CISSP Study Guide, 3rd Edition

 
CISSP Study Guide, 3rd Edition,Eric Conrad,Seth Misenar,Joshua Feldman,ISBN9780128024379
 
 
Up to
15%
off
 

  &      &      

Syngress

9780128024379

9780128028209

622

235 X 191

This book will help users pass the CISSP exam through its concise and practical instruction that includes two practice exams, exam objectives, unique terms and definitions, over 500 questions, and stepped chapter-ending questions for self-study at any level.

Print Book + eBook

USD 71.94
USD 119.90

Buy both together and save 40%

Print Book

Paperback

In Stock

Estimated Delivery Time
USD 50.96
USD 59.95

eBook
eBook Overview

DRM-free included formats : PDF

USD 50.96
USD 59.95
Add to Cart
 
 

Key Features

  • Provides the most complete and effective study guide to prepare users for passing the CISSP exam, giving them exactly what they need to pass the test
  • Authored by Eric Conrad who has prepared hundreds of professionals for passing the CISSP exam through SANS, a popular and well-known organization for information security professionals
  • Covers all of the new information in the Common Body of Knowledge updated in January 2015, and also provides two exams, tiered end-of-chapter questions for a gradual learning curve, and a complete self-test appendix

Description

CISSP Study Guide, Third Edition provides readers with information on the CISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals.

With over 100,000 professionals certified worldwide, and many more joining their ranks, this new third edition presents everything a reader needs to know on the newest version of the exam's Common Body of Knowledge.

The eight domains are covered completely and as concisely as possible, allowing users to ace the exam. Each domain has its own chapter that includes a specially-designed pedagogy to help users pass the exam, including clearly-stated exam objectives, unique terms and definitions, exam warnings, "learning by example" modules, hands-on exercises, and chapter ending questions.

Readership

information security professionals, IT professionals, computer and information systems managers, systems administrators, application developers, network administrators, security managers, security analysts, directors of security, security auditors, security engineers, compliance specialists

Eric Conrad

Eric Conrad (CISSP, GIAC GSE, GPEN, GCIH, GCIA, GCFA, GAWN, GSEC, Security+), is a SANS-certified instructor and President of Backshore Communications, which provides information warfare, penetration testing, incident handling, and intrusion detection consulting services. Eric started his professional career in 1991 as a UNIX systems administrator for a small oceanographic communications company. He gained information security experience in a variety of industries, including research, education, power, Internet, and healthcare, in positions ranging from systems programmer to security engineer to HIPAA security officer and ISSO. He has taught more than a thousand students in courses such as SANS Management 414: CISSP, Security 560: Network Penetration Testing and Ethical Hacking, Security 504: Hacker Techniques, and Exploits and Incident Handling. Eric graduated from the SANS Technology Institute with a Master of Science degree in Information Security Engineering.

Affiliations and Expertise

CISSP, GIAC GSE, GPEN, GCIH, GCIA, GCFA, GAWN, GSEC, GISP, GCED, Senior SANS instructor and CTO, Backshore Communications

View additional works by Eric Conrad

Seth Misenar

Seth Misenar (CISSP, GPEN, GCIH, GCIA, GCFA, GWAPT, GCWN, GSEC, MCSE, MCDBA), is a certified instructor with the SANS Institute and serves as lead consultant for Context Security, which is based in Jackson, Mississippi. His background includes security research, network and Web application penetration testing, vulnerability assessment, regulatory compliance, security architecture design, and general security consulting. Seth previously served as a physical and network security consultant for Fortune 100 companies and as the HIPAA and information security officer for a state government agency. He teaches a variety of courses for the SANS Institute, including Security Essentials, Web Application Penetration Testing, Hacker Techniques, and the CISSP course. Seth is pursuing a Master of Science degree in Information Security Engineering from the SANS Technology Institute and holds a Bachelor of Science degree from Millsaps College, Jackson, Mississippi.

Affiliations and Expertise

CISSP, GIAC GSE, GPEN, GCIH, GCIA, GCFA, GWAPT, GCWN, GSEC, Senior SANS instructor and Lead Consultant, Context Security, LLC.

View additional works by Seth Misenar

Joshua Feldman

Joshua Feldman (CISSP), is currently employed by SAIC, Inc. He has been involved in the Department of Defense Information Systems Agency (DISA) Information Assurance Education, Training, and Awareness program since 2002, where he has contributed to a variety of DoD-wide Information Assurance and Cyber Security policies, specifically the 8500.2 and 8570 series. Joshua has taught more than a thousand DoD students through his "DoD IA Boot Camp" course. He is a subject matter expert for the Web-based DoD Information Assurance Awareness-yearly training of every DoD user is required as part of his or her security awareness curriculum. Also, he is a regular presenter and panel member at the annual Information Assurance Symposium hosted jointly by DISA and NSA. Before joining the support team at DoD/DISA, Joshua spent time as an IT security engineer at the Department of State's Bureau of Diplomatic Security. He got his start in the IT security field with NFR Security Software, a company that manufactures Intrusion Detection Systems. There, he worked as both a trainer and an engineer, implementing IDS technologies and instructing customers how in properly configuring them.

Affiliations and Expertise

CISSP, Vice President: IT Risk, Moody's Investments

View additional works by Joshua Feldman

CISSP Study Guide, 3rd Edition

  • About the Authors
  • Acknowledgments
  • Chapter 1: Introduction
    • How to Prepare for the Exam
    • How to Take the Exam
    • Good Luck!
  • Chapter 2: Domain 1: Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Cornerstone Information Security Concepts
    • Legal and Regulatory Issues
    • Security and 3rd Parties
    • Ethics
    • Information Security Governance
    • Access Control Defensive Categories and Types
    • Risk Analysis
    • Types of Attackers
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Chapter 3: Domain 2: Asset Security (Protecting Security of Assets)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Classifying Data
    • Ownership
    • Memory and Remanence
    • Data Destruction
    • Determining Data Security Controls
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Chapter 4: Domain 3: Security Engineering (Engineering and Management of Security)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Security Models
    • Evaluation Methods, Certification and Accreditation
    • Secure System Design Concepts
    • Secure Hardware Architecture
    • Secure Operating System and Software Architecture
    • Virtualization and Distributed Computing
    • System Vulnerabilities, Threats and Countermeasures
    • Cornerstone Cryptographic Concepts
    • History of Cryptography
    • Types of Cryptography
    • Cryptographic Attacks
    • Implementing Cryptography
    • Perimeter Defenses
    • Site Selection, Design, and Configuration
    • System Defenses
    • Environmental Controls
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Chapter 5: Domain 4: Communication and Network Security (Designing and Protecting Network Security)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Network Architecture and Design
    • Secure Network Devices and Protocols
    • Secure Communications
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Chapter 6: Domain 5: Identity and Access Management (Controlling Access and Managing Identity)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Authentication Methods
    • Access Control Technologies
    • Access Control Models
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Chapter 7: Domain 6: Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Assessing Access Control
    • Software Testing Methods
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Chapter 8: Domain 7: Security Operations (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Administrative Security
    • Forensics
    • Incident Response Management
    • Operational Preventive and Detective Controls
    • Asset Management
    • Continuity of Operations
    • BCP and DRP Overview and Process
    • Developing a BCP/DRP
    • Backups and Availability
    • DRP Testing, Training and Awareness
    • Continued BCP/DRP Maintenance
    • Specific BCP/DRP Frameworks
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Chapter 9: Domain 8: Software Development Security (Understanding, Applying, and Enforcing Software Security)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Programming Concepts
    • Application Development Methods
    • Databases
    • Object-Oriented Design and Programming
    • Assessing the Effectiveness of Software Security
    • Artificial Intelligence
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Appendix: Self Test
  • Glossary
  • Index
 
 
Free Shipping
Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy
FAQ

Contact Us