CISSP Exam Study Guide For Security Professionals: 5 Books In 1
Richie Miller
If you want to become a Cybersecurity Professional, this book is for you!
GET THIS BOOK NOW AND START LEARNING TODAY!
In this book you will discover:Baseline Configuration, Diagrams & IP Management Data Sovereignty & Data Loss Prevention Data Masking, Tokenization & Digital Rights Management Geographical Considerations & Cloud Access Security Broker Secure Protocols, SSL Inspection & Hashing API Gateways & Recovery Sites Honeypots, Fake Telemetry & DNS Sinkhole Cloud Storage and Cloud Computing IaaS, PaaS & SaaS Managed Service Providers, Fog Computing & Edge Computing VDI, Virtualization & Containers Microservices and APIs Infrastructure as Code (IAC) & Software Defined Networking (SDN) Service Integrations and Resource Policies Environments, Provisioning & Deprovisioning Integrity Measurement & Code Analysis Security Automation, Monitoring & Validation Software Diversity, Elasticity & Scalability Directory Services, Federation & Attestation Time-Based Passwords, Authentication & Toke
Duration - 20h 7m.
Author - Richie Miller.
Narrator - Google AI Mike.
Published Date - Saturday, 14 January 2023.
Copyright - © 2022 Szabolcs Juhasz ©.
Location:
United States
Description:
If you want to become a Cybersecurity Professional, this book is for you! GET THIS BOOK NOW AND START LEARNING TODAY! In this book you will discover:Baseline Configuration, Diagrams & IP Management Data Sovereignty & Data Loss Prevention Data Masking, Tokenization & Digital Rights Management Geographical Considerations & Cloud Access Security Broker Secure Protocols, SSL Inspection & Hashing API Gateways & Recovery Sites Honeypots, Fake Telemetry & DNS Sinkhole Cloud Storage and Cloud Computing IaaS, PaaS & SaaS Managed Service Providers, Fog Computing & Edge Computing VDI, Virtualization & Containers Microservices and APIs Infrastructure as Code (IAC) & Software Defined Networking (SDN) Service Integrations and Resource Policies Environments, Provisioning & Deprovisioning Integrity Measurement & Code Analysis Security Automation, Monitoring & Validation Software Diversity, Elasticity & Scalability Directory Services, Federation & Attestation Time-Based Passwords, Authentication & Toke Duration - 20h 7m. Author - Richie Miller. Narrator - Google AI Mike. Published Date - Saturday, 14 January 2023. Copyright - © 2022 Szabolcs Juhasz ©.
Language:
English
Opening Credits
Duration:00:03:56
9781839381799_001_Opening Credits.mp3
Duration:00:00:15
9781839381799_002_Opening Credits - Book 1.mp3
Duration:00:00:09
9781839381799_120_Closing Credits - Book 5.mp3
Duration:00:00:18
9781839381799_004_Chapter 1 Baseline Configuration, Diagrams & IP Management.mp3
Duration:00:10:21
9781839381799_005_Chapter 2 Data Sovereignty & Data Loss Prevention.mp3
Duration:00:05:40
9781839381799_006_Chapter 3 Data Masking, Tokenization & Digital Rights Management.mp3
Duration:00:08:17
9781839381799_007_Chapter 4 Geographical Considerations & Cloud Access Security Broker.mp3
Duration:00:08:20
9781839381799_008_Chapter 5 Secure Protocols, SSL Inspection & Hashing.mp3
Duration:00:03:35
