This auction has been won.
Leading
RCTV70 1 × R56.00
29 Mar 23:35
Runner-up
PPil5937886 1 × R1.00
28 Mar 15:19

Similar products

41% OFF
Cisco Umbrella DNS Security Advantage Bundle - 1 Year Subscription
New
R1,300.00 R2,200.00
70% OFF
The Ultimate Collection – Fonts, Icons & Backgrounds Bundle 🎨✨
New
R297.00 R997.00
21% OFF
ESET Protect Entry Cloud Based 5 User - 3 Year Subscription
New
R6,600.00 R8,400.00
80% OFF
Canva Template Mega Bundle. Planners, Journals, Trackers & More
New
R197.00 R997.00
Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY**
Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY** Cybersecurity and Networking bundle** LATE ENTRY**
Cybersecurity and Networking bundle** LATE ENTRY**
+3
Sold

Cybersecurity and Networking bundle** LATE ENTRY**

New 1 was available
R55.00 minimum increment
R56.00
Shipping
R65.00 Standard shipping applies to orders under R100.00, in most areas in South Africa. R35.00 Standard shipping applies to orders over R100.00. Some areas may attract a surcharge surcharge. This will be calculated at checkout if applicable.
Check my rate
The seller has indicated that they will usually have this item ready to ship within 12 business days. Shipping time depends on your delivery address. The most accurate delivery time will be calculated at checkout, but in general, the following shipping times apply:
 
Standard Delivery
Main centres:  1-3 business days
Regional areas: 3-4 business days
Remote areas: 3-5 business days
Buyer protection

Product details

Condition
New
Location
South Africa
Customer ratings:
Bob Shop ID
583439743


You will get the below ebooks in this bundle -



Techniques and Effective tips to get protected from Cyber Criminals


Key Features

Learn to file a Cybercrime complaint.

Discover the New IT Rules 2021.

Understand the Artificial Intelligence (AI) in Cyber security. 

Know how our online lives and real-world lives are closely intertwined, each affecting the other.

Tips for protection of very young kids (5yr-8 yr), when online.

Identifying and keeping potential online predators and pedophiles at a distance.


Learn the various aspects of Cyber Security concepts.


Key Features

Strengthens the foundations, as a detailed explanation of the concepts are given.

Simple language, crystal clear approach, straight forward comprehensible presentation.

Adopting user-friendly classroom lecture style.

The concepts are duly supported by several examples.

Previous years question papers are also included.

The important set of questions comprising of more than 90 questions with short answers are also included.


A practical book that will help you defend against malicious activities


Key Features

Learn how attackers infiltrate a network, exfiltrate sensitive data and destroy any evidence on their way out

Learn how to choose, design and implement a cybersecurity program that best fits your needs

Learn how to improve a cybersecurity program and accompanying cybersecurity posture by checks, balances and cyclic improvement activities

Learn to verify, monitor and validate the cybersecurity program by active and passive cybersecurity monitoring activities

Learn to detect malicious activities in your environment by implementing Threat Hunting exercises


Cybercrime stories and tricks used by cyber criminals to trap people and preventive tips to avoid cyber crimes.


Key Features

Real-case studies and true events on cybercrime incidents.

Learn how to protect yourself from cyber threats and assist police in crime investigation.

Coverage on financial frauds, social media crimes, mobile payment frauds, and a lot more.


Cybersecurity for Beginners


Key Features

In-depth coverage of cybersecurity concepts, vulnerabilities and detection mechanisms.

Cutting-edge coverage on frameworks, Intrusion detection methodologies and how to design cybersecurity infrastructure.

Access to new tools, methodologies, frameworks and countermeasures developed for cybersecurity.


Knowing your threat actors together with your weaknesses and the technology will master your defence


KEY FEATURES

Gain practical experience with cyber threat intelligence by using the book's lab sections.

Improve your CTI skills by designing a threat intelligence system.

Assisting you in bridging the gap between cybersecurity teams.

Developing your knowledge of Cyber Intelligence tools and how to choose them.

Recently viewed

See more
SCISSOR OPERATION SHARP/SHARP STR 13CM
New
R190.12
DHT22 Single Bus Digital Temperature Humidity Sensor Shield For D1 Mini
New
R464.00
2 x TW De Jongh R2 Consecutive No. notes 4th Issue
Secondhand
R300.00 No bids
Ic Binary Up Counter Dl 4 Bit Smd Soic14 74 Hc393 D
New
R5.74

Customer ratings: 1 ratings

Great product, value for money
01 Jun 2023