Your audiobook is waiting…

Cyber Security

The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
Narrated by: Gary Westphalen
Length: 2 hrs and 1 min
4.5 out of 5 stars (28 ratings)

$14.95/month after 30 days. Cancel anytime.

OR
In Cart

Publisher's Summary

Cyber security is here to stay.

Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”?

Do you own a business and now becoming aware of how dangerous the cyber threats are to your assets? Would you like to know how to quickly create a cyber security plan for your business, without dealing with any technical jargon?

Are you interested in pursuing a career in cyber security? Did you know that the average starting salary of a cyber security professional ranges from $65,000 to $80,000 and jumps to multiple figures in a few years, depending on how far you want to go.

Here is an interesting statistic, you are already compromised. Yes, at some point, one of your digital devices or activities has been hacked and your information has been sold. If you knew how bad the threats really are, you would never go online again or you would be very paranoid.

And we’re not talking about those ads that suddenly pop up and follow you around everywhere because you were looking at sunglasses for sale on google or Amazon, that’s called retargeting marketing and is totally legal and legitimate.

We’re talking about malware that hides deep in your device watching everything you do and type, just as one example among hundreds

Our society has become saturated with internet-connected devices and trackers everywhere.

From home routers to your mobile phones, most people are easily hacked if targeted. But it gets even deeper than this; technology has advanced now to where most hacks are automated, by software. International hackers have vast networks and computers set up to conduct non-stop scans, pings, and probes for weaknesses in millions of IP addresses and network domains, such as businesses and residential home routers.

Check your router log and you’ll see it yourself. Now most devices have firewalls but still, that is what’s called an persistent threat that is here to stay, it’s growing and we all need to be aware of how to protect ourselves starting today.

In this introductory audiobook, we will cover verified steps and tactics on how to increase the level of cyber security in an organization and as an individual. It sheds light on the potential weak points which are used as infiltration points and gives examples of these breaches. We will also talk about cyber crime in a technologically-dependent world (Think IoT).

Cyber security has come a long way from the days that hacks could only be perpetrated by a handful of individuals, and they were mostly done on the larger firms or government databases. Now, everyone with a mobile device, home system, car infotainment, or any other computing device is a point of weakness for malware or concerted attacks from hackers, real or automated.

We have adopted anti-viruses and several firewalls to help prevent these issues to the point we have become oblivious to the majority of the attacks. The assistance of malware blocking tools allows our computing devices to fight thousands of attacks per day. Interestingly, cyber crime is a very lucrative industry, as has been proven by the constant investment by criminals on public information. It would be wise to pay at least half as much attention to your security.

What are you waiting for, get this audiobook now to get started instantly!

©2019 Noah Zhang (P)2019 Noah Zhang

What members say

Average Customer Ratings

Overall

  • 4.5 out of 5 stars
  • 5 Stars
    22
  • 4 Stars
    4
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    1

Performance

  • 4.5 out of 5 stars
  • 5 Stars
    20
  • 4 Stars
    5
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    2

Story

  • 4.5 out of 5 stars
  • 5 Stars
    23
  • 4 Stars
    4
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    1

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    4 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Good Overview of Cybersecurity

All the information in the book is from a high level with only a basic amount of technical information. There are several sections that give some detail on particular incidents of hacking (such as Stuxnet), but these too only give enough technical detail to help the reader understand what happened.

  • Overall
    4 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Thoroughly informative!

Very well performed and written. Of course my only wish is for the authors to update on an annual basis because so much happens in this realm within a few months even!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

good easy to understand cyber security

Very holistic and thorough account of how cybersecurity happened...with cat videos to help keep it pithy. I know more than ever about cyber threats to our digital world because of this book

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great book on the future of cyber!

This was a required book for one of my graduate school courses and I highly recommend it to anyone interested in the subject. Only criticism is when the narrator correctly pronounced Chinese names, but somehow mispronounces well known military acronyms.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great resource for all novice on Cyberspac

Though a long and at time meaty material, if you stick with it you will realize you have learned a great deal.
This book did a great job setting the foundation and building slightly on it.
Recommended for all who don’t know anything about cyberspace and cyber Warfare.

Lastly, it significantly educates the common man/woman on what they need to do to be protected and safe using computers, the internet, and mobile devices.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

excellent overview of cyber security

highly recommended for a birds eye view of personal cyber security. I recommend following the guidelines provided in the book to protect yourself. if you live on the internet, this is a great manual to use for protection guidance.

