舉報

會員
CISSP in 21 Days(Second Edition)
最新章節(jié):
References and further reading
IfyouareaNetworkingprofessionalaspiringtotaketheCISSPexaminationandobtainthecovetedCISSPcertification(consideredtobetheGoldStandardinInformationSecuritypersonalcertification),thenthisisthebookyouwant.Thisbookassumesthatyoualreadyhavesufficientknowledgeinall10domainsoftheCISSPCBKbywayofworkexperienceandknowledgegainedfromotherstudybooks.
最新章節(jié)
- References and further reading
- Mock test
- Summary
- Exam cram
- An overview of the exam cram and mock test
- Chapter 21. Day 21 – Exam Cram and Mock Test
品牌:中圖公司
上架時間:2021-07-14 10:06:54
出版社:Packt Publishing
本書數(shù)字版權(quán)由中圖公司提供,并由其授權(quán)上海閱文信息技術(shù)有限公司制作發(fā)行
- References and further reading 更新時間:2021-07-14 11:05:00
- Mock test
- Summary
- Exam cram
- An overview of the exam cram and mock test
- Chapter 21. Day 21 – Exam Cram and Mock Test
- Sample questions
- Summary
- References and further reading
- Exam cram
- Overview of exam cram and practice questions
- Chapter 20. Day 20 – Exam Cram and Practice Questions
- Sample questions
- Summary
- Monitoring and testing activities
- Security impact analysis
- Threats and vulnerabilities to application systems
- Security in information technology systems
- Overview
- Chapter 19. Day 19 – Software Development Security - Assessing effectiveness of Software Security
- Sample questions
- Summary
- Security in software development
- Software development life cycle
- Systems engineering
- An overview of software development security
- Chapter 18. Day 18 – Software Development Security - Security in Software Development Life Cycle
- Sample questions
- Summary
- Disaster Recovery Planning (DRP)
- Business Continuity Planning (BCP)
- Incident management and reporting
- Chapter 17. Day 17 – Security Operations - Incident Management and Disaster Recovery
- Sample questions
- Summary
- Computer investigations
- Protecting and securing equipment
- Operations/facility security
- Physical and operations security controls
- The physical security design
- An overview of operations security
- Chapter 16. Day 16 – Security Operations - Foundational Concepts
- Summary
- References and further reading
- Mock test
- Exam cram
- An overview of exam cram and practice questions
- Chapter 15. Day 15 – Exam Cram and Practice Questions
- Sample questions
- Summary
- Reporting test and audit outputs
- Internal and third-party security audits
- Analyzing security process data
- A collection of security process data
- An overview of controlling analyzing auditing and reporting security test data
- Chapter 14. Day 14 – Security Assessment and Testing - Controlling Analyzing Auditing and Reporting
- Sample questions
- Summary
- Security controls
- Security assessment and test strategies
- An overview of security assessment and testing
- Chapter 13. Day 13 – Security Assessment and Testing - Designing Performing Security Assessment and Tests
- Sample questions
- Summary
- Accountability
- Access control attacks and countermeasures
- Identity and provisioning life cycle
- Access management concepts methodologies and techniques
- An overview of access management
- Chapter 12. Day 12 – Identity and Access Management - Access Management Provisioning and Attacks
- Sample questions
- Summary
- Third-party identity services
- Identity as a service
- Identity management principles and implementation
- Physical and logical access to assets
- An overview of identity and access management
- Chapter 11. Day 11 – Identity and Access Management - Identity Management
- Summary
- References and further reading
- Sample questions
- The exam cram
- An overview of exam cram and practice questions
- Chapter 10. Day 10 – Exam Cram and Practice Questions
- Sample questions
- Summary
- Preventing or mitigating communication network attacks
- Attacks on communication networks
- Security in communication channels
- An overview of communication security
- Chapter 9. Day 9 – Communication and Network Security - Communication Security
- Sample questions
- Summary
- OSI layers and security
- Open System Interconnect (OSI) model
- Network architecture protocols and technologies
- An overview of communication and network security
- Chapter 8. Day 8 – Communication and Network Security - Network Security
- Sample questions
- Summary
- Cryptographic standards
- Cryptanalytic attacks
- Key management techniques
- Public Key Infrastructure (PKI)
- Applications and the use of cryptography
- The fundamentals of cryptography
- An overview of cryptography
- Chapter 7. Day 7 – Security Engineering - Cryptography
- Sample questions
- Summary
- Vulnerability assessment and mitigation
- Information security models
- Certification and accreditation
- Assurance
- Secure design principles
- An overview of security design practices models and vulnerability mitigation
- Chapter 6. Day 6 – Security Engineering - Security Design Practices Models and Vulnerability Mitigation
- Summary
- References and further reading
- Sample questions
- An overview of exam cram and practice questions
- Chapter 5. Day 5 – Exam Cram and Practice Questions
- Sample questions
- Summary
- Data handling requirements
- Cryptographic methods to secure data
- DLP controls
- Data Loss Prevention strategies
- Data Loss Prevention (DLP)
- Data security controls
- Overview of asset security - data security controls and handling
- Chapter 4. Day 4 – Asset Security - Data Security Controls and Handling
- Sample questions
- Summary
- Data retention
- Data privacy
- Asset classification and control
- Overview of asset security - information and asset classification
- Chapter 3. Day 3 – Asset Security - Information and Asset Classification
- Sample questions
- Summary
- Information security education training and awareness
- Security risk considerations in acquisitions strategy and practice
- Risk management
- Overview of risk management business continuity and security education
- Chapter 2. Day 2 – Security and Risk Management - Risk Management Business Continuity and Security Education
- Sample questions
- Summary
- Personnel security policies
- Security policies standards procedures and guidelines
- Professional ethics
- Legal and regulatory issues
- Compliance
- Security governance
- Confidentiality Integrity and Availability (CIA)
- Overview of security compliance and policies
- Chapter 1. Day 1 – Security and Risk Management - Security Compliance and Policies
- Customer support
- Reader feedback
- Conventions
- Who this book is for
- What you need for this book
- What this book covers
- Preface
- Free access for Packt account holders
- Why subscribe?
