Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Certified Information Systems Security Professional (CISSP) Exam Guide
  • Table Of Contents Toc
Certified Information Systems Security Professional (CISSP) Exam Guide

Certified Information Systems Security Professional (CISSP) Exam Guide

By : Ted Jordan, Ric Daza, Hinne Hettema
5 (6)
close
close
Certified Information Systems Security Professional (CISSP) Exam Guide

Certified Information Systems Security Professional (CISSP) Exam Guide

5 (6)
By: Ted Jordan, Ric Daza, Hinne Hettema

Overview of this book

The (ISC)2 CISSP exam evaluates the competencies required to secure organizations, corporations, military sites, and government entities. The comprehensive CISSP certification guide offers up-to-date coverage of the latest exam syllabus, ensuring you can approach the exam with confidence, fully equipped to succeed. Complete with interactive flashcards, invaluable exam tips, and self-assessment questions, this CISSP book helps you build and test your knowledge of all eight CISSP domains. Detailed answers and explanations for all questions will enable you to gauge your current skill level and strengthen weak areas. This guide systematically takes you through all the information you need to not only pass the CISSP exam, but also excel in your role as a security professional. Starting with the big picture of what it takes to secure the organization through asset and risk management, it delves into the specifics of securing networks and identities. Later chapters address critical aspects of vendor security, physical security, and software security. By the end of this book, you'll have mastered everything you need to pass the latest CISSP certification exam and have this valuable desktop reference tool for ongoing security needs.
Table of Contents (28 chapters)
close
close

Software Development Life Cycle Security

Applications should be designed and planned to be functional and secure right from the beginning. In this chapter, you will learn about software development methodologies used to ensure that applications meet minimum levels of security. Also, you will learn how to determine whether suppliers are meeting minimum levels of application security in their development processes.

Because development projects and the popularity of applications are growing rapidly, ensuring that they remain relevant is crucial. This is achieved through regular updates and patching.

This chapter will discuss how cross-functional or integrated product teams and change management keep applications functional and secure for the life of the product within their user communities.

This chapter will cover the following topics:

  • Software development methodologies
  • Maturity models
  • Operations and maintenance
  • Change management
  • Integrated product team...
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Certified Information Systems Security Professional (CISSP) Exam Guide
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon