CISSP Cert Guideby Troy McMillan, Robin Abernathy
CISSP Cert Guide is a best-of-breed exam study guide. Leading IT certification experts Troy McMillan and Robin Abernathy share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and/b>… See more details below
CISSP Cert Guide is a best-of-breed exam study guide. Leading IT certification experts Troy McMillan and Robin Abernathy share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.
The companion CD contains the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most, so you can succeed on the exam the first time.
The CISSP Cert Guide is the most comprehensive study guide available. With uniquely thorough coverage - carefully mapped to the exam's objectives - this book brings together all the information and insight readers need to succeed on the updated CISSP Exam. Coverage includes:
- Access Control
- Telecommunications and Network Security
- Information Security Governance and Risk Management
- Software Development Security
- Security Architecture and Design
- Security Operations
- Business Continuity and Disaster Recovery Planning
- Legal, Regulations, Investigations and Compliance
- Physical (Environmental) Security
From start to finish, this book is organized to help professionals focus study time where they need the most help, retain more, and earn higher scores. Its features include:
- Pre-chapter "Do I Know This Already" (DIKTA) quizzes that enable readers to assess their knowledge of each chapter's content and decide how much time to spend on each section
- Foundation Topics sections that thoroughly explain concepts and theory, and link them to real-world configurations and commands
- Key Topics icons that flag every figure, table, or list which must absolutely be understood and remembered
- Chapter-ending Exam Preparation sections contain additional exercises and troubleshooting scenarios.
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >
Do you want to acquire additional certifications beyond the CISSP certification? If you do, then this book is for you! Authors Troy McMillan and Robin Abernathy, have done an outstanding job of writing a book that will help you pass the current version of the (ISC)² CISSP Certification Exam. Authors McMillan and Abernathy, begin by discussing why the CISSP credential is a way security professionals can demonstrate the ability to design, implement, and maintain the correct security posture for an organization based on the complex environments in which today’s organizations exist. Then, the authors introduce you to access control, where a subject’s ability to communicate with an object is allowed or denied, based on an organization’s security requirements. They also cover the protection of wired and wireless transmissions and of the network devices that perform the transmissions; as well as, some networking fundamentals required to understand transmission security. The authors continue by showing you how to use the information security governance and risk management components to assess risk, implement controls for identified risks, monitor control effectiveness, and perform future risk assessments. Then, they discuss software development methodology, best practices for secure development, and types of malware and methods of mitigating the effects of malware. The authors then introduce you to cryptography concepts, cryptography history, cryptosystem features, cryptography methods, encryption systems, message integrity, public key infrastructure, key management, encryption communication levels, e-mail security, Internet security, and cryptography attacks. Next, they take a closer look at some of the security issues that can be created during development; some guidelines for secure practices; and, some of the common attacks on software that need to be mitigated. The authors also cover operations security concepts and their application to an ever-changing environment. They continue by explaining the business continuity and disaster recovery concepts that you need to understand for the CISSP exam. Then, the authors cover all of the topics regarding the legal, regulations, investigations, and compliance domain for the CISSP exam. Finally, they focus on the complete treatment of preventing intentional and unintentional damage to facilities, equipment and people. Throughout this most excellent book, you will see references made to policies and principles that can guide you to all of the security operations. Also, throughout this great book, the importance of preventing physical access to assets has been emphasized.