Studying The CISSP Using Amazon Echo

As many of you know, I successfully accomplished one of my life-long goals in passing the (ISC)² Certified Information Systems Security Professional (CISSP) exam in August. One of the common things I have been asked by others aspiring to conqueror this exam is what study methods were successful for me.

In retrospect, I can say there was no one method that was more successful than the other as they all served a specific purpose but what I will say is considering that I live a pretty busy life, I leaned a lot on my Amazon Echo to go through e-books on the subject.

Many of you are probably thinking to yourself that I’m crazy but I assure you on this topic, I am not. The Amazon Echo (Alexa) is one of the most underrated and most powerful tools available on the market. Not only can it tell you the weather, lock your front door, play music and tell you when a local store is open but it can read books you purchase through online bookstores and that is where the magic begins.

Having a busy life with a full time job and keeping up with my children’s daily activities, I was limited in the amount of time I could use to study. When I first started, I would find myself getting too tired reading through books on the topics; cumulatively, the time lost due to pure daily exhaustion was an excess of 10 hours per week. Forward thinking, I knew that I had to find another way, so I explored the option of using my Alexa to read the topic material on my behalf as I followed along.

I’ll start by saying that I highly recommend getting Kindle Unlimited. With an Amazon Kindle Unlimited subscription, users have access to a wide variety of e-books on virtually any topic you can think of. A quick search on CISSP yields a great selection of books that can be downloaded on demand. Python, Security +, Java-Script and yes the CISSP; all there and available for download. Once you discover the right book for you, download the Amazon Alexa app from your tablet or phone’s App Store and start the process of having it read for you.

Use Amazon Alexa App as a Reader

Amazon Alexa App (Screenshot): Play Button
Amazon Alexa App: Play Button
  • Scroll Down until you see the Kindle Library
  • Select your desired book on the carousel by rotating the selection
  • A Play On prompt will come up asking you which device you want to listen from. Scroll down until you see the option, This Device.

Once Alexa starts reading the book, load up the Kindle App and follow along. When you launch the App, a prompt should automatically come up recommending you to jump where Alexa currently is reading from. Affirm the option and enjoy learning.

Multitasking With The Amazon Echo

Another cool feature if you have Echo products at home, is that you can have Alexa play it on other devices, maximizing your opportunities to learn. For instance, if you have to start dinner and have an Echo Dot near the kitchen, send a command to your Alexa product to continue reading where you left off. It’s as simple as that.

Just like the popular security adage says about layers in defense, I am a big proponent of learning the same way. Utilize multiple books on the topic of your choosing to maximize perspective and your learning. Follow along with Alexa using a phone, computer or tablet and elevate your knowledge. You will quickly find that this method saves you time and money in your studies. Good Luck!

To support this blog, this post may contain affiliate links. Please read our Privacy Policy for more information.
Drawing on over two decades of experience in the Information Technology industry, I have acquired a diverse range of roles that have shaped my distinctive outlook. Through this journey, I have developed into an accomplished authority in risk management, catering to Fortune 500 companies and small businesses on a global scale. Over the past 12 years, my primary focus has centered on empowering small business owners and insurance professionals to comprehend the ramifications of cyber incidents and effectively mitigate the risks associated with potential data breaches. My passion for cybersecurity has inspired me to create the Sage Knows IT blog. Through this platform, I aim to help small business owners and aspiring IT professionals understand the roadmap of the IT industry based on my experiences. Information Technology and Information Security are crucial for our future, and I hope my blog will motivate those who are interested in joining this ever-evolving field.

Related Posts

Title Image: AI Security Realities: Rethinking PII as the Sole Indicator

AI Security Realities: Rethinking PII as the Sole Risk Indicator

During a client meeting, I addressed misconceptions about cybersecurity, especially the notion that absence of PII equates to no risk. I discussed how cyber threats extend beyond data theft to include system vulnerabilities that could disrupt operations and impact users, citing the SolarWinds and New York Times attacks as examples. I explained that comprehensive assessments are crucial for understanding broader cybersecurity risks, not just those involving PII. Additionally, I highlighted the importance of protecting AI models from poisoning, underscoring the need for robust security measures in AI development.

10 Ways to Improve Your Math Skills for Cybersecurity

10 Ways to Improve Your Math Skills for Cybersecurity

As highlighted in our earlier discussion, The Intersection of Math and Cybersecurity, a solid grasp of mathematics is indispensable within the realm of cybersecurity. The specific demands…

The Intersection of Math and Cybersecurity - Does Cybersecurity Require Math?

The Intersection of Math and Cybersecurity

During my weekend exploration of a renowned Q&A platform, I unexpectedly encountered a question that left me intrigued. I couldn’t help but wonder if the original poster (OP) was playfully jesting or sincerely seeking knowledge. This curious moment brought forth a reminiscent smile as I recalled the age-old adage we all encountered during our early school years: “Math is fundamental to all endeavors.” However, an interesting twist emerged: Does this axiom extend its influence into the intricate realm of Cybersecurity?

Client Confidence Crisis: How Neglecting Security Practices Can Drive Customers Away

In today’s digital landscape, establishing an Information Systems Security Program (ISSP) is no longer optional but a crucial necessity for organizations. This blog post explores the vital importance of implementing an ISSP early on and understanding the factors that influence its establishment and modification. Senior management’s role in championing ISSPs is emphasized, as their buy-in and recognition of its significance set the tone for organizational security practices.

However, misconceptions and flawed reasoning often hinder the adoption of robust security measures. From the belief that “it will never happen to us” to relying solely on insurance coverage, these notions can prove detrimental to an organization’s security posture. Furthermore, assumptions that clients don’t care about security or that the cloud provides ultimate protection are debunked, shedding light on the evolving expectations and regulations surrounding data protection.

The ugly truth emerges as we delve into the constant threat of internet vulnerability scans and the risks organizations face when vulnerabilities are discovered. This post aims to dismantle these flawed mindsets, highlighting the need for a comprehensive security approach beyond insurance coverage and the importance of addressing vulnerabilities proactively.

Stay tuned for the upcoming parts of this conversation, where we will explore additional influential factors and provide insights into developing effective ISSPs. Together, let’s navigate the complex world of system security and ensure the protection of your organization’s invaluable assets.

Maximizing Email Security: Understanding the Importance of DKIM, SPF, and DMARC

Email is a crucial part of our daily lives, but unfortunately, it’s also a popular target for cybercriminals who use various tactics like spam, phishing, and spoofing to scam people. The FTC recently issued a warning to users of MetaMask and PayPal about phishing scams that are currently circulating through fake emails. The scam claims that the user’s cryptocurrency wallet has been blocked and encourages them to click a link and update their wallet to prevent the loss of their crypto. To protect email users from these threats, authentication protocols like DKIM, SPF, and DMARC are strongly recommended.

Top 10 Cybersecurity Job Sites

Top 10 Job Sites for Cybersecurity Professionals

As the world continues to rely heavily on technology, the demand for cybersecurity professionals continues to grow. Cybersecurity jobs offer high salaries, job security, and a wide range of career options. However, finding the right job can be challenging.