
- 208 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved in securing assets and to find ways to mitigate those risks. Information security jobs include firewall engineers, penetration testers, auditors, and the like. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. The first domain provides information about risk analysis and mitigation, and it discusses security governance. The second domain discusses techniques of access control, which is the basis for all security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental in operating the system and software security components. Domain 6 is one of the critical domains in the Common Body of Knowledge, the Business Continuity Planning and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domain 7, Domain 8 and Domain 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework for determining laws about information system.- The only guide you need for last-minute studying- Answers the toughest questions and highlights core topics- Can be paired with any other study guide so you are completely prepared
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover image
- Title page
- Table of Contents
- Syngress Eleventh Hour Series
- Copyright
- About the Authors
- Chapter 1. Domain 1: Information Security Governance and Risk Management
- Chapter 2. Domain 2: Access Control
- Chapter 3. Domain 3: Cryptography
- Chapter 4. Domain 4: Physical (Environmental) Security
- Chapter 5. Domain 5: Security Architecture and Design
- Chapter 6. Domain 6: Business Continuity and Disaster Recovery Planning
- Chapter 7. Domain 7: Telecommunications and Network Security
- Chapter 8. Domain 8: Application Development Security
- Chapter 9. Domain 9: Operations Security
- Chapter 10. Domain 10: Legal, Regulations, Investigations, and Compliance
- Glossary
- Index