Eleventh Hour CISSP®
3rd Edition
Study Guide
Description
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted.
The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.
Key Features
- Completely updated for the most current version of the exam’s Common Body of Knowledge
- Provides the only guide you need for last-minute studying
- Answers the toughest questions and highlights core topics
- Streamlined for maximum efficiency of study, making it ideal for professionals updating their certification or for those taking the test for the first time
Readership
Computer and Information Systems Managers, Systems Administrators, Application Developers, Network Administrators, Security Managers, Security Analysts, Directors of Security, Security Auditors, Security Engineers, Compliance Specialists
Table of Contents
- Author biography
- Chapter 1: Domain 1: Security risk management
- Abstract
- Introduction
- Cornerstone Information Security Concepts
- Legal and Regulatory Issues
- Security and Third Parties
- Ethics
- Information Security Governance
- Access Control Defensive Categories and Types
- Risk Analysis
- Types of Attackers
- Summary of Exam Objectives
- Top Five Toughest Questions
- Answers
- Chapter 2: Domain 2: Asset security
- Abstract
- Introduction
- Classifying Data
- Ownership
- Memory and Remanence
- Data Destruction
- Determining Data Security Controls
- Summary of Exam Objectives
- Top Five Toughest Questions
- Answers
- Chapter 3: Domain 3: Security engineering
- Abstract
- Introduction
- Security Models
- Secure System Design Concepts
- Secure Hardware Architecture
- Secure Operating System and Software Architecture
- Virtualization and Distributed Computing
- System Vulnerabilities, Threats, and Countermeasures
- Cornerstone Cryptographic Concepts
- Types of Cryptography
- Cryptographic Attacks
- Implementing Cryptography
- Perimeter Defenses
- Site Selection, Design, and Configuration
- System Defenses
- Environmental Controls
- Summary of Exam Objectives
- Top Five Toughest Questions
- Answers
- Chapter 4: Domain 4: Communication and network security
- Abstract
- Introduction
- Network Architecture and Design
- Secure Network Devices and Protocols
- Secure Communications
- Summary of Exam Objectives
- Top Five Toughest Questions
- Answers
- Chapter 5: Domain 5: Identity and access management (controlling access and m
Details
- No. of pages:
- 238
- Language:
- English
- Copyright:
- © Syngress 2017
- Published:
- 23rd September 2016
- Imprint:
- Syngress
- Paperback ISBN:
- 9780128112489
- eBook ISBN:
- 9780128113776