55,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 1-2 Wochen
  • Broschiertes Buch

Master the skills to safeguard information assets in a dynamic digital landscape and achieve your CISSP certification Purchase of this book unlocks access to online exam resources such as practice questions, flashcards, exam tips, and the eBook PDF Key Features: - Explore up-to-date content meticulously aligned with the latest CISSP exam objectives - Understand the value of governance, risk management, and compliance - Assess your exam readiness with practice questions that match exam-level difficulty Book Description: The (ISC)2 CISSP exam evaluates the competencies required to secure…mehr

Produktbeschreibung
Master the skills to safeguard information assets in a dynamic digital landscape and achieve your CISSP certification Purchase of this book unlocks access to online exam resources such as practice questions, flashcards, exam tips, and the eBook PDF Key Features: - Explore up-to-date content meticulously aligned with the latest CISSP exam objectives - Understand the value of governance, risk management, and compliance - Assess your exam readiness with practice questions that match exam-level difficulty Book Description: The (ISC)2 CISSP exam evaluates the competencies required to secure organizations, corporations, military sites, and government entities. The comprehensive CISSP certification guide offers up-to-date coverage of the latest exam syllabus, ensuring you can approach the exam with confidence, fully equipped to succeed. Complete with interactive flashcards, invaluable exam tips, and self-assessment questions, this book helps you build and test your knowledge of all eight CISSP domains. Detailed answers and explanations for all questions will enable you to gauge your current skill level and strengthen weak areas. This guide systematically takes you through all the information you need to not only pass the CISSP exam, but also excel in your role as a security professional. Starting with the big picture of what it takes to secure the organization through asset and risk management, it delves into the specifics of securing networks and identities. Later chapters address critical aspects of vendor security, physical security, and software security. By the end of this book, you'll have mastered everything you need to pass the latest CISSP certification exam and have this valuable desktop reference tool for ongoing security needs. What You Will Learn: - Get to grips with network communications and routing to secure them best - Understand the difference between encryption and hashing - Know how and where certificates and digital signatures are used - Study detailed incident and change management procedures - Manage user identities and authentication principles tested in the exam - Familiarize yourself with the CISSP security models covered in the exam - Discover key personnel and travel policies to keep your staff secure - Discover how to develop secure software from the start Who this book is for: This book is for professionals seeking to obtain the ISC2 CISSP certification. You should have experience in at least two of the following areas: GRC, change management, network administration, systems administration, physical security, database management, or software development. Additionally, a solid understanding of network administration, systems administration, and change management is essential. Table of Contents - Ethics, Security Concepts, and Governance Principles - Compliance, Regulation, and Investigations - Security Policies and Business Continuity - Risk Management, Threat Modeling, SCRM, and SETA - Asset and Privacy Protection - Information and Asset Handling - Secure Design Principles and Controls - Architecture Vulnerabilities and Cryptography - Facilities and Physical Security - Network Architecture Security - Securing Communication Channels - Identity, Access Management, and Federation - Identity Management Implementation - Designing and Conducting Security Assessments - Designing and Conducting Security Testing - Planning for Security Operations - Security Operations - Disaster Recovery - Business Continuity, Personnel, and Physical Security (N.B. Please use the Read Sample option to see further chapters)
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Autorenporträt
Ted Jordan, M.S., CISSP, Linux+, is a seasoned cybersecurity professional with over 30 years of experience. His career includes work with NASA, General Motors, Silicon Graphics, Sun Microsystems, Fakespace, and AM General. Ted has trained over 2,500 students to achieve their CISSP, Security+, and Linux+ certifications with The Training Camp and Learning Tree. He is also the author of five books on Linux and CISSP. In his free time, Ted enjoys a good game of tennis or watching the complexities of carom three-cushion billiards.