Home Page Icon
Home Page
Table of Contents for
Title Page
Close
Title Page
by Robin Abernathy, Troy McMillan
CISSP Cert Guide, 3rd Edition
Cover
About This E-Book
Title Page
Copyright Page
Contents at a Glance
Table of Contents
About the Authors
Dedication
Acknowledgments
About the Technical Reviewer
We Want to Hear from You!
Reader Services
Introduction
The Goals of the CISSP Certification
The Value of the CISSP Certification
The Common Body of Knowledge
Steps to Becoming a CISSP
Facts About the CISSP Exam
About the CISSP Cert Guide, Third Edition
Companion Website
Pearson Test Prep Practice Test Software
Chapter 1 Security and Risk Management
Foundation Topics
Security Terms
Security Governance Principles
Compliance
Legal and Regulatory Issues
Professional Ethics
Security Documentation
Business Continuity
Personnel Security Policies and Procedures
Risk Management Concepts
Geographical Threats
Threat Modeling
Security Risks in the Supply Chain
Security Education, Training, and Awareness
Exam Preparation Tasks
Review All Key Topics
Complete the Tables and Lists from Memory
Define Key Terms
Answer Review Questions
Answers and Explanations
Chapter 2 Asset Security
Foundation Topics
Asset Security Concepts
Identify and Classify Information and Assets
Information and Asset Ownership
Protect Privacy
Asset Retention
Data Security Controls
Information and Asset Handling Requirements
Exam Preparation Tasks
Answer Review Questions
Answers and Explanations
Chapter 3 Security Architecture and Engineering
Foundation Topics
Engineering Processes Using Secure Design Principles
Security Model Concepts
System Security Evaluation Models
Certification and Accreditation
Control Selection Based upon Systems Security Requirements
Security Capabilities of Information Systems
Security Architecture Maintenance
Vulnerabilities of Security Architectures, Designs, and Solution Elements
Vulnerabilities in Web-Based Systems
Vulnerabilities in Mobile Systems
Vulnerabilities in Embedded Devices
Cryptography
Cryptographic Types
Symmetric Algorithms
Asymmetric Algorithms
Public Key Infrastructure
Key Management Practices
Message Integrity
Digital Signatures
Applied Cryptography
Cryptanalytic Attacks
Digital Rights Management
Site and Facility Design
Site and Facility Security Controls
Exam Preparation Tasks
Complete the Tables and Lists from Memory
Answer Review Questions
Answers and Explanations
Chapter 4 Communication and Network Security
Foundation Topics
Secure Network Design Principles
IP Networking
Protocols and Services
Converged Protocols
Wireless Networks
Communications Cryptography
Secure Network Components
Secure Communication Channels
Network Attacks
Exam Preparation Tasks
Answer Review Questions
Answers and Explanations
Chapter 5 Identity and Access Management (IAM)
Foundation Topics
Access Control Process
Physical and Logical Access to Assets
Identification and Authentication Concepts
Identification and Authentication Implementation
Identity as a Service (IDaaS) Implementation
Third-Party Identity Services Integration
Authorization Mechanisms
Provisioning Life Cycle
Access Control Threats
Prevent or Mitigate Access Control Threats
Exam Preparation Tasks
Answer Review Questions
Answers and Explanations
Chapter 6 Security Assessment and Testing
Foundation Topics
Design and Validate Assessment and Testing Strategies
Conduct Security Control Testing
Collect Security Process Data
Analyze and Report Test Outputs
Conduct or Facilitate Security Audits
Exam Preparation Tasks
Answer Review Questions
Answers and Explanations
Chapter 7 Security Operations
Foundation Topics
Investigations
Investigation Types
Logging and Monitoring Activities
Resource Provisioning
Security Operations Concepts
Resource Protection
Incident Management
Detective and Preventive Measures
Patch and Vulnerability Management
Change Management Processes
Recovery Strategies
Disaster Recovery
Testing Disaster Recovery Plans
Business Continuity Planning and Exercises
Physical Security
Personnel Safety and Security
Exam Preparation Tasks
Answer Review Questions
Answers and Explanations
Chapter 8 Software Development Security
Foundation Topics
Software Development Concepts
Security in the System and Software Development Life Cycles
Security Controls in Development
Assess Software Security Effectiveness
Security Impact of Acquired Software
Secure Coding Guidelines and Standards
Exam Preparation Tasks
Review All Key Topics
Define Key Terms
Answer Review Questions
Answers and Explanations
Chapter 9 Final Preparation
Tools for Final Preparation
Suggested Plan for Final Review/Study
Summary
Glossary
Index
Online Elements
Appendix A: Memory Tables
Appendix B: Memory Tables Answer Key
Glossary
Code Snippets
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
About This E-Book
Next
Next Chapter
Copyright Page
CISSP Cert Guide
Third Edition
Robin Abernathy
Troy McMillan
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset