Try free for 30 days

  • Cybersecurity

  • What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
  • By: Lester Evans
  • Narrated by: Michael Reaves, Brian R. Scott
  • Length: 6 hrs and 34 mins
  • 4.0 out of 5 stars (5 ratings)

1 credit a month to use on any title, yours to keep (you’ll use your first credit on this title).
Stream or download thousands of included titles.
Access to exclusive deals and discounts.
$16.45 a month after 30 day trial. Cancel anytime.
Cybersecurity cover art

Cybersecurity

By: Lester Evans
Narrated by: Michael Reaves, Brian R. Scott
Try for $0.00

$16.45 per month after 30 days. Cancel anytime.

Buy Now for $22.99

Buy Now for $22.99

Pay using voucher balance (if applicable) then card ending in
By confirming your purchase, you agree to Audible's Conditions Of Use and Privacy Notice and authorise Audible to charge your designated credit card or another available credit card on file.

Publisher's Summary

If you want to avoid getting hacked, having your information spread and discover the world of ethical hacking then pay attention.... 

Two manuscripts in one audiobook: 

  • Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
  • Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks, Including Tips on Social Engineering

Do you create tons of accounts you will never again visit? 

Do you get annoyed thinking up new passwords, so you just use the same one across all your accounts? 

Does your password contain a sequence of numbers, such as “123456”? 

Do you automatically click all links and download all email attachments coming from your friends? 

This audiobook will show you just how incredibly lucky you are that nobody's hacked you before. 

In part one of this audiobook, you will learn about: 

  • How hackers use raunchy photos to eke out private information
  • Examples of preposterous social engineering attacks
  • How there's only one surefire way to protect against hacking
  • How to lower your exposure to hacking
  • Why companies pester you to attach a phone number to an account 
  • Why social media is the most insecure way to spend your afternoon and much, much more

Some of the topics covered in part two of this audiobook include: 

  • Fighting against companies
  • Ethical hacking defined
  • Patents
  • Penetration testing
  • Jailbreaking Android/iPhone
  • Shut up Cortana
  • How a hacker could go about hacking your Wi-Fi and much, much more!
©2019 Lester Evans (P)2019 Lester Evans

What listeners say about Cybersecurity

Average Customer Ratings
Overall
  • 4 out of 5 stars
  • 5 Stars
    1
  • 4 Stars
    3
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    0
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    2
  • 4 Stars
    3
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Story
  • 3.5 out of 5 stars
  • 5 Stars
    1
  • 4 Stars
    2
  • 3 Stars
    1
  • 2 Stars
    1
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

good introduction to cyber security

basic introduction on the need for cyber security and some useful hints. but not a detailed book on the subjects.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    3 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    2 out of 5 stars

Good intro info, but biased off tangents

The first half of the book went through some intro information that would be great for people learning the introductions to security and how to protect yourself.
The second half felt like it fell into tangents about big companies, government and the authors opinions than giving information on cracking and hacking of systems.

As interesting as it is to hear about large companies controlling data and holding large amounts of power with information, it's widely out of scope for cracking.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.