-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- Narrated by: Michael Reaves, Brian R. Scott
- Length: 6 hrs and 34 mins
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $19.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Cybersecurity Bible
- Security Threats, Frameworks, Cryptography & Network Security: 4 Books in 1
- By: Hugo Hoffman
- Narrated by: Matyas J.
- Length: 11 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Bible is a book bundle that includes four books: 25 Most Common Security Threats & How To Avoid Them, 21 Steps for Implementing the NIST Cybersecurity Framework, Cryptography Fundamentals & Network Security, and How to Get into Cybersecurity Without Technical Background.
-
-
This book is a waste of time and money
- By Richard Sikes on 04-04-21
By: Hugo Hoffman
-
Cybersecurity Essentials
- By: Charles J. Brooks, Christopher Grow, Philip Craig, and others
- Narrated by: Ryan Burke
- Length: 17 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Not made for audio...
- By Kassandra Clauser on 06-07-19
By: Charles J. Brooks, and others
-
Cybersecurity
- An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
- By: Lester Evans
- Narrated by: Michael Reaves
- Length: 3 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to avoid getting hacked, having your information spread, and risking financial loss, then pay attention.... Do you create tons of accounts you will never again visit? Does your password contain a sequence of numbers, such as “123456”? Do you automatically click all links and download all email attachments coming from your friends? This audiobook will show you just how incredibly lucky you are that nobody's hacked you before.
-
-
loved
- By Hyperkill on 04-23-19
By: Lester Evans
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
Great listen for tech fans
- By Mikeyxote on 06-01-12
By: Kevin Mitnick, and others
-
Cybersecurity for Dummies
- By: Joseph Steinberg
- Narrated by: BJ Harrison
- Length: 13 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- By Anonymous User on 07-09-21
By: Joseph Steinberg
-
Cybersecurity Bible
- Security Threats, Frameworks, Cryptography & Network Security: 4 Books in 1
- By: Hugo Hoffman
- Narrated by: Matyas J.
- Length: 11 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Bible is a book bundle that includes four books: 25 Most Common Security Threats & How To Avoid Them, 21 Steps for Implementing the NIST Cybersecurity Framework, Cryptography Fundamentals & Network Security, and How to Get into Cybersecurity Without Technical Background.
-
-
This book is a waste of time and money
- By Richard Sikes on 04-04-21
By: Hugo Hoffman
-
Cybersecurity Essentials
- By: Charles J. Brooks, Christopher Grow, Philip Craig, and others
- Narrated by: Ryan Burke
- Length: 17 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Not made for audio...
- By Kassandra Clauser on 06-07-19
By: Charles J. Brooks, and others
-
Cybersecurity
- An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
- By: Lester Evans
- Narrated by: Michael Reaves
- Length: 3 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to avoid getting hacked, having your information spread, and risking financial loss, then pay attention.... Do you create tons of accounts you will never again visit? Does your password contain a sequence of numbers, such as “123456”? Do you automatically click all links and download all email attachments coming from your friends? This audiobook will show you just how incredibly lucky you are that nobody's hacked you before.
-
-
loved
- By Hyperkill on 04-23-19
By: Lester Evans
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
Great listen for tech fans
- By Mikeyxote on 06-01-12
By: Kevin Mitnick, and others
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
- By: Paul Rosenzweig, The Great Courses
- Narrated by: Paul Rosenzweig
- Length: 9 hrs and 41 mins
- Original Recording
-
Overall
-
Performance
-
Story
Cyberspace is the 21st century’s greatest engine of change. Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more.
-
-
Required if you use the internet!
- By Tommy D'Angelo on 11-29-15
By: Paul Rosenzweig, and others
-
Hacking for Beginners
- A Step-by-Step Guide to Learn How to Hack Websites, Smartphones, Wireless Networks, Work with Social Engineering, Complete a Penetration Test, and Keep Your Computer Safe
- By: Julian James McKinnon
- Narrated by: Ivan Busenius
- Length: 3 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This guidebook is going to spend some time taking a look at the world of hacking and some of the great techniques that come with this type of process as well. Whether you are an unethical or ethical hacker, you will use a lot of the same techniques, and this guidebook is going to explore them in more detail along the way, turning you from a novice to a professional in no time.
-
-
Insights are unique and turn me perceive deeply
- By Chasidy on 12-30-19
-
Ethical Hacking
- A Beginner’s Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment
- By: Zach Codings
- Narrated by: Donald Cuddington
- Length: 3 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you feel that informatics is indispensable in today’s increasingly digital world? Do you want to introduce yourself to the world of hacking? Do you want to have a head start in the job market by learning some of the most important future skills? First of all, we’ll need to look at what an ethical hacker actually is. This audiobook is filled with reasons why you should learn Ethical hacking, as well as a few helpful tutorials to help you learn in the quickest way. This audiobook assumes no programming knowledge at the start, so we’ll be teaching you from the ground up.
-
-
Extremely Prescribed Book
- By Michele Dale on 11-11-19
By: Zach Codings
-
Computer Networking
- The Complete Guide to Understanding Wireless Technology, Network Security, Computer Architecture and Communications Systems (Including Cisco, CCNA and CCENT)
- By: Michael B. White
- Narrated by: Jim D. Johnston
- Length: 10 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technology has gradually transitioned from wired to wireless over the years with tons of benefits. From the internet of things to wireless communication, we are all witnesses of the huge benefits of wireless technologies. This audiobook covers various subjects and highlights both the benefits and challenges of wireless technologies.
-
-
This has been one of my favorite books so far
- By Calvin L. Shultz on 07-25-19
By: Michael B. White
-
Computer Networking Beginners Guide
- An Easy Approach to Learning Wireless Technology, Social Engineering, Security and Hacking Network, Communications Systems (Including CISCO, CCNA and CCENT).
- By: Russell Scott
- Narrated by: Benjamin Williams
- Length: 4 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you know the fundamentals of computer networking? Do you want to know how to keep your network safe? This easy-to-use guide is all you need! In large companies, computers in the workplace need to be connected to a single unit to get work done. Whether it's a company or some other shared hub, computers need to be able to share resources to accomplish goals. Building these networks requires skill, so understanding computer networks is key for getting these connections built. Network addresses must be set and approved. Network connections need to be sure.
-
-
Not what I’m looking for
- By Zoomie on 04-12-21
By: Russell Scott
