Computer Security
-
-
Cybersecurity and Financial System Resilience Report
- Auteur(s): Board of Governors of the Federal Reserve System
- Narrateur(s): Tom Brooks
- Durée: 3 h et 2 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Consolidated Appropriations Act, 20211 (CAA) requires the Board of Governors of the Federal Reserve System (Board) to submit annually for seven years a report focused on cybersecurity to Congress. The CAA calls for a description of measures the Board has undertaken to strengthen cybersecurity within the financial services sector and with respect to the Board’s functions as a regulator, including the supervision and regulation of financial institutions and third-party service providers.
-
Cybersecurity and Financial System Resilience Report
- Narrateur(s): Tom Brooks
- Durée: 3 h et 2 min
- Date de publication: 2023-08-31
- Langue: Anglais
-
The Consolidated Appropriations Act, 20211 (CAA) requires the Board of Governors of the Federal Reserve System (Board) to submit annually for seven years a report focused on cybersecurity to Congress....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Normal People
- A Practical Guide to Staying Safe Online
- Auteur(s): Charles Montago
- Narrateur(s): Amanda Utter VO
- Durée: 1 h et 22 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
When was the last time you used the internet? Chances are, you've been online within the last 10 minutes. While the World Wide Web is integrated into many facets of daily life, there are still risks we take when entering the digital world. But don't fret! Cybersecurity for Normal People is here; your practical guide to staying safe online! Scammers and hackers are all using the same internet we are, and their job is to take advantage of vulnerable users.
-
Cybersecurity for Normal People
- A Practical Guide to Staying Safe Online
- Narrateur(s): Amanda Utter VO
- Durée: 1 h et 22 min
- Date de publication: 2024-09-25
- Langue: Anglais
-
When was the last time you used the internet? Chances are, you've been online within the last 10 minutes. While the World Wide Web is integrated into many facets of daily life, there are still risks we take when entering the digital world.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Phone Phishing (Vishing) for Seniors
- Cyber Safety in 15 Minutes a Day for Seniors (Cyber Safety in 15-Min a Day for Seniors, Book 1)
- Auteur(s): Dr. Feliks Kravets
- Narrateur(s): Barry Fike
- Durée: 1 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This book is part of a series titled "CyberSafety in 15 Minutes a Day," aimed specifically at enhancing the awareness of social engineering threats among seniors. Given that seniors are often the primary targets of cyber attacks, the goal of this publication is to support the community by offering cyber safety coaching and enhancing awareness about social engineering tactics.
-
Phone Phishing (Vishing) for Seniors
- Cyber Safety in 15 Minutes a Day for Seniors (Cyber Safety in 15-Min a Day for Seniors, Book 1)
- Narrateur(s): Barry Fike
- Série: Cyber Safety in 15 Minutes a Day for Seniors, Livre 1
- Durée: 1 h et 5 min
- Date de publication: 2024-04-25
- Langue: Anglais
-
This book is part of a series titled "CyberSafety in 15 Minutes a Day," aimed specifically at enhancing the awareness of social engineering threats among seniors.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Handbook for Small to Mid-Size Businesses
- Navigating the Cybersecurity Landscape with Confidence!
- Auteur(s): Oscar Fernandez
- Narrateur(s): Nathan Ashcroft
- Durée: 1 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
If you are like most business owners, you may feel overwhelmed (and sometimes intimidated) by the topic of cybersecurity. You're not alone! The good news is that help is here. The Cybersecurity Handbook for Small to Mid-Size Businesses is designed to demystify cybersecurity and data protection for you. It provides essential knowledge about these topics, as well as cost-effective solutions you can use to protect your business.
-
Cybersecurity Handbook for Small to Mid-Size Businesses
- Navigating the Cybersecurity Landscape with Confidence!
