Try free for 30 days

  • Cybersecurity

  • Learn Fast How to Become an InfoSec Pro 3 Books in 1
  • By: John Knowles
  • Narrated by: Scott Clem
  • Length: 14 hrs

1 credit a month to use on any title, yours to keep (you’ll use your first credit on this title).
Stream or download thousands of included titles.
Access to exclusive deals and discounts.
$16.45 a month after 30 day trial. Cancel anytime.
Cybersecurity cover art

Cybersecurity

By: John Knowles
Narrated by: Scott Clem
Try for $0.00

$16.45 per month after 30 days. Cancel anytime.

Buy Now for $27.99

Buy Now for $27.99

Pay using voucher balance (if applicable) then card ending in
By confirming your purchase, you agree to Audible's Conditions Of Use and Privacy Notice and authorise Audible to charge your designated credit card or another available credit card on file.

Publisher's Summary

Three audiobooks in one deal:

  • Book 1: How to Establish Effective Security Management Functions
  • Book 2: How to Apply the NIST Risk Management Framework
  • Book 3: How to Manage Risk, Using the NIST Cybersecurity Framework

Click "Buy Now" to get started today!

You will learn in Book 1:

  • Objectives of security management
  • Security management principles
  • Defense in depth
  • How to apply security controls
  • Security control functions
  • Security strategy and governance scenario
  • Information security relationships
  • Business, compliance, and security
  • Management roles and responsibilities
  • Security roles and responsibilities
  • How to decipher the risk management program and more....

You will learn in Book 2:

  • Compliance, security, risk
  • How to be compliant and secure
  • Introduction to risk management framework
  • Introduction to the RMF publications
  • Understanding the cybersecurity framework
  • Comprehending the CSF tiers and profiles
  • Essential RMF concepts
  • Understanding risk tiers
  • Understanding systems and authorization
  • Introduction to roles and responsibilities
  • How to prepare for organization-level tasks
  • And more....

You will learn in Book 3:

  • How to reassess risk
  • How to implement risk response
  • Risk response option basics
  • How to analyze cost and benefit
  • How to prioritize risk response options
  • How to respond to risk
  • Introduction to control types
  • Control function basics
  • Understanding security controls
  • How to develop and use KPIs
  • How to monitor risk factors
  • And more....

Click "Buy Now" to get started today!

©2020 John Knowles (P)2020 John Knowles

What listeners say about Cybersecurity

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.