adbl_ms_membershipImage_includedwith_altText_B076FLV3HT
adbl_ms_membershipImage_includedwith_altText_B076FLV3HT

1 audiobook of your choice.
Stream or download thousands of included titles.
$14.95 a month after 30 day trial. Cancel anytime.
Buy for $19.95

Buy for $19.95

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's Summary

Protecting yourself and your data from online attacks and hacking has never been more important than it is right now, especially in the digital age.

And you know what they always say, knowledge is power.

The Principles of Cybersecurity and Hacking series aims to provide you exactly with that knowledge, and with that power. This comprehensive, in-depth guide on the fundamentals, concepts, and strategies of cybersecurity and hacking will take you to another level of protection in this digital world. It provides you with everything you need to know starting from beginner to advanced through these five books:

  • A Beginner’s Guide to Cybersecurity
  • An Intermediate Guide to Cybersecurity
  • An Advanced Guide to Cybersecurity
  • A Beginner’s Guide to Learn and Understand Hacking
  • An Intermediate Guide to the Concepts of Hacking

In each book, you will learn and understand topics such as:

  • Types of cybersecurity
  • Securing mobile devices
  • Establishing a risk management framework
  • Social engineering
  • White-hat hacking vs. black-hat hacking

And there’s so much more to learn, which you will all find in this book!

Hacking is real, and what better way to protect yourself than being pro-active and arming yourself with the knowledge on how it works and what you can do against it, so get your copy now!

©2018 Zach Webber (P)2018 Zach Webber

What listeners say about The Principles of Cybersecurity and Hacking: 5 Books in 1

Average Customer Ratings
Overall
  • 4.5 out of 5 stars
  • 5 Stars
    49
  • 4 Stars
    4
  • 3 Stars
    5
  • 2 Stars
    4
  • 1 Stars
    2
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    49
  • 4 Stars
    2
  • 3 Stars
    3
  • 2 Stars
    4
  • 1 Stars
    5
Story
  • 4.5 out of 5 stars
  • 5 Stars
    48
  • 4 Stars
    6
  • 3 Stars
    5
  • 2 Stars
    1
  • 1 Stars
    3

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Tips for online safety!

Confidentiality representsthe privacy aspect ofthe triad. When you send a text message to a friend, you are confident that no one else will see that message except for the friend you sent it to. Confidentiality follows the same kind of principle for computers. When you are browsing the web or entering a password into a site, you would not want anyone to see that information. Attackers, on the other hand, want to do just that. They use methods such as ‘eavesdropping’ and ‘phishing’ to gain access to data you send over a network.

Integrity represents the ‘who’ aspect of security. When you visit a website, you trust that the creators of the website are who they say they are. By creating fake websites that look exactly like the real thing, attackers can trick you into divulging private information. The goal of integrity is to determine two things. First, that the website or server you are on belongs to the person or company you believe it to be, and second, that the information presented is accurate and true.

The final category in the security triad is availability. Availability refers to the availability of accessing information, most of the time over the internet. Today’s society depends heavily on the use of the internet. If this access were withdrawn, dreadful consequences would follow. In a less extreme situation, an attacker trying to intrude the availability aspect of security could crash a network, resulting in so many people losing access to emails, bank accounts, social media, and more.

22 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Real cases of cyber attacks

In September 2014, Home Depot announced that it was hacked, probably during the spring of that year; this hack led to the theft of the credit card information of 56 million customers. The hack began when malware masquerading as antivirus software infected the POS systems of the company's stores. The company had to pay nearly twenty million dollars in damages and identity theft protection services to those whose information had been compromised.

In February 2015, the largest security breach in healthcare history occurred when a group of cyber criminals, allegedly sponsored by a foreign government, hacked into the Anthem Health Insurance website. The attack led to millions of names, addresses, dates of birth, and the personal health information of individuals insured by Anthem to become compromised. The breach began when an Anthem employee opened up a phishing email; that one email led to well over one hundred million dollars in damages.

In the fall of 2016, while Yahoo was in negotiations to sell itself to the company Verizon, it disclosed that back in 2014, it had been hacked. 500 million email addresses, real names, dates of birth, and other sensitive information that can lead to identity theft had all been hacked. In the early winter of 2016, it disclosed that it had also been similarly hacked back in 2013. This security breach led to compromising the information of one billion users. Yahoo lost $350 million in its sell price to Verizon, as well as its good name.

The above information isn't intended to scare you. It's intended to sober you into understanding the importance of cybersecurity and protecting yourself online. You may be thinking that these are major companies, so of course, they will be targeted by hackers. But consider this: companies like Yahoo and Target spend millions and millions of dollars every year in cybersecurity yet were still susceptible to security breaches by hackers.

