Home Page Icon
Home Page
Table of Contents for
End User License Agreement
Close
End User License Agreement
by Peter H. Gregory, Lawrence C. Miller
CISSP For Dummies, 6th Edition
Cover
Introduction
About This Book
Foolish Assumptions
Icons Used in This Book
Beyond the Book
Where to Go from Here
Part 1: Getting Started with CISSP Certification
Chapter 1: (ISC)2 and the CISSP Certification
About (ISC)2 and the CISSP Certification
You Must Be This Tall to Ride This Ride (and Other Requirements)
Preparing for the Exam
Registering for the Exam
About the CISSP Examination
After the Examination
Chapter 2: Putting Your Certification to Good Use
Networking with Other Security Professionals
Being an Active (ISC)2 Member
Considering (ISC)2 Volunteer Opportunities
Becoming an Active Member of Your Local Security Chapter
Spreading the Good Word about CISSP Certification
Using Your CISSP Certification to Be an Agent of Change
Earning Other Certifications
Pursue Security Excellence
Part 2: Certification Domains
Chapter 3: Security and Risk Management
Apply Security Governance Principles
Understand and Apply Concepts of Confidentiality, Integrity, and Availability
Compliance
Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
Understand Professional Ethics
Develop and Implement Documented Security Policies, Standards, Procedures, and Guidelines
Understand Business Continuity Requirements
Contribute to Personnel Security Policies
Understand and Apply Risk Management Concepts
Understand and Apply Threat Modeling
Integrate Security Risk Considerations into Supply Chain Management, Mergers, and Acquisitions
Establish and Manage Information Security Education, Training, and Awareness
Chapter 4: Asset Security
Classify Information and Supporting Assets
Determine and Maintain Ownership
Protect Privacy
Ensure Appropriate Retention
Determine Data Security Controls
Establish Handling Requirements
Chapter 5: Security Architecture and Engineering
Implement and Manage Engineering Processes Using Secure Design Principles
Understand the Fundamental Concepts of Security Models
Select Controls Based upon Systems Security Requirements
Understand Security Capabilities of Information Systems
Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Assess and Mitigate Vulnerabilities in Web-Based Systems
Assess and Mitigate Vulnerabilities in Mobile Systems
Assess and Mitigate Vulnerabilities in Embedded Devices
Apply Cryptography
Apply Security Principles to Site and Facility Design
Implement Site and Facility Security Controls
Chapter 6: Communication and Network Security
Implement Secure Design Principles in Network Architectures
Secure Network Components
Design and Establish Secure Communication Channels
Prevent or Mitigate Network Attacks
Chapter 7: Identity and Access Management
Control Physical and Logical Access to Assets
Manage Identification and Authentication of People, Devices, and Services
Integrate Identity-as-a-Service
Integrate Third-Party Identity Services
Implement and Manage Authorization Mechanisms
Prevent or Mitigate Access Control Attacks
Manage the Identity and Access Provisioning Lifecycle
Chapter 8: Security Assessment and Testing
Design and Validate Assessment and Test Strategies
Conduct Security Control Testing
Collect Security Process Data
Analyze Test Output and Generate Reports
Conduct or Facilitate Security Audits
Chapter 9: Security Operations
Understand and Support Investigations
Understand Requirements for Investigation Types
Conduct Logging and Monitoring Activities
Securely Provisioning Resources
Understand and Apply Foundational Security Operations Concepts
Apply Resource Protection Techniques
Conduct Incident Management
Operate and Maintain Detective and Preventive Measures
Implement and Support Patch and Vulnerability Management
Understand and Participate in Change Management Processes
Implement Recovery Strategies
Implement Disaster Recovery (DR) Processes
Test Disaster Recovery Plans
Participate in Business Continuity (BC) Planning and Exercises
Implement and Manage Physical Security
Address Personnel Safety and Security Concerns
Chapter 10: Software Development Security
Understand and Integrate Security in the Software Development Lifecycle
Identify and Apply Security Controls in Development Environments
Assess the Effectiveness of Software Security
Assess Security Impact of Acquired Software
Define and Apply Secure Coding Guidelines and Standards
Part 3: The Part of Tens
Chapter 11: Ten Test-Planning Tips
Know Your Learning Style
Get a Networking Certification First
Register Now!
Make a 60-Day Study Plan
Get Organized and Read!
Join a Study Group
Take Practice Exams
Take a CISSP Training Seminar
Adopt an Exam-Taking Strategy
Take a Breather
Chapter 12: Ten Test-Day Tips
Get a Good Night’s Rest
Dress Comfortably
Eat a Good Meal
Arrive Early
Bring a Photo ID
Bring Snacks and Drinks
Bring Prescription and Over-the-Counter Medications
Leave Your Mobile Devices Behind
Take Frequent Breaks
Guess — as a Last Resort
Glossary
About the Authors
Advertisement Page
Connect with Dummies
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index
WILEY END USER LICENSE AGREEMENT
Go to
www.wiley.com/go/eula
to access Wiley’s ebook EULA.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset