CISSP For Dummies (häftad)
Fler böcker inom
Häftad (Paperback / softback)
Antal sidor
6th Edition
John Wiley & Sons Inc
234 x 190 x 31 mm
748 g
Antal komponenter
CISSP For Dummies (häftad)

CISSP For Dummies

Website Associated W/Book

Häftad Engelska, 2018-05-29
Skickas inom 7-10 vardagar.
Fri frakt inom Sverige för privatpersoner.
Secure your CISSP certification! If you're a security professional seeking your CISSP certification, this book is a perfect way to prepare for the exam. Covering in detail all eight domains, the expert advice inside gives you the key information you'll need to pass the exam. Plus, you'll get tips on setting up a 60-day study plan, tips for exam day, and access to an online test bank of questions. CISSP For Dummies is fully updated and reorganized to reflect upcoming changes (ISC)2 has made to the Common Body of Knowledge. Complete with access to an online test bank this book is the secret weapon you need to pass the exam and gain certification. Get key information for all eight exam domains Find test-taking and exam-day tips and tricks Benefit from access to free online practice questions and flash cards Prepare for the CISSP certification in 2018 and beyond You've put in the time as a security professional--and now you can reach your long-term goal of CISSP certification.
Visa hela texten

Passar bra ihop

  1. CISSP For Dummies
  2. +
  3. Home Networking Do-it-Yourself for Dummies

De som köpt den här boken har ofta också köpt Home Networking Do-it-Yourself for Dummies av Lawrence C Miller (häftad).

Köp båda 2 för 536 kr


Har du läst boken? Sätt ditt betyg »

Bloggat om CISSP For Dummies

Övrig information

Lawrence Miller, CISSP, is a security consultant with experience in consulting, defense, legal, nonprofit, retail, and telecommunications. Peter Gregory, CISSP, is a CISO and an executive security advisor with experience in SaaS, retail, telecommunications, nonprofit, legalized gaming, manufacturing, consulting, healthcare, and local government.


Introduction 1 About This Book 2 Foolish Assumptions 3 Icons Used in This Book 4 Beyond the Book 4 Where to Go from Here 5 Part 1: Getting Started with Cissp Certification 7 Chapter 1: (ISC)2 and the CISSP Certification 9 About (ISC)2 and the CISSP Certification 9 You Must Be This Tall to Ride This Ride (and Other Requirements) 10 Preparing for the Exam 12 Studying on your own 12 Getting hands-on experience 13 Getting official (ISC)2 CISSP training 14 Attending other training courses or study groups 14 Take the practice exam 15 Are you ready for the exam? 15 Registering for the Exam 16 About the CISSP Examination 17 After the Examination 20 Chapter 2: Putting Your Certification to Good Use 23 Networking with Other Security Professionals 24 Being an Active (ISC)2 Member 25 Considering (ISC)2 Volunteer Opportunities 26 Writing certification exam questions 26 Speaking at events 26 Helping at (ISC)2 conferences 27 Read and contribute to (ISC)2 publications 27 Support the (ISC)2 Center for Cyber Safety and Education 27 Participating in (ISC)2 focus groups 28 Join the (ISC)2 Community 28 Get involved with a CISSP study group 28 Help others learn more about data security 28 Becoming an Active Member of Your Local Security Chapter 29 Spreading the Good Word about CISSP Certification 30 Wear the colors proudly 31 Lead by example 31 Using Your CISSP Certification to Be an Agent of Change 32 Earning Other Certifications 32 Other (ISC)2 certifications 33 CISSP concentrations 33 Non-(ISC)2 certifications 34 Choosing the right certifications 37 Find a mentor, be a mentor 38 Pursue Security Excellence 38 Part 2: Certification Domains 41 Chapter 3: Security and Risk Management 43 Apply Security Governance Principles 44 Alignment of security function to business strategy, goals, mission, and objectives 44 Organizational processes (security executive oversight) 45 Security roles and responsibilities 46 Control frameworks 48 Due care 50 Due diligence 50 Understand and Apply Concepts of Confidentiality, Integrity, and Availability 51 Confidentiality 51 Integrity 52 Availability 52 Compliance 53 Legislative and regulatory compliance 53 Privacy requirements compliance 57 Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context 58 Computer crimes 58 Licensing and intellectual property 72 Import/export controls 74 Trans-border data flow 75 Privacy 75 Data breaches 80 Understand Professional Ethics 82 Exercise the (ISC)2 Code of Professional Ethics 83 Support your organization's code of ethics 83 Develop and Implement Documented Security Policies, Standards, Procedures, and Guidelines 85 Policies 86 Standards (and baselines) 87 Procedures 87 Guidelines 87 Understand Business Continuity Requirements 87 Develop and document project scope and plan 90 Conduct Business Impact Analysis 98 Developing the Business Continuity Plan 106 Implementing the BCP 110 Contribute to Personnel Security Policies 111 Employment candidate screening 112 Employment agreements and policies 114 Employment termination processes 115 Vendor, consultant, and contractor controls 115 Compliance 115 Privacy 116 Understand and Apply Risk Management Concepts 116 Identify threats and vulnerabilities 116 Risk assessment/analysis (treatment) 117 Risk treatment 122 Countermeasure selection 123 Implementation 124 Types of controls 125 Control assessment 127 Monitoring and measurement 129 Asset valuation 129 Reporting 130 Continuous improvement 130 Risk frameworks 131 Understand and Apply Threat Modeling 132 Identifying threats 133 Determining and diagramming potential attacks 134 Performing reduction analysis 135 Technologies and processes to remediate threats 135 Integrate Security Risk Considerations into Supply Chain Management, Mergers, and