Używamy cookies, aby ułatwić korzystanie z Portalu. Możesz określić warunki przechowywania, dostępu do plików cookies w Twojej przeglądarce. Dowiedz się więcej.
strona główna Strona główna | Nowości | Promocje | Zapowiedzi Twoje konto | Zarejestruj | Schowek | Kontakt | Pomoc
mapa działów
Szukaj: szukanie zaawansowane
Koszyk
Książki \ Egzaminy

CISSP Rapid Review Język: 2

978-0-7356-6678-8

Cena Brutto: 126.00

Cena netto: 120.00

Ilość:
Wersja: Drukowana
Autor Darril Gibson
Liczba_stron 300
Wydawnictwo Microsoft Press
Oprawa miękka
Data_Wydania 2013-01-01

CISSP

Rapid Review


   Assess your readiness for the CISSP Exam—and quickly identify where you need to focus and practice. This practical, streamlined guide provides objective overviews, exam tips, 'need-to-know' checklists, review questions, and a list of valuable resources—all designed to help evaluate and reinforce your preparation.

Bolster your exam prep with a Rapid Review of these objectives:

  • Information Security Governance and Risk Management
  • Access Control
  • Cryptography
  • Physical (Environmental) Security
  • Security Architecture and Design
  • Legal, Regulations, Investigations and Compliance
  • Telecommunications and Network Security
  • Business Continuity and Disaster Recovery Planning
  • Software Development Security
  • Security Operations

This book is an ideal complement to the in-depth training of the Microsoft Press 2-in-1 Training Kit for the CISSP Exam and other exam-prep resources.

  1. Chapter 1 Access Control

    1. Objective 1.1: Control access by applying the following concepts/methodologies/techniques

    2. Objective 1.2: Understand access control attacks

    3. Objective 1.3: Assess effectiveness of access controls

    4. Objective 1.4: Identity and access provisioning lifecycle (e.g., provisioning, review, revocation)

    5. Answers

  2. Chapter 2 Telecommunications and Network Security

    1. Objective 2.1: Understand secure network architecture and design (e.g., IP & non-IP protocols, segmentation)

    2. Objective 2.2: Securing network components

    3. Objective 2.3: Establish secure communication channels (e.g., VPN, TLS/SSL, VLAN)

    4. Objective 2.4: Understand network attacks (e.g., DDoS, spoofing)

    5. Answers

  3. Chapter 3 Information Security Governance & Risk Management

    1. Objective 3.1: Understand and align security function to goals, mission, and objectives of the organization

    2. Objective 3.2: Understand and apply security governance

    3. Objective 3.3: Understand and apply concepts of confidentiality, integrity, and availability

    4. Objective 3.4: Develop and implement security policy

    5. Objective 3.5: Manage the information lifecycle (e.g., classification, categorization, and ownership)

    6. Objective 3.6: Manage third-party governance (e.g., on-site assessment, document exchange and review, process/policy review)

    7. Objective 3.7: Understand and apply risk management concepts

    8. Objective 3.8: Manage personnel security

    9. Objective 3.9: Develop and manage security education, training, and awareness

    10. Objective 3.10: Manage the security function

    11. Answers

  4. Chapter 4 Software Development Security

    1. Objective 4.1: Understand and apply security in the software development lifecycle

    2. Objective 4.2: Understand the environment and security controls

    3. Objective 4.3: Assess the effectiveness of software security

    4. Answers

  5. Chapter 5 Cryptography

    1. Objective 5.1: Understand the application and use of cryptography

    2. Objective 5.2: Understand the cryptographic lifecycle (e.g., cryptographic limitations, algorithm/protocol governance)

    3. Objective 5.3: Understand encryption concepts

    4. Objective 5.4: Understand key management processes

    5. Objective 5.5: Understand digital signatures

    6. Objective 5.6: Understand non-repudiation

    7. Objective 5.7: Understand methods of cryptanalytic attacks

    8. Objective 5.8: Use cryptography to maintain network security

    9. Objective 5.9: Use cryptography to maintain application security

    10. Objective 5.10: Understand Public Key Infrastructure (PKI)

    11. Objective 5.11: Understand certificate related issues

    12. Objective 5.12: Understand information hiding alternatives (e.g., steganography, watermarking)

    13. Answers

  6. Chapter 6 Security Architecture & Design

    1. Objective 6.1: Understand the fundamental concepts of security models (e.g., Confidentiality, Integrity, and Multi-level Models)

    2. Objective 6.2: Understand the components of information systems security evaluation models

    3. Objective 6.3: Understand security capabilities of information systems (e.g., memory protection, virtualization, Trusted Platform Module)

    4. Objective 6.4: Understand the vulnerabilities of security architectures

    5. Objective 6.5: Understand software and system vulnerabilities and threats

    6. Objective 6.6: Understand countermeasure principles (e.g., defense in depth)

    7. Answers

  7. Chapter 7 Operations Security

    1. Objective 7.1: Understand security operations concepts

    2. Objective 7.2: Employ resource protection

    3. Objective 7.3: Manage incident response

    4. Objective 7.4: Implement preventative measures against attacks (e.g., malicious code, zero-day exploit, denial of service)

    5. Objective 7.5: Implement and support patch and vulnerability management

    6. Objective 7.6: Understand change and configuration management (e.g., versioning, base lining)

    7. Objective 7.7: Understand system resilience and fault tolerance requirements

    8. Answers

  8. Chapter 8 Business Continuity & Disaster Recovery Planning

    1. Objective 8.1: Understand business continuity requirements

    2. Objective 8.2: Conduct business impact analysis

    3. Objective 8.3: Develop a recovery strategy

    4. Objective 8.4: Understand disaster recovery process

    5. Objective 8.5: Exercise, assess, and maintain the plan (e.g., version control, distribution)

    6. Answers

  9. Chapter 9 Legal, Regulations, Investigations, and Compliance

    1. Objective 9.1: Understand legal issues that pertain to information security internationally

    2. Objective 9.2: Understand professional ethics

    3. Objective 9.3: Understand and support investigations

    4. Objective 9.4: Understand forensic procedures

    5. Objective 9.5: Understand compliance requirements and procedures

    6. Objective 9.6: Ensure security in contractual agreements and procurement processes (e.g., cloud computing, outsourcing, vendor governance)

    7. Answers

  10. Chapter 10 Physical (Environmental) Security

    1. Objective 10.1: Understand site and facility design considerations

    2. Objective 10.2: Support the implementation and operation of perimeter security (e.g., physical access control and monitoring, audit trails/access logs)

    3. Objective 10.3: Support the implementation and operation of internal security (e.g., escort requirements/visitor control, keys and locks)

    4. Objective 10.4: Support the implementation and operation of facilities security (e.g., technology convergence)

    5. Objective 10.5: Support the protection and securing of equipment

    6. Objective 10.6: Understand personnel privacy and safety (e.g., duress, travel, monitoring)

    7. Answers

powrót
 
Produkty Podobne
Exam Ref MD-101 Managing Modern Desktops
Exam Ref MD-100 Windows 10
Exam Ref MS-100 Microsoft 365 Identity and Services
Exam Ref MS-101 Microsoft 365 Mobility and Security
Exam Ref AZ-103 Microsoft Azure Administrator
Exam Ref AZ-900 Microsoft Azure Fundamentals
AWS Certified Cloud Practitioner (CLF-C01) Cert Guide
AWS Certified Solutions Architect - Associate (SAA-C01) Cert Guide
Exam Ref 70-698 Installing and Configuring Windows 10, 2nd Edition
Exam Ref 70-778 Analyzing and Visualizing Data with Microsoft Power BI
Więcej produktów