CISSP: Certified Information Systems Security Professional Study Guide, 5th Edition

CISSP Common Body of Knowledge

KEY AREA OF KNOWLEDGE CHAPTER
ACCESS CONTROL
Control access by applying the following concepts/methodology/techniques:Policies; types of controls (preventative, detective, corrective, etc.); techniques (e.g., non-discretionary, discretionary and mandatory); Identification and Authentication; Decentralized/distributed access control techniques; Authorization mechanisms; Logging and Monitoring 1, 2, 14
Understand access control attacks 2
Assess effectiveness of access controls 2
APPLICATION DEVELOPMENT SECURITY
Understand and apply security in the system life cycleSystems Development Life Cycle (SDLC); Maturity models; ...

Get CISSP®: Certified Information Systems Security Professional Study Guide, Fifth Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.