• Cybersecurity: 3 Books in 1: Beginners, Intermediate and Advance Guide in Cybersecurity Measures Effectively

  • By: Zach Webber
  • Narrated by: William Bahl
  • Length: 4 hrs and 28 mins
  • 4.7 out of 5 stars (51 ratings)

1 title per month from Audible’s entire catalog of best sellers, and new releases.
Access a growing selection of included Audible Originals, audiobooks and podcasts.
You will get an email reminder before your trial ends.
Your Premium Plus plan is $14.95 a month after 30 day trial. Cancel anytime.
Buy for $14.95

Buy for $14.95

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's Summary

Beginners: Each week it seems that some major corporation or another is having serious issues, thanks to the leaks of some malicious hacker. Hearing stories like this can make it seem difficult, if not impossible, for individuals and smaller organizations to ensure their own cybersecurity to keep their own information private. This defeatist attitude is just what the criminals want, however, and the truth of the matter is there is plenty you can do to improve your cybersecurity right now. 

While everyone knows that they need to exhibit some level of caution when interacting with the online world, with the bounds of technology changing all the time, this can be easier said than done. Luckily, this is where this book comes in to discuss the types of cybersecurity you should care about and how to put them to use for you in a way that is proven to be effective in both the short and the long-term. 

Inside you will find easy ways to identify potential security threats at a glance, top cyber threats and how to stop them in their tracks, ways to put the world’s crippling shortage of cybersecurity professional to work for you, tips for ensuring your personal cybersecurity is up to snuff, special considerations to keep in mind when keeping your smart devices secure, and more.

Intermediate: The purpose of this book is to inform listeners about cybersecurity, hackers, and the Internet in general. A lot of people are unaware how hackers can get their privileged information or what security measures they need to take in order to avoid falling victim to these hackers or cybercriminals. 

This book explains the types of threats that people can be exposed to while their device is connected to a network, why hackers engage in the activities that they do, what happens to personal data once it has been compromised, and much more.

Advanced: The book considers the problems of related to cyber security in the individual, as well as the organizational setting. Cyber security is essential to the organization considering the growing technological dependencies that organizations are continuously facing. The book considers the nature of threats of cyber-crime from hacking to data manipulation.

The text also considers intrusions related to corruption of information and its theft where the organization suffers from loss of crucial data. Conversely, there is data manipulation where the information is corrupted without the knowledge of the users in the organization. The book tackles the methods of dealing with these types of intrusions and how to mitigate risk through policy changes.

These policies are known as risk management framework for the organizations to secure their data from the basic levels to advanced security settings. These include the steps for cyber security planning maturity, addressing process risks and elements related to personnel vulnerabilities.

©2018 Zapata Publishing (P)2018 Zach Webber

What listeners say about Cybersecurity: 3 Books in 1: Beginners, Intermediate and Advance Guide in Cybersecurity Measures Effectively

Average Customer Ratings
Overall
  • 4.5 out of 5 stars
  • 5 Stars
    40
  • 4 Stars
    8
  • 3 Stars
    2
  • 2 Stars
    0
  • 1 Stars
    1
Performance
  • 5 out of 5 stars
  • 5 Stars
    43
  • 4 Stars
    5
  • 3 Stars
    1
  • 2 Stars
    1
  • 1 Stars
    0
Story
  • 5 out of 5 stars
  • 5 Stars
    42
  • 4 Stars
    7
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Statistics brings a lot of value

According to Techopedia, a network is a group of linked computers intended to allow the computers to share information amongst one another, like the internet, local area network (LAN), and wide area network (WAN). These networks can only exist if devices have a medium to transmit data through. This medium connects hardware together which allows the transfer of data and communication.

Today, these hardware components include PCs, intercommunications, switches, routers, WLAN devices, and servers. Without computers to connect to one another, there would be no need for a network. That being said, PCs are a critical component of networks. Each individual computer is referred to as a node in a network.

The more network security an individual has, the less chance there is of a hacker accessing their data and files.

Network security is the process by which measures are taken to prevent unauthorized access, misuse, or modification of information passed over a network. In other words, network security simply means that any computers accessing a private network are protected from any forms of cyber theft or manipulation.

24 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

For greater computer security awareness!

This book covers verified steps and tactics on how to increase the level of Cybersecurity in the organization and as an individual. It sheds light on the potential weak points which are used as infiltration points and gives examples of these breaches. Hence, the book provides policies and strategies meant to tackle the developing threats of cybercrime in a technologically dependent world.

Cybersecurity has come a long way from the days that hacks could only be perpetrated by a handful of individuals, and they were mostly done on the larger firms or government databases. Now, everyone with a mobile device, home system, car infotainment, or any other computing device is a point of weakness for malware or concerted attacks from hackers. We have adopted anti-viruses and several firewalls to help prevent these issues to the point we have become oblivious to the majority of the attacks. The assistance of malware blocking tools allows our computing devices to fight thousands of attacks per day. Interestingly, cybercrime is a very lucrative industry, as has been proven by the constant investment by criminals on public information. It would be wise to pay at least half as much attention to your security.

It is not just enough to plug the hole but to also safeguard it against future attacks. The key is to be preventive and creative, rather than reactive to such attacks. These are all factors that need to be considered in the event of infiltration, but not all corporations have such protocols.

22 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Now more than ever!

Cybercriminals tend to gravitate to the weakest point within the company defenses, and that usually means going after the personnel and the customers. Bank accounts have typically become part of the technology footprint; for example, with account information being contained on personal computers and mobile devices. The criminals would seek to compromise the data security in different ways, such as the installation of malware, often with phishing emails to compromise the data security of the customer and emulation of unsecured Wi-Fi facilities in restaurants, airports, and cafes. Thieves have been known to create fake accounts, so they direct traffic where they want it to go. It’s one of the biggest issues when it comes to the financial institutions, especially if multiple departments are responsible for the management of the risks that are related to cybersecurity. In an age where the cybercriminals are able to do a lot of damage, there is a case for the aligning or integration of different functions like fraud, IT security, and compliance.

20 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Know tech vulnerabilities

Today’s world and its technological wonders bring many conveniences, but along with that come risks and a responsibility to understand the basics, to be able to lessen those risks and put protective measures in place. The following chapters will provide clear, easy-to-understand definitions and explanations for users at every level of expertise. It starts by describing cybersecurity and its various types and what they could mean to you. Next, you will learn about a variety of different cyber threats and proposes ways to protect yourself and/or your business from them in both the short and the long-term. It also describes careers in this growing and vital field, including engineer and analyst, among others. You will then learn all about how to maximize your personal cybersecurity to the fullest before learning about additional cybersecurity practices and means of protection to try. There are plenty of books on this subject on the market, thanks again for choosing this one! Every effort was made to ensure it is full of as much useful information as possible, please enjoy!

17 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

an American hero that fights against cyber crime!

The United States Government employees a fair portion of the contractor cybersecurity force in the country today. As such, that means if you want to ensure you are qualified for as many different positions as possible you will need to ensure that you are able to obtain security clearance for the type of work that can easily require access to secure information. Unfortunately, this can mean sticking to a fairly strict personal lifestyle as well. Depending on your level of security clearance, you may need to report when and where they travel, what their current debts might be and possibly even who they speak with. Failing to monitor such interactions, and a host of others could ultimately put your clearance in jeopardy. It is also a significant amount of work to obtain a higher security clearance, so it is up to you if access to many higher-paying jobs is worth the hassle. Cybersecurity job postings increased nearly 75 percent between 2012 and 2017 and, regardless of what type of career you are interested in pursuing, the job prospects are excellent across the board. What follows are some of the different job options that those in the cybersecurity industry are currently looking to explore. What follows are some of the most popular options on the market today.

12 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great Book for Businesses

A business impact analysis is a crucial component when it comes to preparing a contingency plan in case your system is attacked in a serious way. This plan should provide your organization with two key components, interdependencies and a classification and characterization of relevant components. To plan for this type of scenario, an organization is going to need to address the accessibility of available resources including mission critical applications and systems, contact information for crucial external contacts, contact information for essential personnel and a secure communication channel for each. It is also important to have all major vendor contact details, points of contact when it comes to organizational procurement and back up ISO files for all critical applications and systems.

7 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great book,

All computers and devices are attacked by viruses, banking networks are attacked regularly, databases of the state are daily trying to be hacked . Someone wants to gain access to our information all the time and it must be reliably protected at all levels, and the more the security expert is aware, the more possible attempts to crack and steal data it can prevent. To protect my data and personal information I’d like to know more about cyber security in order to get my information safe.

7 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Can we be more secure? YES! Thanks you Zach !!!

The objective of this book is to point out the potential areas of weakness in facilities and as an individual, and give frameworks and defense strategies which would significantly reduce the chances of being infiltrated. This includes establishing a risk management framework, which entails integrating cyber risk into the firm problems and making it a managerial priority. The company is meant to adapt cyber risk into its risk mitigation and defense strategies; this will be molded into its organizational behavior and become part of the process. The book also addresses things such as process risks, which deal with the operations of the institution. From there, the company should be able to redeploy the assets and undertake the enforcement of access control, logging, and monitoring for more secure activities. The book also considers people as essential risks to the organization. This point of weakness is tricky considering it can happen at any time. People need to be made aware of the potential danger they pose to the security systems of a company.

4 people found this helpful

  • Overall
    3 out of 5 stars
  • Performance
    2 out of 5 stars
  • Story
    4 out of 5 stars

Could be better but could be worse.

Couldn’t tell if the narration was a computerized voice but it certainly sounded like it. Parts of the book had decent information and others not so much. Sometimes it was hard not to tune out and so I might have missed some things but won’t be listening to it again. Honestly, these types of books aren’t usually the best audio books so it’s not really too much of a surprise.

1 person found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Crisp and concise - easy for anyone

Once you have made it through the chapters of this book and implemented what you have learned, it can be easy to start to feel invincible when it comes to combating threats to your cybersecurity. Letting this feeling go unchecked will only lead to a loss in the future, however, as the number one lesson you should keep in mind is that feeling safe around cyberthreats will only lead you to underestimate them and leave yourself open for attack in the future. As such, no matter how prepared you feel to meet online threats head-on, it is important to approach any unknown situation with a little bit of fear. That fear is what is going to keep you and your data safe in the longterm. Remember, cybersecurity is a marathon, not a sprint, slow and steady wins the race.

1 person found this helpful

Sort by:
Filter by:
  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars
Profile Image for Efren Bright
  • Efren Bright
  • 07-02-20

Accessible and Authoritative

Webber does a great job explaining how his technique can be applied to cyber security and the book is full of practical examples

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars
Profile Image for Gary Barbara
  • Gary Barbara
  • 06-27-20

Don’t be the next victim of cybercrime The book i

Don’t be the next victim of cybercrime

The book is very useful for cyber-security specialist. Highly recommend it to everyone.

  • Overall
    1 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    2 out of 5 stars
Profile Image for Simon
  • Simon
  • 01-04-19

A robot reading it?

This seemed like good information, but the actor reading it was relentless, unpausing, and very difficult to listen to. Was it an automated text to speech program?

Couldn't finish.