Listen free for 30 days
-
The Cyber Security Handbook
- Prepare for, Respond to and Recover from Cyber Attacks with the It Governance Cyber Resilience Framework (CRF)
- Narrated by: Stephen Perring
- Length: 7 hrs and 59 mins
- Unabridged Audiobook
- Categories: Computers & Technology, Security & Encryption
Add to basket failed.
Add to wishlist failed.
Remove from wishlist failed.
Follow podcast failed
Unfollow podcast failed
Listen with a free trial
Buy Now for £18.29
No valid payment method on file.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
Cyber Essentials
- A Pocket Guide
- By: Alan Calder
- Narrated by: Liam Gerrard
- Length: 1 hr and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
Every year, thousands of computer systems in the UK are compromised. The majority fall victim to easily preventable cyberattacks, carried out with tools that are freely available on the Internet. Cyber Essentials is the UK government's reaction to the proliferation of these attacks. It requires that organizations put basic security measures in place, enabling them to reliably counter the most common tactics employed by cybercriminals. This guide explains how to achieve certification to Cyber Essentials in a fast, effective, and cost-effective manner.
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- By: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrated by: Gwen Bettwy
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
Nine Steps to Success
- An ISO27001:2013 Implementation Overview
- By: Alan Calder
- Narrated by: Liam Gerrard
- Length: 2 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
Now in its third edition, Nine Steps to Success has been completely updated to reflect the implementation methodology used by IT Governance consultants in hundreds of successful ISMS implementations around the world and covers each element of the ISO 27001 project in simple, nontechnical language. If you’re tackling ISO 27001 for the first time, Nine Steps to Success will give you the guidance you need to get to grips with the Standard’s requirements and ensure your implementation project is a success - from inception to certification.
-
Cyber Security: Comprehensive Beginners Guide to Learn the Basics and Effective Methods of Cyber Security
- By: Brian Walker
- Narrated by: Peter Prova
- Length: 3 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this book, you will learn about the fundamental concepts of cyber security. These are facts that form the foundation of your knowledge in cyber security. The knowledge you gain from this book will help you understand the need to enhance your security online. From office devices to your personal devices at home, you must be keen on securing your networks all the time.
-
-
Good to listen
- By Bobby on 19-07-19
-
The Wind in the Willows
- By: Kenneth Grahame, Dina Gregory
- Narrated by: Cush Jumbo, Harriet Walter, Aimee Lou Wood, and others
- Length: 7 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Meet Lady Toad, Mistress Badger, Miss Water Rat and Mrs Mole as they go about their adventures, messing around on the river, gallivanting in Lady Toad’s shiny new toy and fighting valiantly to save Toad Hall from unruly squatters. In this retelling by Dina Gregory, The Wind in the Willows becomes a story about a group of female animals to be admired for their close sisterhood and fierce independence. Featuring original music and songs by Rosabella Gregory and sound effects captured on location, put your headphones on, sit back and lose yourself in the British countryside.
-
-
Why Bother?
- By swampedbybunnies on 08-12-20
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
Cyber Essentials
- A Pocket Guide
- By: Alan Calder
- Narrated by: Liam Gerrard
- Length: 1 hr and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
Every year, thousands of computer systems in the UK are compromised. The majority fall victim to easily preventable cyberattacks, carried out with tools that are freely available on the Internet. Cyber Essentials is the UK government's reaction to the proliferation of these attacks. It requires that organizations put basic security measures in place, enabling them to reliably counter the most common tactics employed by cybercriminals. This guide explains how to achieve certification to Cyber Essentials in a fast, effective, and cost-effective manner.
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- By: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrated by: Gwen Bettwy
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
Nine Steps to Success
- An ISO27001:2013 Implementation Overview
- By: Alan Calder
- Narrated by: Liam Gerrard
- Length: 2 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
Now in its third edition, Nine Steps to Success has been completely updated to reflect the implementation methodology used by IT Governance consultants in hundreds of successful ISMS implementations around the world and covers each element of the ISO 27001 project in simple, nontechnical language. If you’re tackling ISO 27001 for the first time, Nine Steps to Success will give you the guidance you need to get to grips with the Standard’s requirements and ensure your implementation project is a success - from inception to certification.
-
Cyber Security: Comprehensive Beginners Guide to Learn the Basics and Effective Methods of Cyber Security
- By: Brian Walker
- Narrated by: Peter Prova
- Length: 3 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this book, you will learn about the fundamental concepts of cyber security. These are facts that form the foundation of your knowledge in cyber security. The knowledge you gain from this book will help you understand the need to enhance your security online. From office devices to your personal devices at home, you must be keen on securing your networks all the time.
