Certified Information Systems Security Professional (CISSP) Exam Guide
eBook - ePub

Certified Information Systems Security Professional (CISSP) Exam Guide

Master CISSP with hands-on bonus content and practical coverage of all eight exam domains

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Certified Information Systems Security Professional (CISSP) Exam Guide

Master CISSP with hands-on bonus content and practical coverage of all eight exam domains

About this book

"If you're preparing for the CISSP exam, this book is a must-have. It clearly covers all domains in a structured way, simplifying complex topics. The exam-focused approach ensures you're targeting the right areas, while practical examples reinforce your learning. The exam tips and readiness drills at the end of each chapter are particularly valuable. Highly recommended for CISSP aspirants!" Bill DeLong, CISSP | CISM | CISA | IT Cybersecurity Specialist, DCMA | Cybersecurity Advisor, US Coast Guard

Key Features

  • Explore up-to-date content meticulously aligned with the latest CISSP exam objectives
  • Understand the value of governance, risk management, and compliance
  • Unlocks access to web-based exam prep resources including mock exams, flashcards and exam tips
  • Authored by seasoned professionals with extensive experience in cybersecurity and CISSP training

Book Description

The (ISC)2 CISSP exam evaluates the competencies required to secure organizations, corporations, military sites, and government entities. The comprehensive CISSP certification guide offers up-to-date coverage of the latest exam syllabus, ensuring you can approach the exam with confidence, fully equipped to succeed. Complete with interactive flashcards, invaluable exam tips, and self-assessment questions, this CISSP book helps you build and test your knowledge of all eight CISSP domains. Detailed answers and explanations for all questions will enable you to gauge your current skill level and strengthen weak areas. This guide systematically takes you through all the information you need to not only pass the CISSP exam, but also excel in your role as a security professional. Starting with the big picture of what it takes to secure the organization through asset and risk management, it delves into the specifics of securing networks and identities. Later chapters address critical aspects of vendor security, physical security, and software security. By the end of this book, you'll have mastered everything you need to pass the latest CISSP certification exam and have this valuable desktop reference tool for ongoing security needs.

What you will learn

  • Get to grips with network communications and routing to secure them best
  • Understand the difference between encryption and hashing
  • Know how and where certificates and digital signatures are used
  • Study detailed incident and change management procedures
  • Manage user identities and authentication principles tested in the exam
  • Familiarize yourself with the CISSP security models covered in the exam
  • Discover key personnel and travel policies to keep your staff secure
  • Discover how to develop secure software from the start

Who this book is for

This book is for professionals seeking to obtain the ISC2 CISSP certification. You should have experience in at least two of the following areas: GRC, change management, network administration, systems administration, physical security, database management, or software development. Additionally, a solid understanding of network administration, systems administration, and change management is essential.

]]>

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Certified Information Systems Security Professional (CISSP) Exam Guide by Ted Jordan,Ric Daza,Hinne Hettema in PDF and/or ePUB format, as well as other popular books in Computer Science & Certification Guides in Computer Science. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Certified Information Systems Security Professional (CISSP) Exam Guide
  2. Contributors
  3. Preface
  4. Becoming a CISSP
  5. Pre-Assessment Test
  6. Ethics, Security Concepts, and Governance Principles
  7. Compliance, Regulation, and Investigations
  8. Security Policies and Business Continuity
  9. Risk Management, Threat Modeling, SCRM, and SETA
  10. Asset and Privacy Protection
  11. Information and Asset Handling
  12. Secure Design Principles and Controls
  13. Architecture Vulnerabilities and Cryptography
  14. Facilities and Physical Security
  15. Network Architecture Security
  16. Securing Communication Channels
  17. Identity, Access Management, and Federation
  18. Identity Management Implementation
  19. Designing and Conducting Security Assessments
  20. Designing and Conducting Security Testing
  21. Planning for Security Operations
  22. Security Operations
  23. Disaster Recovery
  24. Business Continuity, Personnel, and Physical Security
  25. Software Development Life Cycle Security
  26. Software Development Security Controls
  27. Securing Software Development
  28. Secure Coding Guidelines, Third-Party Software, and Databases
  29. Accessing the Online Practice Resources
  30. Other Books You May Enjoy