Listen free for 30 days

  • Computer Networking and Cybersecurity

  • A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
  • By: Quinn Kiser
  • Narrated by: Ivan Busenius
  • Length: 7 hrs and 1 min
  • Unabridged Audiobook
  • Categories: Computers & Technology, Security & Encryption
  • 4.2 out of 5 stars (9 ratings)

Listen with a free trial

One credit a month, good for any title to download and keep.
Unlimited listening to the Plus Catalogue - thousands of select Audible Originals, podcasts and audiobooks.
Exclusive member-only deals.
No commitment - cancel anytime.
Buy Now for £18.29

Buy Now for £18.29

Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.

Summary

If you want to learn the basics of computer networking and how to protect yourself from cyber attacks, then pay attention...

Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. It focuses on enabling you to create a strong foundation of concepts of some of the most popular topics in this area.

We have provided a one-stop highway to learning about the fundamentals of computer networking, internet connectivity, cybersecurity, and hacking.

In part two, you will take a journey into the world of cybercrimes and cybersecurity. The information is designed to help you understand the different forms of hacking and what you can do to prevent being hacked. By the end of this part, you may decide to pursue a career in the domain of information security.

In part two, you will discover the following:

  • The importance of cybersecurity
  • A brief history of cybercrime, the different types, and its evolution over the years
  • The various types of cyberattacks executed over the internet
  • The secrets of phishing attacks and how you can protect yourself against them
  • The different kinds of malware that exist in the digital world
  • The fascinating tools to identify and tackle malware
  • Ransomware and how attackers leverage technology to make money
  • The nine security testing methods you can learn to do
  • Network security, web application security, and smartphone security
  • Examples of different types of hacks and past incidents to emphasize the need for cybersecurity

The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.

So, if you want to learn about computer networking and cybersecurity in an efficient way, then scroll up and click the "buy now" button!

©2020 Quinn Kiser (P)2020 Quinn Kiser

What listeners say about Computer Networking and Cybersecurity

Average customer ratings
Overall
  • 4 out of 5 stars
  • 5 Stars
    4
  • 4 Stars
    4
  • 3 Stars
    0
  • 2 Stars
    1
  • 1 Stars
    0
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    3
  • 4 Stars
    2
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Story
  • 4.5 out of 5 stars
  • 5 Stars
    3
  • 4 Stars
    2
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars

A must for all Cybersecurity practitioners!!

There's great information included such as Zero Trust, Cloud Security, identifying different types of cyberattacks, Cyber Kill Chain, and so much more. Cybersecurity specialists can use this audible as a manual to improve the security posture of their organization as there are some excellent methods explained by two highly qualified experts in the field.

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars

lifecycle in today's cyberscurity landscape

This audible gives a holistic view of the threat management lifecycle in today's cybersecurity landscape. There's loads of coverage on Kali Linux tools for initiatives with recon, exploit, and privilege escalation, followed by defense strategies including threat intelligence for vapor assets. There's no lack of case studies that have happened in the real world, drawing on lessons learned that formed today's cybersecurity methods.

Sort by:
Filter by:
  • Overall
    1 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    1 out of 5 stars
Profile Image for Scott Redfern
  • Scott Redfern
  • 01-10-21

Antiquated technology

This book says it was released in Oct of 2020 but it repeatedly refers to technology that is 20 years old. I keep thinking that it will come around to technology from the current millennium but it persists in discussing 10base2, hubs. 100baseT as current technologies of choice. They neglected to talk about the pony express as a recent foe of communication, but I’m sure that was just an oversight. I could have gone to the museum of computer science for this type of information. I can’t wait for the cyber security section!

2 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Romana Demming
  • Romana Demming
  • 02-01-21

Cyber Security

Cybercriminals are everywhere and they will attack without information. The situation resembles impossible. However, through his well-thought-out strategy, the author examines a powerful plan we can complete to protect our computers, tablets, and phones, from those who would do us harm.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Johnie Fordham
  • Johnie Fordham
  • 02-01-21

Hacker vs Cracker

Python is being used in schools to teach kids coding. It’s nice to have a written back up to help at home. The author distinguishes a cracker from a hacker as someone who has self-interest, looking for selfish gains while an ethical hacker will help expose vulnerabilities of a system and can also get information that could be used for a good cause such as helping the police.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Oda Henricks
  • Oda Henricks
  • 02-01-21

Protect your data

With so many people online these days, people are unprotected from hackers. This work will give you strategies to protect your data.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Nathan Whisnant
  • Nathan Whisnant
  • 02-01-21

Protect your business against cyberattacks

Cyberattacks can happen to any organization big or small. Most advances aim to steal credit card information. There are so many types of cybersecurity and different requirements for each one. Learn how to improve your security and secure your business.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Petrus Loots
  • Petrus Loots
  • 02-01-21

Great protection information

Cybersecurity is a really big problem. My group is always on alert for anything out of the ordinary. I am so glad because I have had problems a few times and they have notified me immediately. This work gives you suggestions for securing your small business, developing your security, and cyber attacks.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Peter Liu
  • Peter Liu
  • 02-01-21

Different types of cybersecurity to be aware of

Not preserving your company from cybercrime can be bad for business. Without some type of security for your company, it could be at high risk for cyber-attacks. There are numerous kinds of cybersecurity that you can use to create a good foundation for an excellent security policy.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Ian Latimer
  • Ian Latimer
  • 01-01-21

self published amature look at cyber secueity

It is a self-published look at cybersecurity and ethical hacking. The content is short 'explanations' of various features of cybersecurity, offering no more information than a quick Google search would bring. The sources used for the manhood of the work are a mix of YouTube and websites such as weird, quoting arbitrary stories as examples of each area of cyber.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Mark Lane
  • Mark Lane
  • 01-01-21

different topics regarding cybersecurity

Very interesting listen, it was well thought out with different viewpoints of the cybersecurity World. The information given has a good clutch of the current issues of today's technology savvy society.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Gillian Jones
  • Gillian Jones
  • 01-01-21

One of the best audible

For a few years, I was looking for an audible that can clear concepts in Cybersecurity. This work comes under that spectrum. It is great to listen to this work and to be very honest whatever I have not learned from my university I am learning from this work. I would say a must book for people who are starting a career in Cybersecurity