Book description
In this best-of-breed study guide, two leading experts help you master all the topics you need to know to succeed on your CISSP exam and advance your career in IT security. Their concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.
Every feature of this book supports both efficient exam preparation
and long-term mastery:
Opening Topics Lists identify the topics you’ll need to learn in each chapter, and list (ISC)2’s official exam objectives
Key Topics feature figures, tables, and lists that call attention to the information that’s most crucial for exam success
Exam Preparation Tasks allow you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions. All of these help you go beyond memorizing mere facts to master the concepts that are crucial to passing the exam and enhancing your career
Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field’s essential terminology
The companion website contains the powerful
Pearson IT Certification Practice Test Engine, with two practice
exams and access to a large library of exam-realistic questions.
The compansion website also includes memory tables, lists, and
other resources, all in a searchable PDF format.
This study guide helps you master all the topics on the latest
CISSP exam, including:
Access control
Telecommunications and network security
Information security governance and risk management
Software development security
Cryptography
Security architecture and design
Operation security
Business continuity and disaster recovery planning
Legal, regulations, investigations, and compliance
Physical (environmental) security
Table of contents
- About This E-Book
- Title Page
- Copyright Page
- Contents at a Glance
- Table of Contents
- About the Author
- Dedication
- Acknowledgments
- About the Technical Reviewers
- We Want to Hear from You!
- Reader Services
- Book Features and Exam Preparation Methods
-
Introduction: The CISSP Certification
- The Goals of the CISSP Certification
- The Value of the CISSP Certification
-
The Common Body of Knowledge
- Security and Risk Management (e.g. Security, Risk, Compliance, Law, Regulations, Business Continuity)
- Asset Security (Protecting Security of Assets)
- Security Engineering (Engineering and Management of Security)
- Communication and Network Security (Designing and Protecting Network Security)
- Identity and Access Management (Controlling Access and Managing Identity)
- Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
- Security Operations (e.g. Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
- Software Development Security (Understanding, Applying, and Enforcing Software Security)
- Steps to Becoming a CISSP
- Chapter 1. Security and Risk Management
- Chapter 2. Asset Security
-
Chapter 3. Security Engineering
-
Foundation Topics
- Engineering Using Secure Design Principles
- Security Model Concepts
- System Security Evaluation Models
- Security Capabilities of Information Systems
- Certification and Accreditation
- Security Architecture Maintenance
- Vulnerabilities of Security Architectures, Designs, and Solution Elements
- Vulnerabilities in Web-Based Systems
- Vulnerabilities in Mobile Systems
- Vulnerabilities in Embedded Devices and Cyber-Physical Systems
- Cryptography
- Cryptographic Types
- Symmetric Algorithms
- Asymmetric Algorithms
- Public Key Infrastructure
- Key Management Practices
- Digital Signatures
- Digital Rights Management (DRM)
- Message Integrity
- Cryptanalytic Attacks
- Geographical Threats
- Site and Facility Design
- Building and Internal Security
- Environmental Security
- Equipment Security
- Exam Preparation Tasks
- Answer Review Questions
-
Foundation Topics
- Chapter 4. Communication and Network Security
-
Chapter 5. Identity and Access Management
-
Foundation Topics
- Access Control Process
- Physical and Logical Access to Assets
- Identification and Authentication Concepts
- Identification and Authentication Implementation
- Identity as a Service (IDaaS) Implementation
- Third-Party Identity Services Implementation
- Authorization Mechanisms
- Access Control Threats
- Prevent or Mitigate Access Control Threats
- Exam Preparation Tasks
-
Foundation Topics
- Chapter 6. Security Assessment and Testing
-
Chapter 7. Security Operations
-
Foundation Topics
- Investigations
- Investigation Types
- Logging and Monitoring Activities
- Resource Provisioning
- Security Operations Concepts
- Resource Protection
- Incident Management
- Preventive Measures
- Patch Management
- Change Management Processes
- Recovery Strategies
- Disaster Recovery
- Testing Recovery Plans
- Business Continuity Planning and Exercises
- Physical Security
- Personnel Privacy and Safety
- Exam Preparation Tasks
- Answer Review Questions
-
Foundation Topics
- Chapter 8. Software Development Security
- Glossary
- Appendix A. Memory Tables
- Appendix B. Memory Tables Answer Key
- Index
- Inside Front Cover
- Inside Back Cover
- Where are the Companion Content Files?
- Code Snippets
Product information
- Title: CISSP Cert Guide, Second Edition
- Author(s):
- Release date: June 2016
- Publisher(s): Pearson IT Certification
- ISBN: 9780134174129
You might also like
book
CISSP Cert Guide
Learn, prepare, and practice for CISSP exam success with this Cert Guide from Pearson IT Certification, …
book
CompTIA Advanced Security Practitioner (CASP) CAS-002 Cert Guide
Trust the best selling Authorized Cert Guide series from Pearson IT Certification to help you learn, …
book
CISSP Cert Guide, 3rd Edition
Learn, prepare, and practice for CISSP exam success with this Cert Guide from Pearson IT Certification, …
book
CompTIA PenTest+ PT0-001 Cert Guide
Learn, prepare, and practice for CompTIA Pentest+ PT0-001 exam success with this CompTIA Cert Guide from …