Cyber Security cover art

Cyber Security

The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats

Preview
Get this deal Try Premium Plus free
Offer ends December 16, 2025 11:59pm GMT.
Prime members: New to Audible? Get 2 free audiobooks during trial.
Just £0.99/mo for your first 3 months of Audible.
1 bestseller or new release per month—yours to keep.
Listen all you want to thousands of included audiobooks, podcasts, and Originals.
Auto-renews at £8.99/mo after 3 months. Cancel monthly.
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£8.99/month after 30 days. Renews automatically.

Cyber Security

By: Noah Zhang
Narrated by: Gary Westphalen
Get this deal Try Premium Plus free

£8.99/mo after 3 months. Cancel monthly. Offer ends December 16, 2025 11:59pm GMT.

£8.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £6.99

Buy Now for £6.99

Only £0.99 a month for the first 3 months. Pay £0.99 for the first 3 months, and £8.99/month thereafter. Renews automatically. Terms apply. Start my membership

About this listen

Cyber security is here to stay.

Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”?

Do you own a business and now becoming aware of how dangerous the cyber threats are to your assets? Would you like to know how to quickly create a cyber security plan for your business, without dealing with any technical jargon?

Are you interested in pursuing a career in cyber security? Did you know that the average starting salary of a cyber security professional ranges from $65,000 to $80,000 and jumps to multiple figures in a few years, depending on how far you want to go.

Here is an interesting statistic, you are already compromised. Yes, at some point, one of your digital devices or activities has been hacked and your information has been sold. If you knew how bad the threats really are, you would never go online again or you would be very paranoid.

And we’re not talking about those ads that suddenly pop up and follow you around everywhere because you were looking at sunglasses for sale on google or Amazon, that’s called retargeting marketing and is totally legal and legitimate.

We’re talking about malware that hides deep in your device watching everything you do and type, just as one example among hundreds

Our society has become saturated with internet-connected devices and trackers everywhere.

From home routers to your mobile phones, most people are easily hacked if targeted. But it gets even deeper than this; technology has advanced now to where most hacks are automated, by software. International hackers have vast networks and computers set up to conduct non-stop scans, pings, and probes for weaknesses in millions of IP addresses and network domains, such as businesses and residential home routers.

Check your router log and you’ll see it yourself. Now most devices have firewalls but still, that is what’s called an persistent threat that is here to stay, it’s growing and we all need to be aware of how to protect ourselves starting today.

In this introductory audiobook, we will cover verified steps and tactics on how to increase the level of cyber security in an organization and as an individual. It sheds light on the potential weak points which are used as infiltration points and gives examples of these breaches. We will also talk about cyber crime in a technologically-dependent world (Think IoT).

Cyber security has come a long way from the days that hacks could only be perpetrated by a handful of individuals, and they were mostly done on the larger firms or government databases. Now, everyone with a mobile device, home system, car infotainment, or any other computing device is a point of weakness for malware or concerted attacks from hackers, real or automated.

We have adopted anti-viruses and several firewalls to help prevent these issues to the point we have become oblivious to the majority of the attacks. The assistance of malware blocking tools allows our computing devices to fight thousands of attacks per day. Interestingly, cyber crime is a very lucrative industry, as has been proven by the constant investment by criminals on public information. It would be wise to pay at least half as much attention to your security.

What are you waiting for, get this audiobook now to get started instantly!

©2019 Noah Zhang (P)2019 Noah Zhang
Security & Encryption Technology Computer Security Hacking Cybersecurity Encryption Cyberattack Business

Listeners also enjoyed...

Cybersecurity cover art
Countdown to Zero Day cover art
Cybersecurity cover art
Computer Programming: The Doctrine: An Introduction to the Language of Computer Programming cover art
Computer Programming Languages for Beginners cover art
Computer Networking Beginners Guide cover art
Everything You Wanted to Know About Bitcoin But Were Too Afraid to Ask: All Your Questions Answered! Trading & Investing in Cryptocurrency For Beginners, Blockchain, Mining, Etherium, LItecoin + More cover art
Excel VBA: The Ultimate Beginner's Guide to Learn VBA Programming Step by Step cover art
Cyber Essentials cover art
Ultimate Blockchain Technology: Mega Edition - Six Books cover art
Social Media Marketing Algorithms cover art
AWS: A Comprehensive Guide to Mastering Amazon Web Services cover art
Navigating New Cyber Risks cover art
AWS cover art
Ransomware Protection Playbook cover art
Hacking with Kali Linux cover art
All stars
Most relevant

Listener received this title free

This is really an excellent book. This book is incredible for any individual who needs to see how accounting can be utilized to take your business to the following dimension.

This is really an excellent book.

Something went wrong. Please try again in a few minutes.

Absolutely essential for participants in any risk management program who want to get beyond faking things up with 3 level matrices. Quantitative risk analysis requires accuracy, but not absolute precision. This book gives great practical examples and training for getting to as much accuracy as you need for a given application. Study it, and make better decisions for your program.

Required for risk management pros

Something went wrong. Please try again in a few minutes.

In this book, you will learn about the fundamental concepts of cybersecurity. These are facts that form the foundation of your knowledge in cybersecurity. The knowledge you gain from this book will help you understand the need to enhance your security online.

Cyber Threats

Something went wrong. Please try again in a few minutes.

The Audible version is well done, with the first two sections easy to follow and comprehend with only a few rewinds for grasping the intricacies of the theory. However, the third section is nearly impossible to follow audibly as the reader is required to voice long and complex Excel mathematical formulas. Of course, this is not a fault of the authors or the performance, just a result of the deep subject matter and detailed examples.

Cybersecurity risk measurement reimagined

Something went wrong. Please try again in a few minutes.

What I like best about this is that it assumes you have virtually no knowledge of the security field, can operate a computer with some skill, and understand how to follow directions. The high-level view is really best for the true novice and helps to take away some of the intimidation of the field. I have been meaning to learn to hack all this time and this book has just got my attention. I have learned so many things from this book that can help me with some hacking kinds of stuff. This is a recommended listen.

This is a recommended listen.

Something went wrong. Please try again in a few minutes.

See more reviews