- www.PacktPub.com
- About the Reviewer
- About the Author
- Credits
- 版權(quán)頁
- 封面
- 封面
- 版權(quán)頁
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- Why subscribe?
- Free access for Packt account holders
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Day 1 – Security and Risk Management - Security Compliance and Policies
- Overview of security compliance and policies
- Confidentiality Integrity and Availability (CIA)
- Security governance
- Compliance
- Legal and regulatory issues
- Professional ethics
- Security policies standards procedures and guidelines
- Personnel security policies
- Summary
- Sample questions
- Chapter 2. Day 2 – Security and Risk Management - Risk Management Business Continuity and Security Education
- Overview of risk management business continuity and security education
- Risk management
- Security risk considerations in acquisitions strategy and practice
- Information security education training and awareness
- Summary
- Sample questions
- Chapter 3. Day 3 – Asset Security - Information and Asset Classification
- Overview of asset security - information and asset classification
- Asset classification and control
- Data privacy
- Data retention
- Summary
- Sample questions
- Chapter 4. Day 4 – Asset Security - Data Security Controls and Handling
- Overview of asset security - data security controls and handling
- Data security controls
- Data Loss Prevention (DLP)
- Data Loss Prevention strategies
- DLP controls
- Cryptographic methods to secure data
- Data handling requirements
- Summary
- Sample questions
- Chapter 5. Day 5 – Exam Cram and Practice Questions
- An overview of exam cram and practice questions
- Sample questions
- References and further reading
- Summary
- Chapter 6. Day 6 – Security Engineering - Security Design Practices Models and Vulnerability Mitigation
- An overview of security design practices models and vulnerability mitigation
- Secure design principles
- Assurance
- Certification and accreditation
- Information security models
- Vulnerability assessment and mitigation
- Summary
- Sample questions
- Chapter 7. Day 7 – Security Engineering - Cryptography
- An overview of cryptography
- The fundamentals of cryptography
- Applications and the use of cryptography
- Public Key Infrastructure (PKI)
- Key management techniques
- Cryptanalytic attacks
- Cryptographic standards
- Summary
- Sample questions
- Chapter 8. Day 8 – Communication and Network Security - Network Security
- An overview of communication and network security
- Network architecture protocols and technologies
- Open System Interconnect (OSI) model
- OSI layers and security
- Summary
- Sample questions
- Chapter 9. Day 9 – Communication and Network Security - Communication Security
- An overview of communication security
- Security in communication channels
- Attacks on communication networks
- Preventing or mitigating communication network attacks
- Summary
- Sample questions
- Chapter 10. Day 10 – Exam Cram and Practice Questions
- An overview of exam cram and practice questions
- The exam cram
- Sample questions
- References and further reading
- Summary
- Chapter 11. Day 11 – Identity and Access Management - Identity Management
- An overview of identity and access management
- Physical and logical access to assets
- Identity management principles and implementation
- Identity as a service
- Third-party identity services
- Summary
- Sample questions
- Chapter 12. Day 12 – Identity and Access Management - Access Management Provisioning and Attacks
- An overview of access management
- Access management concepts methodologies and techniques
- Identity and provisioning life cycle
- Access control attacks and countermeasures
- Accountability
- Summary
- Sample questions
- Chapter 13. Day 13 – Security Assessment and Testing - Designing Performing Security Assessment and Tests
- An overview of security assessment and testing
- Security assessment and test strategies
- Security controls
- Summary
- Sample questions
- Chapter 14. Day 14 – Security Assessment and Testing - Controlling Analyzing Auditing and Reporting
- An overview of controlling analyzing auditing and reporting security test data
- A collection of security process data
- Analyzing security process data
- Internal and third-party security audits
- Reporting test and audit outputs
- Summary
- Sample questions
- Chapter 15. Day 15 – Exam Cram and Practice Questions
- An overview of exam cram and practice questions
- Exam cram
- Mock test
- References and further reading
- Summary
- Chapter 16. Day 16 – Security Operations - Foundational Concepts
- An overview of operations security
- The physical security design
- Physical and operations security controls
- Operations/facility security
- Protecting and securing equipment
- Computer investigations
- Summary
- Sample questions
- Chapter 17. Day 17 – Security Operations - Incident Management and Disaster Recovery
- Incident management and reporting
- Business Continuity Planning (BCP)
- Disaster Recovery Planning (DRP)
- Summary
- Sample questions
- Chapter 18. Day 18 – Software Development Security - Security in Software Development Life Cycle
- An overview of software development security
- Systems engineering
- Software development life cycle
- Security in software development
- Summary
- Sample questions
- Chapter 19. Day 19 – Software Development Security - Assessing effectiveness of Software Security
- Overview
- Security in information technology systems
- Threats and vulnerabilities to application systems
- Security impact analysis
- Monitoring and testing activities
- Summary
- Sample questions
- Chapter 20. Day 20 – Exam Cram and Practice Questions
- Overview of exam cram and practice questions
- Exam cram
- References and further reading
- Summary
- Sample questions
- Chapter 21. Day 21 – Exam Cram and Mock Test
- An overview of the exam cram and mock test
- Exam cram
- Summary
- Mock test
- References and further reading 更新時間:2021-07-14 11:05:00