O'Reilly logo

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition by Darril Gibson, James M Stewart, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9Security Vulnerabilities, Threats, and Countermeasures

THE CISSP EXAM TOPICS COVERED IN THIS CHAPTER INCLUDE:

  • images Domain 3: Security Architecture and Engineering
    • 3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
      • 3.5.1 Client-based systems
      • 3.5.2 Server-based systems
      • 3.5.3 Database systems
      • 3.5.5 Industrial control systems (ICS)
      • 3.5.6 Cloud-based systems
      • 3.5.7 Distributed systems
      • 3.5.8 Internet of Things (IoT)
    • 3.6 Assess and mitigate vulnerabilities in web-based systems
    • 3.7 Assess and mitigate vulnerabilities in mobile systems
    • 3.8 Assess and mitigate vulnerabilities in embedded devices ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required