
Eleventh Hour CISSP®
Study Guide
Description
Key Features
- All new Fourth Edition updated for the most current version of the exam’s Common Body of Knowledge
- The only guide you need for last-minute studying
- Answers the toughest questions and highlights core topics
- No fluff - streamlined for maximum efficiency of study – perfect for professionals who are updating their certification or taking the test for the first time
Readership
Table of Contents
1. Introduction
2. How to take the CISSP Exam
3. Domain 1: Access Control
Confidentiality, integrity, and availability
Identity, authentication, authorization, and accountability
Categories and Controls
Types of authentication
Access control attacks
Access provisioning lifecycle4. Domain 2: Telecommunications and Network Security
Network Security Concepts
The OSI and TCP/IP models
Network devices
End-point security
Network attacks, detection, and mitigation
Defense in depth
Protocols
Remote access5. Domain 3: Information Security Governance and Risk Management
Policies, Procedures, Standards, Guidelines and Baselines
Defense-in-depth
Risk Management formulas
Quantitative and Qualitative Risk Analysis
Total cost of ownership and return on investment
Outsourcing and offshoring
Certification and accreditation
Control frameworks
Managing 3rd-party governance6. Domain 4: Software Development Security
Software-based Controls
The Software Development Lifecycle
Object oriented systems
Artificial intelligence7. Domain 5: Cryptography
Crypto history
Cryptography Concepts and Algorithms
Symmetric encryption, Asymmetric encryption, and hashes
Digital Signatures
Cryptanalysis
Steganography and watermarking
Non-repudiation8. Domain 6: Security Architecture and Design
Security architecture principles
Trusted Computing Base
The security kernel and reference monitor
Secure hardware
Covert channels
XML, SAML and OWASP9. Domain 7: Security Operations
Backups and Media
Change Control
Controls Categories
Object marking, handling, an storage
Separation of duties and rotation of duties
Operational attacks
Incident response10. Domain 8: Business Continuity and Disaster Recovery Planning
The BCP process
Business Impact Analysis and Maximum Allowable Downtime
Hot, warm, and cold sites
BCP/DRP testing
Site restoration Activities
Databases and data warehousing11. Domain 9: Legal, Regulations, Investigations, and Compliance
Professional Ethics
Major Legal Systems
Criminal, Civil, and Regulatory Law
Laws and Information Security
Forensic investigations
Cloud computing12. Domain 10: Physical (Environmental) Security
Physical controls
Environmental controls
Perimeter security
Locks, alarms and cameras
Guards and dogs
Site Location
Product details
- No. of pages: 260
- Language: English
- Copyright: © Syngress 2022
- Published: December 1, 2022
- Imprint: Syngress
- Paperback ISBN: 9780443186882
About the Authors
Eric Conrad
Affiliations and Expertise
Seth Misenar
Seth is pursuing a Master of Science degree in Information Security Engineering from the SANS Technology Institute and holds a Bachelor of Science degree from Millsaps College, Jackson, Mississippi.