• Computer Networking and Cybersecurity

  • A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
  • By: Quinn Kiser
  • Narrated by: Ivan Busenius
  • Length: 7 hrs and 1 min
  • Unabridged Audiobook
  • Categories: Computers & Technology, Security & Encryption
  • 4.8 out of 5 stars (38 ratings)
adbl_ms_membershipImage_includedwith_altText_B076FLV3HT
adbl_ms_membershipImage_includedwith_altText_B076FLV3HT

1 title per month from Audible’s entire catalog of best sellers, and new releases.
Access a growing selection of included Audible Originals, audiobooks and podcasts.
You will get an email reminder before your trial ends.
Your Premium Plus plan is $14.95 a month after 30 day trial. Cancel anytime.
Buy for $14.95

Buy for $14.95

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's Summary

If you want to learn the basics of computer networking and how to protect yourself from cyber attacks, then pay attention...

Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. It focuses on enabling you to create a strong foundation of concepts of some of the most popular topics in this area.

We have provided a one-stop highway to learning about the fundamentals of computer networking, internet connectivity, cybersecurity, and hacking.

In part two, you will take a journey into the world of cybercrimes and cybersecurity. The information is designed to help you understand the different forms of hacking and what you can do to prevent being hacked. By the end of this part, you may decide to pursue a career in the domain of information security.

In part two, you will discover the following:

  • The importance of cybersecurity
  • A brief history of cybercrime, the different types, and its evolution over the years
  • The various types of cyberattacks executed over the internet
  • The secrets of phishing attacks and how you can protect yourself against them
  • The different kinds of malware that exist in the digital world
  • The fascinating tools to identify and tackle malware
  • Ransomware and how attackers leverage technology to make money
  • The nine security testing methods you can learn to do
  • Network security, web application security, and smartphone security
  • Examples of different types of hacks and past incidents to emphasize the need for cybersecurity

The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.

So, if you want to learn about computer networking and cybersecurity in an efficient way, then scroll up and click the "buy now" button!

©2020 Quinn Kiser (P)2020 Quinn Kiser

What listeners say about Computer Networking and Cybersecurity

Average Customer Ratings
Overall
  • 5 out of 5 stars
  • 5 Stars
    33
  • 4 Stars
    4
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    1
Performance
  • 5 out of 5 stars
  • 5 Stars
    28
  • 4 Stars
    3
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    1
Story
  • 4.5 out of 5 stars
  • 5 Stars
    15
  • 4 Stars
    16
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    1

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    1 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    1 out of 5 stars

Antiquated technology

This book says it was released in Oct of 2020 but it repeatedly refers to technology that is 20 years old. I keep thinking that it will come around to technology from the current millennium but it persists in discussing 10base2, hubs. 100baseT as current technologies of choice. They neglected to talk about the pony express as a recent foe of communication, but I’m sure that was just an oversight. I could have gone to the museum of computer science for this type of information. I can’t wait for the cyber security section!

5 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Cyber Security

Cybercriminals are everywhere and they will attack without information. The situation resembles impossible. However, through his well-thought-out strategy, the author examines a powerful plan we can complete to protect our computers, tablets, and phones, from those who would do us harm.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Hacker vs Cracker

Python is being used in schools to teach kids coding. It’s nice to have a written back up to help at home. The author distinguishes a cracker from a hacker as someone who has self-interest, looking for selfish gains while an ethical hacker will help expose vulnerabilities of a system and can also get information that could be used for a good cause such as helping the police.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Protect your data

With so many people online these days, people are unprotected from hackers. This work will give you strategies to protect your data.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Protect your business against cyberattacks

Cyberattacks can happen to any organization big or small. Most advances aim to steal credit card information. There are so many types of cybersecurity and different requirements for each one. Learn how to improve your security and secure your business.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great protection information

Cybersecurity is a really big problem. My group is always on alert for anything out of the ordinary. I am so glad because I have had problems a few times and they have notified me immediately. This work gives you suggestions for securing your small business, developing your security, and cyber attacks.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Different types of cybersecurity to be aware of

Not preserving your company from cybercrime can be bad for business. Without some type of security for your company, it could be at high risk for cyber-attacks. There are numerous kinds of cybersecurity that you can use to create a good foundation for an excellent security policy.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

self published amature look at cyber secueity

It is a self-published look at cybersecurity and ethical hacking. The content is short 'explanations' of various features of cybersecurity, offering no more information than a quick Google search would bring. The sources used for the manhood of the work are a mix of YouTube and websites such as weird, quoting arbitrary stories as examples of each area of cyber.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

different topics regarding cybersecurity

Very interesting listen, it was well thought out with different viewpoints of the cybersecurity World. The information given has a good clutch of the current issues of today's technology savvy society.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

One of the best audible

For a few years, I was looking for an audible that can clear concepts in Cybersecurity. This work comes under that spectrum. It is great to listen to this work and to be very honest whatever I have not learned from my university I am learning from this work. I would say a must book for people who are starting a career in Cybersecurity

Sort by:
Filter by:
  • Overall
    1 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    1 out of 5 stars
Profile Image for Martyn Clements
  • Martyn Clements
  • 05-07-22

There are better books to buy.

Literally read and I’m assuming this is a poor translation from the original book . Appears to have.not been proof read before recording. Spent more time trying to fill in the missing/correct words. Should be re recorded

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars
Profile Image for Cherry Mills
  • Cherry Mills
  • 01-01-21

A must for all Cybersecurity practitioners!!

There's great information included such as Zero Trust, Cloud Security, identifying different types of cyberattacks, Cyber Kill Chain, and so much more. Cybersecurity specialists can use this audible as a manual to improve the security posture of their organization as there are some excellent methods explained by two highly qualified experts in the field.

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars
Profile Image for Jennifer Nicol
  • Jennifer Nicol
  • 01-01-21

lifecycle in today's cyberscurity landscape

This audible gives a holistic view of the threat management lifecycle in today's cybersecurity landscape. There's loads of coverage on Kali Linux tools for initiatives with recon, exploit, and privilege escalation, followed by defense strategies including threat intelligence for vapor assets. There's no lack of case studies that have happened in the real world, drawing on lessons learned that formed today's cybersecurity methods.