-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged Audiobook
- Categories: Computers & Technology, Security & Encryption
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $14.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
Cybersecurity Bible
- Security Threats, Frameworks, Cryptography & Network Security: 4 Books in 1
- By: Hugo Hoffman
- Narrated by: Matyas J.
- Length: 11 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Bible is a book bundle that includes four books: 25 Most Common Security Threats & How To Avoid Them, 21 Steps for Implementing the NIST Cybersecurity Framework, Cryptography Fundamentals & Network Security, and How to Get into Cybersecurity Without Technical Background.
-
-
This book is a waste of time and money
- By Richard Sikes on 04-04-21
By: Hugo Hoffman
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Cybersecurity
- A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 3 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to discover how to protect yourself, your family, and business against cyber attacks, then pay attention...Have you been curious about how hackers choose their victims or develop their attack plans? Have you been hacked before? Do you want to learn to protect your systems and networks from hackers? This audiobook serves as a launchpad for learning more about the Internet and cybersecurity. Throughout this audiobook, you will take a journey into the world of cybercrimes and cybersecurity.
-
-
Secure your information through this audiobook.
- By Roger Strong on 08-24-21
By: Quinn Kiser
-
Computer Networking
- An All-in-One Beginner's Guide to Understanding Communications Systems, Network Security, Internet Connections, Cybersecurity and Hacking
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. It focuses on enabling you to create a strong foundation of concepts of some of the most popular topics in this area.
-
-
Great for beginners.
- By Mia A Cross on 09-23-20
By: Quinn Kiser
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- By: Norman Laurence
- Narrated by: Cole Niblett
- Length: 14 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Computer Networking: All in One contains all the knowledge you need to achieve your goals in the computer world.
-
-
Almost unlistenable
- By Kelly A. Ohlert on 12-31-21
By: Norman Laurence
-
Cybersecurity Essentials
- By: Charles J. Brooks, Christopher Grow, Philip Craig, and others
- Narrated by: Ryan Burke
- Length: 17 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Not made for audio...
- By Kassandra Clauser on 06-07-19
By: Charles J. Brooks, and others
-
Cybersecurity Bible
- Security Threats, Frameworks, Cryptography & Network Security: 4 Books in 1
- By: Hugo Hoffman
- Narrated by: Matyas J.
- Length: 11 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Bible is a book bundle that includes four books: 25 Most Common Security Threats & How To Avoid Them, 21 Steps for Implementing the NIST Cybersecurity Framework, Cryptography Fundamentals & Network Security, and How to Get into Cybersecurity Without Technical Background.
-
-
This book is a waste of time and money
- By Richard Sikes on 04-04-21
By: Hugo Hoffman
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Cybersecurity
- A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 3 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to discover how to protect yourself, your family, and business against cyber attacks, then pay attention...Have you been curious about how hackers choose their victims or develop their attack plans? Have you been hacked before? Do you want to learn to protect your systems and networks from hackers? This audiobook serves as a launchpad for learning more about the Internet and cybersecurity. Throughout this audiobook, you will take a journey into the world of cybercrimes and cybersecurity.
-
-
Secure your information through this audiobook.
- By Roger Strong on 08-24-21
By: Quinn Kiser
-
Computer Networking
- An All-in-One Beginner's Guide to Understanding Communications Systems, Network Security, Internet Connections, Cybersecurity and Hacking
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. It focuses on enabling you to create a strong foundation of concepts of some of the most popular topics in this area.
-
-
Great for beginners.
- By Mia A Cross on 09-23-20
By: Quinn Kiser
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- By: Norman Laurence
- Narrated by: Cole Niblett
- Length: 14 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Computer Networking: All in One contains all the knowledge you need to achieve your goals in the computer world.
-
-
Almost unlistenable
- By Kelly A. Ohlert on 12-31-21
By: Norman Laurence
-
Cybersecurity Essentials
- By: Charles J. Brooks, Christopher Grow, Philip Craig, and others
- Narrated by: Ryan Burke
- Length: 17 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Not made for audio...
- By Kassandra Clauser on 06-07-19
By: Charles J. Brooks, and others
-
Networking for Dummies, 11th Edition
- By: Doug Lowe
- Narrated by: David Stifel
- Length: 13 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Need networking know-how, but don't know where to turn? Run-don't walk-to the no-nonsense networking guidance offered in this friendly guide! Whether you're a networking administrator or an everyday computer user looking to set up a network in your home or office, Networking for Dummies, seamlessly gets you connected with the basics and gives you the knowledge to work out whatever kinks may come your way-in no time.
-
-
Comprehensive superficial review
- By Ward on 01-14-20
By: Doug Lowe
-
CompTIA Security+
- Study Guide for the CompTIA Security+ Certification (Exam SY0-501)
- By: Samuel Foster
- Narrated by: Eli Brennan
- Length: 3 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
You are about to learn how to ace CompTIA Security+ (SY0-501) exams - the easy way to grow your IT career!
-
-
Phenomenal study guide.
- By Ririe Fikriani on 10-31-21
By: Samuel Foster
-
Hacking with Kali Linux
- The Step-by-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
- By: David James Carmack
- Narrated by: Ivan Busenius
- Length: 3 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
Why should you learn hacking? First, to protect yourself. Cyber criminals are everywhere, stealing people’s sensitive data, infecting computers with ransomware, and gaining access to bank accounts. Once you’re aware of the techniques they use, you’ll be able to defend yourself. Second, you can become a “white hat hacker”, a cyber security expert who helps companies find vulnerabilities in their software. You can earn tens of thousands of dollars for discovering a single bug.
-
Computer Networking
- The Complete Guide to Understanding Wireless Technology, Network Security, Computer Architecture and Communications Systems (Including Cisco, CCNA and CCENT)
- By: Michael B. White
- Narrated by: Jim D. Johnston
- Length: 10 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technology has gradually transitioned from wired to wireless over the years with tons of benefits. From the internet of things to wireless communication, we are all witnesses of the huge benefits of wireless technologies. This audiobook covers various subjects and highlights both the benefits and challenges of wireless technologies.
-
-
This has been one of my favorite books so far
- By Calvin L. Shultz on 07-25-19
By: Michael B. White
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Ethical Hacking
- A Beginner’s Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment
- By: Zach Codings
- Narrated by: Donald Cuddington
- Length: 3 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you feel that informatics is indispensable in today’s increasingly digital world? Do you want to introduce yourself to the world of hacking? Do you want to have a head start in the job market by learning some of the most important future skills? First of all, we’ll need to look at what an ethical hacker actually is. This audiobook is filled with reasons why you should learn Ethical hacking, as well as a few helpful tutorials to help you learn in the quickest way. This audiobook assumes no programming knowledge at the start, so we’ll be teaching you from the ground up.
-
-
Extremely Prescribed Book
- By Michele Dale on 11-11-19
By: Zach Codings
-
CompTIA Network+: A Comprehensive Beginners Guide to Learn About The CompTIA Network+ Certification from A-Z
- By: Walker Schmidt
- Narrated by: Dave Wright
- Length: 3 hrs and 41 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you are just getting into the world of certifications, you have made one of the best decisions of your life. Certifications open avenues for you to succeed in so many ways that you never would have imagined. By attaining a special certification, you stand a chance of getting selected for a position more than anyone else in the same category.
-
-
Not relevant to test
- By HandyMan on 10-31-19
By: Walker Schmidt
-
Hacking with Kali Linux
- A Beginner’s Guide to Learn Penetration Testing to Protect Your Family and Business from Cyber Attacks Building a Home Security System for Wireless Network Security
- By: Zach Codings
- Narrated by: Donald Cuddington
- Length: 5 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Have you always been fascinated by the hackers on TV? Do you want to introduce yourself to the world of hacking? Do you know penetration testing is one of the fastest growing fields? If your answer to these questions is yes then keep reading...Luckily for you, this audiobook tackles that issue, and it comes to a simple conclusion: Kali Linux. Kali Linux was made by hackers, for hackers, so there’s no doubt that it is a must-have piece of equipment for those just starting out and those who have been around the block a few times.
-
-
Step By Step Hacking Guide
- By William on 07-27-20
By: Zach Codings
-
Ethical Hacking: Advanced and Effective Measures of Ethical Hacking
- By: Elijah Lewis
- Narrated by: Ben Herold
- Length: 3 hrs and 30 mins
- Unabridged
-
Overall
-
Performance
-
Story
There is a general belief that all hackers are the equivalent to cybercriminals. This belief is partly as a result of the growing rise in the damage that hackers are causing to computer systems and business organizations. However, this audiobook aims to counter that belief. Hacking is a broad term that is used to describe the work of the ethical hacker and the black hat hacker. This audiobook provides a comprehensive explanation of the work of an ethical hacker.
-
-
Very happy to listen to this great audiobook
- By Oscar on 11-14-20
By: Elijah Lewis
-
Hacking with Kali Linux
- The Comprehensive Guide on Kali Linux for Beginners Learn the Basics of CyberSecurity and Hacking
- By: Murphy Rangel
- Narrated by: Luciano Marin
- Length: 3 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook is aimed at beginners, and will take you through the basics of computer hacking. You will learn about the different types of hacking, the primary hacking methods, and different areas of a system that can be hacked. The subsequent section is dedicated about VPN and Tor network. You will discover some basic hacks you can do right away, and be pointed in the direction of software that will assist your hacking escapades.
By: Murphy Rangel
-
Hacking with Kali Linux
- A Complete Guide for Beginners to Hacking, Security, Computer Networking, Wireless Networks, Cybersecurity, Including Linux Basics and Command Lines
- By: Alan Scripting
- Narrated by: Tyler McGuire
- Length: 3 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
This easy-to-use, step-by-step audiobook goes a step further to show you about different techniques and methods as well as ways hackers can get into your network, steal your data, and cause severe damages to you. No matter what you do online, some bad actors are keeping a close watch on you, ready to devour you and your assets. If you are tired of spinning the wheel about your security online, buy this audiobook. Its approach draws from various ways, guidelines, tips, and examples about how hackers can tap into any form of your vulnerabilities on the internet and steal your data.
By: Alan Scripting
-
Cybersecurity for Beginners
- 25 Most Common Security Threats & How to Avoid Them
- By: Hugo Hoffman
- Narrated by: Matyas J.
- Length: 1 hr and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this book, you'll learn how to identify threats that can affect your network, and mitigate against them using some of the best security tools in the industry. This book will cover various security threats that are common against organization's IT infrastructures. If you are interested in the field of networking or security administration, this book is for you. If you're in the IT sector or want to switch careers within the IT sector, this book is perfect for you to learn the security threats that you need to be aware of.
By: Hugo Hoffman
Publisher's Summary
If you want to learn the basics of computer networking and how to protect yourself from cyber attacks, then pay attention...
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. It focuses on enabling you to create a strong foundation of concepts of some of the most popular topics in this area.
We have provided a one-stop highway to learning about the fundamentals of computer networking, internet connectivity, cybersecurity, and hacking.
In part two, you will take a journey into the world of cybercrimes and cybersecurity. The information is designed to help you understand the different forms of hacking and what you can do to prevent being hacked. By the end of this part, you may decide to pursue a career in the domain of information security.
In part two, you will discover the following:
- The importance of cybersecurity
- A brief history of cybercrime, the different types, and its evolution over the years
- The various types of cyberattacks executed over the internet
- The secrets of phishing attacks and how you can protect yourself against them
- The different kinds of malware that exist in the digital world
- The fascinating tools to identify and tackle malware
- Ransomware and how attackers leverage technology to make money
- The nine security testing methods you can learn to do
- Network security, web application security, and smartphone security
- Examples of different types of hacks and past incidents to emphasize the need for cybersecurity
The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
So, if you want to learn about computer networking and cybersecurity in an efficient way, then scroll up and click the "buy now" button!
More from the same
What listeners say about Computer Networking and Cybersecurity
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Scott Redfern
- 10-01-21
Antiquated technology
This book says it was released in Oct of 2020 but it repeatedly refers to technology that is 20 years old. I keep thinking that it will come around to technology from the current millennium but it persists in discussing 10base2, hubs. 100baseT as current technologies of choice. They neglected to talk about the pony express as a recent foe of communication, but I’m sure that was just an oversight. I could have gone to the museum of computer science for this type of information. I can’t wait for the cyber security section!
