Mostrando títulos en Educación
-
-
Incident Response – Lessons Learned (Domain 4)
- Duración: 9 m
- Grabación Original
-
General
-
Narración:
-
Historia
Every incident is a learning opportunity, and the final step of the response lifecycle—lessons learned—ensures that your team emerges stronger, smarter, and better prepared. In this episode, we explore how to conduct structured post-incident reviews that examine not just what happened, but how and why it happened, how the team responded, and what can be improved. This includes identifying gaps in detection, communication failures, delayed responses, or missing playbooks, as well as documenting which controls were effective. We also cover how to update your incident response plan, inform ...
-
Incident Response – Lessons Learned (Domain 4)
- 06-16-25
- Duración: 9 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Risk Management Strategies (Domain 5)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
Once risks are identified and analyzed, organizations must decide how to respond—and in this episode, we examine the five primary risk management strategies: mitigate, transfer, accept, avoid, and exempt. Mitigation involves applying controls to reduce risk impact or likelihood, such as enabling MFA or installing endpoint protection. Transferring risk often involves insurance or outsourcing functions to vendors with specialized capabilities and contractual safeguards. Acceptance applies when the cost of mitigation outweighs the threat, provided the risk is well understood and formally ...
-
Risk Management Strategies (Domain 5)
- 06-16-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Enhancing Firewall Capabilities (Domain 4)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
Firewalls are often the first line of defense—but they’re only as effective as the rules, architecture, and tuning behind them. In this episode, we explore advanced firewall configurations, including layered rule sets, port and protocol filtering, application awareness, and geographic blocking. We discuss the use of stateful inspection, deep packet inspection (DPI), and integration with threat intelligence feeds that enable firewalls to recognize malicious patterns in real time. Firewalls can also serve as traffic shapers and segmenters, helping to enforce internal access controls, isolate...
-
Enhancing Firewall Capabilities (Domain 4)
- 06-16-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Benefits of Security Automation (Part 2) (Domain 4)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
Building on the first part of our automation series, this episode explores how security automation improves scalability, incident reaction time, and team productivity. We examine real-world examples where automated alerts trigger isolation of infected systems, revoke compromised credentials, or update firewall rules within seconds—long before a human analyst could intervene. Automation enables systems to scale securely by enforcing templates, access policies, and configuration baselines across hundreds or thousands of assets, even in fast-moving cloud environments. We also touch on workforce...
-
Benefits of Security Automation (Part 2) (Domain 4)
- 06-16-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Benefits of Security Automation (Part 1) (Domain 4)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
Security automation offers more than just saved time—it fundamentally transforms how teams operate by embedding consistency, speed, and scalability into their daily processes. In this episode, we cover the benefits of automation in efficiency and standardization, highlighting how routine tasks like user onboarding, policy enforcement, patch verification, and incident alerting can be executed instantly and without error. We discuss how automation reduces reliance on human memory and tribal knowledge, allowing for repeatable processes that function across shifts, teams, and platforms. ...
-
Benefits of Security Automation (Part 1) (Domain 4)
- 06-16-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Identity Proofing and Federation (Domain 4)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
Before you can secure access, you have to know who’s requesting it—and identity proofing ensures that the person behind a login is who they claim to be. In this episode, we explore identity proofing methods used during onboarding and remote authentication, including document verification, biometric validation, third-party attestation, and knowledge-based authentication. These techniques form the foundation of trust in both physical and digital identity systems, especially in regulated environments. We also discuss identity federation, which enables a single identity to be used across ...
-
Identity Proofing and Federation (Domain 4)
- 06-16-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Methods to Secure Data (Part 2) (Domain 3)
- Duración: 8 m
- Grabación Original
-
General
-
Narración:
-
Historia
Beyond encryption, organizations have additional tools to secure data in contexts where usability, compliance, or performance requirements call for alternatives. In this episode, we explore hashing, tokenization, and data masking—each serving a unique purpose in reducing data exposure while supporting operations like analytics or software testing. Hashing protects integrity and is commonly used for password storage and verification, using algorithms like SHA-256 or bcrypt to create one-way representations that can’t be reversed. Tokenization replaces sensitive fields with random or ...
-
Methods to Secure Data (Part 2) (Domain 3)
- 06-15-25
- Duración: 8 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Monitoring Computing Resources (Domain 4)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
Monitoring is the heartbeat of any modern security operation, providing real-time visibility into systems, applications, and infrastructure. In this episode, we explore how organizations monitor computing resources for both performance and security, using tools like agents, collectors, log forwarders, and telemetry APIs. We discuss the difference between host-based and network-based monitoring, and how to build a centralized view through Security Information and Event Management (SIEM) platforms. The focus is on both proactive and reactive monitoring—identifying anomalies before they become ...
-
Monitoring Computing Resources (Domain 4)
- 06-16-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Vendor Risk and Supply Chain Considerations (Domain 5)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
A growing portion of cybersecurity risk now comes from outside the organization—specifically, through third-party vendors, suppliers, and service providers. In this episode, we examine how to assess and manage vendor risk across the full lifecycle, starting with due diligence during procurement and continuing through onboarding, monitoring, and offboarding. We explore how to evaluate vendors based on their security policies, compliance certifications, breach history, and contract terms—especially service-level agreements (SLAs) and right-to-audit clauses. Supply chain security goes beyond ...
-
Vendor Risk and Supply Chain Considerations (Domain 5)
- 06-16-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Secure Asset Disposal and Decommissioning (Domain 4)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
When assets reach the end of their lifecycle, they don’t just disappear—they become potential liabilities if not securely decommissioned. In this episode, we explore the processes and tools used for secure asset disposal, including data sanitization, cryptographic wiping, degaussing, and physical destruction. We also discuss how improperly retired systems—like old servers, network devices, or hard drives—can leak sensitive data or provide backdoor access to an otherwise secure network. A good decommissioning policy includes clear documentation, ownership verification, and post-disposal...
-
Secure Asset Disposal and Decommissioning (Domain 4)
- 06-15-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Privacy Laws and Global Compliance (Domain 5)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
Data privacy is no longer just a legal issue—it’s a global business imperative, and this episode explores the complex and evolving landscape of privacy laws. We cover key regulations such as the European Union’s GDPR, California’s CCPA, Brazil’s LGPD, and other region-specific rules that govern how personal data is collected, processed, stored, and transferred. These laws define roles like data controller and data processor, outline user rights such as data access or deletion, and impose significant penalties for non-compliance. We also explain how organizations can align with ...
-
Privacy Laws and Global Compliance (Domain 5)
- 06-16-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Data Recovery Techniques (Domain 3)
- Duración: 8 m
- Grabación Original
-
General
-
Narración:
-
Historia
Backups are only half of the story—the other half is how effectively you can recover from them. In this episode, we focus on data recovery techniques that turn dormant backups into operational systems, covering strategies such as replication, journaling, point-in-time recovery, and bare-metal restoration. We define and differentiate between Recovery Time Objective (RTO)—how quickly you need to be back online—and Recovery Point Objective (RPO)—how much data loss is acceptable—explaining how these shape the choice of recovery tools and processes. Journaling captures changes in real ...
-
Data Recovery Techniques (Domain 3)
- 06-15-25
- Duración: 8 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Digital Forensics Foundations (Domain 4)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
When a security incident occurs, understanding what happened—and proving it—requires digital forensics. In this episode, we cover foundational concepts of digital forensics, including data acquisition, chain of custody, preservation, and documentation. Acquiring data from endpoints, servers, or cloud environments must be done carefully to avoid altering evidence, while maintaining chain of custody ensures that every step of handling is logged and defensible in court. We explore the importance of write-blockers, forensic images, and hashing to preserve integrity, and discuss where forensic ...
-
Digital Forensics Foundations (Domain 4)
- 06-16-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
On-Premises, Centralized, and Decentralized Architectures (Domain 3)
- Duración: 8 m
- Grabación Original
-
General
-
Narración:
-
Historia
Security must adapt to the architecture of the environment it protects, and that starts with understanding how infrastructure is organized. In this episode, we compare on-premises, centralized, and decentralized architectures, explaining the security implications of each. Centralized models offer streamlined control, simpler updates, and more consistent enforcement—but they also concentrate risk in a single point of failure. Decentralized architectures distribute resources and decision-making, improving resilience but making visibility, auditing, and access management more complex. On-prem ...
-
On-Premises, Centralized, and Decentralized Architectures (Domain 3)
- 06-15-25
- Duración: 8 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Advanced Secure Access Solutions (Domain 3)
- Duración: 7 m
- Grabación Original
-
General
-
Narración:
-
Historia
Traditional perimeter security isn’t enough in a world of mobile users, cloud resources, and third-party integrations. In this episode, we explore advanced secure access solutions, starting with Software-Defined Wide Area Networking (SD-WAN), which replaces traditional WAN technologies with application-aware routing and policy-based control across diverse internet paths. SD-WAN not only improves performance but enhances security by segmenting traffic and enforcing encryption between endpoints. We then examine Secure Access Service Edge (SASE), which merges SD-WAN with cloud-delivered ...
-
Advanced Secure Access Solutions (Domain 3)
- 06-15-25
- Duración: 7 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Procedures and Playbooks (Domain 5)
- Duración: 9 m
- Grabación Original
-
General
-
Narración:
-
Historia
Procedures and playbooks are the operational backbone of a mature security program—translating policy into detailed, repeatable steps for responding to specific threats or performing security tasks. In this episode, we explain the difference between general procedures (e.g., user onboarding or access review) and incident-specific playbooks (e.g., malware containment or phishing investigation). Playbooks are especially valuable in reducing response time and minimizing errors during high-stress situations by guiding responders through proven workflows. We discuss how to build, test, and ...
-
Procedures and Playbooks (Domain 5)
- 06-16-25
- Duración: 9 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Human vs. Non-human Readable Data (Domain 3)
- Duración: 7 m
- Grabación Original
-
General
-
Narración:
-
Historia
Not all data is meant for human eyes, and in cybersecurity, understanding the distinction between human-readable and non-human-readable data formats is vital for applying the right protection. This episode explains how human-readable data—like documents, emails, or spreadsheets—poses a higher risk of exposure and misuse when accessed by unauthorized users, and must often be protected with strong access controls, encryption, and data loss prevention (DLP) tools. Non-human-readable data includes binary files, machine logs, compiled code, and metadata—often overlooked, but still sensitive ...
-
Human vs. Non-human Readable Data (Domain 3)
- 06-15-25
- Duración: 7 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Key Security Monitoring Activities (Part 1) (Domain 4)
- Duración: 11 m
- Grabación Original
-
General
-
Narración:
-
Historia
Monitoring is most valuable when it drives action, and in this episode, we explore foundational activities that turn data into defense—starting with log aggregation, alerting, and scanning. Log aggregation involves collecting logs from diverse systems—servers, firewalls, applications, cloud platforms—into a central platform for correlation and analysis. Alerting systems evaluate these logs in real time, flagging deviations from normal behavior based on thresholds, signatures, or heuristics. We also examine the importance of routine vulnerability scanning to proactively identify ...
-
Key Security Monitoring Activities (Part 1) (Domain 4)
- 06-16-25
- Duración: 11 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Introduction to Domain Five — Security Program Management and Oversight
- Duración: 8 m
- Grabación Original
-
General
-
Narración:
-
Historia
Cybersecurity isn’t just about blocking attacks and managing firewalls. It’s also about building policies, assessing risk, managing vendors, and aligning security with the overall goals of the business. That’s the focus of Domain Five: Security Program Management and Oversight. This domain gives you the big-picture understanding of how security fits into the way organizations function. It teaches you to think beyond the keyboard and start connecting what happens in the server room to what matters in the boardroom.Domain Five accounts for 20 percent of the Security Plus exam. That makes ...
-
Introduction to Domain Five — Security Program Management and Oversight
- 06-16-25
- Duración: 8 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Vulnerability Response and Remediation (Part 1) (Domain 4)
- Duración: 9 m
- Grabación Original
-
General
-
Narración:
-
Historia
Finding vulnerabilities is only useful if you have a plan to fix them—and this episode dives into the critical processes of response and remediation. We begin with patching, one of the most effective and often underutilized defenses in cybersecurity. Timely and tested patch application is essential for operating systems, applications, firmware, and even cloud services, yet many organizations struggle to keep pace with updates. We also explore alternative remediation strategies like configuration changes, software upgrades, and user permission adjustments that address vulnerabilities when ...
-
Vulnerability Response and Remediation (Part 1) (Domain 4)
- 06-15-25
- Duración: 9 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
The Let Them Theory
- A Life-Changing Tool That Millions of People Can’t Stop Talking About
- De: Mel Robbins
- Narrado por: Mel Robbins
- Duración: 10 h y 38 m
- Versión completa
-
General
-
Narración:
-
Historia
In her latest groundbreaking book, The Let Them Theory, Mel Robbins—New York Times bestselling author and one of the world's most respected experts on motivation, confidence, and mindset—teaches you how to stop wasting energy on what you can't control and start focusing on what truly matters: YOU. Your happiness. Your goals. Your life.
-
-
Let Her
- De Paula en 01-02-25
De: Mel Robbins
-
The Primal Hunter 12
- A LitRPG Adventure
- De: Zogarth
- Narrado por: Travis Baldree
- Duración: 20 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
The Nevermore Leaderboards competition has gathered more attention than perhaps in any era prior, with gods getting both directly and indirectly involved to see who will eventually come out on top. Jake, who has so far been performing above all expectations, enters his final Challenge Dungeon before it’s time to meet up with his party once more. Together, they’ll make a final push to try and climb as many floors as possible before time is up and, hopefully, in the end, find their names atop the Nevermore Leaderboards.
-
-
Amazing
- De Levi M. en 06-16-25
De: Zogarth
-
Great Big Beautiful Life
- De: Emily Henry
- Narrado por: Julia Whelan
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
Alice Scott is an eternal optimist still dreaming of her big writing break. Hayden Anderson is a Pulitzer-prize winning human thundercloud. And they’re both on balmy Little Crescent Island for the same reason: To write the biography of a woman no one has seen in years—or at least to meet with the octogenarian who claims to be the Margaret Ives. Tragic heiress, former tabloid princess, and daughter of one of the most storied (and scandalous) families of the 20th Century.
-
-
Just, wow.
- De julia lee en 04-25-25
De: Emily Henry
-
Atmosphere: A GMA Book Club Pick
- A Love Story
- De: Taylor Jenkins Reid
- Narrado por: Kristen DiMercurio, Julia Whelan, Taylor Jenkins Reid
- Duración: 9 h y 52 m
- Versión completa
-
General
-
Narración:
-
Historia
Fast-paced, thrilling, and emotional, Atmosphere is Taylor Jenkins Reid at her best: transporting listeners to iconic times and places, creating complex protagonists, and telling a passionate and soaring story about the transformative power of love—this time among the stars.
-
-
This has soared to the top of my all-time favs!
- De Kimberley en 06-03-25
-
The Let Them Theory
- A Life-Changing Tool That Millions of People Can’t Stop Talking About
- De: Mel Robbins
- Narrado por: Mel Robbins
- Duración: 10 h y 38 m
- Versión completa
-
General
-
Narración:
-
Historia
In her latest groundbreaking book, The Let Them Theory, Mel Robbins—New York Times bestselling author and one of the world's most respected experts on motivation, confidence, and mindset—teaches you how to stop wasting energy on what you can't control and start focusing on what truly matters: YOU. Your happiness. Your goals. Your life.
-
-
Let Her
- De Paula en 01-02-25
De: Mel Robbins
-
The Primal Hunter 12
- A LitRPG Adventure
- De: Zogarth
- Narrado por: Travis Baldree
- Duración: 20 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
The Nevermore Leaderboards competition has gathered more attention than perhaps in any era prior, with gods getting both directly and indirectly involved to see who will eventually come out on top. Jake, who has so far been performing above all expectations, enters his final Challenge Dungeon before it’s time to meet up with his party once more. Together, they’ll make a final push to try and climb as many floors as possible before time is up and, hopefully, in the end, find their names atop the Nevermore Leaderboards.
-
-
Amazing
- De Levi M. en 06-16-25
De: Zogarth
-
Great Big Beautiful Life
- De: Emily Henry
- Narrado por: Julia Whelan
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
Alice Scott is an eternal optimist still dreaming of her big writing break. Hayden Anderson is a Pulitzer-prize winning human thundercloud. And they’re both on balmy Little Crescent Island for the same reason: To write the biography of a woman no one has seen in years—or at least to meet with the octogenarian who claims to be the Margaret Ives. Tragic heiress, former tabloid princess, and daughter of one of the most storied (and scandalous) families of the 20th Century.
-
-
Just, wow.
- De julia lee en 04-25-25
De: Emily Henry
-
Atmosphere: A GMA Book Club Pick
- A Love Story
- De: Taylor Jenkins Reid
- Narrado por: Kristen DiMercurio, Julia Whelan, Taylor Jenkins Reid
- Duración: 9 h y 52 m
- Versión completa
-
General
-
Narración:
-
Historia
Fast-paced, thrilling, and emotional, Atmosphere is Taylor Jenkins Reid at her best: transporting listeners to iconic times and places, creating complex protagonists, and telling a passionate and soaring story about the transformative power of love—this time among the stars.
-
-
This has soared to the top of my all-time favs!
- De Kimberley en 06-03-25
-
The Tenant
- De: Freida McFadden
- Narrado por: Will Damron, Christine Lakin
- Duración: 8 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Blake Porter is riding high, until he's not. Fired abruptly from his job as a VP of marketing and unable to make the mortgage payments on the new brownstone he shares with his fiancée, he's desperate to make ends meet. Enter Whitney. Beautiful, charming, down-to-earth, and looking for a room to rent. She's exactly what Blake's looking for. Or is she? Because something isn't quite right. The neighbors start treating Blake differently. The smell of decay permeates his home, no matter how hard he scrubs. Strange noises jar him awake in the middle of the night.
-
-
the twist
- De Sheila en 05-09-25
De: Freida McFadden
-
Harry Potter and the Sorcerer's Stone, Book 1
- De: J.K. Rowling
- Narrado por: Jim Dale
- Duración: 8 h y 18 m
- Versión completa
-
General
-
Narración:
-
Historia
Harry Potter has never even heard of Hogwarts when the letters start dropping on the doormat at number four, Privet Drive. Addressed in green ink on yellowish parchment with a purple seal, they are swiftly confiscated by his grisly aunt and uncle. Then, on Harry's eleventh birthday, a great beetle-eyed giant of a man called Rubeus Hagrid bursts in with some astonishing news: Harry Potter is a wizard, and he has a place at Hogwarts School of Witchcraft and Wizardry. An incredible adventure is about to begin!
-
-
A great reading of the wrong book
- De P en 11-24-15
De: J.K. Rowling
-
The Waitress
- De: K. L. Slater
- Narrado por: Claudia Jessie
- Duración: 7 h y 56 m
- Grabación Original
-
General
-
Narración:
-
Historia
Alicia has left her young son behind with her sister to chase a better life in London. But she’s not just chasing opportunity. She’s escaping the truth. And no one in her new life needs to know what she’s running from. At The Orbit — a glittering high-rise where the city’s elite come to play — Alicia waits tables and watches everything. She knows just how to blend in, how to charm, how to make people see what she wants them to see.
-
-
Easy listen
- De Birderliz en 06-11-25
De: K. L. Slater
-
Never Flinch
- A Novel
- De: Stephen King
- Narrado por: Jessie Mueller, Stephen King
- Duración: 14 h y 44 m
- Versión completa
-
General
-
Narración:
-
Historia
When the Buckeye City Police Department receives a disturbing letter from a person threatening to “kill thirteen innocents and one guilty” in “an act of atonement for the needless death of an innocent man,” Detective Izzy Jaynes has no idea what to think. Are fourteen citizens about to be slaughtered in an unhinged act of retribution? As the investigation unfolds, Izzy realizes that the letter writer is deadly serious, and she turns to her friend Holly Gibney for help.
-
-
THE VOICES
- De Candis Taylor en 05-30-25
De: Stephen King
-
My Friends
- A Novel
- De: Fredrik Backman
- Narrado por: Marin Ireland
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
Most people don’t even notice them—three tiny figures sitting at the end of a long pier in the corner of one of the most famous paintings in the world. Most people think it’s just a depiction of the sea. But Louisa, an artist herself, knows otherwise and she is determined to find out the story of these three enigmatic figures. Twenty-five years earlier, in a distant town, a group of teenagers find refuge from their difficult home lives by spending their days laughing and telling stories out on a pier.
-
-
How can he keep doing this? Another masterpiece!
- De Blue en 05-08-25
De: Fredrik Backman
-
What Could Go Wrong?
- De: Scott Z. Burns
- Narrado por: Scott Z. Burns
- Duración: 3 h y 40 m
- Grabación Original
-
General
-
Narración:
-
Historia
Predicting a global pandemic in a hit movie was impressive. Writing a sequel that will work for today’s world might take a whole different kind of intelligence. Join Scott Z. Burns, the acclaimed screenwriter of Contagion, as he embarks on a mind-bending quest to create a worthy follow-up to his eerily prophetic film. Reuniting with director Steven Soderbergh, members of the cast and crew, and the scientific experts who advised him on the first film, Burns also turns to an unexpected collaborator: artificial intelligence.
-
-
AI an Ethical Dilemma
- De porte8a2 en 06-11-25
De: Scott Z. Burns
-
Broken Country
- De: Clare Leslie Hall
- Narrado por: Hattie Morahan
- Duración: 8 h y 57 m
- Versión completa
-
General
-
Narración:
-
Historia
Beth and her gentle, kind husband Frank are happily married, but their relationship relies on the past staying buried. But when Beth’s brother-in-law shoots a dog going after their sheep, Beth doesn’t realize that the gunshot will alter the course of their lives. For the dog belonged to none other than Gabriel Wolfe, the man Beth loved as a teenager—the man who broke her heart years ago. Gabriel has returned to the village with his young son Leo, a boy who reminds Beth very much of her own son, who died in a tragic accident.
-
-
Best book of the year
- De Carolyn en 03-27-25
-
Fourth Wing
- Empyrean, Book 1
- De: Rebecca Yarros
- Narrado por: Rebecca Soler, Teddy Hamilton
- Duración: 21 h y 22 m
- Versión completa
-
General
-
Narración:
-
Historia
Twenty-year-old Violet Sorrengail was supposed to enter the Scribe Quadrant, living a quiet life among books and history. Now, the commanding general—also known as her tough-as-talons mother—has ordered Violet to join the hundreds of candidates striving to become the elite of Navarre: dragon riders. But when you’re smaller than everyone else and your body is brittle, death is only a heartbeat away...because dragons don’t bond to “fragile” humans. They incinerate them.
-
-
Erotica with Dragons
- De Trev en 05-13-23
De: Rebecca Yarros
-
Sunrise on the Reaping
- A Hunger Games Novel
- De: Suzanne Collins
- Narrado por: Jefferson White
- Duración: 12 h y 48 m
- Versión completa
-
General
-
Narración:
-
Historia
As the day dawns on the fiftieth annual Hunger Games, fear grips the districts of Panem. This year, in honor of the Quarter Quell, twice as many tributes will be taken from their homes. Back in District 12, Haymitch Abernathy is trying not to think too hard about his chances. All he cares about is making it through the day and being with the girl he loves.
-
-
A Sad but Beautiful Tale
- De Anonymous User en 03-19-25
De: Suzanne Collins
-
Project Hail Mary
- De: Andy Weir
- Narrado por: Ray Porter
- Duración: 16 h y 10 m
- Versión completa
-
General
-
Narración:
-
Historia
Ryland Grace is the sole survivor on a desperate, last-chance mission - and if he fails, humanity and the Earth itself will perish. Except that right now, he doesn't know that. He can't even remember his own name, let alone the nature of his assignment or how to complete it. All he knows is that he's been asleep for a very, very long time. And he's just been awakened to find himself millions of miles from home, with nothing but two corpses for company.
-
-
Bazinga
- De Davidgonzalezsr en 05-04-21
De: Andy Weir
-
Death Row
- Alibis collection
- De: Freida McFadden
- Narrado por: Lauryn Allman
- Duración: 1 h y 44 m
- Versión completa
-
General
-
Narración:
-
Historia
Talia Kemper is on death row for murdering her husband. She had an alibi and no known motive, yet Talia’s unwavering protestations of innocence have always been ignored. Then one day in the visiting area, she sees a recognizable stranger she’s certain is her husband. It turns out the man she’s been convicted of killing may not be dead after all. But as the days tick away toward Talia’s execution, what will it take for her to be believed?
-
-
Out of left field!
- De NEA en 06-16-25
De: Freida McFadden
-
Nightshade
- De: Michael Connelly
- Narrado por: Will Damron
- Duración: 9 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Los Angeles County Sheriff’s Detective Stilwell has been "exiled" to a low-key post policing rustic Catalina Island, after department politics drove him off a homicide desk on the mainland. But while following up the usual drunk-and-disorderlies and petty thefts that come with his new territory, Detective Stilwell gets a report of a body found wrapped in plastic and weighed down at the bottom of the harbor. Crossing all lines of protocol and jurisdiction, he starts doggedly working the case.
-
-
A new Connelly detective…
- De SAM en 05-28-25
De: Michael Connelly
-
Atomic Habits
- An Easy & Proven Way to Build Good Habits & Break Bad Ones
- De: James Clear
- Narrado por: James Clear
- Duración: 5 h y 35 m
- Versión completa
-
General
-
Narración:
-
Historia
No matter your goals, Atomic Habits offers a proven framework for improving - every day. James Clear, one of the world's leading experts on habit formation, reveals practical strategies that will teach you exactly how to form good habits, break bad ones, and master the tiny behaviors that lead to remarkable results. If you're having trouble changing your habits, the problem isn't you. The problem is your system. Bad habits repeat themselves again and again not because you don't want to change, but because you have the wrong system for change.
-
-
Author went overboard hawking his site
- De CHughes en 06-25-19
De: James Clear
-
Onyx Storm
- Empyrean, Book 3
- De: Rebecca Yarros
- Narrado por: Jasmin Walker, Justis Bolding, Teddy Hamilton, y otros
- Duración: 23 h y 52 m
- Versión completa
-
General
-
Narración:
-
Historia
After nearly eighteen months at Basgiath War College, Violet Sorrengail knows there’s no more time for lessons. No more time for uncertainty. Because the battle has truly begun, and with enemies closing in from outside their walls and within their ranks, it’s impossible to know who to trust. Now Violet must journey beyond the failing Aretian wards to seek allies from unfamiliar lands to stand with Navarre. The trip will test every bit of her wit, luck, and strength, but she will do anything to save what she loves—her dragons, her family, her home, and him.
-
-
I'm spoiled by graphic audio
- De CAtkins en 01-22-25
De: Rebecca Yarros
-
Dungeon Crawler Carl
- A LitRPG/Gamelit Adventure
- De: Matt Dinniman
- Narrado por: Jeff Hays
- Duración: 13 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
A man. His ex-girlfriend's cat. A sadistic game show unlike anything in the universe: a dungeon crawl where survival depends on killing your prey in the most entertaining way possible. In a flash, every human-erected construction on Earth - from Buckingham Palace to the tiniest of sheds - collapses in a heap, sinking into the ground. The buildings and all the people inside have all been atomized and transformed into the dungeon: an 18-level labyrinth filled with traps, monsters, and loot.
-
-
A refreshing take on apocalyptical LITRPG
- De Rhexas en 03-01-21
De: Matt Dinniman
-
Fourth Wing (Part 1 of 2) (Dramatized Adaptation)
- The Empyrean, Book 1
- De: Rebecca Yarros
- Narrado por: full cast, Scott McCormick, Troy Allan, y otros
- Duración: 7 h y 52 m
- Grabación Original
-
General
-
Narración:
-
Historia
Twenty-year-old Violet Sorrengail was supposed to enter the Scribe Quadrant, living a quiet life among books and history. Now, the commanding general—also known as her tough-as-talons mother—has ordered Violet to join the hundreds of candidates striving to become the elite of Navarre: dragon riders. But when you’re smaller than everyone else and your body is brittle, death is only a heartbeat away...because dragons don’t bond to “fragile” humans. They incinerate them. With fewer dragons willing to bond than cadets, most would kill Violet to better their own chances of success.
-
-
4 FIRST-YEAR ★’s
- De ➷➹➸❥HFB🔹🔹🔹 en 12-27-23
De: Rebecca Yarros
-
Harry Potter and the Chamber of Secrets, Book 2
- De: J.K. Rowling
- Narrado por: Jim Dale
- Duración: 9 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
Harry Potter's summer has included the worst birthday ever, doomy warnings from a house-elf called Dobby, and rescue from the Dursleys by his friend Ron Weasley in a magical flying car! Back at Hogwarts School of Witchcraft and Wizardry for his second year, Harry hears strange whispers echo through empty corridors - and then the attacks start. Students are found as though turned to stone... Dobby's sinister predictions seem to be coming true.
-
-
Jim Dale is wonderful!
- De ladigolfer en 12-31-15
De: J.K. Rowling
-
Till Summer Do Us Part
- De: Meghan Quinn
- Narrado por: Erin Mallon, Teddy Hamilton, Stephen Dexter
- Duración: 11 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Scottie Price just started a new job and it's a real sausage fest. She's the only woman on a team filled with Brads and Chads. Expecting a bachelor pad atmosphere, she is quickly corrected when she finds out everyone is happily married. In an effort to impress her boss, Scottie mentions her nonexistent husband in a company meeting. But eagle-eyed Chad points out her lack of wedding ring.
-
-
Perfect summer read!
- De Kathy D. en 06-07-25
De: Meghan Quinn
-
The Wedding People
- A Novel
- De: Alison Espach
- Narrado por: Helen Laser
- Duración: 11 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s a beautiful day in Newport, Rhode Island, when Phoebe Stone arrives at the grand Cornwall Inn wearing a green dress and gold heels, not a bag in sight, alone. She's immediately mistaken by everyone in the lobby for one of the wedding people, but she’s actually the only guest at the Cornwall who isn’t here for the big event. Phoebe is here because she’s dreamed of coming for years—she hoped to shuck oysters and take sunset sails with her husband, only now she’s here without him, at rock bottom, and determined to have one last decadent splurge on herself.
-
-
What a beautiful book
- De Brooke Baker en 08-15-24
De: Alison Espach
-
The Ballad of Songbirds and Snakes
- A Hunger Games Novel
- De: Suzanne Collins
- Narrado por: Santino Fontana
- Duración: 16 h y 16 m
- Versión completa
-
General
-
Narración:
-
Historia
It is the morning of the reaping that will kick off the 10th annual Hunger Games. In the Capitol, 18-year-old Coriolanus Snow is preparing for his one shot at glory as a mentor in the Games. The once-mighty house of Snow has fallen on hard times, its fate hanging on the slender chance that Coriolanus will be able to out charm, outwit, and outmaneuver his fellow students to mentor the winning tribute. The odds are against him. He’s been given the humiliating assignment of mentoring the female tribute from District 12, the lowest of the low.
-
-
Bad part
- De Edgars Dumins en 05-19-20
De: Suzanne Collins
-
Murder at the Patel Motel
- De: Maulik Pancholy, Zackary Grady, Achilles Stamatelaky
- Narrado por: Maulik Pancholy, Murray Bartlett, Poorna Jagannathan, y otros
- Duración: 4 h y 29 m
- Grabación Original
-
General
-
Narración:
-
Historia
When Milan Patel visits his parents at their family-run motel in Montana, he's expecting the usual drama. But shortly after he arrives, his father mysteriously dies in the motel pool. Now everyone's a suspect. What was meant to be a quick trip becomes Milan's worst nightmare, as he races to solve his father's murder while confronting the past he tried to leave behind.
-
-
So Much Fun
- De Amazon Customer en 06-07-25
De: Maulik Pancholy, y otros
-
Harry Potter and the Prisoner of Azkaban, Book 3
- De: J.K. Rowling
- Narrado por: Jim Dale
- Duración: 11 h y 49 m
- Versión completa
-
General
-
Narración:
-
Historia
When the Knight Bus crashes through the darkness and screeches to a halt in front of him, it's the start of another far from ordinary year at Hogwarts for Harry Potter. Sirius Black, escaped mass-murderer and follower of Lord Voldemort, is on the run - and they say he is coming after Harry. In his first ever Divination class, Professor Trelawney sees an omen of death in Harry's tea leaves... But perhaps most terrifying of all are the Dementors patrolling the school grounds, with their soul-sucking kiss...
-
-
Jim Dale at his best
- De rottndachs en 01-12-16
De: J.K. Rowling
-
Iron Flame
- Empyrean, Book 2
- De: Rebecca Yarros
- Narrado por: Rebecca Soler, Teddy Hamilton
- Duración: 28 h y 16 m
- Versión completa
-
General
-
Narración:
-
Historia
Everyone expected Violet Sorrengail to die during her first year at Basgiath War College-Violet included. But Threshing was only the first impossible test meant to weed out the weak-willed, the unworthy, and the unlucky. Now the real training begins, and Violet’s already wondering how she’ll get through. It’s not just that it’s grueling and maliciously brutal, or even that it’s designed to stretch the riders’ capacity for pain beyond endurance. It’s the new vice commandant, who’s made it his personal mission to teach Violet exactly how powerless she is–unless she betrays the man she loves.
-
-
I wish I could throw this book off a cliff.
- De Rebekah L Johnson en 11-10-23
De: Rebecca Yarros
-
Quicksilver
- The Fae & Alchemy Series, Book 1
- De: Callie Hart
- Narrado por: Stella Bloom, Anthony Palmini
- Duración: 20 h y 41 m
- Versión completa
-
General
-
Narración:
-
Historia
Twenty-four-year-old Saeris Fane is good at keeping secrets. No one knows about the strange powers she possesses or the fact that she has been picking pockets and stealing from the Undying Queen's reservoirs for as long as she can remember. But a secret is like a knot. Sooner or later, it is bound to come undone. When Saeris comes face-to-face with Death himself, she inadvertently reopens a gateway between realms and is transported to a land of ice and snow. The Fae have always been the stuff of myth, of legend, of nightmares… but it turns out they're real.
-
-
Best Romantasy this year!
- De Gabby love en 11-02-24
De: Callie Hart