• The Principles of Cybersecurity and Hacking: 5 Books in 1

  • Cybersecurity and Hacking Series
  • By: Zach Webber
  • Narrated by: William Bahl
  • Length: 7 hrs and 5 mins
  • 4.4 out of 5 stars (62 ratings)

1 title per month from Audible’s entire catalog of best sellers, and new releases.
Access a growing selection of included Audible Originals, audiobooks and podcasts.
You will get an email reminder before your trial ends.
Your Premium Plus plan is $14.95 a month after 30 day trial. Cancel anytime.
Buy for $19.95

Buy for $19.95

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's Summary

Protecting yourself and your data from online attacks and hacking has never been more important than it is right now, especially in the digital age.

And you know what they always say, knowledge is power.

The Principles of Cybersecurity and Hacking series aims to provide you exactly with that knowledge, and with that power. This comprehensive, in-depth guide on the fundamentals, concepts, and strategies of cybersecurity and hacking will take you to another level of protection in this digital world. It provides you with everything you need to know starting from beginner to advanced through these five books:

  • A Beginner’s Guide to Cybersecurity
  • An Intermediate Guide to Cybersecurity
  • An Advanced Guide to Cybersecurity
  • A Beginner’s Guide to Learn and Understand Hacking
  • An Intermediate Guide to the Concepts of Hacking

In each book, you will learn and understand topics such as:

  • Types of cybersecurity
  • Securing mobile devices
  • Establishing a risk management framework
  • Social engineering
  • White-hat hacking vs. black-hat hacking

And there’s so much more to learn, which you will all find in this book!

Hacking is real, and what better way to protect yourself than being pro-active and arming yourself with the knowledge on how it works and what you can do against it, so get your copy now!

©2018 Zach Webber (P)2018 Zach Webber

What listeners say about The Principles of Cybersecurity and Hacking: 5 Books in 1

Average Customer Ratings
Overall
  • 4.5 out of 5 stars
  • 5 Stars
    46
  • 4 Stars
    4
  • 3 Stars
    6
  • 2 Stars
    4
  • 1 Stars
    2
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    46
  • 4 Stars
    2
  • 3 Stars
    3
  • 2 Stars
    4
  • 1 Stars
    6
Story
  • 4.5 out of 5 stars
  • 5 Stars
    45
  • 4 Stars
    6
  • 3 Stars
    6
  • 2 Stars
    1
  • 1 Stars
    3

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Tips for online safety!

Confidentiality representsthe privacy aspect ofthe triad. When you send a text message to a friend, you are confident that no one else will see that message except for the friend you sent it to. Confidentiality follows the same kind of principle for computers. When you are browsing the web or entering a password into a site, you would not want anyone to see that information. Attackers, on the other hand, want to do just that. They use methods such as ‘eavesdropping’ and ‘phishing’ to gain access to data you send over a network.

Integrity represents the ‘who’ aspect of security. When you visit a website, you trust that the creators of the website are who they say they are. By creating fake websites that look exactly like the real thing, attackers can trick you into divulging private information. The goal of integrity is to determine two things. First, that the website or server you are on belongs to the person or company you believe it to be, and second, that the information presented is accurate and true.

The final category in the security triad is availability. Availability refers to the availability of accessing information, most of the time over the internet. Today’s society depends heavily on the use of the internet. If this access were withdrawn, dreadful consequences would follow. In a less extreme situation, an attacker trying to intrude the availability aspect of security could crash a network, resulting in so many people losing access to emails, bank accounts, social media, and more.

22 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Real cases of cyber attacks

In September 2014, Home Depot announced that it was hacked, probably during the spring of that year; this hack led to the theft of the credit card information of 56 million customers. The hack began when malware masquerading as antivirus software infected the POS systems of the company's stores. The company had to pay nearly twenty million dollars in damages and identity theft protection services to those whose information had been compromised.

In February 2015, the largest security breach in healthcare history occurred when a group of cyber criminals, allegedly sponsored by a foreign government, hacked into the Anthem Health Insurance website. The attack led to millions of names, addresses, dates of birth, and the personal health information of individuals insured by Anthem to become compromised. The breach began when an Anthem employee opened up a phishing email; that one email led to well over one hundred million dollars in damages.

In the fall of 2016, while Yahoo was in negotiations to sell itself to the company Verizon, it disclosed that back in 2014, it had been hacked. 500 million email addresses, real names, dates of birth, and other sensitive information that can lead to identity theft had all been hacked. In the early winter of 2016, it disclosed that it had also been similarly hacked back in 2013. This security breach led to compromising the information of one billion users. Yahoo lost $350 million in its sell price to Verizon, as well as its good name.

