Cyber Security cover art

Cyber Security

The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats

Preview

£0.00 for first 30 days

Try for £0.00
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.

Cyber Security

By: Noah Zhang
Narrated by: Gary Westphalen
Try for £0.00

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £6.99

Buy Now for £6.99

Confirm Purchase
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
Cancel

About this listen

Cyber security is here to stay.

Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”?

Do you own a business and now becoming aware of how dangerous the cyber threats are to your assets? Would you like to know how to quickly create a cyber security plan for your business, without dealing with any technical jargon?

Are you interested in pursuing a career in cyber security? Did you know that the average starting salary of a cyber security professional ranges from $65,000 to $80,000 and jumps to multiple figures in a few years, depending on how far you want to go.

Here is an interesting statistic, you are already compromised. Yes, at some point, one of your digital devices or activities has been hacked and your information has been sold. If you knew how bad the threats really are, you would never go online again or you would be very paranoid.

And we’re not talking about those ads that suddenly pop up and follow you around everywhere because you were looking at sunglasses for sale on google or Amazon, that’s called retargeting marketing and is totally legal and legitimate.

We’re talking about malware that hides deep in your device watching everything you do and type, just as one example among hundreds

Our society has become saturated with internet-connected devices and trackers everywhere.

From home routers to your mobile phones, most people are easily hacked if targeted. But it gets even deeper than this; technology has advanced now to where most hacks are automated, by software. International hackers have vast networks and computers set up to conduct non-stop scans, pings, and probes for weaknesses in millions of IP addresses and network domains, such as businesses and residential home routers.

Check your router log and you’ll see it yourself. Now most devices have firewalls but still, that is what’s called an persistent threat that is here to stay, it’s growing and we all need to be aware of how to protect ourselves starting today.

In this introductory audiobook, we will cover verified steps and tactics on how to increase the level of cyber security in an organization and as an individual. It sheds light on the potential weak points which are used as infiltration points and gives examples of these breaches. We will also talk about cyber crime in a technologically-dependent world (Think IoT).

Cyber security has come a long way from the days that hacks could only be perpetrated by a handful of individuals, and they were mostly done on the larger firms or government databases. Now, everyone with a mobile device, home system, car infotainment, or any other computing device is a point of weakness for malware or concerted attacks from hackers, real or automated.

We have adopted anti-viruses and several firewalls to help prevent these issues to the point we have become oblivious to the majority of the attacks. The assistance of malware blocking tools allows our computing devices to fight thousands of attacks per day. Interestingly, cyber crime is a very lucrative industry, as has been proven by the constant investment by criminals on public information. It would be wise to pay at least half as much attention to your security.

What are you waiting for, get this audiobook now to get started instantly!

©2019 Noah Zhang (P)2019 Noah Zhang
Security & Encryption Computer Security Hacking Encryption Cyberattack Business
activate_Holiday_promo_in_buybox_DT_T2

Listeners also enjoyed...

Cybersecurity cover art
Countdown to Zero Day cover art
Cybersecurity cover art
Computer Programming: The Doctrine: An Introduction to the Language of Computer Programming cover art
Computer Programming Languages for Beginners cover art
Computer Networking Beginners Guide cover art
Everything You Wanted to Know About Bitcoin But Were Too Afraid to Ask: All Your Questions Answered! Trading & Investing in Cryptocurrency For Beginners, Blockchain, Mining, Etherium, LItecoin + More cover art
Excel VBA: The Ultimate Beginner's Guide to Learn VBA Programming Step by Step cover art
Cyber Essentials cover art
Ultimate Blockchain Technology: Mega Edition - Six Books cover art
Social Media Marketing Algorithms cover art
AWS: A Comprehensive Guide to Mastering Amazon Web Services cover art
Navigating New Cyber Risks cover art
AWS cover art
Ransomware Protection Playbook cover art
Hacking with Kali Linux cover art

What listeners say about Cyber Security

Average customer ratings
Overall
  • 4.5 out of 5 stars
  • 5 Stars
    12
  • 4 Stars
    5
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    1
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    13
  • 4 Stars
    4
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    1
Story
  • 4.5 out of 5 stars
  • 5 Stars
    14
  • 4 Stars
    3
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    1

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars

Informative

I recently started a course on cyber security, this book is an excellent beginner's volume to help someone improve their information security and make businesses more aware of cyber threats. It's short, and its not as complete as others I have read, but like the guide says, it is for basics and beginners.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    4 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    4 out of 5 stars
Listener received this title free

Guide to computer hacking

I purchased this book to see if there were any tips or tricks that I could pick up on. It is really easy to listen and follow. Also, it has a great format. This book has turned out to be the most beneficial book so far in my studies. It's packed with the baby steps needed for penetration testing. This has given me enough knowledge to seek other reference materials to continue along this track.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

Statistics brings a lot of value

This was an eye-opener for me. Applying statistics can bring a lot of value to cybersecurity and this book presents good examples of how to use it. I would highly recommend for cybersecurity professionals but you might want to brush up your statistic background to fully benefit from the topics covered here.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Outstanding

A fascinating book, it provides a comprehensive overview of the current state of cybersecurity and the incredible challenges facing cybersecurity professionals. Very detailed, the authors go to great lengths to point out some very scary vulnerabilities and they also dispel some fears that are probably overblown. Very even-handed in how they approach political perspectives for cyber strategies. The narrator does an excellent job. Highly recommended.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Cybersecurity risk measurement reimagined

The Audible version is well done, with the first two sections easy to follow and comprehend with only a few rewinds for grasping the intricacies of the theory. However, the third section is nearly impossible to follow audibly as the reader is required to voice long and complex Excel mathematical formulas. Of course, this is not a fault of the authors or the performance, just a result of the deep subject matter and detailed examples.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

Cyber Security

I adapted so much data and occasions about digital security that I once never knew.Very supportive for getting into the field. Spreads the fundamentals and enlightening. Each fledgling should peruse this to get an idea of the extent of the digital security issue and how to assault it.This book is such a great amount of superior to anything some in the weeds thing depicting particular specialized ways to deal with a particular issue. This book demonstrates to you where to begin and what sorts of specialists you have to enroll and the various parts of digital security that you have to consider.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    5 out of 5 stars

This is a recommended listen.

What I like best about this is that it assumes you have virtually no knowledge of the security field, can operate a computer with some skill, and understand how to follow directions. The high-level view is really best for the true novice and helps to take away some of the intimidation of the field. I have been meaning to learn to hack all this time and this book has just got my attention. I have learned so many things from this book that can help me with some hacking kinds of stuff. This is a recommended listen.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Required for risk management pros

Absolutely essential for participants in any risk management program who want to get beyond faking things up with 3 level matrices. Quantitative risk analysis requires accuracy, but not absolute precision. This book gives great practical examples and training for getting to as much accuracy as you need for a given application. Study it, and make better decisions for your program.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

Five Stars

I learned so much information and events about cyber security that I once never knew! Very helpful for getting into the field. Covers the basics and informative.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Cyber Threats

In this book, you will learn about the fundamental concepts of cybersecurity. These are facts that form the foundation of your knowledge in cybersecurity. The knowledge you gain from this book will help you understand the need to enhance your security online.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!