CISSP: Certified Information Systems Security Professional Study Guide. 6th Edition

  • ID: 2293160
  • Book
  • 936 Pages
  • John Wiley and Sons Ltd
1 of 4

Includes Real–World Scenarios, Written Exercises, and Access to Exam Prep Software Featuring:

  • +Three Full–Length Practice Exams
  • +Over 1,000 Practice Questions
  • +Electronic Flashcards

Develop the Skills to Achieve CISSP Certification

If your goal is to become a certified security professional, then the CISSP certification and this study guide are for you. This practical guide walks you through each of the updated CISSP Common Body of Knowledge domains to provide you with a clear understanding of the material. You′ll learn helpful tips along the way to help you prepare for each section of the exam and develop practical skills that you can effectively apply on the job. Inside, find:

Full coverage of all exam objectives in a systematic approach, so you can be confident you′re getting the instruction you need for the exam

Practical written labs to reinforce critical skills

Real–world scenarios that put what you′ve learned in the context of actual job roles

Challenging review questions in each chapter to prepare you for exam day

Exam Essentials, a key feature in each chapter that identifies critical areas you must become proficient in before taking the exam

A detailed objective map that shows the reader where each of the BoK domains is covered in the book, so you can track your exam prep objective by objective

Note: Product cover images may vary from those shown
2 of 4
Introduction xxxv

Assessment Test xliv

Chapter 1 Access Control 1

Chapter 2 Access Control Attacks and Monitoring 47

Chapter 3 Secure Network Architecture and Securing Network Components 87

Chapter 4 Secure Communications and Network Attacks 151

Chapter 5 Security Governance Concepts, Principles, and Policies 205

Chapter 6 Risk and Personnel Management 239

Chapter 7 Software Development Security 275

Chapter 8 Malicious Code and Application Attacks 327

Chapter 9 Cryptography and Symmetric Key Algorithms 361

Chapter 10 PKI and Cryptographic Applications 403

Chapter 11 Principles of Security Models, Design, and Capabilities 437

Chapter 12 Security Architecture Vulnerabilities, Threats, and Countermeasures 477

Chapter 13 Security Operations 531

Chapter 14 Incident Management 571

Chapter 15 Business Continuity Planning 617

Chapter 16 Disaster Recovery Planning 643

Chapter 17 Laws, Regulations, and Compliance 681

Chapter 18 Incidents and Ethics 713

Chapter 19 Physical Security Requirements 745

Appendix A Answers to Review Questions 781

Appendix B Answers to Written Labs 815

Appendix C About the Additional Study Tools 829

Index 833

Note: Product cover images may vary from those shown
3 of 4

Loading
LOADING...

4 of 4
James Michael Stewart
Mike Chapple
Darril Gibson
Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown
Adroll
adroll