20 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Lot's of privileged insights

With smart devices so ubiquitous, it can be easy to be flippant about them when you are out and about, especially if you are busy or otherwise in a hurry. Regardless of the personal cost of the device in question, it is important to not just think about the physical value if the device was lost but the value of the time wasted in changing literally every password and credit/debit card you own. Furthermore, think about the potential value of keeping your identity secure and act accordingly. Likewise, you should make a habit of keeping an eye on your surroundings when using your device, which will likely be easier said than done. Nevertheless, you should try and pay attention to those around you, including anyone who may be trying to look over your shoulder for a peek at your sweet, sweet data. Generally speaking, if you don’t need your device at the moment, it is best to keep it hidden away from prying eyes, just to be safe. If you are using a company laptop, you may even want to consider a third-party alarm that can be set to ensure that anyone who tries to access the computer without your permission is in for a rude awakening. Regardless of how important your information is, it is important to have at least one backup of all your data stored in a secure location or, more likely, the cloud. This way you will be able to ensure you are able to get back to where you were as quickly as possible, you will also know exactly what information is now at risk, allowing you to take additional precautions as needed.

20 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Manage security

Firewalls are extremely useful when it comes to protecting your computer and network from outside attacks from malicious or unnecessary network traffic. It also blocks malicious software from accessing your network. Firewalls can also be configured to block data from various locations or applications while at the same time allowing whitelisted data through. There are two different types of firewalls, hardware, and software, that control different types of activities and are located in different places. Hardware firewalls, also known as network firewalls are external devices that you physically place your computer and your modem, router, or other network connection. Many internet service providers offer routers with this type of security already built in. This type of firewall is especially useful if you are in the market to protect multiple computers at once and control the various types of activity that pass through them. The biggest advantage of this type of firewall is that it is a completely separate device which means it has its own operating system that the malware would need to crack before it can move on to your primary system. One of the biggest benefits of software firewalls, on the other hand, is the fact that practically every operating system you can name includes a firewall feature that can be enabled, for free. As such, even if you install a physical firewall you willstill want to configure your software firewall as well. Software firewalls are also useful in that they have the ability to control the access that individual processes on the computer have to the network. While running a software firewall is better than nothing, it is important to keep in mind the inherent limitations that come about when the firewall tries to enforce protections on a system that it is a part of. This is going to be doubly true if you are installing a new software firewall onto a system that is already compromised.

17 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Appeals to all experts

When it comes to ensuring the right amount of control over who has access to what, it is important that enterprise systems that can interface with numerous endpoints directly all require dual-factor authentication for any interactive logins. Further, it is important to make sure that authorized users are limited to a specific subset of the organization’s personnel. Whatever you do, it is important that the default user group doesn’t have the ability to authenticate or access these systems directly. You will also need to ensure that unique domain accounts are documented and utilized for every service that involves and enterprise application. The context in which these permissions are assigned to various accounts should always be fully documented and also configured in such a way that the greatest number of users have the fewest number of privileges possible. Doing so provides the enterprise the ability to track and monitor actions that are taken based on assigned service accounts. This is why it is important to avoid providing a service account with either interactive or local login permissions. In fact, service accounts should be expressly denied these types of permissions, especially if access to critical data locations or important network shares. Additionally, accounts that are used for the purpose of authenticating centralized servers should not contain downstream systems that have elevated permissions as this could allow a system that is far easier to compromise to infect a system that is typically far better protected.

10 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

If connected than LISTEN!

Computers are an important part of everyday life, but they can also lead to a wide variety of headaches if you don’t take the time to secure them properly, and this starts before you even connect a new computer to the internet. What follows are a number of suggestions to help secure your computer; it is important to keep in mind, however, that while they will help to minimize your risk, they won’t serve to remove it completely, so you will still need to practice safe internet usage for the best results.

One ofthe most effective and common methods of dealing with malware is anti-malware software. Programs such as Windows Essentials, McAfee, and Bitdefender allow a user to run scans on a system to search for infected files. If any files are found to be corrupted, these programs alert the operator, allowing him or her to remove the files in question. This type of software is also very useful as they can scan any downloaded items or email attachments before allowing the user to download them. This is a crucial protective barrier, as it prevents any malicious programs from installing itself on a device.

These types of software can also analyze what kind of virus, worm, or Trojan has infected the computer in question. (The types of threats are described more in chapter 3). This kind of protective software will remove anything malicious automatically from the computer but will be unable to recognize threats such as ransomware or keyloggers.

