Cybersecurity cover art

Cybersecurity

Learn Fast How to Become an InfoSec Pro 3 Books in 1

Preview

Try Premium Plus free
1 credit a month to buy any audiobook in our entire collection.
Access to thousands of additional audiobooks and Originals from the Plus Catalogue.
Member-only deals & discounts.
Auto-renews at $16.45/mo after 30 days. Cancel anytime.

Cybersecurity

By: John Knowles
Narrated by: Scott Clem
Try Premium Plus free

$16.45 per month after 30 days. Cancel anytime.

Buy Now for $27.99

Buy Now for $27.99

Confirm Purchase
Pay using voucher balance (if applicable) then card ending in
By confirming your purchase, you agree to Audible's Conditions Of Use and Privacy Notice and authorise Audible to charge your designated credit card or another available credit card on file.
Cancel

About this listen

Three audiobooks in one deal:

  • Book 1: How to Establish Effective Security Management Functions
  • Book 2: How to Apply the NIST Risk Management Framework
  • Book 3: How to Manage Risk, Using the NIST Cybersecurity Framework

Click "Buy Now" to get started today!

You will learn in Book 1:

  • Objectives of security management
  • Security management principles
  • Defense in depth
  • How to apply security controls
  • Security control functions
  • Security strategy and governance scenario
  • Information security relationships
  • Business, compliance, and security
  • Management roles and responsibilities
  • Security roles and responsibilities
  • How to decipher the risk management program and more....

You will learn in Book 2:

  • Compliance, security, risk
  • How to be compliant and secure
  • Introduction to risk management framework
  • Introduction to the RMF publications
  • Understanding the cybersecurity framework
  • Comprehending the CSF tiers and profiles
  • Essential RMF concepts
  • Understanding risk tiers
  • Understanding systems and authorization
  • Introduction to roles and responsibilities
  • How to prepare for organization-level tasks
  • And more....

You will learn in Book 3:

  • How to reassess risk
  • How to implement risk response
  • Risk response option basics
  • How to analyze cost and benefit
  • How to prioritize risk response options
  • How to respond to risk
  • Introduction to control types
  • Control function basics
  • Understanding security controls
  • How to develop and use KPIs
  • How to monitor risk factors
  • And more....

Click "Buy Now" to get started today!

©2020 John Knowles (P)2020 John Knowles
Security & Encryption

What listeners say about Cybersecurity

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.