- Narrateur(s): Nathan Ashcroft
- Durée: 1 h
- Date de publication: 2023-08-11
- Langue: Anglais
-
If you are like most business owners, you may feel overwhelmed (and sometimes intimidated) by the topic of cybersecurity. You're not alone! The Cybersecurity Handbook for Small to Mid-Size Businesses is designed to demystify cybersecurity and data protection for you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Tips For: 5G Network Slicing
- Security Considerations for Design, Deployment, and Maintenance
- Auteur(s): Cybersecurity National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 3 h et 32 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Enduring Security Framework1 established a working panel comprised of government and industry experts and conducted an in-depth review of the fifth-generation technology for broadband cellular networks standalone network slicing network architecture. This panel assessed the security, risks, benefits, design, deployment, operations, and maintenance of a 5G standalone network slice over two papers: Parts 1 and 2.
-
Tips For: 5G Network Slicing
- Security Considerations for Design, Deployment, and Maintenance
- Narrateur(s): Tom Brooks
- Durée: 3 h et 32 min
- Date de publication: 2023-08-22
- Langue: Anglais
-
The Enduring Security Framework1 established a working panel comprised of government and industry experts and conducted an in-depth review of the fifth-generation technology for broadband cellular networks standalone network slicing network architecture. This panel assessed the security, risks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet. A global, multistakeholder community made up of many organizations shapes internet policy, operations, and security. But the ongoing and increasing reliance on the internet underscores the need to understand the risks to its underlying architecture.
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2022-04-05
- Langue: Anglais
-
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Critical Infrastructure Protection:
- Agencies Need to Assess Adoption of Cybersecurity Guidance - February 2022
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 3 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Federal agencies with a lead role to assist and protect one or more of the nation’s 16 critical infrastructures are referred to as sector risk management agencies (SRMAs). The SRMAs for three of the 16 have determined the extent of their sector’s adoption of the National Institute of Standards and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity (framework). In doing so, lead agencies took actions such as developing sector surveys and conducting technical assessments mapped to framework elements.
-
Critical Infrastructure Protection:
- Agencies Need to Assess Adoption of Cybersecurity Guidance - February 2022
- Narrateur(s): Tom Brooks
- Durée: 3 h et 6 min
- Date de publication: 2022-03-04
- Langue: Anglais
-
Federal agencies with a lead role to assist and protect one or more of the nation’s 16 critical infrastructures are referred to as sector risk management agencies (SRMAs)....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Evolving Electric Power Systems and Cybersecurity
- Auteur(s): Congressional Research Service
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Electricity is essentially the lifeblood of the modern, technological society that we enjoy, for without it, the devices and machinery that enable our economy would not be able to function. The US grid is aging, and one of the tools for modernizing the system is the incorporation of computerized systems that allow for the rapid monitoring and control of the equipment used in the grid. Connecting these systems to the internet has increased the ability to remotely control aspects of the grid, but this has come with increasing concern for the grid’s cybersecurity.
-
Evolving Electric Power Systems and Cybersecurity
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Date de publication: 2021-11-29
- Langue: Anglais
-
Electricity is essentially the lifeblood of the modern, technological society that we enjoy, for without it, the devices and machinery that enable our economy would not be able to function. The US grid is aging....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity: Testimony Before the Committee on Transportation and Infrastructure, House of Representatives
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Thank you for the opportunity to contribute to today’s discussion on federal perspectives to secure the nation’s infrastructure. As you know, our nation’s critical infrastructure sectors are dependent on information technology (IT) systems and digital data to carry out operations and to process, maintain, and report essential information. The security of these systems and data is vital to public confidence and national security, prosperity, and well-being.
-
Cybersecurity: Testimony Before the Committee on Transportation and Infrastructure, House of Representatives
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Date de publication: 2021-12-21
- Langue: Anglais
-
Thank you for the opportunity to contribute to today’s discussion on federal perspectives to secure the nation’s infrastructure. As you know, our nation’s critical infrastructure sectors are dependent on information technology (IT) systems and digital data to carry out operations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cloud Security Career Handbook
- A Beginner's Guide to Starting and Succeeding in Cloud Security
- Auteur(s): Timothy Isle
- Narrateur(s): Brent Caraway
- Durée: 2 h et 45 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cloud security is one of the hottest fields around, with the global cloud market expected to become a multi-billion-dollar industry by 2030. The demand for cloud security professionals is at an all-time high, and now is the best time to take that next step in your cybersecurity career!
