Certified Information Systems Security Professional - CISSP (ISC2) Certification Guide
Packt Publishing Limited (Verlag)
978-1-78961-735-1 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
About This Book
* Comprehensive guide to learn cybersecurity concepts across various domains like Cryptography
* Labs and tests based guide to help you gain the confidence to crack the CISSP certification exam
* Tips and tricks for security professionals and aspirants
Who This Book Is For
The book is for professionals seeking to gain the CISSP (ISC2) Certification. Readers are expected to have experience in at least two of the following areas: GRC, Change Management, Network Administration, Systems Administration, Physical Security, Database Management, Software Development.
What You Will Learn
* Understand the difference between Encryption and Hashing
* Know how and where Certificates and Digital Signatures are used
* Learn to develop secure software the first time
* Get to know the important malware topics to help pass the exam
* Dig into network communications and routing to secure them in the best way
* Manage user identities and authentication principles key to exam
* Know the CISSP security models used for the exam
* Discover key personnel and travel policies to keep your staff secure
* Understand the value of governance, risk management, and compliance
* Learn detailed incident and change management procedures important to exam
* Use forensics to assure that legal incidents are properly managed
In Detail
The CISSP certification is the most prominent certification in the security domains, authorized by the globally-recognized ISC2 organization. Prepare for CISSP and join over 100,000 professionals certified with CISSP. Certified Information Systems Security Professional Certification was the first technology-related credential to earn ANSI/ISO/IEC Standard 17024 accreditation, making it the Gold Standard within the information security industry. This makes CISSP one of the most sought after certifications and a globally recognized standard of achievement.
The book will start off with the different security methodologies, including the fundamentals of security which will help you understand the major safeguards and countermeasures to harden the exposure footprint. These set of chapters will cover CIA, encryption and hashing techniques, PKI, digital signatures, certificates and the various access control processes. Next, you will learn about the common threats and their mitigations related to computing systems, personnel and via networks. You will cover information on malware and application attacks, DDoS attacks, physical and internal threats and concepts of social engineering. Going forward, you will get to know about the security architectures ranging from desktop computers, the cloud and networks, their vulnerabilities and how to secure them. The last two sections will cover concepts on Governance, Risk and Compliance and Forensic Events. At the end, you will get to practise two comprehensive mock tests before attempting the final CISSP exam.
Mr. Ted Jordan has more than 25 years of UNIX, IRIX, Solaris, and Linux experience. He learned C language and UNIX administration while completing his Masters at UC Berkeley, and started his career at General Motors as an undergraduate of Kettering University in Flint, MI. He also did engineering with Silicon Graphics, The CAVE Virtual Reality, and SUN Microsystems. He trains and holds the CISSP, LPIC-1, Linux+, SUSE Linux Administrator, Network+, A+, Security+, Solaris Administrator, and Certified Ethical Hacker certifications. He is Founder and President of two successful tech startup companies including Funutation Tekademy Inc which teaches kids to program robots and write video games through their franchise operators. Ted lives with his family near Milwaukee, WI and enjoys tennis, golf, and karaoke.
Erscheint lt. Verlag | 31.5.2019 |
---|---|
Verlagsort | Birmingham |
Sprache | englisch |
Maße | 191 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Weitere Themen ► Zertifizierung | |
ISBN-10 | 1-78961-735-9 / 1789617359 |
ISBN-13 | 978-1-78961-735-1 / 9781789617351 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich