Fr. 106.00

Official (ISC)2 Guide to the CISSP CBK

English · Hardback

Shipping usually within 3 to 5 weeks

Description

Read more

Informationen zum Autor Adam Gordon Klappentext This book presents material that has been prepared by CISSP credential holders and reviewed by (ISC)² authorized instructors who are highly knowledgeable about the latest information security-related developments and are proven experts in the CISSP common body of knowledge (CBK). Endorsed by the (ISC)², the Official (ISC)2® Guide to the CISSP® CBK®, Fourth Edition is the most comprehensive and up-to-date review of information systems security concepts and industry best practices. Zusammenfassung As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on a regular basis to ensure that the examinations and subsequent training and continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of today’s practicing information security professionals. Refreshed technical content has been added to the official (ISC)² CISSP CBK to reflect the most current topics in the information security industry today. Some topics have been expanded (e.g., asset security, security assessment and testing), while other topics have been realigned under different domains. The result is an exam that most accurately reflects the technical and managerial competence required from an experienced information security professional to effectively design, engineer, implement and manage an organization’s information security program within an ever-changing security landscape. The domain names have been updated as follows: CISSP Domains, Effective April 15, 2015 Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity) Asset Security (Protecting Security of Assets) Security Engineering (Engineering and Management of Security) Communications and Network Security (Designing and Protecting Network Security) Identity and Access Management (Controlling Access and Managing Identity) Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing) Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery) Software Development Security (Understanding, Applying, and Enforcing Software Security) Some candidates may be wondering how these updates affect training materials for the CISSP credential. As part of the organization’s comprehensive education strategy and certifying body best practices, (ISC)² training materials do not teach directly to its credential examinations. Rather, (ISC)² Education is focused on teaching the core competencies relevant to the roles and responsibilities of today’s practicing information security professional. It is designed to refresh and enhance the knowledge of experienced industry professionals. Inhaltsverzeichnis Domain 1 — Security & Risk Management. Domain 2 — Asset Security. Domain 3 — Security Engineering. Domain 4 — Communications & Network Security. Domain 5 — Identity & Access Management. Domain 6 — Security Assessment & Testing. Domain 7 — Security Operations. Domain 8 — Security in the Software Development Life Cycle. ...

Product details

Authors Adam (EDT) Gordon
Assisted by Adam Gordon (Editor)
Publisher Taylor & Francis Ltd.
 
Languages English
Product format Hardback
Released 15.10.2015
 
EAN 9781482262759
ISBN 978-1-4822-6275-9
No. of pages 1200
Dimensions 190 mm x 263 mm x 55 mm
Series (ISC)2 Press
(ISC)2 Press
Subject Natural sciences, medicine, IT, technology > IT, data processing > Data communication, networks

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.