The SSCP (R) certification is the key to unlocking the upper ranks of security implementation at the world's most prestigious organizations. If you're serious about becoming a leading tactician at the front lines, the (ISC) (2) (R) Systems Security Certified Practitioner (SSCP) certification is an absolute necessity-demanded by cutting-edge companies worldwide, today more than ever before. As a warrior defending an organization's digital assets, a SSCP must demonstrate a high level of competence and understanding of the seven domains of the (ISC) (2) CBK (R). This comprehensive taxonomy of information security topics establishes a common framework of terms and principles that enable security professionals around the world to discuss, debate, and resolve matters pertaining to the industry.
Nowhere else are the seven domains of the CBK embodied more adeptly than in the first edition of the Official (ISC) (2) (R) Guide to the SSCP (R) CBK (R). In a milestone effort by (ISC) (2), five of the of the world's leading tacticians with hands-on experience in IT security acknowledge the importance of the security implementation process. Armed with practical experience, the authors discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure.
Simply put, the (ISC) (2) Systems Security Certified Practitioner certification is the most important credential an information security practitioner can have. Through clear descriptions accompanied by numerous tables, easy-to-follow instructions, sample questions, and an entire chapter of self-assessment questions, this book builds a solid, product-independent understanding of information security fundamentals.
The Official (ISC) (2) (R) Guide to the SSCP (R) CBK (R).
Master it, and you'll have the current concepts, widely recognized best practices, and key techniques used by the world's top specialists.
Reihe
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Für Beruf und Forschung
The SSCP® credential is ideal for those working toward or who have already attained positions such as Systems or Network Administrator, Senior Network Security Engineer, Senior Security Systems Analyst or Senior Security Administrator. In addition the SSCP has proven to be one of the best introductions to security principles for personnel that work in a role where security is not one of their primary responsibilities such as application or web programmers, information systems auditors, network, system and database administrators, and risk managers.
Illustrationen
10 s/w Tabellen, 25 s/w Abbildungen
10 Tables, black and white; 25 Illustrations, black and white
Maße
Höhe: 234 mm
Breite: 156 mm
Gewicht
ISBN-13
978-0-8493-2774-2 (9780849327742)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Hamilton, Ontario, Canada CitiFinancial, Oak Hill, Virginia, USA
Autor*in
Hamilton, Ontario, Canada
CitiFinancial, Oak Hill, Virginia, USA
Herausgeber*in
HFT Associates, Villa Park, California, USA
ACCESS CONTROLS
Access Controls in Terms of Subjects
Access Controls in Terms of Objects
Authentication Implementation
Access Control Concepts
SECURITY OPERATIONS AND ADMINISTRATION
Security Administration
Change Management Concepts
Systems Development Life Cycle (SDLC)
Organization Security Evaluation and Assistance
User Security Awareness and Education
Code of Ethics
Security Infrastructure Evaluation Tools
Security Policy Administration
Certification and Accreditation Process Concepts
Security Best Practices Implementation
ANALYSIS AND MONITORING
Principles, Practices and Mechanisms
Audits
Monitoring Systems
Analysis of Exploits
RISK, RESPONSE, AND RECOVERY
Risk Management Process
Security Assessments
Incident Handling Analysis
The Business Continuity Plan (BCP)
The Disaster Recovery Plan (DRP)
CRYPTOGRAPHY
Business and Security Requirements for Cryptography
Principles of Certificates and Key Management
Secure Protocols
NETWORKS AND TELECOMMUNICATIONS
Business and Security Requirements
Remote Access Architecture
Firelwalls
Networks
Wireless
MALICIOUS CODE
Viruses, Worms and Trojan Horses,
Virus Activity
Trap Doors and Back Doors
Virus Hoaxes and Myths
Characteristics of Malicious Code
Appropriate Security Measures