5 people found this helpful
-
Overall
-
Performance
-
Story
- Romana Demming
- 01-02-21
Cyber Security
Cybercriminals are everywhere and they will attack without information. The situation resembles impossible. However, through his well-thought-out strategy, the author examines a powerful plan we can complete to protect our computers, tablets, and phones, from those who would do us harm.
-
Overall
-
Performance
-
Story
- Johnie Fordham
- 01-02-21
Hacker vs Cracker
Python is being used in schools to teach kids coding. It’s nice to have a written back up to help at home. The author distinguishes a cracker from a hacker as someone who has self-interest, looking for selfish gains while an ethical hacker will help expose vulnerabilities of a system and can also get information that could be used for a good cause such as helping the police.
-
Overall
-
Performance
-
Story
- Oda Henricks
- 01-02-21
Protect your data
With so many people online these days, people are unprotected from hackers. This work will give you strategies to protect your data.
-
Overall
-
Performance
-
Story
- Nathan Whisnant
- 01-02-21
Protect your business against cyberattacks
Cyberattacks can happen to any organization big or small. Most advances aim to steal credit card information. There are so many types of cybersecurity and different requirements for each one. Learn how to improve your security and secure your business.
-
Overall
-
Performance
-
Story
- Petrus Loots
- 01-02-21
Great protection information
Cybersecurity is a really big problem. My group is always on alert for anything out of the ordinary. I am so glad because I have had problems a few times and they have notified me immediately. This work gives you suggestions for securing your small business, developing your security, and cyber attacks.
-
Overall
-
Performance
-
Story
- Peter Liu
- 01-02-21
Different types of cybersecurity to be aware of
Not preserving your company from cybercrime can be bad for business. Without some type of security for your company, it could be at high risk for cyber-attacks. There are numerous kinds of cybersecurity that you can use to create a good foundation for an excellent security policy.
-
Overall
-
Performance
-
Story
- Ian Latimer
- 01-01-21
self published amature look at cyber secueity
It is a self-published look at cybersecurity and ethical hacking. The content is short 'explanations' of various features of cybersecurity, offering no more information than a quick Google search would bring. The sources used for the manhood of the work are a mix of YouTube and websites such as weird, quoting arbitrary stories as examples of each area of cyber.
-
Overall
-
Performance
-
Story
- Mark Lane
- 01-01-21
different topics regarding cybersecurity
Very interesting listen, it was well thought out with different viewpoints of the cybersecurity World. The information given has a good clutch of the current issues of today's technology savvy society.
-
Overall
-
Performance
-
Story
- Gillian Jones
- 01-01-21
One of the best audible
For a few years, I was looking for an audible that can clear concepts in Cybersecurity. This work comes under that spectrum. It is great to listen to this work and to be very honest whatever I have not learned from my university I am learning from this work. I would say a must book for people who are starting a career in Cybersecurity
-
Overall
-
Performance
-
Story

- Martyn Clements
- 05-07-22
There are better books to buy.
Literally read and I’m assuming this is a poor translation from the original book . Appears to have.not been proof read before recording. Spent more time trying to fill in the missing/correct words. Should be re recorded
-
Overall
-
Performance
-
Story

- Cherry Mills
- 01-01-21
A must for all Cybersecurity practitioners!!
There's great information included such as Zero Trust, Cloud Security, identifying different types of cyberattacks, Cyber Kill Chain, and so much more. Cybersecurity specialists can use this audible as a manual to improve the security posture of their organization as there are some excellent methods explained by two highly qualified experts in the field.
-
Overall
-
Performance
-
Story

- Jennifer Nicol
- 01-01-21
lifecycle in today's cyberscurity landscape
This audible gives a holistic view of the threat management lifecycle in today's cybersecurity landscape. There's loads of coverage on Kali Linux tools for initiatives with recon, exploit, and privilege escalation, followed by defense strategies including threat intelligence for vapor assets. There's no lack of case studies that have happened in the real world, drawing on lessons learned that formed today's cybersecurity methods.