-
Cloud Security Career Handbook
- A Beginner's Guide to Starting and Succeeding in Cloud Security
- Narrateur(s): Brent Caraway
- Durée: 2 h et 45 min
- Date de publication: 2023-06-14
- Langue: Anglais
-
Cloud security is one of the hottest fields around, with the global cloud market expected to become a multi-billion-dollar industry by 2030. The demand for cloud security professionals is at an all-time high, and now is the best time to take that next step in your cybersecurity career....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity and Financial System Resilience Report
- Auteur(s): Office of the Comptroller of the Currency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The OCC charters, regulates, and supervises national banks and federal savings associations and licenses, regulates, and supervises federal branches and agencies of foreign banking organizations (collectively the “federal banking system”). As of September 30, 2022, the federal banking system comprised 1,035 banks operating in the United States. In total, the banks within the federal banking system, excluding federal branches and agencies of foreign banks, hold $15.2 trillion of all assets of US commercial banks (64 percent of the total assets held by all US commercial banks).
-
Cybersecurity and Financial System Resilience Report
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Date de publication: 2023-08-10
- Langue: Anglais
-
The OCC charters, regulates, and supervises national banks and federal savings associations and licenses, regulates, and supervises federal branches and agencies of foreign banking organizations (collectively the “federal banking system”).
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Confessions of a CIA Spy
- The Art of Human Hacking
- Auteur(s): Peter Warmka
- Narrateur(s): Gary Williams
- Durée: 3 h et 42 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
What can you learn from a CIA spy who spent his career artfully manipulating regular people to steal high-value secrets? Plenty! In this explosive book, former intelligence officer Peter Warmka unveils detailed methodologies that he and other threat actors use to breach the security of their targets, whether they’re high-profile individuals or entire organizations.
-
Confessions of a CIA Spy
- The Art of Human Hacking
- Narrateur(s): Gary Williams
- Durée: 3 h et 42 min
- Date de publication: 2021-03-02
- Langue: Anglais
-
What can you learn from a CIA spy who spent his career artfully manipulating regular people to steal high-value secrets? Plenty! In this explosive book, former intelligence officer Peter Warmka unveils detailed methodologies to breach the security of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Customer Data and Privacy
- The Insights You Need from Harvard Business Review (HBR Insights Series)
- Auteur(s): Harvard Business Review
- Narrateur(s): Christopher Grove, Janet Metzger
- Durée: 2 h et 56 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Customer Data and Privacy: The Insights You Need from Harvard Business Review will help you understand the tangled interdependencies and complexities and develop strategies that allow your company to be good stewards, collecting, using, and storing customer data responsibly.
-
Customer Data and Privacy
- The Insights You Need from Harvard Business Review (HBR Insights Series)
- Narrateur(s): Christopher Grove, Janet Metzger
- Série: HBR Insights Series
- Durée: 2 h et 56 min
- Date de publication: 2020-09-22
- Langue: Anglais
-
Customer Data and Privacy: The Insights You Need from Harvard Business Review will help you understand the tangled interdependencies and complexities and develop strategies that allow your company to be good stewards, collecting, using, and storing customer data responsibly....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
12,24 $ ou gratuit avec l'essai de 30 jours
-
-
-
Control Your Search
- Narrateur(s): Alex Adekola
- Durée: 1 h et 57 min
- Date de publication: 2023-07-05
- Langue: Anglais
-
Learn the techniques and methods used to control information appearing online about you in a search for your name....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Covert Techniques
- Stay Hidden from Enemies, Governments and Large Corporations
- Auteur(s): Brian Bladen
- Narrateur(s): Piers Powis
- Durée: 1 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In the modern world, maintaining our privacy is getting harder and harder. We are now in a digital age and it is getting so much easier for somebody to get hold of personal information. But it is not only about criminals looking for personal data. Everyone from marketing companies, government agencies, and the media want to know who you are, where you are, what you do, and what you purchase. You have got to get savvy and guard yourself against those that want to get their hands on your data.
