This auction has been won.
Leading
RCTV70 1 × R56.00
29 Mar 23:35
Runner-up
PPil5937886 1 × R1.00
28 Mar 15:19

Similar products

70% OFF
The Ultimate Collection – Fonts, Icons & Backgrounds Bundle 🎨✨
New
R297.00 R997.00
25% OFF
ESET Protect Entry On-Prem 5 User - 1 Year Subscription
New
R2,400.00 R3,200.00
70% OFF
10,000 Infographics Mega Bundle
New
R297.00 R997.00
8% OFF
Proline Pinnpos Windows 10 IoT Enterprise 2021 Individual Key Entry MUV-00027
New
R1,200.00 R1,300.00
Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY**
Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY**
Cybersecurity and Networking bundle** LATE ENTRY**
+3
Sold

Cybersecurity and Networking bundle** LATE ENTRY**

New 1 was available
R55.00 minimum increment
R56.00
Shipping
R65.00 Standard shipping applies to orders under R100.00, in most areas in South Africa. R35.00 Standard shipping applies to orders over R100.00. Some areas may attract a surcharge surcharge. This will be calculated at checkout if applicable.
Check my rate
The seller has indicated that they will usually have this item ready to ship within 12 business days. Shipping time depends on your delivery address. The most accurate delivery time will be calculated at checkout, but in general, the following shipping times apply:
 
Standard Delivery
Main centres:  1-3 business days
Regional areas: 3-4 business days
Remote areas: 3-5 business days
Buyer protection

Product details

Condition
New
Location
South Africa
Customer ratings:
Bob Shop ID
583439743


You will get the below ebooks in this bundle -



Techniques and Effective tips to get protected from Cyber Criminals


Key Features

Learn to file a Cybercrime complaint.

Discover the New IT Rules 2021.

Understand the Artificial Intelligence (AI) in Cyber security. 

Know how our online lives and real-world lives are closely intertwined, each affecting the other.

Tips for protection of very young kids (5yr-8 yr), when online.

Identifying and keeping potential online predators and pedophiles at a distance.


Learn the various aspects of Cyber Security concepts.


Key Features

Strengthens the foundations, as a detailed explanation of the concepts are given.

Simple language, crystal clear approach, straight forward comprehensible presentation.

Adopting user-friendly classroom lecture style.

The concepts are duly supported by several examples.

Previous years question papers are also included.

The important set of questions comprising of more than 90 questions with short answers are also included.


A practical book that will help you defend against malicious activities


Key Features

Learn how attackers infiltrate a network, exfiltrate sensitive data and destroy any evidence on their way out

Learn how to choose, design and implement a cybersecurity program that best fits your needs

Learn how to improve a cybersecurity program and accompanying cybersecurity posture by checks, balances and cyclic improvement activities

Learn to verify, monitor and validate the cybersecurity program by active and passive cybersecurity monitoring activities

Learn to detect malicious activities in your environment by implementing Threat Hunting exercises


Cybercrime stories and tricks used by cyber criminals to trap people and preventive tips to avoid cyber crimes.


Key Features

Real-case studies and true events on cybercrime incidents.

Learn how to protect yourself from cyber threats and assist police in crime investigation.

Coverage on financial frauds, social media crimes, mobile payment frauds, and a lot more.


Cybersecurity for Beginners


Key Features

In-depth coverage of cybersecurity concepts, vulnerabilities and detection mechanisms.

Cutting-edge coverage on frameworks, Intrusion detection methodologies and how to design cybersecurity infrastructure.

Access to new tools, methodologies, frameworks and countermeasures developed for cybersecurity.


Knowing your threat actors together with your weaknesses and the technology will master your defence


KEY FEATURES

Gain practical experience with cyber threat intelligence by using the book's lab sections.

Improve your CTI skills by designing a threat intelligence system.

Assisting you in bridging the gap between cybersecurity teams.

Developing your knowledge of Cyber Intelligence tools and how to choose them.

Recently viewed

See more
Statutory Interpretation . An Introduction for Students
Secondhand
R200.00
Pwm Relay Switch 5v Receiver 20a Electronic Controller Module Diy Model Universal On-off for Fpv Rc
New
R409.00
Collapsible Storage Boxes Crates Lidded Storage Plastic Box Blue
New
R490.00
Wifi Router Shelf Router Rack Box Rack Wall Shelf Storage Box Shelf
New
R318.00

Customer ratings: 1 ratings

Great product, value for money
01 Jun 2023