The Official (ISC)2 CISSP CBK Reference
eBook - PDF

The Official (ISC)2 CISSP CBK Reference

Arthur J. Deane, Aaron Kraus

Share book
  1. English
  2. PDF
  3. Available on iOS & Android
eBook - PDF

The Official (ISC)2 CISSP CBK Reference

Arthur J. Deane, Aaron Kraus

Book details
Book preview
Table of contents
Citations

About This Book

The only official, comprehensive reference guide to the CISSP

Thoroughly updated for 2021 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC) 2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks. Vendor neutral and backed by (ISC) 2, the CISSP credential meets the stringent requirements of ISO/IEC Standard 17024.

This CBK covers the current eight domains of CISSP with the necessary depth to apply them to the daily practice of information security. Revised and updated by a team of subject matter experts, this comprehensive reference covers all of the more than 300 CISSP objectives and sub-objectives in a structured format with:

  • Common and good practices for each objective
  • Common vocabulary and definitions
  • References to widely accepted computing standards
  • Highlights of successful approaches through case studies

Whether you've earned your CISSP credential or are looking for a valuable resource to help advance your security career, this comprehensive guide offers everything you need to apply the knowledge of the most recognized body of influence in information security.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is The Official (ISC)2 CISSP CBK Reference an online PDF/ePUB?
Yes, you can access The Official (ISC)2 CISSP CBK Reference by Arthur J. Deane, Aaron Kraus in PDF and/or ePUB format, as well as other popular books in Informatique & Cybersécurité. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Sybex
Year
2021
ISBN
9781119790013
Edition
6
1
Security 
and Risk 
Management
DOMAIN 
OF 
THE 
CISSP 
Common 
Body 
of 
Knowledge 
(CBK) 
covers 
the 
founda-
tional 
topics 
of 
building 
and 
managing 
risk-based 
information 
security 
program. 
This 
domain 
covers 
wide 
variety 
of 
concepts 
upon 
which 
the 
remainder 
of 
the 
CBK 
builds.
Before 
diving 
into 
the 
heart 
of 
security 
and 
risk 
management 
concepts, 
this 
chapter 
begins 
with 
coverage 
of 
professional 
ethics 
and 
how 
they 
apply 
in 
the 
field 
of 
information 
security. 
Understanding 
your 
responsibilities 
as 
security 
professional 
is 
equally 
as 
important 
as 
knowing 
how 
to 
apply 
the 
security 
con-
cepts. 
We 
then 
move 
on 
to 
topics 
related 
to 
understanding 
your 
organization’s 
mission, 
strategy, 
goals, 
and 
business 
objectives, 
and 
evaluating 
how 
to 
properly 
satisfy 
your 
organization’s 
business 
needs 
securely.
Understanding 
risk 
management, 
and 
how 
its 
concepts 
apply 
to 
information 
security, 
is 
one 
of 
the 
most 
important 
things 
you 
should 
take 
away 
from 
this 
chapter. 
We 
describe 
risk 
management 
concepts 
and 
explain 
how 
to 
apply 
them 
within 
your 
organization’s 
security 
program. 
In 
addition, 
understanding 
relevant 
legal, 
regulatory, 
and 
compliance 
requirements 
is 
critical 
component 
of 
every 
information 
security 
program. 
Domain 
1 includes 
coverage 
of 
concepts 
such 
as 
DOMAIN 
1
CISSP
®

Table of contents