Listen free for 30 days

Listen with offer

  • Cyber Security

  • Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
  • By: Jonathan Rigdon
  • Narrated by: Kevin Brooker
  • Length: 51 mins

$0.00 for first 30 days

Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.
Cyber Security cover art

Cyber Security

By: Jonathan Rigdon
Narrated by: Kevin Brooker
Try for £0.00

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £3.69

Buy Now for £3.69

Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
activate_primeday_promo_in_buybox_DT

Summary

To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to monitor and control network traffic, deploying antivirus software to detect and remove malicious software, using encryption to secure sensitive data both in transit and at rest, and implementing strong authentication mechanisms such as multi-factor authentication to prevent unauthorized access.

Additionally, cybersecurity involves ongoing monitoring and analysis of network activity to detect and respond to potential threats in real-time. This may involve the use of security information and event management (SIEM) systems, which aggregate and analyze data from various sources to identify suspicious behavior and security incidents.

Furthermore, cybersecurity professionals often engage in vulnerability assessments and penetration testing to identify weaknesses in systems and networks before they can be exploited by attackers. This proactive approach helps organizations strengthen their defenses and reduce the risk of successful cyber attacks.

©2024 Kevin Brooker (P)2024 Kevin Brooker

What listeners say about Cyber Security

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.