9781839381799_009_Chapter 6 API Gateways & Recovery Sites.mp3
Duration:00:07:52
9781839381799_010_Chapter 7 Honeypots, Fake Telemetry & DNS Sinkhole.mp3
Duration:00:05:54
9781839381799_011_Chapter 8 Cloud Storage and Cloud Computing.mp3
Duration:00:05:47
9781839381799_012_Chapter 9 IaaS, PaaS & SaaS.mp3
Duration:00:08:08
9781839381799_013_Chapter 10 Managed Service Providers, Fog Computing & Edge Computing.mp3
Duration:00:09:32
9781839381799_014_Chapter 11 VDI, Virtualization & Containers.mp3
Duration:00:15:45
9781839381799_015_Chapter 12 Microservices and APIs.mp3
Duration:00:04:16
9781839381799_016_Chapter 13 Infrastructure as Code (IAC) & Software Defined Networking (SDN).mp3
Duration:00:05:46
9781839381799_017_Chapter 14 Service Integrations and Resource Policies.mp3
Duration:00:06:21
9781839381799_018_Chapter 15 Environments, Provisioning & Deprovisioning.mp3
Duration:00:11:05
9781839381799_019_Chapter 16 Integrity Measurement & Code Analysis.mp3
Duration:00:12:53
9781839381799_020_Chapter 17 Security Automation, Monitoring & Validation.mp3
Duration:00:09:38
9781839381799_021_Chapter 18 Software Diversity, Elasticity & Scalability.mp3
Duration:00:05:53
9781839381799_022_Chapter 19 Directory Services, Federation & Attestation.mp3
Duration:00:06:17
9781839381799_023_Chapter 20 Time-Based Passwords, Authentication & Tokens.mp3
Duration:00:07:54
9781839381799_024_Chapter 21 Proximity Cards, Biometric & Facial Recognition.mp3
Duration:00:07:05
9781839381799_025_Chapter 22 Vein and Gait Analysis & Efficacy Rates.mp3
Duration:00:13:29
9781839381799_026_Closing Credits - Book 1.mp3
Duration:00:00:15
9781839381799_027_Opening Credits - Book 2.mp3
Duration:00:00:10
9781839381799_028_Introduction.mp3
Duration:00:03:33
9781839381799_029_Chapter 1 Geographically Disperse, RAID & Multipath.mp3
Duration:00:09:36
9781839381799_030_Chapter 2 Load Balancer, Power Resiliency & Replication.mp3
Duration:00:07:25
9781839381799_031_Chapter 3 Backup Execution Policies.mp3
Duration:00:14:17
9781839381799_032_Chapter 4 High Availability, Redundancy & Fault Tolerance.mp3
Duration:00:09:57
9781839381799_033_Chapter 5 Embedded Systems & SCADA Security.mp3
Duration:00:12:48
9781839381799_034_Chapter 6 Smart Devices IoT & Special Purpose Devices.mp3
Duration:00:08:47
9781839381799_036_Chapter 8 Real Time Operating Systems & Surveillance Systems.mp3
Duration:00:11:41
9781839381799_037_Chapter 9 Barricades, Mantraps & Alarms.mp3
Duration:00:07:51
9781839381799_038_Chapter 10 Cameras, Video Surveillance & Guards.mp3
Duration:00:07:33
9781839381799_039_Chapter 11 Cable Locks, USB Data Blockers, Safes & Fencing.mp3
Duration:00:07:04
9781839381799_040_Chapter 12 Motion Detection Infrared & Proximity Readers.mp3
Duration:00:07:56
9781839381799_041_Chapter 13 Demilitarized Zone & Protected Distribution System.mp3
Duration:00:12:16
9781839381799_042_Chapter 14 Shredding, Pulping & Pulverizing.mp3
Duration:00:04:11
9781839381799_043_Chapter 15 Deguassing, Purging & Wiping.mp3
Duration:00:06:03
9781839381799_044_Chapter 16 Cryptographic Terminology and History.mp3
Duration:00:06:30
9781839381799_045_Chapter 17 Digital Signatures, Key Stretching & Hashing.mp3
Duration:00:06:37