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- By: Lance Henderson
- Narrated by: James C. Lewis
- Length: 12 hrs and 57 mins
- Unabridged
-
Overall
-
Performance
-
Story
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Technical deficiencies
- By Byzantine Technologies LLC on 07-16-19
By: Lance Henderson
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
-
Linux
- This Book Includes 4 Manuscripts. The Underground Bible to the UNIX Operating System with Tools on Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line
- By: Darwin Growth
- Narrated by: Kevin Ford MVO
- Length: 12 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Linux is a free and freely distributed operating system inspired by the UNIX system, written by Linus Torvalds with the help of thousands of programmers. This operating system is an option to be taken into account by those users who are dedicated to working with networks, devoting their time for programming, or for learning hacking techniques.
-
-
This text was barely edited, if at all
- By Christopher F on 04-22-22
By: Darwin Growth
-
Hacking
- Social Engineering Attacks, Techniques & Prevention
- By: Alex Wagner
- Narrated by: Jack Bellows
- Length: 3 hrs and 30 mins
- Unabridged
-
Overall
-
Performance
-
Story
In order to understand hackers and protect the network infrastructure, you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured. The focus of this book will be to introduce some of the most well-known social engineering techniques. Your listening to this book will boost your knowledge on what is possible in today’s hacking world and help you to become an ethical hacker, a.k.a. penetration tester.
-
-
Very insightful and interesting!
- By Daniwonkers on 01-17-21
By: Alex Wagner
-
Hacking: Denial of Service Attacks
- By: Alex Wagner
- Narrated by: Jack Bellows
- Length: 3 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured. This audiobook will focus on some of the most dangerous hacker tools that are favorite of both, White Hat and Black Hat hackers. The focus of this audiobook will be to introduce some of the best well known software that you can use for free of charge, furthermore where to find them, how to access them, and finally in every section you will find demonstrated examples step-by-step.
By: Alex Wagner
-
Cyber Security
- A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk Management, Social Engineering, and Information Security.
- By: Kevin Kali
- Narrated by: Tom Brooks
- Length: 3 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you want to protect yourself from Cyber Security attacks? If so then keep reading. There have been various solutions given to decrease your attack surface and mitigate the risks of cyberattacks. These can also be used on a small scale to protect yourself as an individual from such infiltrations. To avoid cybercrime from evolving, and to not become better at infiltration and such, cyber security needs to stay a practice that adapts to growing problems, thus far, the hackers/attackers are outpacing defenders.
-
-
Great overall high-level
- By Autumn P Corea on 02-29-20
By: Kevin Kali
Publisher's Summary
If you want to avoid getting hacked, having your information spread and discover the world of ethical hacking then pay attention....
Two manuscripts in one audiobook:
- Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
- Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks, Including Tips on Social Engineering
Do you create tons of accounts you will never again visit?
Do you get annoyed thinking up new passwords, so you just use the same one across all your accounts?
Does your password contain a sequence of numbers, such as “123456”?
Do you automatically click all links and download all email attachments coming from your friends?
This audiobook will show you just how incredibly lucky you are that nobody's hacked you before.
In part one of this audiobook, you will learn about:
- How hackers use raunchy photos to eke out private information
- Examples of preposterous social engineering attacks
- How there's only one surefire way to protect against hacking
- How to lower your exposure to hacking
- Why companies pester you to attach a phone number to an account
- Why social media is the most insecure way to spend your afternoon and much, much more
Some of the topics covered in part two of this audiobook include:
- Fighting against companies
- Ethical hacking defined
- Patents
- Penetration testing
- Jailbreaking Android/iPhone
- Shut up Cortana
- How a hacker could go about hacking your Wi-Fi and much, much more!
What listeners say about Cybersecurity
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- D. Reeves
- 08-14-19
Misleading
"Reads" like a blog you would send your grandmother to keep her off the internet. I thought this would be slightly more technical but it really just runs through the most basic info that you could find in a run of the mill source online for free.
5 people found this helpful
-
Overall
-
Performance
-
Story
- Jche
- 02-06-20
A good listen
Really enjoyed this. Easy to listen to without any visuals needed to understand what he was talking about.
1 person found this helpful
-
Overall
-
Performance
-
Story
- Oliver
- 06-20-19
Good details but with heavy bias
Great book with lots of details explained at the the beginner level. The second part of the book is heavy with best described as “anti-establishment bias”. However, still worth listening too despite the writers rants on government and business. Helpful websites mentioned and explained complex concepts at a laymen level.
1 person found this helpful
-
Overall
-
Performance
-
Story
- TK-422
- 04-23-19
No t bad
Decent stories and basic theory. No knowledge or technique discussed beyond basic concepts. Have some interesting, thought provoking ideas and stories of real world situations.
1 person found this helpful
-
Overall
-
Performance
-
Story
- Brittany C. McKinney
- 02-16-19
I strongly recommend this book
This is one of the best book for Cyber Security. I strongly recommend this book who wants to learn about cybersecurity and cyber security attack vectors and also cyber defense strategies.
1 person found this helpful
-
Overall
-
Performance
-
Story
- Olia S.
- 07-20-22
Kool.
My third book on cybersecurity, but this is by far the most useful. Definitely worth the time.
-
Overall
-
Performance
-
Story
- Lakshman Tulsiram
- 01-24-20
Good book for beginners
Overall it’s good book with lot of information. Don’t expect too much. Just take information and dig more deeper by yourself.
-
Overall
-
Performance
-
Story
- Mat
- 12-11-19
Not "Guide" but an eye opener
I enjoyed it, only until the last sentence where the narrator says "you've been listening to a guide" which I thought nope..Didn't hear any ABC Steps... Ironically a misleading title was used to HACK my purchase decision
-
Overall
-
Performance
-
Story
- Darkwing Duck
- 06-30-19
Great listen and fascinating info.
I finished listening to Kevin Mitnick's "The Art of Invisibility" and wanted to learn more. This book was a great collection of various topics, and I really enjoyed learning more ways to keep things secure. Definitely thought the stories about epic failures were valuable.
-
Overall
-
Performance
-
Story
- subcell
- 06-24-19
Great introduction to material, but just that
A lot of good stuff is covered in this book but it's just an introduction. As someone studying for my CEH exam this doesn't really help. It was a good listen though.
-
Overall
-
Performance
-
Story

