• Cybersecurity: The Ultimate Beginners Guide to Learn and Understand Cybersecurity Measures Effectively

  • By: Zach Webber
  • Narrated by: William Bahl
  • Length: 1 hr and 26 mins
  • 4.5 out of 5 stars (60 ratings)

1 title per month from Audible’s entire catalog of best sellers, and new releases.
Access a growing selection of included Audible Originals, audiobooks and podcasts.
You will get an email reminder before your trial ends.
Your Premium Plus plan is $14.95 a month after 30 day trial. Cancel anytime.
Cybersecurity: The Ultimate Beginners Guide to Learn and Understand Cybersecurity Measures Effectively  By  cover art

Cybersecurity: The Ultimate Beginners Guide to Learn and Understand Cybersecurity Measures Effectively

By: Zach Webber
Narrated by: William Bahl
Try for $0.00

$14.95/month after 30 days. Cancel anytime.

Buy for $6.95

Buy for $6.95

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's Summary

Each week it seems that some major corporation or another is having serious issues thanks to the leaks of some malicious hacker. Hearing stories like this can make it seem difficult, if not impossible, for individuals and smaller organizations to ensure their own cybersecurity to keep their own information private; after all, if the big guys can’t manage, then it can be hard to see the point. This defeatist attitude is just what the criminals want. However, the truth of the matter is there is plenty you can do to improve your cybersecurity, right now. If you like the sound of that, then The Ultimate Beginners Guide to Learn and Understand Cybersecurity Measures Effectively is the book you have been waiting for.  

While everyone knows that they need to exhibit some level of caution when interacting with the Online world, with the bounds of technology changing all the time, this can be easier said than done. Luckily, this is where this book comes in to discuss the types of cybersecurity you should care about and how to put them to use for you in a way that is proven to be effective in both the short and the long-term. So, what are you waiting for? Take control of your technological future and buy this book today.  

Inside you will find:

  • Easy ways to identify potential security threats at a glance
  • Top cyber threats and how to stop them in their tracks
  • Ways to put the world’s crippling shortage of cybersecurity professional to work for you
  • Tips for ensuring your personal cybersecurity is up to snuff
  • Special considerations to keep in mind when keeping your smart devices secure
  • And more
©2018 Zach Webber (P)2018 Zapata Publishing

What listeners say about Cybersecurity: The Ultimate Beginners Guide to Learn and Understand Cybersecurity Measures Effectively

Average Customer Ratings
Overall
  • 4.5 out of 5 stars
  • 5 Stars
    45
  • 4 Stars
    6
  • 3 Stars
    6
  • 2 Stars
    2
  • 1 Stars
    1
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    46
  • 4 Stars
    7
  • 3 Stars
    2
  • 2 Stars
    1
  • 1 Stars
    3
Story
  • 4.5 out of 5 stars
  • 5 Stars
    46
  • 4 Stars
    6
  • 3 Stars
    1
  • 2 Stars
    5
  • 1 Stars
    1

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Statistics brings a lot of value


In September 2014, Home Depot announced that it was hacked, probably during the spring of that year; this hack led to the theft of the credit card information of 56 million customers. The hack began when malware masquerading as antivirus software infected the POS systems of the company's stores. The company had to pay nearly twenty million dollars in damages and identity theft protection services to those whose information had been compromised.

In February 2015, the largest security breach in healthcare history occurred when a group of cyber criminals, allegedly sponsored by a foreign government, hacked into the Anthem Health Insurance website. The attack led to millions of names, addresses, dates of birth, and the personal health information of individuals insured by Anthem to become compromised. The breach began when an Anthem employee opened up a phishing email; that one email led to well over one hundred million dollars in damages.

In the fall of 2016, while Yahoo was in negotiations to sell itself to the company Verizon, it disclosed that back in 2014, it had been hacked. 500 million email addresses, real names, dates of birth, and other sensitive information that can lead to identity theft had all been hacked. In the early winter of 2016, it disclosed that it had also been similarly hacked back in 2013. This security breach led to compromising the information of one billion users. Yahoo lost $350 million in its sell price to Verizon, as well as its good name.

The above information isn't intended to scare you. It's intended to sober you into understanding the importance of cybersecurity and protecting yourself online. You may be thinking that these are major companies, so of course, they will be targeted by hackers. But consider this: companies like Yahoo and Target spend millions and millions of dollars every year in cybersecurity yet were still susceptible to security breaches by hackers.


24 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Process Driven Approach to Day Trading

A stock market index refers to a collection of stocks which are combined together to create a bellwether for a group of similar companies in the market. The idea is to present an index which tracks a certain sector, market, currency, commodity, bond, or other type of financial asset.

Stocks which are collected in such an index are put into a so-called basket. An example of this is easy to understand. A person who wished to invest in the DJIA Dow Jones Industrial Average index would buy into the shares of the index basket that represented the 30 component companies. This means that the investor would then own 30 different companies’ stock shares.

The idea behind indices is that they track the underlying assets or market. The XAU Gold and Precious Metals Index is comprised of those companies which mine precious metals including gold. Purchasing shares in this index means that an investor has the benefit of exposure to the entire gold mining sector. They achieve this without having to acquire shares in all of the gold mining firms of the globe. It is accomplished because shares in XAU represent all of the gold mining shares in the form of the entire industry.

These indices were fashioned to imitate particular markets. This does not mean they will ever be accurate all of the time nor even 100 percent at any given point. This is because there are a wide range of factors that can change the market course which indices will not always capture with perfection immediately.

21 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Xcellent Advice From the Expert

Webber and Bahl are two of the great thought leaders in the cybersecurity landscape. The research and combined years of experience that has gone into this book really shows through and the reader will gain immediate benefit from every chapter.

If you are new to the security field, and want to learn more than just the tools, this book will provide you with the understanding required to define strategies, implement procedures, and refine the tools you have to make a bigger impact in the security posture of your organization.

If you are an experience security expert, there is plenty more to learn. I recommend this audio book to my own teams to ensure they keep testing their own knowledge and improve at every opportunity.

19 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Embrace the uncertainty and change the game

It is also important to ensure that your flow paths for communications are not only well defined but authorized or documented as well. From there, you will want to strive to increase awareness of systems that can be utilized as a gateway to laterally pivot as needed or directly connect to relevant endpoints found anywhere throughout the enterprise. Whatever you do, it is important to do what you can to ensure that these systems are maintained within these restrictive VLANs with appropriate network access control and segmentation as needed.

When it comes to ensuring the right amount of control over who has access to what, it is important that enterprise systems that can interface with numerous endpoints directly all require dual-factor authentication for any interactive logins. Further, it is important to make sure that authorized users are limited to a specific subset of the organization’s personnel. Whatever you do, it is important that the default user group doesn’t have the ability to authenticate or access these systems directly.

You will also need to ensure that unique domain accounts are documented and utilized for every service that involves and enterprise application. The context in which these permissions are assigned to various accounts should always be fully documented and also configured in such a way that the greatest number of users have the fewest number of privileges possible. Doing so provides the enterprise the ability to track and monitor actions that are taken based on assigned service accounts.



15 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Can we be more secure? YES! Thanks you Zach !!!

While cybersecurity has managed to cobble together a handful of codified rules and processes in the years since the internet went mainstream, compared to many industries this field is still relatively light on clear career paths. Information security has grown into a unique career specialization as an off-shoot from general information technology which means it is common for many people to get their start there, but it is far from required. While this means you can’t find a readily available career path and stick to it with blind faith, it does often create a system that favors merit over experience which means that those who want to enter the field from more arcane angles are welcome as well. It doesn’t matter if you are looking to land your first job in the industry or work your way up the chain of command, a proactive mindset is key in this environment. This isn’t the type of position where you can sit back on cruise control and expect benefits to come your way, you need to seek out problems to solve if you hope to be known for solving problems and need to work on your own to earn additional industry certifications to show that you are qualified to take on more advanced rolls in the company. Great choices to start with include the Certified Information Systems Security Professional and the CompTIA Security+ certification. Beyond certifications, it is important to go out of your way to get all the experience you can as only by coming up against threats that you haven’t seen before will you be able to learn how to combat them effectively. If you cannot find paying opportunities to do so, this could include taking on volunteer positions, just to get your feet in the door. Organizations such as the Information Systems Security Association are always looking for volunteers and can also help to put you in touch with companies that may have paying work further down the line.

13 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Cybersecurity, the Whole Picture.

This book offers an overview of essential components and methods of cybersecurity.

The first three chapters of the book contain fundamental knowledge of cybersecurity while the later chapters focus on different methods of cybersecurity.

There are many practical suggestions and war stories to back them up in this Cybersecurity book.

12 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Comprehensive, doable, effective computer security

While it was once possible to expect to purchase a piece of software that was completed at the time of sale, this is no longer the case and new updates and patches for software are released all the time. While it can be time consuming reading through patch notes for the various programs you use, you are going to want to do so to ensure you don’t accidentally miss any that relate to crucial security updates in the process. It is especially important that you manually go to the websites of all of the product’s you are keeping that were preinstalled on your machine and ensure you are using the most up to date version of the software possible. When it comes to ensuring your operating system itself is properly updated, it is important that you turn on the auto-update functionality often found under the security options. Generally speaking, you are going to want to have three levels of passwords, basic, medium and extremely secure. Basic passwords can be used for accounts that you don’t care about and that don’t require any of your private data. Medium passwords can be used for things that have access to your private data, but not information that could be used to steal your identity or your financial data. Finally, extremely secure passwords should all be one-offs and should be used for the most secure of all your data.

