Używamy cookies, aby ułatwić korzystanie z Portalu. Możesz określić warunki przechowywania, dostępu do plików cookies w Twojej przeglądarce. Dowiedz się więcej.
Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying your knowledge to real-world case scenarios and practice exercises. This guide is designed to help make the most of your study time.
Maximize your performance on the exam in these 10 domains:
Access Control
Information Security Governance and Risk Management
Cryptography
Physical (Environmental) Security
Security Architecture and Design
Legal, Regulations, Investigations and Compliance
Telecommunications and Network Security
Business Continuity and Disaster Recovery Planning
Operations Security
Software Development Security
PRACTICE TESTS
Assess your skills with practice tests on CD. You can work through hundreds of questions using multiple testing modes to meet your specific learning needs. You get detailed explanations for right and wrong answers—including a customized learning path that describes how and where to focus your studies.
Pragniemy Państwa zapewnić, iż dokładamy wszelkich możliwych starań, by opisy książek i podręczników, zawarte na naszych stronach internetowych, zawierały bieżące i wiarygodne materiały. Może jednak, mimo naszych wysiłków, w opisy książek wkraść się przekłamanie z naszej strony niezamierzone. Nie może to stanowić powodu do roszczeń. O ile macie Państwo jakiekolwiek pytania lub wątpliwości - prosimy o kontakt z działem handlowym. Tam nasi specjaliści postarają się odpowiedzieć na wszystkie Państwa pytania zanim podejmiecie Państwo decyzje o złożeniu zamówienia. #
Chapter 1 Information security governance and risk management
Where do information security and risk management begin?
Security objectives and controls
Policies and frameworks
Risk assessment and management
Implementing the security program
Exercises
Chapter summary
Chapter review
Answers
Chapter 2 Access control
Trusted path
Choices, choices, choices
Authentication, authorization, and auditing
Exercises
Chapter summary
Chapter review
Answers
Chapter 3 Cryptography
What is cryptography?
The basics of cryptography
Historical review of cryptography
Cryptographic keys
Hashing algorithm/message digest
Strong cryptography
Symmetric key algorithms and cryptosystems
Asymmetric key algorithms and cryptosystems
Cryptography in use
Attacks on cryptography
Exercises
Chapter summary
Chapter review
Answers
Chapter 4 Physical (environmental) security
Physical security in a layered defense model
Planning the design of a secure facility
Designing a physical security program
Fire prevention, detection, and suppression
Exercises
Chapter summary
Chapter review
Answers
Chapter 5 Security architecture and design
Identifying architectural boundaries
Computer hardware and operating systems
Application architecture
Frameworks for security
Exercises
Chapter summary
Chapter review
Answers
Chapter 6 Legal, regulations, investigations, and compliance
Computer crimes
A global perspective of laws regarding computer crime
Exercises
Chapter summary
Chapter review
Answers
Chapter 7 Telecommunications and network security
The Open Systems Interconnection (OSI) Model
Transmission media and technologies
Network devices
Protocols, protocols, and more protocols
PAN, LAN, MAN, WAN, and more
Wireless networking
Attacking the network
Exercises
Chapter summary
Chapter review
Answers
Chapter 8 Business continuity and disaster recovery planning
Disaster recovery plan and the business continuity plan
Develop the plans: Proposals
Implementing the approved plans
Exercises
Chapter summary
Chapter review
Answers
Chapter 9 Software development security
The need for improved security in software
Maturity models
Programming concepts
Database systems
Attacks on applications
Exercises
Chapter summary
Chapter review
Answers
Chapter 10 Operations security
The activities of operations
Data management
Attacks on operations
Exercises
Chapter summary
Chapter review
Answers
Appendix Additional resources
Additional resources available from (ISC)2
Miscellaneous additional resources
Chapter 1: Information security governance and risk management
Chapter 2: Access control
Chapter 3: Cryptography
Chapter 4: Physical (environmental) security
Chapter 5: Security architecture and design
Chapter 6: Legal, regulations, investigations and compliance
Chapter 7: Telecommunications and network security
Chapter 8: Business continuity and disaster recovery planning