CISSP Training Guide

CISSP Training Guide

3 (1 rating by Goodreads)
By (author) 

List price: US$79.99

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multiple choice questions, covering topics such as Access Control Systems, Cryptography, and Security Management Practices, and is administered by the International Information Systems Security Certification Consortium or (ISC)2. (ISC)2 promotes the CISSP exam as an aid to evaluating personnel performing information security functions. Candidates for this exam are typically network security professionals and system administrators with at least 3 years of direct work experience in one or more of the 10 test domains. This book maps to the exam objectives and offers numerous features such as exam tips, case studies, and practice exams. In addition, the CD includes PrepLogic Practice Tests, Preview Edition, making it the ultimate guide for those studying for the CISSP exam.
show more

Product details

  • Mixed media product | 768 pages
  • 202 x 232 x 44mm | 1,437.9g
  • Pearson It Certification
  • Upper Saddle River, United States
  • English
  • w. figs.
  • 078972801X
  • 9780789728012

Back cover copy

The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multiple choice questions, covering topics such as Access Control Systems, Cryptography, and Security Management Practices, and is administered by the International Information Systems Security Certification Consortium or (ISC)2. (ISC)2 promotes the CISSP exam as an aid to evaluating personnel performing information security functions. Candidates for this exam are typically network security professionals and system administrators with at least 3 years of direct work experience in one or more of the 10 test domains. This book maps to the exam objectives and offers numerous features such as exam tips, case studies, and practice exams. In addition, the CD includes PrepLogic Practice Tests, Preview Edition, making it the ultimate guide for those studying for the CISSP exam.
show more

Table of contents

I. Exam Preparation.

1. Access Control Systems and Methodology.


Introduction. Accountability. Access Control Techniques. Access Control Administration. Access Control Models. Identification and Authentication Techniques. Access Control Methodologies. Methods of Attacks. Monitoring. Penetration Testing.

2. Telecommunications and Network Security.


Introduction. The Open Systems Interconnection Model. Network Characteristics and Topologies. Network Topologies. LAN Devices. WAN Technologies. Providing Remote Access Capabilities. Networking Protocols. Protecting the Integrity, Availability, and Confidentiality of Network Data. Fault Tolerance and Data Restoration.

3. Security Management and Practices.


Introduction. Defining Security Principles. Security Management Planning. Risk Management and Analysis. Policies, Standards, Guidelines, and Procedures. Examining Roles and Responsibility. Management Responsibility. Understanding Protection Mechanisms. Classifying Data. Employment Policies and Practices. Managing Change Control. Security Awareness Training.

4. Applications and Systems Development Security.


Introduction. Software Applications and Issues. Attacking Software. Understanding Malicious Code. Implementing System Development Controls. Using Coding Practices That Reduce System Vulnerability.

5. Cryptography.


Introduction. Uses of Cryptography. Cryptographic Concepts, Methodologies, and Practices. PKI and Key Management. Methods of Attack.

6. Security Architecture and Models.


Introduction. Requirements for Security Architecture and Models. Security Models. Security System Architecture. Information System Security Standards. Common Criteria. IPSec.

7. Operations Security.


Introduction. Examining the Key Roles of Operations Security. The Roles of Auditing and Monitoring. Developing Countermeasures to Threats. The Role of Administrative Management. Concepts and Best Practices.

8. Business Continuity Planning and Disaster Recovery Planning.


Introduction. What Are the Disasters That Interrupt Business Operation? Quantifying the Difference Between DRP and BCP. Examining the Business Continuity Planning Process. Defining Disaster Recovery Planning. Developing a Backup Strategy.

9. Law, Investigation, and Ethics.


Introduction. Fundamentals of Law. Criminal Law and Computer Crime. Computer Security Incidents. Legal Evidence. Computer Forensics. Computer Ethics.

10. Physical Security.


Introduction. Classifying Assets to Simplify Physical Security Discussions. Vulnerabilities. Selecting, Designing, Constructing, and Maintaining a Secure Site. Tape and Media Library Retention Policies. Document (Hard-Copy) Libraries. Waste Disposal. Physical Intrusion Detection.

II. Final Review.

Fast Facts.


Domain 1, "Access Control". Domain 2, "Network Security and Telecommunications". Domain 3, "Security Management and Practices". Domain 4, "Applications and Systems Development Security". Domain 5, "Cryptography". Domain 6, "Security Architecture and Models". Domain 7, "Operations Security". Domain 8, "Business Continuity Planning and Disaster Recovery Planning". Domain 9, "Law, Investigation, and Ethics". Domain 10, "Physical Security".

Study and Exam Prep Tips.


Learning As a Process. Study Tips. Exam Prep Tips.

Practice Exam.


Exam Questions.

III. Appendixes.

Appendix A. Glossary.
Appendix B. Overview of the Certification Process.


Description of the Path to Certification. About the Certification Program.

Appendix C. What's on the CD-ROM.


PrepLogic Practice Tests, Preview Edition. Exclusive Electronic Version of Text.

Appendix D. Using the PrepLogic Practice Tests, Preview Edition Software.


Exam Simulation. Software Requirements. Contacting PrepLogic. License Agreement.

Index.
show more

About Roberta Bragg

Roberta Bragg, CISSP, MCSE, and the original Security Evangelist, is a veteran of more than 25 years in IT. Her technical experience ranges from programming to systems administration and Windows network security design. She is an internationally acclaimed author and lecturer on Windows security.

Scott Barman is currently an information security and systems architecture analyst for The MITRE Corporation (http://www.mitre.org) working with the MITRE team to help the IRS modernize its IT infrastructure. He has been involved with information security for almost 20 years, nurturing the evolution of systems and their security requirements for commercial organizations and government agencies. Since the explosion of the Internet, and prior to joining MITRE, he has focused on various areas of security and policy development for many organizations in the Washington, D.C. area. Scott earned his undergraduate degree from the University of Georgia and a Master of Information Systems Management with a concentration in information security management from Carnegie Mellon University (http://www.mism.cmu.edu).

Philip Fites has worked for more than 34 years in informatics, from computer operations to business and project management. His current focus includes information systems security theory and practice. Since the early 1980s, a lifelong interest in information security has been transformed into a commitment to research on integrity and other issues of security in information systems, combined with a practical focus on applying his expertise to help clients clarify and achieve security objectives.

Philip holds a bachelor of science in mathematics and an M.B.A. and studied for a Ph.D. in computing science at Queen's University. He is coauthor of Control and Security of Computer Information Systems, The Computer Virus Crisis, and Information Systems Security: A Practitioner's Reference, and he has published a number of works on various topics in computer security, software research, and educational planning methodology in various professional and industry publications. He has served as a director and president of the International Information Systems Security Certification Consortium (ISC)2. He is a member of the Standards Council of Canada's Canadian Advisory Committee on Information Technology.

Wesley J. Noonan is currently a senior quality assurance representative with BMC Software, Inc. (http://www.bmc.com) working on its network management product line. Wes got his start in the United States Marine Corps working on its Banyan VINES network and has spent the past 10 years building, maintaining, and securing corporate networks ranging in size from 25 to 25,000 users. Wes is also an active trainer, developing and teaching his own custom, Cisco-based routing and switching curriculum. His certifications include MCSE, CCNA, CCDA, and NNCSS.

Benjamin Wright, recognized the world over as one of the leading lawyers in e-commerce, is the founding author of The Law of Electronic Commerce, a comprehensive book on the legality of electronic transactions, published by Aspen Law & Business. A graduate of Georgetown University Law Center, he is an independent attorney practicing computer security and e-commercial law in Dallas, Texas.

Since 1988, he has delivered more than 500 speeches on e-commerce, privacy, and computer security and has been quoted in publications around the globe, from the Wall Street Journal to the Sydney Morning Herald. On May 26, 2001, he was featured in the 30-minute documentary The Cutting Edge Technology Report: Electronic Signatures, nationally broadcast on CNBC.

Guy Bruneau, GSEC, GCIA, GCUX is a senior security consultant with InfoPeople Security Solutions, Inc. He works within InfoPeople's security practice assisting clients with their managed security services, computer intrusion detection operations and deployment, network security auditing, incident response and reporting, and so on. He has firsthand knowledge in the use and hardening of Cisco Secure IDS, Shadow IDS, and Snort IDS, among others. He has been a SANS instructor and speaker and is the author of the IDIC course Introduction to Logfile Analysis. He is an authorized SANS Unix security grader and is presently serving as the chair of the SANS GIAC Certified Intrusion Analyst Advisory Board. He is the author of the OS hardened Shadow IDS platform based on NSWC's Shadow version 1.7 (available at http://www.whitehats.ca). In his spare time, he has worked as a technical reviewer for New Riders Publishing. Lawrence S. Paccone is a principal national/systems security analyst at Northrop Grumman Information Technology TASC. As both a technical lead and project manager, he has worked in the Internet and network/systems security arena for more than 8 years. He has been the technical lead for several network security projects supporting a government network/systems security research and development laboratory. Prior to that, he worked for 5 years at The Analytical Sciences Corporation (TASC) as a national security analyst assessing conventional military force structures. He has an M.S. in information systems, an M.A. in international relations, and a B.A. in political science. He has completed eight professional certifications in network and systems security, internetworking, wide area networking, Cisco routing/switching, Unix, and Windows NT. He also has been a technical editor for eight IT security books that are currently in publication.

Patrick "Swissman" Ramseier, CCNA, CISSP is a systems engineer at OKENA, makers of the StormSystem Intrusion Prevention System. OKENA has been delivering breakthrough security software products that proactively preserve the operational integrity of applications and host systems. OKENA StormSystem is a system of seamlessly integrated security products that act in unison to prevent existing and unknown attacks without relying on attack signatures. Patrick started out as a Unix system administrator. Over the past 14 years, he has been involved with corporate-level security design; architecture reviews; vulnerability assessments; VPN support; physical, network, and operating system security (Unix-Solaris, Linux, BSD, and Windows NT/2000); training; research; and post- and pre-sales. He has a B.A. in business and is working concurrently on his master's and doctorate in computer science.
show more

Rating details

1 ratings
3 out of 5 stars
5 0% (0)
4 0% (0)
3 100% (1)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X