Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Don't Let the Real Test Be Your First Test!
This fully updated self-study guide offers complete coverage of all eight Certified Information Systems Security Professional exam domains developed by the International Information Systems Security Certification Consortium (ISC)2 (R). To reinforce important skills and facilitate retention, every question is accompanied by in-depth explanations for both correct and incorrect answers. Designed to help you pass the test with ease, this book is the ideal companion to the bestselling CISSP All-in-One Exam Guide.
Covers all 8 CISSP (R) domains:
*Security and risk management*Asset security*Security architecture and engineering*Communication and network security*Identity and access management*Security assessment and testing*Security operations*Software development security
DIGITAL CONTENT INCLUDES:
*1000+ multiple-choice practice exam questions*Hotspot and drag-and-drop practice exam questions
Auflage
Sprache
Verlagsort
Zielgruppe
Für höhere Schule und Studium
Produkt-Hinweis
Broschur/Paperback
Klebebindung
Illustrationen
Maße
Höhe: 231 mm
Breite: 189 mm
Dicke: 26 mm
Gewicht
ISBN-13
978-1-260-14267-9 (9781260142679)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Jonathan Ham, CISSP, GSEC, GCIA, GCIH, is an independent consultant who specializes in large-scale enterprise security issues, from policy and procedure, through staffing and training, to scalable prevention, detection, and response technology and techniques. With a keen understanding of ROI and TCO, he has helped his clients achieve greater success for more than 12 years, advising in both the public and private sectors, from small upstarts to the Fortune 500. Jonathan has been commissioned to teach NCIS investigators how to use Snort, performed packet analysis from a facility more than 2000 feet underground, and chartered and trained the CIRT for one of the largest U.S. civilian federal agencies. He is a member of the GIAC Advisory Board and is a SANS instructor teaching their MGT414: SANS Training Program for CISSP Certification course. He is also co-author of Network Forensics: Tracking Hackers through Cyberspace, a textbook published by Prentice-Hall.
Chapter 1: Security and Risk Management
Chapter 2: Asset Security
Chapter 3: Security Engineering
Chapter 4: Communication and Network Security
Chapter 5: Identity and Access Management
Chapter 6: Security Assessment and Testing
Chapter 7: Security Operations
Chapter 8: Software Development Security