首頁(yè) > 計(jì)算機(jī)網(wǎng)絡(luò) >
編程語(yǔ)言與程序設(shè)計(jì)
> CISSP in 21 Days(Second Edition)最新章節(jié)目錄
舉報(bào)

會(huì)員
CISSP in 21 Days(Second Edition)
最新章節(jié):
References and further reading
IfyouareaNetworkingprofessionalaspiringtotaketheCISSPexaminationandobtainthecovetedCISSPcertification(consideredtobetheGoldStandardinInformationSecuritypersonalcertification),thenthisisthebookyouwant.Thisbookassumesthatyoualreadyhavesufficientknowledgeinall10domainsoftheCISSPCBKbywayofworkexperienceandknowledgegainedfromotherstudybooks.
目錄(172章)
倒序
- 封面
- 版權(quán)頁(yè)
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- Why subscribe?
- Free access for Packt account holders
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Day 1 – Security and Risk Management - Security Compliance and Policies
- Overview of security compliance and policies
- Confidentiality Integrity and Availability (CIA)
- Security governance
- Compliance
- Legal and regulatory issues
- Professional ethics
- Security policies standards procedures and guidelines
- Personnel security policies
- Summary
- Sample questions
- Chapter 2. Day 2 – Security and Risk Management - Risk Management Business Continuity and Security Education
- Overview of risk management business continuity and security education
- Risk management
- Security risk considerations in acquisitions strategy and practice
- Information security education training and awareness
- Summary
- Sample questions
- Chapter 3. Day 3 – Asset Security - Information and Asset Classification
- Overview of asset security - information and asset classification
- Asset classification and control
- Data privacy
- Data retention
- Summary
- Sample questions
- Chapter 4. Day 4 – Asset Security - Data Security Controls and Handling
- Overview of asset security - data security controls and handling
- Data security controls
- Data Loss Prevention (DLP)
- Data Loss Prevention strategies
- DLP controls
- Cryptographic methods to secure data
- Data handling requirements
- Summary
- Sample questions
- Chapter 5. Day 5 – Exam Cram and Practice Questions
- An overview of exam cram and practice questions
- Sample questions
- References and further reading
- Summary
- Chapter 6. Day 6 – Security Engineering - Security Design Practices Models and Vulnerability Mitigation
- An overview of security design practices models and vulnerability mitigation
- Secure design principles
- Assurance
- Certification and accreditation
- Information security models
- Vulnerability assessment and mitigation
- Summary
- Sample questions
- Chapter 7. Day 7 – Security Engineering - Cryptography
- An overview of cryptography
- The fundamentals of cryptography
- Applications and the use of cryptography
- Public Key Infrastructure (PKI)
- Key management techniques
- Cryptanalytic attacks
- Cryptographic standards
- Summary
- Sample questions
- Chapter 8. Day 8 – Communication and Network Security - Network Security
- An overview of communication and network security
- Network architecture protocols and technologies
- Open System Interconnect (OSI) model
- OSI layers and security
- Summary
- Sample questions
- Chapter 9. Day 9 – Communication and Network Security - Communication Security
- An overview of communication security
- Security in communication channels
- Attacks on communication networks
- Preventing or mitigating communication network attacks
- Summary
- Sample questions
- Chapter 10. Day 10 – Exam Cram and Practice Questions
- An overview of exam cram and practice questions
- The exam cram
- Sample questions
- References and further reading
- Summary
- Chapter 11. Day 11 – Identity and Access Management - Identity Management
- An overview of identity and access management
- Physical and logical access to assets
- Identity management principles and implementation
- Identity as a service
- Third-party identity services
- Summary
- Sample questions
- Chapter 12. Day 12 – Identity and Access Management - Access Management Provisioning and Attacks
- An overview of access management
- Access management concepts methodologies and techniques
- Identity and provisioning life cycle
- Access control attacks and countermeasures
- Accountability
- Summary
- Sample questions
- Chapter 13. Day 13 – Security Assessment and Testing - Designing Performing Security Assessment and Tests
- An overview of security assessment and testing
- Security assessment and test strategies
- Security controls
- Summary
- Sample questions
- Chapter 14. Day 14 – Security Assessment and Testing - Controlling Analyzing Auditing and Reporting
- An overview of controlling analyzing auditing and reporting security test data
- A collection of security process data
- Analyzing security process data
- Internal and third-party security audits
- Reporting test and audit outputs
- Summary
- Sample questions
- Chapter 15. Day 15 – Exam Cram and Practice Questions
- An overview of exam cram and practice questions
- Exam cram
- Mock test
- References and further reading
- Summary
- Chapter 16. Day 16 – Security Operations - Foundational Concepts
- An overview of operations security
- The physical security design
- Physical and operations security controls
- Operations/facility security
- Protecting and securing equipment
- Computer investigations
- Summary
- Sample questions
- Chapter 17. Day 17 – Security Operations - Incident Management and Disaster Recovery
- Incident management and reporting
- Business Continuity Planning (BCP)
- Disaster Recovery Planning (DRP)
- Summary
- Sample questions
- Chapter 18. Day 18 – Software Development Security - Security in Software Development Life Cycle
- An overview of software development security
- Systems engineering
- Software development life cycle
- Security in software development
- Summary
- Sample questions
- Chapter 19. Day 19 – Software Development Security - Assessing effectiveness of Software Security
- Overview
- Security in information technology systems
- Threats and vulnerabilities to application systems
- Security impact analysis
- Monitoring and testing activities
- Summary
- Sample questions
- Chapter 20. Day 20 – Exam Cram and Practice Questions
- Overview of exam cram and practice questions
- Exam cram
- References and further reading
- Summary
- Sample questions
- Chapter 21. Day 21 – Exam Cram and Mock Test
- An overview of the exam cram and mock test
- Exam cram
- Summary
- Mock test
- References and further reading 更新時(shí)間:2021-07-14 11:05:00
推薦閱讀
- Git Version Control Cookbook
- HTML5+CSS3網(wǎng)頁(yè)設(shè)計(jì)
- WebRTC技術(shù)詳解:從0到1構(gòu)建多人視頻會(huì)議系統(tǒng)
- Instant Ext.NET Application Development
- C語(yǔ)言開發(fā)基礎(chǔ)教程(Dev-C++)(第2版)
- HTML5 APP開發(fā)從入門到精通(微課精編版)
- OpenCV 3計(jì)算機(jī)視覺(jué):Python語(yǔ)言實(shí)現(xiàn)(原書第2版)
- SpringBoot從零開始學(xué)(視頻教學(xué)版)
- SwiftUI極簡(jiǎn)開發(fā)
- WebStorm Essentials
- MySQL數(shù)據(jù)庫(kù)應(yīng)用實(shí)戰(zhàn)教程(慕課版)
- Flutter從0基礎(chǔ)到App上線
- 信息學(xué)競(jìng)賽寶典:基礎(chǔ)算法
- PHP面試一戰(zhàn)到底
- 零基礎(chǔ)輕松學(xué)Java
- 從Excel到Python:用Python輕松處理Excel數(shù)據(jù)
- Drupal 8 Module Development
- C語(yǔ)言解惑
- Instant Pentaho Data Integration Kitchen
- Hands-On RESTful API Design Patterns and Best Practices
- 軟技能:代碼之外的生存指南
- Learning OpenStack Networking
- OpenCV計(jì)算機(jī)視覺(jué)編程攻略(第3版)
- 游戲概論
- Getting Started with UDOO
- 整理優(yōu)先:小改進(jìn),大回報(bào),整潔代碼設(shè)計(jì)指南
- Python基礎(chǔ)實(shí)例教程(微課版)
- Redis設(shè)計(jì)與實(shí)現(xiàn)
- OpenShift云原生架構(gòu):原理與實(shí)踐
- Mastering Social Media Mining with Python