-
-
Good to listen
- By Bobby on 19-07-19
-
The Wind in the Willows
- By: Kenneth Grahame, Dina Gregory
- Narrated by: Cush Jumbo, Harriet Walter, Aimee Lou Wood, and others
- Length: 7 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Meet Lady Toad, Mistress Badger, Miss Water Rat and Mrs Mole as they go about their adventures, messing around on the river, gallivanting in Lady Toad’s shiny new toy and fighting valiantly to save Toad Hall from unruly squatters. In this retelling by Dina Gregory, The Wind in the Willows becomes a story about a group of female animals to be admired for their close sisterhood and fierce independence. Featuring original music and songs by Rosabella Gregory and sound effects captured on location, put your headphones on, sit back and lose yourself in the British countryside.
-
-
Why Bother?
- By swampedbybunnies on 08-12-20
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
CISSP: A Comprehensive Beginners Guide on the Information Systems Security
- By: Walker Schmidt
- Narrated by: Dean Collins
- Length: 4 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
The key functions of the Security and Risk Management domain are risk analysis and mitigation, as well as, ensuring the best organizational structure for a robust information security system is in place. In this area of expertise, it’s the quality of the people that can make or break an organization. By "quality of the people", we mean knowledgeable and experienced staff with supportive, as well as, vested leadership are of the highest quality.
-
Cybersecurity: The Advance Guide in System Security and Defense Strategies in Cybersecurity
- By: Zach Webber
- Narrated by: William Bahl
- Length: 1 hr and 26 mins
- Unabridged
-
Overall
-
Performance
-
Story
The audiobook considers the problems related to cybersecurity in the individual as well as the organizational setting. Cybersecurity is essential to the organization considering the growing technological dependencies that organizations are continuously facing. The audiobook considers the nature of threats of cybercrime from hacking to data manipulation.
-
-
Enjoyed it
- By Taylor S. on 01-04-21
-
Cybersecurity: The Ultimate Beginners Guide to Learn and Understand Cybersecurity Measures Effectively
- By: Zach Webber
- Narrated by: William Bahl
- Length: 1 hr and 26 mins
- Unabridged
-
Overall
-
Performance
-
Story
Each week it seems that some major corporation or another is having serious issues thanks to the leaks of some malicious hacker. Hearing stories like this can make it seem difficult, if not impossible for individuals and smaller organizations to ensure their own cybersecurity to keep their own information private; after all, if the big guys can’t manage, then it can be hard to see the point. This defeatist attitude is just what the criminals want. However, the truth of the matter is there is plenty you can do to improve your cybersecurity, right now.
-
-
Remarkable book for everyone
- By Ruth Hudson on 01-06-20
-
Cybersecurity
- The Insights You Need from Harvard Business Review
- By: Harvard Business Review, Alex Blau, Andrew Burt, and others
- Narrated by: Jonathan Todd Ross
- Length: 2 hrs and 56 mins
- Unabridged
-
Overall
-
Performance
-
Story
No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT specialists. Improving and increasing data security practices and identifying suspicious activity is everyone's responsibility, from the boardroom to the break room.
-
Alice and Bob Learn Application Security
- By: Tanya Janca
- Narrated by: Tanya Janca
- Length: 10 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Learn application security from the very start with this comprehensive and approachable guide. Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures.
-
The ABC of Cybersecurity
- How to Prevent Phishing & Social Engineering Attacks, Incident Management Best Practices and Cybersecurity Awareness for Employees
- By: Mike Miller
- Narrated by: Scott Clem
- Length: 13 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Designed to teach you how to protect yourself and your business from the most common cyberattacks, this comprehensive bundle includes three books: How to Prevent Phishing & Social Engineering Attacks, Incident Management Best Practices, and Cybersecurity Awareness for Employees.
-
CISSP Exam Study Guide
- Cybersecurity and Ethical Hacking to Information Security Professionals: Comprehensive Guide to Threats, Ethical Hacking, Defense Techniques & Cybersecurity Frameworks 5 Book
- By: John Knowles
- Narrated by: Scott Clem, Marty Ravenel, Khai Lannor
- Length: 26 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you want to discover what it takes to become a CISSP? If your answer is yes, buy this book now!
-
-
Realistic advice provides in this audio-book
- By Arlene B. Snow on 09-12-21
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
8 Steps to Better Security
- A Simple Cyber Resilience Guide for Business
- By: Kim Crawley
- Narrated by: Jo Anna Perrin
- Length: 7 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical road map to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Fascinating History of Hacking
- By James on 19-07-19
-
Cybersecurity
- The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks
- By: Trust Genics
- Narrated by: Leon Tietz
- Length: 3 hrs and 48 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyberattacks are an evolving danger to organizations, employees, and consumers. They may be designed to access or destroy sensitive data, extort money or even put your family at risk. At an individual level, a cybersecurity attack can result in everything from identity theft to extortion attempts, to the loss of important data like family photos. However, there are simple things you can do to protect yourself, your family, and your work.
-
-
Learn cybersecurity
- By Jay Law on 23-03-22
-
Cyber Intelligence Driven Risk
- How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
- By: Richard O. Moore III
- Narrated by: Walter Dixon
- Length: 5 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize overall business risk?
Summary
This audiobook is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.
Start your cyber security journey and buy this audiobook today!
PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.