CISSP Cert Guide
Home > Computing and Information Technology > Computer certification > CISSP Cert Guide: (Certification Guide)
CISSP Cert Guide: (Certification Guide)

CISSP Cert Guide: (Certification Guide)


     0     
5
4
3
2
1



International Edition


X
About the Book

In this comprehensive study guide, two leading experts help you master all the topics you need to know to succeed on the latest CISSP exam and advance your career in IT security. Their concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. Every feature of this book supports both efficient exam preparation and long-term mastery: Opening Topics Lists identify the topics you need to learn in each chapter and list (ISC)²’s official exam objectives Key Topic figures, tables, and lists call attention to the information that’s most crucial for exam success Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions…going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field’s essential terminology This study guide helps you master all the topics on the latest CISSP exam, deepening your knowledge of: Security and Risk Management Asset Security Security Architecture and Engineering Communication and Network Security Identity and Access Management (IAM) Security Assessment and Testing Security Operations Software Development Security

Table of Contents:
    Introduction xlix Chapter 1 Security and Risk Management 5     Foundation Topics 6     Security Terms 6     Security Governance Principles 11     Compliance 40     Legal and Regulatory Issues 42     Investigation Types 65     Professional Ethics 70     Security Documentation 72     Business Continuity 76     Personnel Security Policies and Procedures 89     Risk Management Concepts 95     Geographical Threats 133     Threat Modeling 142     Security Risks in the Supply Chain 148     Security Education, Training, and Awareness 153     Exam Preparation Tasks 155     Review All Key Topics 155     Complete the Tables and Lists from Memory 157     Define Key Terms 157     Answer Review Questions 158     Answers and Explanations 164 Chapter 2 Asset Security 171     Foundation Topics 172     Asset Security Concepts 172     Identify and Classify Information and Assets 175     Information and Asset Handling Requirements 183     Provision Resources Securely 185     Data Life Cycle 186     Asset Retention 201     Data Security Controls 203     Exam Preparation Tasks 211     Review All Key Topics 211     Define Key Terms 211     Answer Review Questions 212     Answers and Explanations 213 Chapter 3 Security Architecture and Engineering 219     Foundation Topics 220     Information Systems Life Cycle 220     Engineering Processes Using Secure Design Principles 223     Security Model Concepts 231     System Security Evaluation Models 255     Certification and Accreditation 267     Control Selection Based on Systems Security Requirements 268     Security Capabilities of Information Systems 269     Security Architecture Maintenance 272     Vulnerabilities of Security Architectures, Designs, and Solution Elements 273     Vulnerabilities in Web-Based Systems 296     Vulnerabilities in Mobile Systems 299     Vulnerabilities in Embedded Systems 304     Cryptographic Solutions 305     Cryptographic Types 317     Symmetric Algorithms 325     Asymmetric Algorithms 332     Public Key Infrastructure and Digital Certificates 335     Key Management Practices 343     Message Integrity 347     Digital Signatures and Non-repudiation 354     Applied Cryptography 354     Cryptanalytic Attacks 355     Digital Rights Management 360     Site and Facility Design 362     Site and Facility Security Controls 368     Exam Preparation Tasks 379     Review All Key Topics 379     Complete the Tables and Lists from Memory 381     Define Key Terms 381     Answer Review Questions 382     Answers and Explanations 387 Chapter 4 Communication and Network Security 391     Foundation Topics 392     Secure Network Design Principles 392     IP Networking 403     Protocols and Services 435     Converged Protocols 443     Wireless Networks 448     Communications Cryptography 468     Secure Network Components 473     Secure Communication Channels 520     Network Attacks 535     Exam Preparation Tasks 547     Review All Key Topics 547     Define Key Terms 548     Answer Review Questions 550     Answers and Explanations 555 Chapter 5 Identity and Access Management (IAM) 561     Foundation Topics 562     Access Control Process 562     Physical and Logical Access to Assets 563     Identification and Authentication Concepts 568     Identification and Authentication Implementation 588     Identity as a Service (IDaaS) Implementation 602     Third-Party Identity Services Integration 602     Authorization Mechanisms 603     Provisioning Life Cycle 612     Access Control Threats 618     Prevent or Mitigate Access Control Threats 625     Exam Preparation Tasks 625     Review All Key Topics 625     Define Key Terms 626     Answer Review Questions 627     Answers and Explanations 630 Chapter 6 Security Assessment and Testing 635     Foundation Topics 636     Design and Validate Assessment and Testing Strategies 636     Conduct Security Control Testing 639     Collect Security Process Data 655     Analyze Test Outputs and Generate a Report 659     Conduct or Facilitate Security Audits 659     Exam Preparation Tasks 661     Review All Key Topics 661     Define Key Terms 662     Answer Review Questions 662     Answers and Explanations 665 Chapter 7 Security Operations 673     Foundation Topics 674     Investigations 674     Logging and Monitoring Activities 690     Configuration and Change Management 697     Security Operations Concepts 702     Resource Protection 707     Incident Management 719     Detective and Preventive Measures 724     Patch and Vulnerability Management 729     Recovery Strategies 729     Disaster Recovery 747     Testing Disaster Recovery Plans 751     Business Continuity Planning and Exercises 753     Physical Security 754     Personnel Safety and Security 760     Exam Preparation Tasks 763     Review All Key Topics 763     Define Key Terms 764     Answer Review Questions 764     Answers and Explanations 768 Chapter 8 Software Development Security 773     Foundation Topics 774     Software Development Concepts 774     Security in the System and Software Development Life Cycle 783     Security Controls in Development 806     Assess Software Security Effectiveness 815     Security Impact of Acquired Software 817     Exam Preparation Tasks 825     Review All Key Topics 825     Define Key Terms 825     Answer Review Questions 826     Answers and Explanations 830 Chapter 9 Final Preparation 835     Tools for Final Preparation 835     Suggested Plan for Final Review/Study 839     Summary 840   Online Elements Appendix A Memory Tables Appendix B Memory Tables Answer Key Glossary 9780135343999, TOC, 7/24/24

