Listen free for 30 days

Listen with offer

  • Cybersecurity

  • A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
  • By: Quinn Kiser
  • Narrated by: Ivan Busenius
  • Length: 3 hrs and 33 mins
  • 4.6 out of 5 stars (12 ratings)
Offer ends May 1st, 2024 11:59PM GMT. Terms and conditions apply.
£7.99/month after 3 months. Renews automatically.
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
Cybersecurity cover art

Cybersecurity

By: Quinn Kiser
Narrated by: Ivan Busenius
Get this deal Try for £0.00

Pay £99p/month. After 3 months pay £7.99/month. Renews automatically. See terms for eligibility.

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £11.99

Buy Now for £11.99

Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.

Listeners also enjoyed...

Computer Networking cover art
Cybersecurity cover art
Computer Networking and Cybersecurity cover art
Hacking with Kali Linux cover art
Hacking with Kali Linux cover art
Cybersecurity for Dummies cover art
Hacking for Beginners cover art
Cyber Security cover art
Markov Models: Supervised and Unsupervised Machine Learning cover art
SQL: From Beginner to Intermediate cover art
Hacking with Kali Linux cover art
JAVA: The Practical Beginners Guide to Learn Java and Javascript in One Day cover art
Ransomware Protection Playbook cover art
Notary Public and Loan Signing cover art
8 Steps to Better Security cover art
Social Media Mastery: Two Manuscripts cover art

Summary

If you want to discover how to protect yourself, your family, and business against cyber attacks, then pay attention...

Have you been curious about how hackers choose their victims or develop their attack plans?

Have you been hacked before?

Do you want to learn to protect your systems and networks from hackers?

If you answered “yes” to any of the questions above, this is the audiobook for you.

This audiobook serves as a launchpad for learning more about the Internet and cybersecurity.

Throughout this audiobook, you will take a journey into the world of cybercrimes and cybersecurity.

The information is designed to help you understand the different forms of hacking and what you can do to prevent being hacked.

By the end of this audiobook, you may decide to pursue a career in the domain of information security.

In this audiobook, you will discover the following:

  • The importance of cybersecurity.
  • A brief history of cybercrime, the different types, and its evolution over the years.
  • The various types of cyber-attacks executed over the Internet. 
  • 10 Types of Cyber hackers - the masterminds behind attacks.
  • The secrets of phishing attacks and how you can protect yourself against them.
  • The different kinds of malware that exist in the digital world. 
  • The fascinating tools to identify and tackle malware. 
  • Ransomware and how attackers leverage technology to make money. 
  • 9 security testing methods you can learn to do.
  • Social engineering and how to identify a social engineering attack.
  • Network Security, Web Application Security, and Smartphone security.
  • Examples of different types of hacks and past incidents to emphasize the need for cybersecurity. 

If you are keen to know more and get started, buy this audiobook today.

©2020 Quinn Kiser (P)2020 Quinn Kiser

What listeners say about Cybersecurity

Average customer ratings
Overall
  • 4.5 out of 5 stars
  • 5 Stars
    9
  • 4 Stars
    1
  • 3 Stars
    2
  • 2 Stars
    0
  • 1 Stars
    0
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    2
  • 4 Stars
    1
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Story
  • 4 out of 5 stars
  • 5 Stars
    2
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    1
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

It is upcoming Cybersecurity course!

It reminds me of the essence we used to do at Sprint. This is the type of information that can save a company also a lot of money.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

Slow and steady wins the race.

It was interesting and useful to learn about Cybersecurity, I know how to fix it and how to guard cybersecurity now. I think that this is really an essential topic, especially in our time. I agree with the author that cybersecurity is a marathon, not a race, slow and steady wins the race.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    3 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    2 out of 5 stars

If you have a passing interest and you’re not concerned about clear explanation.

When you explain that the cloud is something on the internet it makes me believe that you don’t understand this either but you write about it!
Simply cloud is a company that invested in many powerful computers and they offer access to this resource in exchange for money.
From another perspective Cloud is usually one or a complex of buildings full of dedicated computers that supports multiple connections, they have a lot of storage to be able to hold huge amounts of data and high processing power to support multiple server applications.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!