7 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

I truly recommend it

This course is amazing, all real examples are very clearly explain. I truly recommend it. Would love to meet instructor in person...totally rocks. Thank you Zach Webber

4 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great directions and good concepts

When it comes to the importance of ensuring the cybersecurity of your portable devices, only you can accurately determine what’s at risk besides the machine itself. However, with most portable devices these days, if the thief is able to access the information that is stored within it successfully, a lot more than the data directly on the device itself is at risk. You have likely heard stories about the uproar caused when a senior manager for one major corporation or another leaves a laptop or a smartphone somewhere they shouldn’t. Confidential information of this type can cause untold damage to a company, especially if it has something to hide. Even if your devices don’t have serious secrets hidden within, there is still enough on the average smart device to make your life very difficult if the wrong person gained access to it. Keep the following in mind when it comes to keeping your data private on the go. As cloud usage proliferates, new challenges to security do the same as each cloud storage system offers virtually unlimited potential for a security nightmare should even one bit of data end up where it is not supposed to be. Statistics show that weekly occurrences of cloud breaches occur on a higher than expected, and far higher than reported, basis, throwing shade on the sense of security that many users feel with the cloud. While new tools to protect are constantly being developed, it is important to note that due diligence remains vital to security.

2 people found this helpful

  • Overall
    2 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    3 out of 5 stars

Worst narration

I'm about 20 minutes in and can't listen to this anymore. It's like a robot sloth is narrating. Even with the playback rate at 1.4x, it's unbearable as his language is very choppy with unnecessary and very long pauses.

As for the content 20 minutes in, I am displeased. It's equivalent to going to the glossary of a cybersecurity book and just reading that.

2 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Loving approach

Once you have made it through the chapters of this book and implemented what you have learned, it can be easy to start to feel invincible when it comes to combating threats to your cybersecurity. Letting this feeling go unchecked will only lead to a loss in the future, however, as the number one lesson you should keep in mind is that feeling safe around cyberthreats will only lead you to underestimate them and leave yourself open for attack in the future. As such, no matter how prepared you feel to meet online threats head-on, it is important to approach any unknown situation with a little bit of fear. That fear is what is going to keep you and your data safe in the long-term. Remember, cybersecurity is a marathon, not a sprint, slow and steady wins the race.

1 person found this helpful

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Beverly
  • Beverly
  • 08-16-20

Having a good password

A good password consists of three basic qualities: Its length, the characters used, and the combination of upper and lower case letters. The longer a password is, the harder it is to break. Some hackers try to use algorithms in which they send massive amounts of combinations, hoping that one is a match to the secret password. By increasing the length of a password, its chances of being cracked decreases.

A mixture of letters and symbols such as exclamation marks help protect your password from being stolen. This also applies to adding uppercase lettersinto your password. A password such as‘password1’ is very weak in comparison to a password like ‘PasSWord2018!’ The combination of upper case letters and symbols decreases the chances that a password can be hacked through brute force.

Another method you can use to create incredibly secure passwords is getting a program like ‘LastPass’ or ‘Password Boss.’ These programs randomly create a password that is incredibly secure. Using a program like this will provide a unique password for everything a person uses. This means that if a hacker can get into one of an individual’s accounts, they will not have the password for the other programs or web services.

24 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Cherie
  • Cherie
  • 08-17-20

Super Guideline.

Cybersecurity job postings increased nearly 75 percent between 2012 and 2017 and, regardless of what type of career you are interested in pursuing, the job prospects are excellent across the board. What follows are some of the different job options that those in the cybersecurity industry are currently looking to explore. What follows are some of the most popular options on the market today. If you are planning on finding a job in the cybersecurity industry, it is important to keep in mind that doing so means never resting on your laurels when it comes to learning. New threats and means to counter them appear on the regular which means you are always going to need to be prepared to fight back if you hope to remain relevant in the fight against online threats. This means you are going to expect to spend much of your time each week just brushing up on what’s new and what the next round of attack vectors you come into contact with are likely to be. You won’t have to do this alone, of course, as you will find plenty of cybersecurity blogs and the like who spend all of their time trying to determine where the next attack is likely to come from. While trying to keep up to date on everything can quickly become overwhelming, over time most cybersecurity professional tends to specialize in one direction or another and deep dive into a specialized field.

23 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Martin
  • Martin
  • 08-18-20

This is a must listen

A Security Sockets Layer is a form of internet protection provided by encryption. Its purpose isto encrypt any data you send over a network to prevent anyone else on your network from seeing the actual information being transferred. SSLs are very important for anyone entering private information into a website. They work by verifying what is known as a website certificate. A certificate is what websites use to verify themselves. When you connect to a website, the server the website runs on sends you its certificate to verify its authenticity. A website can only acquire these certificates by applying for them, and they have to follow a strict set of security guidelines.

So, to keep this from getting complicated, if a website has a credible website certificate using SSL, any information you send or receive from that site will be encrypted and safe from any possible attackers.

Also, you can see if a website is secure by looking for the https in the URL at the top of your internet browser.

21 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for  Jones
  • Jones
  • 08-23-20

Really worth recommending!

Cybersecurity defends computers, programs and data against hard drive crashes, hackers, viruses, direct attacks and other situationsthat interrupt or destroy the flow of computer work and safety. Companies, organizations and government agencies receive and process volumes of confidential information, then store and transmit that data to other computers. Ever-increasing cyber-attacks at even the highest levels (The Pentagon, e.g.) demonstrate the need for the development of cybersecurity plans to ensure business flow, protect personal confidentiality and safeguard national security. Basic measures of protection include maintaining strong authentication practices (passwords, etc.) and not storing sensitive data where it is openly accessible, but a strong cybersecurity plan must also take into account that the digital world expands continually. The cloud, the use of personal devices at work, the growing internet of things (IoT, the interconnection of home appliances, autos, digital devices, power plants and more)—all of these have created a need to keep up with progress, or even stay a step ahead of it.

9 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Jennifer
  • Jennifer
  • 05-30-19

Covers Everything. Be Warned.

Any book that attempt to describe anything about cybersecurity is worth listening because the author has decided to tackle a very complex subject. Based on his own experience, Bahl has the unique gift of explaining cybersecurity as Zach use simple terms so everyone can understand it. A must listen for everyone!

6 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Kevin Collins
  • Kevin Collins
  • 08-25-20

Super book Audible zone

If a website is going to operate securely, it needs to obtain what is known as either a host or a site certificate. If a website is asking for your personal information, then checking its website certificates are a good way to determine if it is on the level. If you can’t find the certificates for a specific site, and they are asking for your personal information, run the other way and don’t look back. Generally speaking, there are two main elements to look for in order to verify that a website is using the proper level of encryption. First, you are going to want to keep an eye out for the picture of a small, closed padlock, that, depending on your browser, could be found at either the top or the bottom of the browser window. From there, you are also going to want to verify that the website’s URL starts with https as opposed to http. By always taking the extra step of looking for these details, you can help protect yourself against attackers and ensure that you know where your information is going before you submit anything. Assuming the website you are on has a valid certificate, this means that the owner of the site has already taken the steps to verify their site and its security processes, a good sign that it is on the level. When you visit a secure website, your browser will automatically check the website’s certificate to ensure it matches with the URL details and that the certificate is signed by an authority your browser recognizes as trusted. The amount of trust that you can put into a given certificate should be directly proportional to how much you trust the organization in question along with the certifying authority. If the web address is the same as the URL on the certificate, the certificate is signed by a trusted authority, and the date is valid, you can generally be fairly confident that the site you are visiting is on the level. The only way you will ever be able to tell that a website is on the level beyond a shadow of a doubt is by calling the verifying authority directly, which means at some point you will have to exercise a little bit of trust if you want to get anything done online.

3 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Charline Blair
  • Charline Blair
  • 08-31-20

Appreciate it!

Through this excellent work (which I now have on Audio and physical format..hmmm...maybe Kindle next?), Zach had made Cybersecurity human, none geeky and thoroughly understandable. Cybersecurity strategy has at last been humanised a d laid out in a format most anyone can grasp and action. I listened to this book twice because it provides a good foundation on Cybersecurity. The terms and keywords are important to know, industry jargon, and how to model a program from the ground up at a 50K foot level. I’ve got a couple complaints about the narrator such as the way he pronounced certain terms and words like ISACA, saying C-I-S-O and I-S-O instead of pronouncing them as one word like I’ve heard most of the industry do. However those are minor nitpicks. The book itself provides a good foundation if you ever want to figure out where to start when building a CS program. The audio book will provide you a platform to be better student, security administrator, or penetration tester.Thanks for creator. I am exceptionally happy with this audio book.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Anne
  • Anne
  • 08-31-20

Well done by all involved.

This is a well-written book with lots of great guidelines and direction for solid structure and how to begin your company CyberSecurity Program.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Bonnie
  • Bonnie
  • 08-31-20

Super book Audible zone

The book has been the start of a Cyber-security journey and awakening. Teco project, getting to Grips with Networking , the dark web and designing a TCP/IP stack. In the age of IOT and AI/ML, a new world just opened up. enter if you dare. (lol). In short, The book's a winner. I can listen to it over and over I have almost 60 70% of security questions memorize so it's good to listen to it's not bad I'd recommend it to anyone who wants to get a good understanding of security from project manager to business admin or an entry-level desktop or security person. It is astounding how much we authentically are oblivious to the world of hackers. This audible gave me quite the conception of what hackers of and how they get into our personal information. Very pleased with my purchase this audible. I am really grateful to realize this book. This audio book is great because these book tips are really helpful. I doubtless my friends and family recommend this book. I really welcome this book. I cannot wait to REALize what I have learned from this book. Second reading here we go!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Charles
  • Charles
  • 08-30-20

Readable, modern, and applicable

Good overview about all cybersecurity topics. The course is well structured and easy to understand. Ideal to get to know the basics.