  • Overall
    4 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    4 out of 5 stars

It is quite helpful, too!

I learned so much information and events about cybersecurity that I once never knew! Very helpful for getting into the field. Covers the basics and informative

  • Overall
    5 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    5 out of 5 stars

An Excellent Cybersecurity Resource

I found this to be a very good book on Cybersecurity. This book is very readable and one that I will likely refer back to often. The authors provide excellent resources, tools and websites to refer to for further study.

  • Overall
    5 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars

A good general explanation of Cybersecurity

A well thought out, intelligently written book on digital security issues and how to combat them, both before and after an attack. Great use of index of terms with their definitions at the end of the book.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Lovely Cybersecurity Book.

There are some parts, have to admit, i skimmed. But in general it is an outstanding book for anyone who doesn't know where to start!

Sort by:
Filter by:
  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Dobson
  • Dobson
  • 11-01-19

This is a recommended listen.

What I like best about this is that it assumes you have virtually no knowledge of the security field, can operate a computer with some skill, and understand how to follow directions. The high-level view is really best for the true novice and helps to take away some of the intimidation of the field. I have been meaning to learn to hack all this time and this book has just got my attention. I have learned so many things from this book that can help me with some hacking kinds of stuff. This is a recommended listen.

  • Overall
    4 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    4 out of 5 stars
Profile Image for Alisha
  • Alisha
  • 11-01-19

Guide to computer hacking

I purchased this book to see if there were any tips or tricks that I could pick up on. It is really easy to listen and follow. Also, it has a great format. This book has turned out to be the most beneficial book so far in my studies. It's packed with the baby steps needed for penetration testing. This has given me enough knowledge to seek other reference materials to continue along this track.

  • Overall
    4 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Owens
  • Owens
  • 11-01-19

I like this book

Since this is my first serious exploration of this topic I've just listened through the book with my terminal open, entering the example commands when appropriate and discovering what they do. I will admit that some of this stuff goes over my head but I'm okay with that because the stretch means I'm learning something. Great listen!

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars
Profile Image for Norman
  • Norman
  • 10-29-19

Very good in statistics end

Good book for any level of the person interested in cloud security. It's basic and understandable. 4 stars because I found it a bit repetitive at times and I hoped for a little richer content. Overall a good free book, though.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Dodd
  • Dodd
  • 10-29-19

Helpful book

I found that this book brought me back to my days before retirement where we had to plan everything and DID get good results. A good book and a pleasant reminder!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Bond
  • Bond
  • 10-29-19

Statistics brings a lot of value

This was an eye-opener for me. Applying statistics can bring a lot of value to cybersecurity and this book presents good examples of how to use it. I would highly recommend for cybersecurity professionals but you might want to brush up your statistic background to fully benefit from the topics covered here.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Davis
  • Davis
  • 10-29-19

Required for risk management pros

Absolutely essential for participants in any risk management program who want to get beyond faking things up with 3 level matrices. Quantitative risk analysis requires accuracy, but not absolute precision. This book gives great practical examples and training for getting to as much accuracy as you need for a given application. Study it, and make better decisions for your program.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Welch
  • Welch
  • 10-29-19

Cybersecurity risk measurement reimagined

The Audible version is well done, with the first two sections easy to follow and comprehend with only a few rewinds for grasping the intricacies of the theory. However, the third section is nearly impossible to follow audibly as the reader is required to voice long and complex Excel mathematical formulas. Of course, this is not a fault of the authors or the performance, just a result of the deep subject matter and detailed examples.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Summer
  • Summer
  • 10-29-19

I found the most interesting aspect of the book

I found the most interesting aspect of the book to be the policy-level discussions of hacking. If a state hacks another state and shuts down a power plant, what constitutes an appropriate response? Does it make sense for the victim state to move the conflict to the “real” world and bomb an attacker’s power plant in retaliation? Also, the difficulties in determining just who initiated an attack are explored. All in all, I recommend this book for the reader who wants a good overview of an issue that will likely dominate geopolitics in the coming decades.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Conway
  • Conway
  • 10-27-19

Outstanding

A fascinating book, it provides a comprehensive overview of the current state of cybersecurity and the incredible challenges facing cybersecurity professionals. Very detailed, the authors go to great lengths to point out some very scary vulnerabilities and they also dispel some fears that are probably overblown. Very even-handed in how they approach political perspectives for cyber strategies. The narrator does an excellent job. Highly recommended.