9781839381799_046_Chapter 18 Quantum Communications & Elliptic Curve Cryptography.mp3
Duration:00:07:41
9781839381799_047_Chapter 19 Quantum Computing, Cipher Modes & XOR Function.mp3
Duration:00:08:45
9781839381799_048_Chapter 20 Encryptions & Blockchains.mp3
Duration:00:06:54
9781839381799_050_Chapter 22 Cipher Suites, Random & Quantum Random Number Generators.mp3
Duration:00:07:23
9781839381799_121_Conclusion.mp3
Duration:00:00:19
9781839381799_122_About Richie Miller.mp3
Duration:00:00:45
9781839381799_051_Closing Credits - Book 2.mp3
Duration:00:00:17
9781839381799_052_Opening Credits - Book 3.mp3
Duration:00:00:11
9781839381799_123_Closing Credits.mp3
Duration:00:00:22
9781839381799_053_Introduction.mp3
Duration:00:03:59
9781839381799_054_Chapter 1 Secure Networking Protocols.mp3
Duration:00:30:29
9781839381799_055_Chapter 2 Host or Application Security Solutions.mp3
Duration:00:26:17
9781839381799_056_Chapter 3 Coding, Fuzzing & Quality Testing.mp3
Duration:00:29:33
9781839381799_057_Chapter 4 How to Implement Secure Network Designs.mp3
Duration:00:25:02
9781839381799_058_Chapter 5 Network Access Control, Port Security & Loop Protection.mp3
Duration:00:14:45
9781839381799_059_Chapter 6 Spanning Tree, DHCP Snooping & MAC Filtering.mp3
Duration:00:07:01
9781839381799_060_Chapter 7 Access Control Lists & Route Security.mp3
Duration:00:08:44
9781839381799_061_Chapter 8 Intrusion Detection and Prevention.mp3
Duration:00:14:06
9781839381799_062_Chapter 9 Firewalls & Unified Threat Management.mp3
Duration:00:25:24
9781839381799_063_Chapter 10 How to Install and Configure Wireless Security.mp3
Duration:00:38:37
9781839381799_064_Chapter 11 How to Implement Secure Mobile Solutions.mp3
Duration:00:29:22
9781839381799_065_Chapter 12 Geo-tagging & Context-Aware Authentication.mp3
Duration:00:18:47
9781839381799_066_Chapter 13 How to Apply Cybersecurity Solutions to the Cloud.mp3
Duration:00:38:31
9781839381799_067_Chapter 14 How to Implement Identity and Account Management Controls.mp3
Duration:00:37:34
9781839381799_068_Chapter 15 How to Implement Authentication and Authorization Solutions.mp3
Duration:00:41:13
9781839381799_069_Chapter 16 How to Implement Public Key Infrastructure.mp3
Duration:00:29:44
9781839381799_070_Closing Credits - Book 3.mp3
Duration:00:00:17
9781839381799_071_Opening Credits - Book 4.mp3
Duration:00:00:13
9781839381799_072_Introduction.mp3
Duration:00:04:37
9781839381799_073_Chapter 1 Data Sources to Support an Incident.mp3
Duration:00:03:02
9781839381799_074_Chapter 2 How to Assess Organizational Security.mp3
Duration:00:24:26
9781839381799_075_Chapter 3 File Manipulation & Packet Captures.mp3
Duration:00:12:06
9781839381799_076_Chapter 4 Forensics & Exploitation Frameworks.mp3
Duration:00:08:19
9781839381799_077_Chapter 5 Data Sanitization Tools.mp3
Duration:00:05:48
9781839381799_078_Chapter 6 How to Apply Policies, Processes and Procedures for Incident Response.mp3
Duration:00:09:16
9781839381799_079_Chapter 7 Detection and Analysis.mp3
Duration:00:10:05
9781839381799_080_Chapter 8 Test Scenarios & Simulations.mp3
Duration:00:12:00
9781839381799_081_Chapter 9 Threat Intelligence Lifecycle.mp3