The above information isn't intended to scare you. It's intended to sober you into understanding the importance of cybersecurity and protecting yourself online. You may be thinking that these are major companies, so of course, they will be targeted by hackers. But consider this: companies like Yahoo and Target spend millions and millions of dollars every year in cybersecurity yet were still susceptible to security breaches by hackers.

20 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Lot's of privileged insights

With smart devices so ubiquitous, it can be easy to be flippant about them when you are out and about, especially if you are busy or otherwise in a hurry. Regardless of the personal cost of the device in question, it is important to not just think about the physical value if the device was lost but the value of the time wasted in changing literally every password and credit/debit card you own. Furthermore, think about the potential value of keeping your identity secure and act accordingly. Likewise, you should make a habit of keeping an eye on your surroundings when using your device, which will likely be easier said than done. Nevertheless, you should try and pay attention to those around you, including anyone who may be trying to look over your shoulder for a peek at your sweet, sweet data. Generally speaking, if you don’t need your device at the moment, it is best to keep it hidden away from prying eyes, just to be safe. If you are using a company laptop, you may even want to consider a third-party alarm that can be set to ensure that anyone who tries to access the computer without your permission is in for a rude awakening. Regardless of how important your information is, it is important to have at least one backup of all your data stored in a secure location or, more likely, the cloud. This way you will be able to ensure you are able to get back to where you were as quickly as possible, you will also know exactly what information is now at risk, allowing you to take additional precautions as needed.

20 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Manage security

Firewalls are extremely useful when it comes to protecting your computer and network from outside attacks from malicious or unnecessary network traffic. It also blocks malicious software from accessing your network. Firewalls can also be configured to block data from various locations or applications while at the same time allowing whitelisted data through. There are two different types of firewalls, hardware, and software, that control different types of activities and are located in different places. Hardware firewalls, also known as network firewalls are external devices that you physically place your computer and your modem, router, or other network connection. Many internet service providers offer routers with this type of security already built in. This type of firewall is especially useful if you are in the market to protect multiple computers at once and control the various types of activity that pass through them. The biggest advantage of this type of firewall is that it is a completely separate device which means it has its own operating system that the malware would need to crack before it can move on to your primary system. One of the biggest benefits of software firewalls, on the other hand, is the fact that practically every operating system you can name includes a firewall feature that can be enabled, for free. As such, even if you install a physical firewall you willstill want to configure your software firewall as well. Software firewalls are also useful in that they have the ability to control the access that individual processes on the computer have to the network. While running a software firewall is better than nothing, it is important to keep in mind the inherent limitations that come about when the firewall tries to enforce protections on a system that it is a part of. This is going to be doubly true if you are installing a new software firewall onto a system that is already compromised.

17 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Appeals to all experts

When it comes to ensuring the right amount of control over who has access to what, it is important that enterprise systems that can interface with numerous endpoints directly all require dual-factor authentication for any interactive logins. Further, it is important to make sure that authorized users are limited to a specific subset of the organization’s personnel. Whatever you do, it is important that the default user group doesn’t have the ability to authenticate or access these systems directly. You will also need to ensure that unique domain accounts are documented and utilized for every service that involves and enterprise application. The context in which these permissions are assigned to various accounts should always be fully documented and also configured in such a way that the greatest number of users have the fewest number of privileges possible. Doing so provides the enterprise the ability to track and monitor actions that are taken based on assigned service accounts. This is why it is important to avoid providing a service account with either interactive or local login permissions. In fact, service accounts should be expressly denied these types of permissions, especially if access to critical data locations or important network shares. Additionally, accounts that are used for the purpose of authenticating centralized servers should not contain downstream systems that have elevated permissions as this could allow a system that is far easier to compromise to infect a system that is typically far better protected.

10 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

If connected than LISTEN!

Computers are an important part of everyday life, but they can also lead to a wide variety of headaches if you don’t take the time to secure them properly, and this starts before you even connect a new computer to the internet. What follows are a number of suggestions to help secure your computer; it is important to keep in mind, however, that while they will help to minimize your risk, they won’t serve to remove it completely, so you will still need to practice safe internet usage for the best results.

