Cybersecurity
Learn Fast How to Become an InfoSec Pro 3 Books in 1
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.
Add to basket failed.
Please try again later
Add to Wish List failed.
Please try again later
Remove from Wish List failed.
Please try again later
Follow podcast failed
Unfollow podcast failed
1 credit a month to buy any audiobook in our entire collection.
Access to thousands of additional audiobooks and Originals from the Plus Catalogue.
Member-only deals & discounts.
Auto-renews at $16.45/mo after 30 days. Cancel anytime.
Buy Now for $27.99
No valid payment method on file.
We are sorry. We are not allowed to sell this product with the selected payment method
Pay using voucher balance (if applicable) then card ending in
By confirming your purchase, you agree to Audible's Conditions Of Use and Privacy Notice and authorise Audible to charge your designated credit card or another available credit card on file.
-
Narrated by:
-
Scott Clem
-
By:
-
John Knowles
About this listen
Three audiobooks in one deal:
- Book 1: How to Establish Effective Security Management Functions
- Book 2: How to Apply the NIST Risk Management Framework
- Book 3: How to Manage Risk, Using the NIST Cybersecurity Framework
Click "Buy Now" to get started today!
You will learn in Book 1:
- Objectives of security management
- Security management principles
- Defense in depth
- How to apply security controls
- Security control functions
- Security strategy and governance scenario
- Information security relationships
- Business, compliance, and security
- Management roles and responsibilities
- Security roles and responsibilities
- How to decipher the risk management program and more....
You will learn in Book 2:
- Compliance, security, risk
- How to be compliant and secure
- Introduction to risk management framework
- Introduction to the RMF publications
- Understanding the cybersecurity framework
- Comprehending the CSF tiers and profiles
- Essential RMF concepts
- Understanding risk tiers
- Understanding systems and authorization
- Introduction to roles and responsibilities
- How to prepare for organization-level tasks
- And more....
You will learn in Book 3:
- How to reassess risk
- How to implement risk response
- Risk response option basics
- How to analyze cost and benefit
- How to prioritize risk response options
- How to respond to risk
- Introduction to control types
- Control function basics
- Understanding security controls
- How to develop and use KPIs
- How to monitor risk factors
- And more....
Click "Buy Now" to get started today!
©2020 John Knowles (P)2020 John KnowlesWhat listeners say about Cybersecurity
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.