11 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Proven to be effective.

An increase in collaboration and the behavioral change in employees may have a big impact on the business. There has to be an attractive advantage of utilizing business controlled secure file-sharing, such that the users will be able to switch from the methods of file sharing they use at the moment. The enterprise users have the ability for using convenient file sharing services like DropBox or even Google Drive. These are tools that can allow the users to access the files at any time on any device, at any appointed location, and make alterations in real time. The issue for companies would be the implementation of enterprise file synchronization tools and policies before the users begin the use of unauthorized solutions. That is only a part of the answer. Companies have to come to terms that just dealing with the file data challenge is going to bring problems during the long term. What is needed would be a solution that creates fully secure workplace collaboration. For example, it is especially important to make sure that the user’s experience of the service is as good as Google Drive. If it is not, then the users would not want to switch over. The users have the expectation level of file-sharing services which have to be matched to enterprises so that users would be able to migrate to more secure platforms.In the creation of a file sharing strategy along the virtual desktop approach, it would be inevitable that this user experience is as better as compared to the laptop experience, for there to be a success. In the case of file sharing, the strategy has to deliver what the users consider as the accepted setting. A way of ensuring this to happen would be to enable more of the capabilities. That would entail having file-sharing abilities that give data backup and protection. It also enables remote office. That will allow for twin objectives to be there, thus creating a secure environment for the enterprise and maintaining a high standard for the user experience. These approaches are some of the significant components when it comes to achieving total security in the cloud. They allow for the IT sector to do its job and make sure that there is stable business continuity for the enterprise.

8 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

To Understand the Atmospherics!

Companies like Yahoo and Target spend millions and millions of dollars every year in cybersecurity yet were still susceptible to security breaches by hackers. Cybersecurity defends computers, programs and data against hard drive crashes, hackers, viruses, direct attacks and other situations that interrupt or destroy the flow of computer work and safety. Companies, organizations and government agencies receive and process volumes of confidential information, then store and transmit that data to other computers. Ever-increasing cyber-attacks at even the highest levels (The Pentagon, e.g.) demonstrate the need for the development of cybersecurity plans to ensure business flow, protect personal confidentiality and safeguard national security. Basic measures of protection include maintaining strong authentication practices (passwords, etc.) and not storing sensitive data where it is openly accessible, but a strong cybersecurity plan must also take into account that the digital world expands continually. The cloud, the use of personal devices at work, the growing internet of things (IoT, the inter-connection of home appliances, autos, digital devices, power plants and more)—all of these have created a need to keep up with progress, or even stay a step ahead of it.

7 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Important to Know

The United States Government employees a fair portion of the contractor cybersecurity force in the country today. As such, that means if you want to ensure you are qualified for as many different positions as possible you will need to ensure that you are able to obtain security clearance for the type of work that can easily require access to secure information. Unfortunately, this can mean sticking to a fairly strict personal lifestyle as well. Depending on your level of security clearance, you may need to report when and where they travel, what their current debts might be and possibly even who they speak with. Failing to monitor such interactions, and a host of others could ultimately put your clearance in jeopardy. It is also a significant amount of work to obtain a higher security clearance, so it is up to you if access to many higherpaying jobs is worth the hassle. Every time a particularly high-profile cybersecurity attack makes the news, the demand for cybersecurity professionals grows a little more. In fact, according to the Bureau of Labor Statistics, cybersecurity jobs are estimated to increase in demand by about 20 percent each year through at least 2025. That’s more than 10 percent higher the average estimate of 7 percent per year for most occupations.

7 people found this helpful

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Ruth Hudson
  • Ruth Hudson
  • 06-01-20

Remarkable book for everyone

This book is a solid guide to understanding what it takes to get a job in information security.

If you’re a recent grad looking to get into the field, or a veteran of another industry, you’ll learn the history, the lingo, and the mindset you need to break into information security.

The author breaks down that you don’t even have to be technical to get a job in information security - strong analytical skills and an appreciation of process are more valuable than being a programmer or having a network engineering background.

It was an enjoyable and informative read.

24 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Efren Bright
  • Efren Bright
  • 06-03-20

If you own an electronic device, please

With smart devices so ubiquitous, it can be easy to be flippant about them when you are out and about, especially if you are busy or otherwise in a hurry. Regardless of the personal cost of the device in question, it is important to not just think about the physical value if the device was lost but the value of the time wasted in changing literally every password and credit/debit card you own. Furthermore, think about the potential value of keeping your identity secure and act accordingly.

Likewise, you should make a habit of keeping an eye on your surroundings when using your device, which will likely be easier said than done. Nevertheless, you should try and pay attention to those around you, including anyone who may be trying to look over your shoulder for a peek at your sweet, sweet data. Generally speaking, if you don’t need your device at the moment, it is best to keep it hidden away from prying eyes, just to be safe. If you are using a company laptop, you may even want to consider a third-party alarm that can be set to ensure that anyone who tries to access the computer without your permission is in for a rude awakening.

Regardless of how important your information is, it is important to have at least one backup of all your data stored in a secure location or, more likely, the cloud. This way you will be able to ensure you are able to get back to where you were as quickly as possible, you will also know exactly what information is now at risk, allowing you to take additional precautions as needed.

The first thing you are going to want to do is report the theft to the proper authorities as they may have procedures in place that you might not be aware of for this sort of thing. It is also important to cancel any mobile data service that is on the device as quickly as possible to delay the culprit as much as possible and give yourself time to change all of the relevant passwords in the interim.


23 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Joseph Lawson
  • Joseph Lawson
  • 06-04-20

A convincing argument for quantitative methods

Along with cutting down on inessential programs, turning off default features you know you won’t be using is a great way to limit potential attack vectors. As such, all you need to do is to is review the features that come with the operating system and customizing those you will be using with as much security as possible while at the same time turning off those you don’t plan on using, after all, you can always turn them back on again later. If you plan on modifying features or services, it is important to research them fully beforehand to prevent damaging the functionality of your system in a way that is difficult to easily fix.

The principal of least privilege refers to the fact that if malware infects a specific user on a computer, it is then limited in the damage it can do based on the privileges that user has access to. As such, a good way to limit the potential threats that you are at risk from is to user a specially created user account that has very limited access for daily user, as well as a secondary full-access account that you only use as needed.

The web browser that comes installed on your new computer is unlikely to have its security settings turned up to the maximum which means you will need to do so, or download a better browser, as soon as you get online for the first time. This is as easy as locating the security settings of your chosen browser and then turning them up to high and there is no excuse for not taking this simple, yet effective, step.

19 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Trumble
  • Trumble
  • 06-05-20

Don’t be the next victim

Cybersecurity defends computers, programs and data against hard drive crashes, hackers, viruses, direct attacks and other situations that interrupt or destroy the flow of computer work and safety. Companies, organizations and government agencies receive and process volumes of confidential information, then store and transmit that data to other computers. Ever-increasing cyber-attacks at even the highest levels (The Pentagon, e.g.) demonstrate the need for the development of cybersecurity plans to ensure business flow, protect personal confidentiality and safeguard national security. Basic measures of protection include maintaining strong authentication practices (passwords, etc.) and not storing sensitive data where it is openly accessible, but a strong cybersecurity plan must also take into account that the digital world expands continually. The cloud, the use of personal devices at work, the growing internet of things (IoT, the inter-connection of home appliances, autos, digital devices, power plants and more)—all of these have created a need to keep up with progress, or even stay a step ahead of it.

18 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Nicole  Dunigan
  • Nicole Dunigan
  • 06-07-20

The book is a must read for everyone using social

While social media makes taking this fact seriously difficult, it is important to ensure that you are comfortable with anyone in the world seeing what you post online. This means more than avoiding posting photos that could be embarrassing ten years down the road, however, it also means avoiding posting pictures that contain information that could be reverse engineered to create details that could let someone access your various accounts without your knowledge. While this might sound easy, consider the last time you went to a hometown football game, odds are that it was your high school, with that, your name and email address, a hacker could be well on their way to gaining access to a site that you secured with a verification question about your high school. The same goes for family, pets, the list goes on and on. Watch what you let others know about yourself: It used to be possible to find a person’s name and contact information, and little else. These days, however, companies are interested in learning as much about you as possible, which means that those who are looking to steal your information have a whole wealth of additional options to choose from. When deciding what information to share with the outside world, keep in mind that the more you put your email address out there, the more spam email you will receive as a result. Likewise, providing details about things like your friends, family, past, job, hobbies, etc. will give those looking to do you wrong additional options when it comes to performing social engineering attacks on you. Don’t forget, anything that you post online is going to be available, in some shape or form, for the foreseeable future. Use some discretion in what you post, after all, you can always post it later.

