Używamy cookies, aby ułatwić korzystanie z Portalu. Możesz określić warunki przechowywania, dostępu do plików cookies w Twojej przeglądarce. Dowiedz się więcej.
strona główna Strona główna | Nowości | Promocje | Zapowiedzi Twoje konto | Zarejestruj | Schowek | Kontakt | Pomoc
mapa działów
Szukaj: szukanie zaawansowane
Koszyk
Książki \ Egzaminy

CISSP Training Kit Język: 2

978-0-7356-5782-3

Cena Brutto: 286.65

Cena netto: 273.00

Ilość:
Wersja: Drukowana
Autor David R. Miller
Liczba_stron 816, CD
Wydawnictwo Microsoft Press
Data_Wydania 2014-01-14

CISSP

Training Kit


Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying your knowledge to real-world case scenarios and practice exercises. This guide is designed to help make the most of your study time.

Maximize your performance on the exam in these 10 domains:

  • Access Control
  • Information Security Governance and Risk Management
  • Cryptography
  • Physical (Environmental) Security
  • Security Architecture and Design
  • Legal, Regulations, Investigations and Compliance
  • Telecommunications and Network Security
  • Business Continuity and Disaster Recovery Planning
  • Operations Security
  • Software Development Security

PRACTICE TESTS

Assess your skills with practice tests on CD. You can work through hundreds of questions using multiple testing modes to meet your specific learning needs. You get detailed explanations for right and wrong answers—including a customized learning path that describes how and where to focus your studies.




Pragniemy Państwa zapewnić, iż dokładamy wszelkich możliwych starań, by opisy książek i podręczników, zawarte na naszych stronach internetowych, zawierały bieżące i wiarygodne materiały. Może jednak, mimo naszych wysiłków, w opisy książek wkraść się przekłamanie z naszej strony niezamierzone. Nie może to stanowić powodu do roszczeń. O ile macie Państwo jakiekolwiek pytania lub wątpliwości - prosimy o kontakt z działem handlowym. Tam nasi specjaliści postarają się odpowiedzieć na wszystkie Państwa pytania zanim podejmiecie Państwo decyzje o złożeniu zamówienia.
#

  1. Chapter 1 Information security governance and risk management

    1. Where do information security and risk management begin?

    2. Security objectives and controls

    3. Policies and frameworks

    4. Risk assessment and management

    5. Implementing the security program

    6. Exercises

    7. Chapter summary

    8. Chapter review

    9. Answers

  2. Chapter 2 Access control

    1. Trusted path

    2. Choices, choices, choices

    3. Authentication, authorization, and auditing

    4. Exercises

    5. Chapter summary

    6. Chapter review

    7. Answers

  3. Chapter 3 Cryptography

    1. What is cryptography?

    2. The basics of cryptography

    3. Historical review of cryptography

    4. Cryptographic keys

    5. Hashing algorithm/message digest

    6. Strong cryptography

    7. Symmetric key algorithms and cryptosystems

    8. Asymmetric key algorithms and cryptosystems

    9. Cryptography in use

    10. Attacks on cryptography

    11. Exercises

    12. Chapter summary

    13. Chapter review

    14. Answers

  4. Chapter 4 Physical (environmental) security

    1. Physical security in a layered defense model

    2. Planning the design of a secure facility

    3. Designing a physical security program

    4. Fire prevention, detection, and suppression

    5. Exercises

    6. Chapter summary

    7. Chapter review

    8. Answers

  5. Chapter 5 Security architecture and design

    1. Identifying architectural boundaries

    2. Computer hardware and operating systems

    3. Application architecture

    4. Frameworks for security

    5. Exercises

    6. Chapter summary

    7. Chapter review

    8. Answers

  6. Chapter 6 Legal, regulations, investigations, and compliance

    1. Computer crimes

    2. A global perspective of laws regarding computer crime

    3. Exercises

    4. Chapter summary

    5. Chapter review

    6. Answers

  7. Chapter 7 Telecommunications and network security

    1. The Open Systems Interconnection (OSI) Model

    2. Transmission media and technologies

    3. Network devices

    4. Protocols, protocols, and more protocols

    5. PAN, LAN, MAN, WAN, and more

    6. Wireless networking

    7. Attacking the network

    8. Exercises

    9. Chapter summary

    10. Chapter review

    11. Answers

  8. Chapter 8 Business continuity and disaster recovery planning

    1. Disaster recovery plan and the business continuity plan

    2. Develop the plans: Proposals

    3. Implementing the approved plans

    4. Exercises

    5. Chapter summary

    6. Chapter review

    7. Answers

  9. Chapter 9 Software development security

    1. The need for improved security in software

    2. Maturity models

    3. Programming concepts

    4. Database systems

    5. Attacks on applications

    6. Exercises

    7. Chapter summary

    8. Chapter review

    9. Answers

  10. Chapter 10 Operations security

    1. The activities of operations

    2. Data management

    3. Attacks on operations

    4. Exercises

    5. Chapter summary

    6. Chapter review

    7. Answers

  1. Appendix Additional resources

    1. Additional resources available from (ISC)2

    2. Miscellaneous additional resources

    3. Chapter 1: Information security governance and risk management

    4. Chapter 2: Access control

    5. Chapter 3: Cryptography

    6. Chapter 4: Physical (environmental) security

    7. Chapter 5: Security architecture and design

    8. Chapter 6: Legal, regulations, investigations and compliance

    9. Chapter 7: Telecommunications and network security

    10. Chapter 8: Business continuity and disaster recovery planning

    11. Chapter 9: Software development security

    12. Chapter 10: Operations security

  2. Appendix About the author

powrót
 
Produkty Podobne
Egzamin 70-742: Tożsamość w Windows Server 2016
Exam Ref 70-768 Developing SQL Data Models
Exam Ref 70-761 Querying Data with Transact-SQL
MTA 98-349: Windows Operating System Fundamentals uCertify Course and Lab
Exam Ref 70-742 Identity with Windows Server 2016
Egzamin 70-741: Windows Server 2016 – Praca w sieci
Egzamin 70-744: Zabezpieczanie systemu Windows Server 2016
Exam Ref 70-740 Installation, Storage and Compute with Windows Server 2016
CCNA Cloud Official Cert Guide Library (Exams CLDFND 210-451 and CLDADM 210-455)
CCNA Data Center DCICT 200-155 Official Cert Guide
Więcej produktów