One ofthe most effective and common methods of dealing with malware is anti-malware software. Programs such as Windows Essentials, McAfee, and Bitdefender allow a user to run scans on a system to search for infected files. If any files are found to be corrupted, these programs alert the operator, allowing him or her to remove the files in question. This type of software is also very useful as they can scan any downloaded items or email attachments before allowing the user to download them. This is a crucial protective barrier, as it prevents any malicious programs from installing itself on a device.

These types of software can also analyze what kind of virus, worm, or Trojan has infected the computer in question. (The types of threats are described more in chapter 3). This kind of protective software will remove anything malicious automatically from the computer but will be unable to recognize threats such as ransomware or keyloggers.

7 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

I truly recommend it

This course is amazing, all real examples are very clearly explain. I truly recommend it. Would love to meet instructor in person...totally rocks. Thank you Zach Webber

4 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great directions and good concepts

When it comes to the importance of ensuring the cybersecurity of your portable devices, only you can accurately determine what’s at risk besides the machine itself. However, with most portable devices these days, if the thief is able to access the information that is stored within it successfully, a lot more than the data directly on the device itself is at risk. You have likely heard stories about the uproar caused when a senior manager for one major corporation or another leaves a laptop or a smartphone somewhere they shouldn’t. Confidential information of this type can cause untold damage to a company, especially if it has something to hide. Even if your devices don’t have serious secrets hidden within, there is still enough on the average smart device to make your life very difficult if the wrong person gained access to it. Keep the following in mind when it comes to keeping your data private on the go. As cloud usage proliferates, new challenges to security do the same as each cloud storage system offers virtually unlimited potential for a security nightmare should even one bit of data end up where it is not supposed to be. Statistics show that weekly occurrences of cloud breaches occur on a higher than expected, and far higher than reported, basis, throwing shade on the sense of security that many users feel with the cloud. While new tools to protect are constantly being developed, it is important to note that due diligence remains vital to security.

2 people found this helpful

  • Overall
    2 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    3 out of 5 stars

Worst narration

I'm about 20 minutes in and can't listen to this anymore. It's like a robot sloth is narrating. Even with the playback rate at 1.4x, it's unbearable as his language is very choppy with unnecessary and very long pauses.

As for the content 20 minutes in, I am displeased. It's equivalent to going to the glossary of a cybersecurity book and just reading that.

2 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Loving approach

Once you have made it through the chapters of this book and implemented what you have learned, it can be easy to start to feel invincible when it comes to combating threats to your cybersecurity. Letting this feeling go unchecked will only lead to a loss in the future, however, as the number one lesson you should keep in mind is that feeling safe around cyberthreats will only lead you to underestimate them and leave yourself open for attack in the future. As such, no matter how prepared you feel to meet online threats head-on, it is important to approach any unknown situation with a little bit of fear. That fear is what is going to keep you and your data safe in the long-term. Remember, cybersecurity is a marathon, not a sprint, slow and steady wins the race.

1 person found this helpful

Sort by:
Filter by:
  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars
Profile Image for Wendy
  • Wendy
  • 08-21-20

Essential for our life

The most common prevention system for networks are firewalls which can be hardware- or software-based and, if designed appropriately, block unwanted access and some attacks

  • Overall
    2 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    2 out of 5 stars
Profile Image for Mr. M. J. Yeomans
  • Mr. M. J. Yeomans
  • 12-31-19

Imagine Wikipedia read by Steven Hawkins...

Very dry content that's good collation of information put into a logical order for those looking to go through the route of doing the CISSP or similar in due course with no formal background in cybersecurity. It reads like an encyclopedia, with an entire chapter literally just being definitions from techopedia... I would say it's a more painful way of getting the content than courses such as cybrary, but that's largely the reader that really kills it for me and just audio for this kind of information is quite tough. The reader is clear but unbelievably bland and sounds like it's a Microsoft reader from the 90s (rhythmically as well as tone - some of the punctuation being read sounds weirdly robotic and that's quite jarring).

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Kevin Walker
  • Kevin Walker
  • 11-15-19

Poacher turned gamekeeper

A well written book gave a good introduction to the hacking fraternity and worth a read

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Raji
  • Raji
  • 02-04-19

effective book

This is a helpful book and interesting.I was really amaze cause this book is an ultimate beginners guide.The author is clear and explains the concepts very well.I highly recommend this book to all of you guys.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Bruin.a
  • Bruin.a
  • 02-04-19

helpful guide about hacking

I love that each chapter is relatable, clear, and to the point. The price is unbeatable. Learned so much in under an hour! I can’t wait to see if the info learned was worth it!

.