14 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Taylor John
  • Taylor John
  • 06-08-20

The need for greater computer security awareness!

Computers are an important part of everyday life, but they can also lead to a wide variety of headaches if you don’t take the time to secure them properly, and this starts before you even connect a new computer to the internet. What follows are a number of suggestions to help secure your computer; it is important to keep in mind, however, that while they will help to minimize your risk, they won’t serve to remove it completely, so you will still need to practice safe internet usage for the best results. When you connect your computer to the internet, you are also connecting it to every other internet-enabled computer out there which makes it possible for attackers to access your computer as well. Information flows into your home network from the Internet, starting with your modem, moving to your router and then reaching your computer directly. While the average internet service provider can provide some level of security, it is crucial to ensure that your router is properly secured before you connect to the internet for the first time from a new computer. A firewall is a useful precautionary measure that serves to control the flow of information that moves between your computer and the internet, in much the same way as a router does. Regardless of what operating system you are using, you will find that it includes a firewall built in and you should be sure to set it up to full strength, including a quality password, before you connect to the internet for the first time.While this will likely require you to go online, if you can’t trust the purveyor of malware software to run a clean site, then you probably shouldn’t be dealing with their software in the first place. Many types of antispyware and antivirus software can detect the presence of malware on your system by looking for known files or patterns of memory usage active on your computer. The vendors then provide updated virus signatures to look for in order to ensure that your system stays protected against future threats as well. What’s more, many of these programs offer automatic timers that set them to run on a regular basis and ensure they are updated as well to ensure that your cybersecurity needs are as automated as possible.


12 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for  Derek
  • Derek
  • 08-20-21

Interacting with the Online world.

One of the biggest benefits of software firewalls is the fact that practically every operating system you can name includes a firewall feature that can be enabled, for free. As such, even if you install a physical firewall you will still want to configure your software firewall as well.

Software firewalls are also useful in that they have the ability to control the access that individual processes on the computer have to the network. While running a software firewall is better than nothing, it is important to keep in mind the inherent limitations that come about when the firewall tries to enforce protections on a system that it is a part of. This is going to be doubly true if you are installing a new software firewall onto a system that is already compromised. When it comes to setting up a firewall successfully, it is especially important to ensure you configure the settings properly.

Generally speaking, commercially available firewalls of both varieties come with preconfigured settings that are easy to use. As your needs may be different than the norm, however, it is still important to read any available documentation to ensure that you are getting the most protection possible. While an effective firewall is going to work to block some attacks, it is important to not use it as an excuse to make poor decisions when browsing online. As with any other type of security, a firewall is only one piece of the puzzle. They primarily serve to protect against traffic with malicious intent, they are not designed to detect malware, which is why it is important it works in tandem with a virus protection software, not as an alternative to it.

9 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Kieran Chandler
  • Kieran Chandler
  • 06-09-20

Easy read on a complex set of topics.

While interacting with the internet can seem more freeing than dealing with other people directly, it is important to keep in mind that, these days, that sense of anonymity is largely an illusion. The truth of the matter is that you are rarely truly alone when you are online, which means that it can be extremely easy for others to gain access to your personal information whether you want them to or not. This is unfortunate as, while most people would be unwilling to give up personal details to a random stranger on the street, the proliferation of social media options available at the click of a button means that these same people don’t think twice about posting those same details online. While they may not be giving out all of their personal information directly, a determined thief can do a lot with a steady stream of Instagram photos and a Facebook timeline. For these reasons and more, it is important to keep the following in mind when putting details of yourself online. Financial regulators, investment banks and commercial banks attract cybercriminals who see an avenue to market manipulation and illegal gains. Any website than enables transfer of funds or buying goods is also a target, as are ATMs, which are frequently hacked for customer data and PINs.

7 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Rosie Newman
  • Rosie Newman
  • 09-12-21

Slow and steady wins the race.

Once you have made it through the chapters of this book and implemented what you have learned, it can be easy to start to feel invincible when it comes to combating threats to your cybersecurity.

Letting this feeling go unchecked will only lead to a loss in the future, however, as the number one lesson you should keep in mind is that feeling safe around cyberthreats will only lead you to underestimate them and leave yourself open for attack in the future. As such, no matter how prepared you feel to meet online threats head-on, it is important to approach any unknown situation with a little bit of fear. That fear is what is going to keep you and your data safe in the long-term.

Remember, cybersecurity is a marathon, not a sprint, slow and steady wins the race.

6 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Maura Lane
  • Maura Lane
  • 10-23-21

Introduction on cyber security.

Fascinating Professor who gives a pragmatic approach to introduction on cyber security while keeping it simple to understand for a layman with no prior background. Highly recommended!