Preview
  • Cyber Security

  • The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
  • By: Noah Zhang
  • Narrated by: Gary Westphalen
  • Length: 2 hrs and 1 min
  • 4.6 out of 5 stars (26 ratings)

Prime logo Prime members: New to Audible?
Get 2 free audiobooks during trial.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.

Cyber Security

By: Noah Zhang
Narrated by: Gary Westphalen
Try for $0.00

$14.95/month after 30 days. Cancel anytime.

Buy for $6.95

Buy for $6.95

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's summary

Cyber security is here to stay.

Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”?

Do you own a business and now becoming aware of how dangerous the cyber threats are to your assets? Would you like to know how to quickly create a cyber security plan for your business, without dealing with any technical jargon?

Are you interested in pursuing a career in cyber security? Did you know that the average starting salary of a cyber security professional ranges from $65,000 to $80,000 and jumps to multiple figures in a few years, depending on how far you want to go.

Here is an interesting statistic, you are already compromised. Yes, at some point, one of your digital devices or activities has been hacked and your information has been sold. If you knew how bad the threats really are, you would never go online again or you would be very paranoid.

And we’re not talking about those ads that suddenly pop up and follow you around everywhere because you were looking at sunglasses for sale on google or Amazon, that’s called retargeting marketing and is totally legal and legitimate.

We’re talking about malware that hides deep in your device watching everything you do and type, just as one example among hundreds

Our society has become saturated with internet-connected devices and trackers everywhere.

From home routers to your mobile phones, most people are easily hacked if targeted. But it gets even deeper than this; technology has advanced now to where most hacks are automated, by software. International hackers have vast networks and computers set up to conduct non-stop scans, pings, and probes for weaknesses in millions of IP addresses and network domains, such as businesses and residential home routers.

Check your router log and you’ll see it yourself. Now most devices have firewalls but still, that is what’s called an persistent threat that is here to stay, it’s growing and we all need to be aware of how to protect ourselves starting today.

In this introductory audiobook, we will cover verified steps and tactics on how to increase the level of cyber security in an organization and as an individual. It sheds light on the potential weak points which are used as infiltration points and gives examples of these breaches. We will also talk about cyber crime in a technologically-dependent world (Think IoT).

Cyber security has come a long way from the days that hacks could only be perpetrated by a handful of individuals, and they were mostly done on the larger firms or government databases. Now, everyone with a mobile device, home system, car infotainment, or any other computing device is a point of weakness for malware or concerted attacks from hackers, real or automated.

We have adopted anti-viruses and several firewalls to help prevent these issues to the point we have become oblivious to the majority of the attacks. The assistance of malware blocking tools allows our computing devices to fight thousands of attacks per day. Interestingly, cyber crime is a very lucrative industry, as has been proven by the constant investment by criminals on public information. It would be wise to pay at least half as much attention to your security.

What are you waiting for, get this audiobook now to get started instantly!

©2019 Noah Zhang (P)2019 Noah Zhang
activate_Holiday_promo_in_buybox_DT_T2

What listeners say about Cyber Security

Average customer ratings
Overall
  • 4.5 out of 5 stars
  • 5 Stars
    20
  • 4 Stars
    4
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    1
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    19
  • 4 Stars
    4
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    2
Story
  • 4.5 out of 5 stars
  • 5 Stars
    20
  • 4 Stars
    4
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    1

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

It's good

Great information here in this audio book, I would recommend giving it a listen 👍🏼

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

This book contains some very unique and powerful

This book contains some very unique and powerful strategy concepts not found in ANY other Product Management books. This is a terrific overview of what executive-level Product Management people do for a living. Greg lists the key elements of doing Product Management -- but then he discusses why you should be doing these tasks.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

good easy to understand cyber security

Very holistic and thorough account of how cybersecurity happened...with cat videos to help keep it pithy. I know more than ever about cyber threats to our digital world because of this book

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful

  • Overall
    4 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    4 out of 5 stars
Listener received this title free

It is quite helpful, too!

I learned so much information and events about cybersecurity that I once never knew! Very helpful for getting into the field. Covers the basics and informative

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

excellent overview of cyber security

highly recommended for a birds eye view of personal cyber security. I recommend following the guidelines provided in the book to protect yourself. if you live on the internet, this is a great manual to use for protection guidance.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    4 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

Good Overview of Cybersecurity

All the information in the book is from a high level with only a basic amount of technical information. There are several sections that give some detail on particular incidents of hacking (such as Stuxnet), but these too only give enough technical detail to help the reader understand what happened.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars
Listener received this title free

A good general explanation of Cybersecurity

A well thought out, intelligently written book on digital security issues and how to combat them, both before and after an attack. Great use of index of terms with their definitions at the end of the book.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

Great book on the future of cyber!

This was a required book for one of my graduate school courses and I highly recommend it to anyone interested in the subject. Only criticism is when the narrator correctly pronounced Chinese names, but somehow mispronounces well known military acronyms.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

Lovely Cybersecurity Book.

There are some parts, have to admit, i skimmed. But in general it is an outstanding book for anyone who doesn't know where to start!

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Listener received this title free

Learned a lot

The book was informative if you know nothing about cyber security. A well thought out, intelligently written book on digital security issues and how to combat them, both before and after an attack. I found this book to be incredibly insightful. I would recommend this book.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!