Book description
Table of contents
- Cover
- Title Page
- Copyright Page
- Dedication
- About the Authors
- Contents at a Glance
- Contents
- In Memory of Shon Harris
- Foreword
- From the Author
- Acknowledgments
- Why Become a CISSP?
-
Chapter 1 Security and Risk Management
- Fundamental Principles of Security
- Security Definitions
- Control Types
- Security Frameworks
- The Crux of Computer Crime Laws
- Complexities in Cybercrime
- Intellectual Property Laws
- Privacy
- Data Breaches
- Policies, Standards, Baselines, Guidelines, and Procedures
- Risk Management
- Threat Modeling
- Risk Assessment and Analysis
- Supply Chain Risk Management
- Risk Management Frameworks
- Business Continuity and Disaster Recovery
- Personnel Security
- Security Governance
- Ethics
- Summary
- Quick Tips
- Chapter 2 Asset Security
-
Chapter 3 Security Architecture and Engineering
- System Architecture
- Computer Architecture
- Operating Systems
- System Security Architecture
- Security Models
- Systems Evaluation
- Certification vs. Accreditation
- Open vs. Closed Systems
- Systems Security
- A Few Threats to Review
- Cryptography in Context
- Cryptography Definitions and Concepts
- Types of Ciphers
- Methods of Encryption
- Types of Symmetric Systems
- Types of Asymmetric Systems
- Message Integrity
- Public Key Infrastructure
- Applying Cryptography
- Attacks on Cryptography
- Site and Facility Security
- The Site Planning Process
- Internal Support Systems
- Summary
- Quick Tips
-
Chapter 4 Communication and Network Security
- Principles of Network Architectures
- Open Systems Interconnection Reference Model
- TCP/IP Model
- Transmission Media
- Wireless Networks
- Networking Foundations
- Network Protocols and Services
- Network Components
- Intranets and Extranets
- Metropolitan Area Networks
- Wide Area Networks
- Communications Channels
- Remote Access
- Network Encryption
- Network Attacks
- Summary
- Quick Tips
-
Chapter 5 Identity and Access Management
- Access Controls Overview
- Security Principles
- Identification, Authentication, Authorization, and Accountability
- Integrating Identity as a Service
- Access Control Mechanisms
- Access Control Techniques and Technologies
- Managing the Identity and Access Provisioning Life Cycle
- Controlling Physical and Logical Access
- Access Control Practices
- Access Control Monitoring
- Threats to Access Control
- Summary
- Quick Tips
- Chapter 6 Security Assessment and Testing
-
Chapter 7 Security Operations
- The Role of the Operations Department
- Administrative Management
- Physical Security
- Secure Resource Provisioning
- Network and Resource Availability
- Preventing and Detecting
- The Incident Management Process
- Investigations
- Disaster Recovery
- Liability and Its Ramifications
- Insurance
- Implementing Disaster Recovery
- Personal Safety Concerns
- Summary
- Quick Tips
-
Chapter 8 Software Development Security
- Building Good Code
- Software Development Life Cycle
- Software Development Methodologies
- Capability Maturity Model Integration
- Change Management
- Security of Development Environments
- Secure Coding
- Programming Languages and Concepts
- Distributed Computing
- Mobile Code
- Web Security
- Database Management
- Malicious Software (Malware)
- Assessing the Security of Acquired Software
- Summary
- Quick Tips
- Appendix A Comprehensive Questions
- Appendix B About the Online Content
- Glossary
- Index
Product information
- Title: CISSP All-in-One Exam Guide, Eighth Edition, 8th Edition
- Author(s):
- Release date: October 2018
- Publisher(s): McGraw-Hill
- ISBN: 9781260142648
You might also like
book
CISSP® Practice: 2,250 Questions, Answers, and Explanations for Passing the Test
A must-have prep guide for taking the CISSP certification exam If practice does, indeed, make perfect, …
book
The Official (ISC)2 Guide to the CISSP CBK Reference, 5th Edition
The only official, comprehensive reference guide to the CISSP All new for 2019 and beyond, this …
book
CISSP For Dummies, 6th Edition
Secure your CISSP certification! If you’re a security professional seeking your CISSP certification, this book is …
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …