Buy ISC2 SSCP Systems Security Certified Practitioner Official Study Guide
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Network security > ISC2 SSCP Systems Security Certified Practitioner Official Study Guide: (Sybex Study Guide)
ISC2 SSCP Systems Security Certified Practitioner Official Study Guide: (Sybex Study Guide)

ISC2 SSCP Systems Security Certified Practitioner Official Study Guide: (Sybex Study Guide)


     0     
5
4
3
2
1



Available


X
About the Book

The only SSCP study guide officially approved by (ISC)2

The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures.

This comprehensive Official Study Guide—the only study guide officially approved by (ISC)2—covers all objectives of the seven SSCP domains.

  • Security Operations and Administration
  • Access Controls
  • Risk Identification, Monitoring, and Analysis
  • Incident Response and Recovery
  • Cryptography
  • Network and Communications Security
  • Systems and Application Security

This updated Third Edition covers the SSCP exam objectives effective as of November 2021. Much of the new and more advanced knowledge expected of an SSCP is now covered in a new chapter "Cross-Domain Challenges." If you're an information security professional or student of cybersecurity looking to tackle one or more of the seven domains of the SSCP, this guide gets you prepared to pass the exam and enter the information security workforce with confidence.



Table of Contents:

Introduction xxv

Assessment Test xlviii

Part I Getting Started as an SSCP 1

Chapter 1 The Business Case for Decision Assurance and Information Security 3

Information: The Lifeblood of Business 4

Policy, Procedure, and Process: How Business Gets Business Done 10

Who Runs the Business? 20

Summary 24

Exam Essentials 24

Review Questions 26

Chapter 2 Information Security Fundamentals 33

The Common Needs for Privacy, Confidentiality, Integrity, and Availability 34

Training and Educating Everybody 47

SSCPs and Professional Ethics 47

Summary 49

Exam Essentials 50

Review Questions 54

Part II Integrated Risk Management and Mitigation 61

Chapter 3 Integrated Information Risk Management 63

It’s a Dangerous World 64

The Four Faces of Risk 75

Getting Integrated and Proactive with Information Defense 83

Risk Management: Concepts and Frameworks 89

Risk Assessment 95

Four Choices for Limiting or Containing Damage 107

Summary 114

Exam Essentials 114

Review Questions 120

Chapter 4 Operationalizing Risk Mitigation 127

From Tactical Planning to Information Security Operations 128

Operationalizing Risk Mitigation: Step by Step 134

The Ongoing Job of Keeping Your Baseline Secure 164

Ongoing, Continuous Monitoring 174

Reporting to and Engaging with Management 182

Summary 183

Exam Essentials 183

Review Questions 189

Part III The Technologies of Information Security 197

Chapter 5 Communications and Network Security 199

Trusting Our Communications in a Converged World 200

Internet Systems Concepts 206

Two Protocol Stacks, One Internet 218

Wireless Network Technologies 240

IP Addresses, DHCP, and Subnets 243

IPv4 vs. IPv6: Important Differences and Options 248

CIANA Layer by Layer 251

Securing Networks as Systems 262

Summary 273

Exam Essentials 273

Review Questions 280

Chapter 6 Identity and Access Control 285

Identity and Access: Two Sides of the Same CIANA+PS Coin 286

Identity Management Concepts 288

Access Control Concepts 295

Network Access Control 305

Implementing and Scaling IAM 310

User and Entity Behavior Analytics (UEBA) 329

Zero Trust Architectures 332

Summary 333

Exam Essentials 334

Review Questions 343

Chapter 7 Cryptography 349

Cryptography: What and Why 350

Building Blocks of Digital Cryptographic Systems 358

Keys and Key Management 367

“Why Isn’t All of This Stuff Secret?” 373

Cryptography and CIANA+PS 375

Public Key Infrastructures 381

Applying Cryptography to Meet Different Needs 399

Managing Cryptographic Assets and Systems 405

Measures of Merit for Cryptographic Solutions 407

Attacks and Countermeasures 408

PKI and Trust: A Recap 418

On the Near Horizon 420

Summary 423

Exam Essentials 424

Review Questions 429

Chapter 8 Hardware and Systems Security 435

Infrastructure Security Is Baseline Management 437

Securing the Physical Context 442

Infrastructures 101 and Threat Modeling 444

Endpoint Security 457

Malware: Exploiting the Infrastructure’s Vulnerabilities 462

Privacy and Secure Browsing 466

“The Sin of Aggregation” 469

Updating the Threat Model 469

Managing Your Systems’ Security 470

Summary 471

Exam Essentials 472

Review Questions 478

Chapter 9 Applications, Data, and Cloud Security 483

It’s a Data-Driven World…At the Endpoint 484

Software as Appliances 487

Applications Lifecycles and Security 490

CIANA+PS and Applications Software Requirements 498

Application Vulnerabilities 504

“Shadow IT:” The Dilemma of the User as Builder 507

Information Quality and Information Assurance 511

Protecting Data in Motion, in Use, and at Rest 514

Into the Clouds: Endpoint App and Data Security Considerations 522

Legal and Regulatory Issues 533

Countermeasures: Keeping Your Apps and Data Safe and Secure 535

Summary 536

Exam Essentials 537

Review Questions 548

Part IV People Power: What Makes or Breaks Information Security 555

Chapter 10 Incident Response and Recovery 557

Defeating the Kill Chain One Skirmish at a Time 558

Harsh Realities of Real Incidents 564

Incident Response Framework 566

Preparation 571

Detection and Analysis 578

Containment and Eradication 584

Recovery: Getting Back to Business 587

Post-Incident Activities 590

 

Summary 594

Exam Essentials 595

Review Questions 601

Chapter 11 Business Continuity via Information Security and People Power 607

What Is a Disaster? 608

Surviving to Operate: Plan for It! 609

Timelines for BC/DR Planning and Action 615

Options for Recovery 617

Cloud- Based “Do- Over” Buttons for Continuity, Security, and Resilience 623

People Power for BC/DR 626

Security Assessment: For BC/DR and Compliance 633

Converged Communications: Keeping Them Secure During BC/DR Actions 634

Summary 637

Exam Essentials 637

Review Questions 641

Chapter 12 Cross-Domain Challenges 647

Operationalizing Security Across the Immediate and Longer Term 648

Supply Chains, Security, and the SSCP 657

Other Dangers on the Web and Net 662

On Our Way to the Future 666

Enduring Lessons 672

Your Next Steps 677

At the Close 678

Exam Essentials 678

Review Questions 683

Appendix Answers to Review Questions 689

Chapter 1: The Business Case for Decision Assurance and Information Security 690

Chapter 2: Information Security Fundamentals 693

Chapter 3: Integrated Information Risk Management 695

Chapter 4: Operationalizing Risk Mitigation 698

Chapter 5: Communications and Network Security 701

Chapter 6: Identity and Access Control 704

Chapter 7: Cryptography 707

Chapter 8: Hardware and Systems Security 709

Chapter 9: Applications, Data, and Cloud Security 712

Chapter 10: Incident Response and Recovery 715

Chapter 11: Business Continuity via Information Security and People Power 718

Chapter 12: Cross- Domain Challenges 722

Index 727



About the Author :

ABOUT THE AUTHOR

Michael S. Wills, SSCP, CISSP, CAMS, is Assistant Professor of Applied Information Technologies in the College of Business at the Embry-Riddle Aeronautical University’s Worldwide Campus. He has many years of experience designing, building, and operating cutting-edge secure systems, and wrote (ISC)2s official training courses for both the SSCP and CISSP. He is also the creator of ERAU’s Master of Science in Information Security and Assurance degree program.


Best Sellers


Product Details
  • ISBN-13: 9781119854982
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Sybex Inc.,U.S.
  • Height: 234 mm
  • No of Pages: 816
  • Returnable: N
  • Spine Width: 43 mm
  • Width: 188 mm
  • ISBN-10: 1119854989
  • Publisher Date: 04 Apr 2022
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Series Title: Sybex Study Guide
  • Weight: 1502 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
ISC2 SSCP Systems Security Certified Practitioner Official Study Guide: (Sybex Study Guide)
John Wiley & Sons Inc -
ISC2 SSCP Systems Security Certified Practitioner Official Study Guide: (Sybex Study Guide)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

ISC2 SSCP Systems Security Certified Practitioner Official Study Guide: (Sybex Study Guide)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!