Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Certified Information Systems Security Professional (CISSP) Exam Guide
  • Table Of Contents Toc
Certified Information Systems Security Professional (CISSP) Exam Guide

Certified Information Systems Security Professional (CISSP) Exam Guide

By : Ted Jordan, Ric Daza, Hinne Hettema
5 (5)
close
close
Certified Information Systems Security Professional (CISSP) Exam Guide

Certified Information Systems Security Professional (CISSP) Exam Guide

5 (5)
By: Ted Jordan, Ric Daza, Hinne Hettema

Overview of this book

The (ISC)2 CISSP exam evaluates the competencies required to secure organizations, corporations, military sites, and government entities. The comprehensive CISSP certification guide offers up-to-date coverage of the latest exam syllabus, ensuring you can approach the exam with confidence, fully equipped to succeed. Complete with interactive flashcards, invaluable exam tips, and self-assessment questions, this CISSP book helps you build and test your knowledge of all eight CISSP domains. Detailed answers and explanations for all questions will enable you to gauge your current skill level and strengthen weak areas. This guide systematically takes you through all the information you need to not only pass the CISSP exam, but also excel in your role as a security professional. Starting with the big picture of what it takes to secure the organization through asset and risk management, it delves into the specifics of securing networks and identities. Later chapters address critical aspects of vendor security, physical security, and software security. By the end of this book, you'll have mastered everything you need to pass the latest CISSP certification exam and have this valuable desktop reference tool for ongoing security needs.
Table of Contents (28 chapters)
close
close

Software Development Methodologies

To create a secure software development project, you must have a secure development process in place. This process includes proper planning and collection of software requirements, architecture and design, coding, testing, and release and maintenance. There are several software development frameworks in use today, including Waterfall, Agile, DevOps, and DevSecOps. These frameworks guide the process of developing secure software applications and provide a structured approach to releasing software projects.

The Agile model is an incremental development methodology that focuses on customer collaboration and feedback. Agile was developed to address the dissatisfaction that customers had when the final software project did not meet their expectations; it does so by involving them more in the process. For example, consider a project where a client requires an app to print two dots. Without involvement, the developer might complete the project and make...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Certified Information Systems Security Professional (CISSP) Exam Guide
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon