Listen free for 30 days

Listen with offer

  • Cybersecurity

  • An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
  • By: Lester Evans
  • Narrated by: Michael Reaves
  • Length: 3 hrs and 25 mins
  • 3.5 out of 5 stars (6 ratings)
Offer ends May 1st, 2024 11:59PM GMT. Terms and conditions apply.
£7.99/month after 3 months. Renews automatically.
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
Cybersecurity cover art

Cybersecurity

By: Lester Evans
Narrated by: Michael Reaves
Get this deal Try for £0.00

Pay £99p/month. After 3 months pay £7.99/month. Renews automatically. See terms for eligibility.

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £11.99

Buy Now for £11.99

Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.

Listeners also enjoyed...

Forex Trading: Currency Trading Made Simple, the Ultimate Forex Guide for Beginners, Secret Strategies, Tips, and Tricks cover art
SQL: From Beginner to Intermediate cover art
Dark Psychology and Manipulation cover art
Mind Mapping cover art
Cryptocurrency cover art
Cryptocurrency: Investing, Trading, and Mining in Blockchain, Bitcoin, Ethereum, and Altcoins cover art
Money: Cryptocurrency cover art
Dark Psychology cover art
Computer Programming: The Doctrine: An Introduction to the Language of Computer Programming cover art
Persuasion cover art
Passive Income: 10 Ways to Generate a Passive Income Stream with Offline Businesses cover art
Cryptocurrency: The Basics of Bitcoin, Ethereum, and Blockchain cover art
Credit Score Repair: How to Repair Your Credit and Boost Your Score Fast - Delete Judgments, Inquiries, and Negative Accounts cover art
Rental Property Investing cover art
How to Start a Small Business for Beginners in 2019 cover art
C#: The Practical Intermediates Guide To Increase Your C# Programming And Coding Abilities Using Effective Computer Languages Skills (Python, Java, Arduino, SQL, C++) cover art

Summary

If you want to avoid getting hacked, having your information spread, and risking financial loss, then pay attention....

Do you create tons of accounts you will never again visit? 

Does your password contain a sequence of numbers, such as “123456”? 

Do you automatically click all links and download all email attachments coming from your friends? 

This audiobook will show you just how incredibly lucky you are that nobody's hacked you before.

With this handy little book as your starting point, you can finally go from a starry-eyed internet user to a paranoid cybersecurity geek. 

With plenty of examples, this audiobook will show you that the internet is not merely a way to watch cute cat videos; it's a battlefield, a military invention that was accidentally found to be capable of overpowering any threat economically, digitally and politically. 

From the crudest forums to the most sophisticated online services, there is a war going on, and, whether you want it or not, you're involved by the very fact you're here, so better arm yourself with knowledge.

Here’s just a tiny fraction of what you’ll discover:

  • How the internet is held together with a pinky swear
  • How hackers use raunchy photos to eke out private information
  • Examples of preposterous social engineering attacks
  • Equally preposterous defense from those attacks
  • How people in charge don't even realize what hacking means
  • How there's only one surefire way to protect against hacking
  • Research on past, present, and future hacking methods
  • Difference between good and bad hackers
  • How to lower your exposure to hacking
  • Why companies pester you to attach a phone number to an account
  • Why social media is the most insecure way to spend your afternoon

And much, much more....

©2018 Lester Evans (P)2019 Lester Evans

What listeners say about Cybersecurity

Average customer ratings
Overall
  • 3.5 out of 5 stars
  • 5 Stars
    3
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    3
  • 1 Stars
    0
Performance
  • 4 out of 5 stars
  • 5 Stars
    2
  • 4 Stars
    2
  • 3 Stars
    0
  • 2 Stars
    1
  • 1 Stars
    0
Story
  • 3.5 out of 5 stars
  • 5 Stars
    2
  • 4 Stars
    0
  • 3 Stars
    1
  • 2 Stars
    2
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    2 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    2 out of 5 stars

A big rant about corporations

The book is basically a big rant about corporations and governments about their incentives, and offers no practical advice on how to mitigate anything.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!