- Matthew J
- 04-25-19
Blog book
A good afternoon's work, but this is unlikely to appear on any academic course reading list.
1 person found this helpful
-
Overall
-
Performance
-
Story

- Kevin Walker
- 12-03-19
Awesome utterly awesome
Well impressed by the writing by the aerator it was an overwhelming experience.
Highly recommended , I sujest you buy it read it question it use it
-
Overall
-
Performance
-
Story

- N
- 10-17-19
More Anti-establishment than anything else
There was some good content in the audio book and some key areas covered.
This audio book was extremely leading. Rather than presenting information, possible viewpoints and leaving the conclusion to the listener - this was very anti establishment in the conveyed message shoved down the listeners throat.
I also feel that a fair bit of content was very much on the brink of ethical hacking and closer to general societal issues surrounding technology.
Wouldn’t recommend.
-
Overall
-
Performance
-
Story

- Ms
- 05-02-19
Informative, Interesting & Practical
For the beginner to Cybersecurity & those with a general interest. The explanations about how we're vulnerable have opened my eyes to how we might also protect ourselves more + where to go for further info + community answers.
-
Overall
-
Performance
-
Story

- Ian Sinclair
- 03-23-21
good introduction to cyber security
basic introduction on the need for cyber security and some useful hints. but not a detailed book on the subjects.
-
Overall
-
Performance
-
Story

- Anonymous User
- 02-10-20
Good intro info, but biased off tangents
The first half of the book went through some intro information that would be great for people learning the introductions to security and how to protect yourself.
The second half felt like it fell into tangents about big companies, government and the authors opinions than giving information on cracking and hacking of systems.
As interesting as it is to hear about large companies controlling data and holding large amounts of power with information, it's widely out of scope for cracking.