Duration:00:11:59
9781839381799_082_Chapter 10 Disaster Recovery & Business Continuity.mp3
Duration:00:15:01
9781839381799_083_Chapter 11 How to Implement Data Sources to Support an Investigation.mp3
Duration:00:21:25
9781839381799_084_Chapter 12 Retention Auditing, Compliance & Metadata.mp3
Duration:00:17:45
9781839381799_085_Chapter 13 How to Implement Mitigation Techniques to Secure an Environment.mp3
Duration:00:15:40
9781839381799_086_Chapter 14 Mobile Device Management.mp3
Duration:00:06:13
9781839381799_087_Chapter 15 DLP, Content Filters & URL Filters.mp3
Duration:00:19:32
9781839381799_088_Chapter 16 Key Aspects of Digital Forensics.mp3
Duration:00:08:53
9781839381799_089_Chapter 17 Chain of Custody & Legal Hold.mp3
Duration:00:04:23
9781839381799_090_Chapter 18 First Responder Best Practices.mp3
Duration:00:08:54
9781839381799_091_Chapter 19 Network Traffic and Logs.mp3
Duration:00:09:32
9781839381799_092_Chapter 20 Screenshots & Witnesses.mp3
Duration:00:02:48
9781839381799_093_Chapter 21 Preservation of Evidence.mp3
Duration:00:04:57
9781839381799_094_Chapter 22 Data Integrity.mp3
Duration:00:07:20
9781839381799_095_Chapter 23 Jurisdictional Issues & Data Breach Notification Laws.mp3
Duration:00:04:48
9781839381799_096_Closing Credits - Book 4.mp3
Duration:00:00:19
9781839381799_097_Opening Credits - Book 5.mp3
Duration:00:00:12
9781839381799_098_Introduction.mp3
Duration:00:03:28
9781839381799_099_Chapter 1 Threat Types & Access Control.mp3
Duration:00:08:12
9781839381799_100_Chapter 2 Applicable Regulations, Standards, & Frameworks.mp3
Duration:00:27:25
9781839381799_101_Chapter 3 Benchmarks & Secure Configuration Guides.mp3
Duration:00:07:22
9781839381799_102_Chapter 4 How to Implement Policies for Organizational Security.mp3
Duration:00:08:17
9781839381799_103_Chapter 5 Monitoring & Balancing.mp3
Duration:00:10:27
9781839381799_104_Chapter 6 Awareness & Skills Training.mp3
Duration:00:05:48
9781839381799_105_Chapter 7 Technology & Vendor Diversity.mp3
Duration:00:11:01
9781839381799_106_Chapter 8 Change Management & Asset Management.mp3
Duration:00:03:56
9781839381799_107_Chapter 9 Risk Management Process and Concepts.mp3
Duration:00:11:42
9781839381799_108_Chapter 10 Risk Register, Risk Matrix, and Heat Map.mp3
Duration:00:06:16
9781839381799_109_Chapter 11 Regulatory Examples.mp3
Duration:00:10:31
9781839381799_110_Chapter 12 Qualitative and Quantitative Analysis.mp3
Duration:00:12:09
9781839381799_111_Chapter 13 Identification of Critical Systems.mp3
Duration:00:14:01
9781839381799_112_Chapter 14 Order of Restoration.mp3
Duration:00:07:14
9781839381799_113_Chapter 15 Continuity of Operations.mp3
Duration:00:04:39
9781839381799_114_Chapter 16 Privacy and Sensitive Data Concepts.mp3
Duration:00:04:06
9781839381799_115_Chapter 17 Incident Notification and Escalation.mp3
Duration:00:04:26
9781839381799_116_Chapter 18 Data Classification.mp3
Duration:00:03:24
9781839381799_117_Chapter 19 Privacy-enhancing Technologies.mp3
Duration:00:02:57
9781839381799_118_Chapter 20 Data Owners & Responsibilities.mp3
Duration:00:03:17
9781839381799_119_Chapter 21 Information Lifecycle.mp3
Duration:00:06:24