Peter H. Gregory - CISSP For Dummies

Здесь есть возможность читать онлайн «Peter H. Gregory - CISSP For Dummies» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

CISSP For Dummies: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «CISSP For Dummies»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Get CISSP certified, with this comprehensive study plan!  Revised for the updated 2021 exam, 
 is packed with everything you need to succeed on test day. With deep content review on every domain, plenty of practice questions, and online study tools, this book helps aspiring security professionals unlock the door to success on this high-stakes exam. This book, written by CISSP experts, goes beyond the exam material and includes tips on setting up a 60-day study plan, exam-day advice, and access to an online test bank of questions. 
Make your test day stress-free with 

Review every last detail you need to pass the CISSP certification exam Master all 8 test domains, from Security and Risk Management through Software Development Security Get familiar with the 2021 test outline Boost your performance with an online test bank, digital flash cards, and test-day tips If you’re a security professional seeking your CISSP certification, this book is your secret weapon as you prepare for the exam.

CISSP For Dummies — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «CISSP For Dummies», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

CISSP For Dummies 7th Edition Published by John Wiley Sons Inc111 - фото 1

CISSP For Dummies 7th Edition Published by John Wiley Sons Inc111 - фото 2

CISSP® For Dummies®, 7th Edition

Published by: John Wiley & Sons, Inc.,111 River Street, Hoboken, NJ 07030-5774, www.wiley.com

Copyright © 2022 by John Wiley & Sons, Inc., Hoboken, New Jersey

Published simultaneously in Canada

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions .

Trademarks:Wiley, For Dummies, the Dummies Man logo, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc., and may not be used without written permission. CISSP is a registered certification mark of (ISC) 2, Inc. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.

LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: WHILE THE PUBLISHER AND AUTHORS HAVE USED THEIR BEST EFFORTS IN PREPARING THIS WORK, THEY MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES REPRESENTATIVES, WRITTEN SALES MATERIALS OR PROMOTIONAL STATEMENTS FOR THIS WORK. THE FACT THAT AN ORGANIZATION, WEBSITE, OR PRODUCT IS REFERRED TO IN THIS WORK AS A CITATION AND/OR POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE PUBLISHER AND AUTHORS ENDORSE THE INFORMATION OR SERVICES THE ORGANIZATION, WEBSITE, OR PRODUCT MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING PROFESSIONAL SERVICES. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR YOUR SITUATION. YOU SHOULD CONSULT WITH A SPECIALIST WHERE APPROPRIATE. FURTHER, READERS SHOULD BE AWARE THAT WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ. NEITHER THE PUBLISHER NOR AUTHORS SHALL BE LIABLE FOR ANY LOSS OF PROFIT OR ANY OTHER COMMERCIAL DAMAGES, INCLUDING BUT NOT LIMITED TO SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR OTHER DAMAGES.

For general information on our other products and services, please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002. For technical support, please visit https://hub.wiley.com/community/support/dummies .

Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com . For more information about Wiley products, visit www.wiley.com .

Library of Congress Control Number: 2022930207

ISBN 978-1-119-80682-0 (pbk); ISBN 978-1-119-80689-9 (ebk); ISBN 978-1-119-80690-5 (ebk)

CISSP® For Dummies®

To view this book's Cheat Sheet, simply go to www.dummies.comand search for “CISSP For Dummies Cheat Sheet” in the Search box.

Table of Contents

1 Cover

2 Title Page

3 Copyright

4 Introduction About This Book Foolish Assumptions Icons Used in This Book Beyond the Book Where to Go from Here

5 Part 1: Getting Started with CISSP Certification Chapter 1: (ISC) 2and the CISSP Certification About (ISC) 2and the CISSP Certification You Must Be This Tall to Ride This Ride (And Other Requirements) Preparing for the Exam Registering for the Exam About the CISSP Examination After the Examination Chapter 2: Putting Your Certification to Good Use Networking with Other Security Professionals Being an Active (ISC) 2Member Considering (ISC) 2Volunteer Opportunities Becoming an Active Member of Your Local Security Chapter Spreading the Good Word about CISSP Certification Using Your CISSP Certification to Be an Agent of Change Earning Other Certifications Pursuing Security Excellence

6 Part 2: Certification Domains Chapter 3: Security and Risk Management Understand, Adhere to, and Promote Professional Ethics Understand and Apply Security Concepts Evaluate and Apply Security Governance Principles Determine Compliance and Other Requirements Understand Legal and Regulatory Issues That Pertain to Information Security Understand Requirements for Investigation Types Develop, Document, and Implement Security Policies, Standards, Procedures, and Guidelines Identify, Analyze, and Prioritize Business Continuity (BC) Requirements Contribute to and Enforce Personnel Security Policies and Procedures Understand and Apply Risk Management Concepts Understand and Apply Threat Modeling Concepts and Methodologies Apply Supply Chain Risk Management (SCRM) Concepts Establish and Maintain a Security Awareness, Education, and Training Program Chapter 4: Asset Security Identify and Classify Information and Assets Establish Information and Asset Handling Requirements Provision Resources Securely Manage Data Life Cycle Ensure Appropriate Asset Retention Determine Data Security Controls and Compliance Requirements Chapter 5: Security Architecture and Engineering Research, Implement, and Manage Engineering Processes Using Secure Design Principles Understand the Fundamental Concepts of Security Models Select Controls Based Upon Systems Security Requirements Understand Security Capabilities of Information Systems Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements Select and Determine Cryptographic Solutions Understand Methods of Cryptanalytic Attacks Apply Security Principles to Site and Facility Design Design Site and Facility Security Controls Chapter 6: Communication and Network Security Assess and Implement Secure Design Principles in Network Architectures Secure Network Components Implement Secure Communication Channels According to Design Chapter 7: Identity and Access Management Control Physical and Logical Access to Assets Manage Identification and Authentication of People, Devices, and Services Federated Identity with a Third-Party Service Implement and Manage Authorization Mechanisms Manage the Identity and Access Provisioning Life Cycle Implement Authentication Systems Chapter 8: Security Assessment and Testing Design and Validate Assessment, Test, and Audit Strategies Conduct Security Control Testing Collect Security Process Data Analyze Test Output and Generate Reports Conduct or Facilitate Security Audits Chapter 9: Security Operations Understand and Comply with Investigations Conduct Logging and Monitoring Activities Perform Configuration Management Apply Foundational Security Operations Concepts Apply Resource Protection Conduct Incident Management Operate and Maintain Detective and Preventative Measures Implement and Support Patch and Vulnerability Management Understand and Participate in Change Management Processes Implement Recovery Strategies Implement Disaster Recovery Processes Test Disaster Recovery Plans Participate in Business Continuity Planning and Exercises Implement and Manage Physical Security Address Personnel Safety and Security Concerns Chapter 10: Software Development Security Understand and Integrate Security in the Software Development Life Cycle Identify and Apply Security Controls in Software Development Ecosystems Assess the Effectiveness of Software Security Assess Security Impact of Acquired Software Define and Apply Secure Coding Guidelines and Standards

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «CISSP For Dummies»

Представляем Вашему вниманию похожие книги на «CISSP For Dummies» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «CISSP For Dummies»

Обсуждение, отзывы о книге «CISSP For Dummies» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x