Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Steven Hernandez, Adam Gordon
The Official (ISC)2 Guide to the SSCP CBK, 3rd Edition
Domain 1: Access Controls Notes
Objectives
Access Control Concepts
Implementing Access Controls
Security Architecture and Models
Implementing Authentication Mechanisms—Identification, Authentication, Authorization, and Accountability
Comparing Internetwork Trust Architectures
Trust Direction
Administering the Identity Management Lifecycle
Summary
Sample Questions
Domain 2: Security Operations
Objectives
Code of Ethics
Security Program Objectives: The C-I-A Triad and Beyond
Disclosure Controls: Data Leakage Prevention
Summary
Sample Questions
Notes
Domain 3: Risk, Identification, Monitoring, and Analysis
Objectives
Responding to an Audit
Security Assessment Activities
Operating and Maintaining Monitoring Systems
Going Hands-on—Risk Identification Exercise
Summary
Sample Questions
Notes
Domain 4: Incident Response and Recovery
Objectives
Incident Handling
Recovery and Business Continuity
Summary
Sample Questions
Notes
Domain 5: Cryptography
Objectives
Encryption Concepts
Data Sensitivity and Regulatory Requirements
Going Hands-On with Cryptography—Cryptography Exercise
Summary
Sample Questions
End Notes
Domain 6: Networks and Communications Security
Objectives
Security Issues Related to Networks
Telecommunications Technologies
Control Network Access
LAN-Based Security
Network-Based Security Devices
Wireless Technologies
Summary
Sample Questions
End Notes
Domain 7: Systems and Application Security
Objectives
Identifying and Analyzing Malicious Code and Activity
CIA Triad: Applicability to Malcode
Vectors of Infection
Spoofing, Phishing, Spam, and Botnets
Malicious Web Activity
Payloads
Identifying Infections
Behavioral Analysis of Malcode
Malcode Mitigation
Implementing and Operating End-Point Device Security
Operating and Configuring Cloud Security
Encryption
Encryption Alternatives and Other Data Protection Technologies
Securing Big Data Systems
Operating and Securing Virtual Environments
Summary
Sample Questions
End Notes
Appendix A: Answers to Sample Questions
Domain 1: Access Controls
Domain 2: Security Operations
Domain 3: Risk, Identification, Monitoring, and Analysis
Domain 4: Incident Response and Recovery
Domain 5: Cryptography
Domain 6: Networks and Communications Security
Domain 7: Systems and Application Security
Appendix B: DNSSEC Walkthrough
Hardware and Software Requirements
Configuring the Test Lab
Configuring DC1
Configuring DNS1
Signing a Zone on DC1 and Distributing Trust Anchors
Appendix C: Glossary of Terms Related to the SSCP
Titlepage
Copyright
About the Editors
Foreword
Introduction
End-User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
The Official (ISC)2 Guide to the SSCP CBK
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset