CISSP study guide / [electronic resource]
by Conrad, Eric [author.]; Misenar, Seth [author.]; Feldman, Joshua [author.].
Material type: BookPublisher: Waltham, MA : Syngress/Elsevier, 2016.Edition: 3rd ed.Description: 1 online resource (xxi, 599 pages) : illustrations.ISBN: 9780128028209; 0128028203; 0128024372; 9780128024379.Subject(s): Electronic data processing personnel -- Certification | Computer networks -- Examinations -- Study guides | Computer networks -- Examinations | Electronic data processing personnel -- Certification | COMPUTERS / Computer Literacy | COMPUTERS / Computer Science | COMPUTERS / Data Processing | COMPUTERS / Hardware / General | COMPUTERS / Information Technology | COMPUTERS / Machine Theory | COMPUTERS / Reference | Study guides | Electronic booksOnline resources: ScienceDirectIncludes bibliographical references and index.
Print version record.
This third edition provides readers with information on the CISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. The eight domains are covered completely and as concisely as possible, allowing users to ace the exam. Each domain has its own chapter that includes a specially-designed pedagogy to help users pass the exam, including clearly-stated exam objectives, unique terms and definitions, exam warnings, "learning by example" modules, hands-on exercises, and chapter ending questions. It covers all of the new information in the Common Body of Knowledge updated in January 2015, and also provides two exams, tiered end-of-chapter questions for a gradual learning curve, and a complete self-test appendix. -- Edited summary from book.
Introduction -- Domain 1: security and risk management (e.g., security, risk, compliance, law, regulations, business continuity) -- Domain 2: asset security (protecting security of assets) -- Domain 3: security engineering (engineering and management of security) -- Domain 4: communication and network security (designing and protecting network security) -- Domain 5: identity and access management (controlling access and managing identity) -- Domain 6: security assessment and testing (designing, performing, and analyzing security testing) -- Domain 7: security operations (e.g., foundational concepts, investigations, incident management, disaster recovery) -- Domain 8: software development security (understanding, applying, and enforcing software security)
There are no comments for this item.