-
Covert Techniques
- Stay Hidden from Enemies, Governments and Large Corporations
- Narrateur(s): Piers Powis
- Durée: 1 h et 5 min
- Date de publication: 2023-05-18
- Langue: Anglais
-
In the modern world, maintaining our privacy is getting harder and harder. We are now in a digital age and it is getting so much easier for somebody to get hold of personal information. But it is not only about criminals looking for personal data....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
CISA Open Source Software Security Roadmap
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
As a public good, open-source software is supported by diverse and wide-ranging communities—which are composed of individual maintainers, non-profit software foundations, and corporate stewards. CISA must integrate into and support these communities, with a particular focus on the critical OSS components that the federal government and critical infrastructure systems rely upon.
-
CISA Open Source Software Security Roadmap
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Date de publication: 2023-09-26
- Langue: Anglais
-
This roadmap lays out how CISA will help enable the secure usage and development of OSS, both within and outside the federal government....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity & Infrastructure Security Agency Tips
- Stop Ransomware Guide
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.
-
Cybersecurity & Infrastructure Security Agency Tips
- Stop Ransomware Guide
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2023-06-12
- Langue: Anglais
-
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
CyberSecurity Metaverse
- Auteur(s): Sajed Khan
- Narrateur(s): Gary Middleton
- Durée: 2 h et 9 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Speaking about the "metaverse" is like having a discussion about what "the internet" was in the 1990s. Today, there is a new form of communication and we're in the process of building a new reality but don't really know what the future holds. There is a lot of marketing hype wrapped up in this idea of the metaverse, from Crypto, NFT, and Blockchain to digital wardrobes. To help you get a sense of how vague and complex a term the "metaverse" can be, this audiobook is written around the parameters of what the metaverse means but more importantly cybersecurity.
-
CyberSecurity Metaverse
- Narrateur(s): Gary Middleton
- Durée: 2 h et 9 min
- Date de publication: 2022-04-05
- Langue: Anglais
-
Speaking about the "metaverse" is like having a discussion about what "the internet" was in the 1990s. Today, there is a new form of communication and we're in the process of building a new reality but don't really know what the future holds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Social Engineer's Playbook: A Practical Guide to Pretexting
- Auteur(s): Jeremiah Talamantes
- Narrateur(s): Tom Taverna
- Durée: 3 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Social Engineer's Playbook is a practical guide to pretexting and a collection of social engineering pretexts for Hackers, Social Engineers, and Security Analysts. Build effective social engineering plans using the techniques, tools and expert guidance in this book. Learn valuable elicitation techniques, such as: Bracketing, Artificial Ignorance, Flattery, Sounding Board, and others. This book covers an introduction to tools, such as: Maltego, Social Engineer Toolkit, Dradis, Metasploit, and Kali Linux among others. Crucial to any social engineering test is the information used to build it. Discover the most valuable sources of intel and how to put them to use.
-
The Social Engineer's Playbook: A Practical Guide to Pretexting
- Narrateur(s): Tom Taverna
- Durée: 3 h
- Date de publication: 2017-11-06
- Langue: Anglais
-
The Social Engineer's Playbook is a practical guide to pretexting and a collection of social engineering pretexts for Hackers, Social Engineers, and Security Analysts. Build effective social engineering plans using the techniques, tools and expert guidance in this book. Learn valuable elicitation techniques, such as: Bracketing, Artificial Ignorance, Flattery, Sounding Board, and others....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Security
- The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
- Auteur(s): Noah Zhang
- Narrateur(s): Gary Westphalen
- Durée: 2 h et 1 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cyber security is here to stay. Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”? Our society has become saturated with internet-connected devices and trackers everywhere. From home routers to your mobile phones, most people are easily hacked if targeted. In this introductory audiobook, we will cover verified steps and tactics on how to increase the level of cyber security in an organization and as an individual.
-
Cyber Security
- The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
- Narrateur(s): Gary Westphalen
- Durée: 2 h et 1 min
- Date de publication: 2019-10-17
- Langue: Anglais
-
Cyber security is here to stay. Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”? Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-