About the Author :
Robin M. Abernathy has been working in the IT certification preparation industry for more than 20 years. She has written and edited certification preparation materials for many (ISC)2, Microsoft, CompTIA, PMI, ITIL, ISACA, and GIAC certifications and holds multiple IT certifications from these vendors. Robin provides training on computer hardware and software, networking, security, and project management. Over the past decade, she has ventured into the traditional publishing industry by technically editing several publications and co-authoring Pearson’s CISSP Cert Guide and CASP+ Cert Guide and authoring Pearson’s Project+ Cert Guide. She presents at technical conferences and hosts webinars on IT certification topics.   Dr. Darren R. Hayes has close to 20 years of academic and professional experience in computer security and digital forensics. He has authored numerous publications in these fields, including A Practical Guide to Digital Forensics Investigations, which is published by Pearson. He is Associate Professor at Pace University, where he is the founder and director of the Seidenberg Digital Forensics Research Lab. He holds numerous IT certifications in security and digital forensics and holds a PhD from Sapienza University in Italy and a doctorate from Pace University. Darren is also a professional digital forensics examiner and has supported both criminal and civil investigations over the past decade and a half. He has also been declared an expert witness in federal court.


Best Sellers


Product Details
  • ISBN-13: 9780135343999
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson IT Certification
  • Height: 230 mm
  • No of Pages: 944
  • Series Title: Certification Guide
  • Weight: 1565 gr
  • ISBN-10: 0135343992
  • Publisher Date: 25 Feb 2025
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Spine Width: 45 mm
  • Width: 185 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
CISSP Cert Guide: (Certification Guide)
Pearson Education (US) -
CISSP Cert Guide: (Certification Guide)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

CISSP Cert Guide: (Certification Guide)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!