Astu tarinoiden maailmaan
5
Talous & liike-elämä
2 AUDIOBOOKS IN 1!
• Book 1 - 25 Most Common Security Threats & How To Avoid Them • Book 2 - 21 Steps For Implementing The NIST Cybersecurity Framework
You will learn:
AUDIOBOOK 1:
Basic Cybersecurity concepts
•How to write a security policy
•IT staff and end-user education
•Physical & Perimeter security
•Client Traffic Analytics
•Password management
•Patch Management Deployment
•HTTP, HTTPS, SSL & TLS
•Scanning with NMAP
•Patch Management with Ivanti
•Deploying AV processes
•McAfee Policy Orchestrator
•Access Control Deployments
•Data in Transit Security
•IDS & IPS Systems & Proxy Servers
•Data Loss Prevention & RAID
•Incremental VS Differential Backup
•Data Backup Solutions
AUDIOBOOK 2:
•Software Bugs and Buffer Overflow
•Weak Passwords
•Path Traversal
•SQL Injection
•Cross Site Scripting
•Cross-site forgery request
•Viruses & Malware
•Trojan & Ransomware
•Rootkits & Worms
•DoS Attacks
•Man-in-the-middle attacks
•Social Engineering and Phishing Attacks
•Cloud Services Attacks
•ARP Poisoning
•Rogue Access Points
•Man in the Middle on Wireless Networks
•De-Authentication Attack
•Wireless Collision Attack
•Wireless Replay Attacks and much more...
© 2020 HUGO HOFFMAN (Äänikirja): 9781664975125
Julkaisupäivä
Äänikirja: 27. marraskuuta 2020
Avainsanat
5
Talous & liike-elämä
2 AUDIOBOOKS IN 1!
• Book 1 - 25 Most Common Security Threats & How To Avoid Them • Book 2 - 21 Steps For Implementing The NIST Cybersecurity Framework
You will learn:
AUDIOBOOK 1:
Basic Cybersecurity concepts
•How to write a security policy
•IT staff and end-user education
•Physical & Perimeter security
•Client Traffic Analytics
•Password management
•Patch Management Deployment
•HTTP, HTTPS, SSL & TLS
•Scanning with NMAP
•Patch Management with Ivanti
•Deploying AV processes
•McAfee Policy Orchestrator
•Access Control Deployments
•Data in Transit Security
•IDS & IPS Systems & Proxy Servers
•Data Loss Prevention & RAID
•Incremental VS Differential Backup
•Data Backup Solutions
AUDIOBOOK 2:
•Software Bugs and Buffer Overflow
•Weak Passwords
•Path Traversal
•SQL Injection
•Cross Site Scripting
•Cross-site forgery request
•Viruses & Malware
•Trojan & Ransomware
•Rootkits & Worms
•DoS Attacks
•Man-in-the-middle attacks
•Social Engineering and Phishing Attacks
•Cloud Services Attacks
•ARP Poisoning
•Rogue Access Points
•Man in the Middle on Wireless Networks
•De-Authentication Attack
•Wireless Collision Attack
•Wireless Replay Attacks and much more...
© 2020 HUGO HOFFMAN (Äänikirja): 9781664975125
Julkaisupäivä
Äänikirja: 27. marraskuuta 2020
Avainsanat
Suomi
Suomi