CISSP: Certified Information Systems Security Professional Study Guide, Seventh Edition

  • 23h 9m
  • Darril Gibson, James Michael Stewart, Mike Chapple
  • Sybex
  • 2015

CISSP Study Guide - fully updated for the 2015 CISSP Body of Knowledge

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition has been completely updated for the latest 2015 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions.

Coverage of all of the exam topics in the book means you'll be ready for:

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communication and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

About the Authors

James Michael Stewart, CISSP, CEH, CHFI, Security+, has focused on security, certification, and various operating systems for more than 20 years. He teaches numerous job skill and certification courses.

Mike Chapple, PhD, CISSP, is Senior Director for IT Service Delivery at the University of Notre Dame. He oversees information security, data governance, IT architecture, project management, strategic planning, and product management functions.

Darril Gibson, CISSP, is CEO of YCDA, LLC. He regularly writes and consults on a variety of technical and security topics, and has authored or coauthored more than 35 books.

In this Book

  • Introduction
  • Assessment Test
  • Security Governance Through Principles and Policies
  • Personnel Security and Risk Management Concepts
  • Business Continuity Planning
  • Laws, Regulations, and Compliance
  • Protecting Security of Assets
  • Cryptography and Symmetric Key Algorithms
  • PKI and Cryptographic Applications
  • Principles of Security Models, Design, and Capabilities
  • Security Vulnerabilities, Threats, and Countermeasures
  • Physical Security Requirements
  • Secure Network Architecture and Securing Network Components
  • Secure Communications and Network Attacks
  • Managing Identity and Authentication
  • Controlling and Monitoring Access
  • Security Assessment and Testing
  • Managing Security Operations
  • Preventing and Responding to Incidents
  • Disaster Recovery Planning
  • Incidents and Ethics
  • Software Development Security
  • Malicious Code and Application Attacks
  • Bonus Questions
  • Comprehensive Online Learning Environment
SHOW MORE
FREE ACCESS