Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Peter Gregory, Lawrence Miller
CISSP For Dummies, 4th Edition
Table of Contents
Title Page
Introduction
How This Book Is Organized
How the Chapters Are Organized
Icons Used in This Book
Where to Go from Here
Part I: Certification Basics
Chapter 1: (ISC)2 and the CISSP Certification
About (ISC)2 and the CISSP Certification
You Must Be This Tall to Ride (and Other Requirements)
Registering for the Exam
Preparing for the Exam
About the CISSP Examination
Chapter 2: The Common Body of Knowledge (CBK)
Telecommunications and Network Security
Information Security Governance and Risk Management
Software Development Security
Cryptography
Security Architecture and Design
Security Operations
Business Continuity and Disaster Recovery Planning
Legal, Regulations, Investigations, and Compliance
Physical (Environmental) Security
Chapter 3: Putting Your Certification to Good Use
Following the (ISC)² Code of Ethics
Keeping Your Certification Current
Remaining an Active (ISC)² Member
Considering (ISC)² Volunteer Opportunities
Becoming an Active Member of Your Local Security Chapter
Spreading the Good Word about CISSP Certification
Using Your CISSP Certification to Be an Agent of Change
Earning Other Certifications
Pursue Security Excellence
Part II: Domains
Chapter 4: Access Control
Basic Concepts of Access Control
Control Types and Purposes
Access Control Services
Categories of Access Control
Access Control Attacks
Evaluating and Testing Access Controls
Identity and Access Provisioning Lifecycle
Data Network Types
The OSI Reference Model
The TCP/IP Model
Network Security
Wireless Network (WLAN) Security
E-mail, Web, Facsimile, and Telephone Security
Network Attacks and Countermeasures
Chapter 6: Information Security Governance and Risk Management
Data Classification
Mission Statements, Goals, and Objectives
Policies, Standards, Guidelines, and Procedures
Information Security Governance Practices
Personnel Security Policies and Practices
Risk Management Concepts
Security Education, Training, and Awareness Programs
Chapter 7: Software Development Security
Distributed Applications
Object-Oriented Environments
Databases
Knowledge-Based Systems
Systems Development Life Cycle
Application Security Controls
System Attack Methods
Perpetrators
Chapter 8: Cryptography
The Role of Cryptography in Information Security
Cryptography Basics
Cryptography Alternatives
Not Quite the Metric System: Symmetric and Asymmetric Key Systems
Message Authentication
Public Key Infrastructure (PKI)
Key Management Functions
Key Escrow and Key Recovery
E-Mail Security Applications
Internet Security Applications
Methods of Attack
Chapter 9: Security Architecture and Design
Computer Architecture
Security Architecture
Security Countermeasures
Security Models
Evaluation Criteria
System Certification and Accreditation
Chapter 10: Security Operations
Administrative Management and Control
Security Operations Concepts
Threats and Countermeasures
Security Controls
Audit Trails
Monitoring
Defining Disastrous Events
How BCP and DRP Work Together
Understanding BCP Project Elements
Determining BCP Scope
Conducting the Business Impact Assessment
Identifying the Elements of a Business Continuity Plan
Developing the BC Plan
Implementing the Business Continuity Plan
Disaster Recovery Planning
Developing a Disaster Recovery Plan
Testing the Disaster Recovery Plan
Creating competitive advantage
Chapter 12: Legal, Regulations, Investigations, and Compliance
Major Types and Classifications of Law
Major Categories of Computer Crime
Types of Laws Relevant to Computer Crimes
Investigations
Professional Ethics
Chapter 13: Physical (Environmental) Security
Physical Security Threats
Site and Facility Design Considerations
Bringing It All Together
Part III: The Part of Tens
Chapter 14: Ten (Okay, Eight) Test Preparation Tips
Get a Networking Certification First
Make a 60-Day Study Plan
Get Organized and READ!
Join a Study Group
Take a CISSP Review Seminar
Take a Breather
Chapter 15: Ten Test-Day Tips
Get a Good Night’s Rest
Dress Comfortably
Eat a Good Breakfast
Arrive Early
Bring a Photo ID
Bring Prescription and Over-the-Counter Medications
Leave Your Cell Phone and Pager Behind
Take Frequent Breaks
Chapter 16: Ten More Sources for Security Certifications
ASIS International
Check Point
Cisco
CWNP
DRI International
EC-Council
ISACA
(ISC)2
SANS/GIAC
Chapter 17: Ten Security Websites
CISSP Open Study Guide
Carnegie Mellon SEI CERT Coordination Center
Common Vulnerabilities and Exposures
Dark Reading
(ISC)2
National Institute of Standards and Technology
PCI Security Standards Council
The SANS Institute
WindowSecurity Network Security Library
Chapter 18: Ten Essential Reference Books
Part IV: Appendixes
Appendix A: Practice CISSP Exam
Appendix B: Glossary
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Table of Contents
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset