and their references. Such information helps the reader to obtain more information and get him/herself organized as both a student, as well as a security practitioner.
Each chapter covers a complete CISSP domain in a clear and concise manner with information that guides you to the next domain. The book also includes all of the information required to register and to prepare for the CISSP examination, including tips and references to the required websites and courseware.
Certified Information System Security Practitioner (CISSP) is one of the leading information security certification and accreditation awarded by the (ISC)2. As of 2019, there are 136,000+ CISSP members worldwide in 171 countries.
CISSP: A Comprehensive Beginner's Guide to learn the Realms of Security and Risk Management from A-Z using CISSP Principles is a comprehensive guide for students and professionals who are willing to follow or already following the CISSP studies.
The book covers the first domain of the CISSP realm and is written with carefully structured content providing a step-by-step learning process so you go through a well-structured learning path with scenarios and real-world examples. It includes the latest information and statistics and follows the most recent syllabus released by (ISC)2. Let's look at the content at a glance.
- Information about CISSP and the examination, everything you want to know.
- Information security risks, threats, and vulnerabilities.
- Information security concepts, confidentially, integrity, security.
- Cryptography basics.
- Security and governance principles in an organization.
- Security policies, standards, procedures, guidelines, baselines, and more.
- Organizations and information security laws, regulations, compliance, and standards.
- Information security, compliance, and risk management.
- Risk Management methodologies, frameworks, Business continuity.
- Professional ethics.
- Personal security policies and procedures.
- Privacy and its role in customers, employees, and organizations.
- Risk management in the supply chain.
- Security awareness training and education.
- And more...
The book includes additional information on difficult topics as the beginners should have a proper foundation. CISSP is a challenging topic, and therefore, the foundation topics must be well-understood; hence the reader can learn the rest of the domains with confidence. It includes extensive information on risk management, security, and global frameworks.
What listeners say about CISSP: 3 in 1
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Dollie Ring
- 07-18-20
It establishes the topics for review
Data availability means you are able to access the data or information you need when you need it without any delays or long wait times. There are lots of threats to the availability of data. There can be many disasters, such as natural disasters causing major loss of data. There can also be human-initiated threats, like Distributed Denial Of Service attacks (DDoS) or even simple mistakes or configuration faults, internet failures or bandwidth limitations.
To provide continuous access, it is important to deploy the relevant options. The routine maintenance of hardware, operating systems, servers, applications through fault tolerance, redundancy, load balancing and disaster recovery measure must be in place. These will ensure high availability and resiliency.
There are technological deployments (hardware/software), such as fail-over clustering, load balancers, redundant hardware/systems and network support to fight availability issues.
24 people found this helpful
-
Overall
-
Performance
-
Story
- Sidney
- 07-26-20
Get it
Due Diligence is the understanding of governance principles and risks your organization has to face. This process involves the gathering of information, assessment of risks, establishing written policies and documentation, and distributing this information to the organization.
Due care is about the responsibilities. In other words, it is about your responsibility within the organization and the legal responsibilities to establish proper controls, and follow the security policies to take reasonable actions and make better choices.
These two concepts can be confusing. For the ease of understanding, you can think due diligence as the practice by which the due care can be set forth.
21 people found this helpful
-
Overall
-
Performance
-
Story
- Williams
- 07-27-20
What you need to study
In 2003, The USA Department of Defense (NSA) adopted the CISSP as a baseline in order to form the ISSEP (Information System Security Engineer Professional) program. Today it is considered one of the CISSP concentrations. CISSP also stands as the most required security certification in LinkedIn. The most significant win it reached is to become the first information security credential to meet the conditions of ISO/IEC Standard 17024. According to (ISC)2, CISSP works in more than 160 nations globally. More than 129,000 professionals currently hold the certification and this implies how popular and global this certification is. Information security as a carrier is not a new trend and the requirements, opportunities and salary has grown continuously. To become an information security (Infosec) professional takes dedication, commitment, learning, experimentation and hands on experience. To become a professional with applied knowledge takes experience, which is a critical factor. There are lots of Infosec programs and certifications worldwide. Among all the certificates, such as CISA, CISM etc., CISSP is known as the elite certification, as well as one of the most challenging, yet rewarding.
19 people found this helpful
-
Overall
-
Performance
-
Story
- Stephanie Medders
- 07-28-20
CISSP Killer
Rsk is or can be defined as a step toward evolution. In day to day life, taking a risk to obtain a goal (i.e. a reward) is crucial. When it comes to information technology, the risk is something that comes along with the territory. There are many industries that integrate information technology into their daily operations. Take for example, the healthcare industry or the banking, information technology operates within the core levels. This comes with a huge risk in terms of information exposure, theft, and corruption. The calculation of assessing the associated risk, implementing and testing measures, mitigating the risks become a core responsibility of the security and management. In the current information technology atmosphere, there are many risks associated with the components of a system. This can range from a simple display panel to complex machinery in a nuclear power plant. Risk management involves the process of understanding, assessing (analysis) and mitigating the risks to ensure the security objectives are met. Every decision-making process inherits the risks and the risk management process ensures the effectiveness of these decisions without having to go through the security failures.
18 people found this helpful
-
Overall
-
Performance
-
Story
- Betty Murtagh
- 07-30-20
IMHO best explanation
Certified Information Systems Security Professional is the world’s premier cyber security certification (ISC)2. The world’s leading and the largest IT security organization was formed in 1989 as a non-profit organization. The requirement for standardization and maintaining vendor-neutrality while providing a global competency lead to the formation of the “International Information Systems Security Certification Consortium” or in short (ISC)2. In 1994, with the launch of the CISSP credential, a door was opened to a world class information security education and certification. CISSP is a fantastic journey through the world of information security. To build a strong, robust and competitive information security strategy and the practical implementation is a crucial task, yet a challenge that is entirely beneficial to an entire organization. CISSP focuses on an in-depth understanding of the components of critical areas in the information security. This certification stands out as proof of the advanced skills, and knowledge one possesses in terms of designing, implementing, developing, managing and maintaining a secure atmosphere in an organization.
15 people found this helpful
-
Overall
-
Performance
-
Story
- Anthony Reid
- 08-02-20
One of the best options to study if you want to be
One of the best options to study if you want to become a CISSP
Personal Identifiable Information are sensitive to customers, employees, vendors, consultants and other parties. Therefore, such information must be kept safe. Only the indented party must be able to obtain and use the information. This process must also be audited to ensure trustworthiness. There must be a documented privacy policy to describe what types of information are covered and to who it is applied.
Risk management is the process of determining the threats, and vulnerabilities, assessment of the risks, and risk response. The reports resulting after this process are sent to management to make educated and intelligent decisions. The team involved is also responsible for budget controls. A real-world scenario is that the organization management is spending less money and time to reduce the risks to a certain level.
A vulnerability is an exploitable problem. When a vulnerability is present, a threat is a possibility. These two are linked, as you understand now. There are known and unknown vulnerabilities. As an example, a computer may have a bug if it is unpatched. If this already has a patch, but not applied, it is a known threat. If no one except a malicious user knows it, it is an unknown threat. Identifying these is not easy in real-life situations.
13 people found this helpful
-
Overall
-
Performance
-
Story
- Morris
- 08-04-20
Here is the Highest complement I can give ........
Here is the Highest complement I can give the Study ...
When it comes to establishing an information security strategy, the decision must come from the top of the organization’s hierarchy. The organization’s governance or the governing body must initiate the security governance processes and policies to direct the next level management (executive management). Which means the strategy itself, the objectives and the risks are defined and executed in a top-down approach. The strategy must be in compliance with the existing regulations as well. The executive management must be fully aware/informed of the strategies (visibility) and have control over the security policies and the overall operation. In the process, the teams must meet and review the existing strategy, incidents, introduce new changes when as required and approve the changes accordingly. This strengthens the effectiveness, and ensures that the security activities are continuing while mitigating risks, while the investment on security is worth the cost. Many organizations must satisfy one or more compliance requirements. There can be one or more applicable laws, regulations, and industry standards. The consequence of non-compliance can be severe, as the act directly violate regulations, which include state laws and regulations. The worst-case scenario is the end of business followed by a considerable fine. Therefore, compliance is a very important topic to discuss and understand.
9 people found this helpful
-
Overall
-
Performance
-
Story
- Terry
- 07-30-20
Outstanding!
I passed the CISSP exam preparing with this course (just hearing it 2 times and answering the questions).
7 people found this helpful
-
Overall
-
Performance
-
Story
- Amazon Customer
- 12-28-20
Good book, terrible narration.
I'm about 3 hours in, and the book feels good and informative in the right places, but the narration is awful. The narrator pauses in weird places (prepare yourself for repeated "C...ISSP" and mid-sentence pauses that sound like end-of-sentence pauses, making it difficult listen and actually glean the information correctly). The important thing for the written book is that it touches on all of the domains and provides adequate coverage. This may not quite rise to that level... it's a good beginning look but doesn't seem to go quite in-depth far enough in some places (like cryptography). But in an audio presentation, it's important that the thoughts (sentences) flow together so you can pick up the information, and that's where this one falls short.
6 people found this helpful
-
Overall
-
Performance
-
Story
- Anne Vierra
- 08-09-20
A needed book for the Cybersecurity professional
The instructor does a great job of explaining the information. I like that the information is organized and flows, allowing me to understand the connection of each subject.
3 people found this helpful
-
Overall
-
Performance
-
Story

- Sylvia Livingston
- 07-28-20
Must have for the CISSP exam
Must have for the CISSP exam
Awesome Awesome & amazing course. Thank you very much for making things simple.
1 person found this helpful
-
Overall
-
Performance
-
Story

- Wojciech Basalaj
- 05-12-22
Awful audiobook, material OK
i am very annoyed that I bought this audiobook guided by positive reviews, and I don't understand how can anybody find it a good audiobook. The material is OK*, but the person reading it is performing so, so badly!
1. The most annoying part: he cannot be a voice artist, because he invents his own punctuation - making pauses in the middle of a sentence, wirhout any reason, and on the other hand, rushing with more sentences when he should pause to emphasize something, like the beginning of a new section. This alone makes this book unbearable to listen to.
*) I'm not even sure if the material is "OK", because often this bad punctuation is so distracting that it is difficult to focus on the meaning.
2. He clearly doesn't understand the material even on a basic level, and because of that all he reads come across as a bunch of words that carry little meaning.
3. Just a little thing: he clutches his throat at the end of most words (there are pauses in the middle of sentences, remember?) which is unpleasant to hear.
Overall, I regret buying the audiobook, and advise to avoid it. And to maybe get a better voice artist to re-read this book.