Book description
Learn, prepare, and practice for CISSP exam success with this Cert Guide from Pearson IT Certification, a leader in IT certification learning.
Master the latest CISSP exam topics
Assess your knowledge with chapter-ending quizzes
Review key concepts with exam preparation tasks
Practice with realistic exam questions
Get practical guidance for test taking strategies
CISSP Cert Guide, Fourth Edition is a comprehensive exam study guide. Leading IT certification experts Robin Abernathy and Darren Hayes share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.
The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan.
The companion website contains the powerful Pearson Test Prep practice test software engine, complete with hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most.
Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this CISSP study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time.
This study guide helps you master all the topics on the CISSP exam, including
Security and Risk Management
Asset Security
Security Architecture and Engineering
Communication and Network Security
Identity and Access Management (IAM)
Security Assessment and Testing
Security Operations
Software Development Security
Table of contents
- Cover Page
- About This eBook
- Title Page
- Copyright Page
- Pearson’s Commitment to Diversity, Equity, and Inclusion
- Contents at a Glance
- Table of Contents
- About the Authors
- Dedications
- Acknowledgments
- About the Technical Reviewers
- We Want to Hear from You!
- Reader Services
- Introduction
-
Chapter 1. Security and Risk Management
- Security Terms
- Security Governance Principles
- Compliance
- Legal and Regulatory Issues
- Investigation Types
- Professional Ethics
- Security Documentation
- Business Continuity
- Personnel Security Policies and Procedures
- Risk Management Concepts
- Geographical Threats
- Threat Modeling
- Security Risks in the Supply Chain
- Security Education, Training, and Awareness
- Review All Key Topics
- Complete the Tables and Lists from Memory
- Define Key Terms
- Answer Review Questions
- Answers and Explanations
- Chapter 2. Asset Security
-
Chapter 3. Security Architecture and Engineering
- Engineering Processes Using Secure Design Principles
- Security Model Concepts
- System Security Evaluation Models
- Certification and Accreditation
- Control Selection Based on Systems Security Requirements
- Security Capabilities of Information Systems
- Security Architecture Maintenance
- Vulnerabilities of Security Architectures, Designs, and Solution Elements
- Vulnerabilities in Web-Based Systems
- Vulnerabilities in Mobile Systems
- Vulnerabilities in Embedded Systems
- Cryptographic Solutions
- Cryptographic Types
- Symmetric Algorithms
- Asymmetric Algorithms
- Public Key Infrastructure and Digital Certificates
- Key Management Practices
- Message Integrity
- Digital Signatures and Non-repudiation
- Applied Cryptography
- Cryptanalytic Attacks
- Digital Rights Management
- Site and Facility Design
- Site and Facility Security Controls
- Review All Key Topics
- Complete the Tables and Lists from Memory
- Define Key Terms
- Answer Review Questions
- Answers and Explanations
- Chapter 4. Communication and Network Security
-
Chapter 5. Identity and Access Management (IAM)
- Access Control Process
- Physical and Logical Access to Assets
- Identification and Authentication Concepts
- Identification and Authentication Implementation
- Identity as a Service (IDaaS) Implementation
- Third-Party Identity Services Integration
- Authorization Mechanisms
- Provisioning Life Cycle
- Access Control Threats
- Prevent or Mitigate Access Control Threats
- Review All Key Topics
- Define Key Terms
- Answer Review Questions
- Answers and Explanations
- Chapter 6. Security Assessment and Testing
-
Chapter 7. Security Operations
- Investigations
- Logging and Monitoring Activities
- Configuration and Change Management
- Security Operations Concepts
- Resource Protection
- Incident Management
- Detective and Preventive Measures
- Patch and Vulnerability Management
- Recovery Strategies
- Disaster Recovery
- Testing Disaster Recovery Plans
- Business Continuity Planning and Exercises
- Physical Security
- Personnel Safety and Security
- Review All Key Topics
- Define Key Terms
- Answer Review Questions
- Answers and Explanations
-
Chapter 8. Software Development Security
- Software Development Concepts
- Security in the System and Software Development Life Cycle
- Security Controls in Development
- Assess Software Security Effectiveness
- Security Impact of Acquired Software
- Secure Coding Guidelines and Standards
- Review All Key Topics
- Define Key Terms
- Answer Review Questions
- Answers and Explanations
- Chapter 9. Final Preparation
- Index
- Appendix A. Memory Tables
- Appendix B. Memory Tables Answer Key
- Glossary
- Access Card
- Where are the companion content files? - Register
- Inside Front Cover
- Inside Back Cover
- Code Snippets
Product information
- Title: CISSP Cert Guide
- Author(s):
- Release date: November 2022
- Publisher(s): Pearson IT Certification
- ISBN: 9780137507863
You might also like
book
CISSP (ISC)² Certification Practice Exams and Tests
Pass the Certified Information Systems Security Professional Exam with our all-new set of practice exams designed …
book
CASP+ CompTIA Advanced Security Practitioner Study Guide, 4th Edition
Prepare to succeed in your new cybersecurity career with the challenging and sought-after CASP+ credential In …
book
CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition
Up-to-date coverage of every topic on the CEH v11 exam Thoroughly updated for CEH v11 exam …
book
CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide
The official Cisco Press Certification Guide designed to help candidates prepare for the new SNCF 300-710 …