O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security objectives and controls

The CISSP targets the protection of information systems and information assets. Please remember that although focused mainly on inanimate assets such as databases and file servers, the protection of human safety is always the top priority. With the people safe, you can turn your sights toward the protection of these valuable information assets.

The collection of valuable information assets includes all the data files stored on any of the computers the organization owns, on every database, every Microsoft Word document, and every spreadsheet. The assets also include everything required to make these assets available to the workers and business decision makers, such as the hard disk drives that store the files, the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required