-
Book Overview & Buying
-
Table Of Contents
Certified Information Systems Security Professional (CISSP) Exam Guide
By :
Certified Information Systems Security Professional (CISSP) Exam Guide
By:
Overview of this book
The (ISC)2 CISSP exam evaluates the competencies required to secure organizations, corporations, military sites, and government entities. The comprehensive CISSP certification guide offers up-to-date coverage of the latest exam syllabus, ensuring you can approach the exam with confidence, fully equipped to succeed.
Complete with interactive flashcards, invaluable exam tips, and self-assessment questions, this CISSP book helps you build and test your knowledge of all eight CISSP domains. Detailed answers and explanations for all questions will enable you to gauge your current skill level and strengthen weak areas.
This guide systematically takes you through all the information you need to not only pass the CISSP exam, but also excel in your role as a security professional. Starting with the big picture of what it takes to secure the organization through asset and risk management, it delves into the specifics of securing networks and identities. Later chapters address critical aspects of vendor security, physical security, and software security.
By the end of this book, you'll have mastered everything you need to pass the latest CISSP certification exam and have this valuable desktop reference tool for ongoing security needs.
Table of Contents (28 chapters)
Preface
Intro I: Becoming a CISSP
Intro II: Pre-Assessment Test
Chapter 1: Ethics, Security Concepts, and Governance Principles
Chapter 2: Compliance, Regulation, and Investigations
Chapter 3: Security Policies and Business Continuity
Chapter 4: Risk Management, Threat Modeling, SCRM, and SETA
Chapter 5: Asset and Privacy Protection
Chapter 6: Information and Asset Handling
Chapter 7: Secure Design Principles and Controls
Chapter 8: Architecture Vulnerabilities and Cryptography
Chapter 9: Facilities and Physical Security
Chapter 10: Network Architecture Security
Chapter 11: Securing Communication Channels
Chapter 12: Identity, Access Management, and Federation
Chapter 13: Identity Management Implementation
Chapter 14: Designing and Conducting Security Assessments
Chapter 15: Designing and Conducting Security Testing
Chapter 16: Planning for Security Operations
Chapter 17: Security Operations
Chapter 18: Disaster Recovery
Chapter 19: Business Continuity, Personnel, and Physical Security
Chapter 20: Software Development Life Cycle Security
Chapter 21: Software Development Security Controls
Chapter 22: Securing Software Development
Chapter 23: Secure Coding Guidelines, Third-Party Software, and Databases
Chapter 24: Accessing the Online Practice Resources
Other Books You May Enjoy