دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Mike Chapple
سری:
ISBN (شابک) : 9781394213832, 9781394213849
ناشر: Sybex
سال نشر: 2024
تعداد صفحات: 259
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 7 Mb
در صورت تبدیل فایل کتاب CC Certified in Cybersecurity Study Guide (Sybex Study Guide) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب راهنمای مطالعه امنیت سایبری گواهی CC (راهنمای مطالعه Sybex) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Prepare for the Certified in Cybersecurity exam, as well as a new career in cybersecurity, with this effective study guide. Complete with full color illustrations! In Certified in Cybersecurity Study Guide, veteran IT and cybersecurity educator Mike Chapple delivers a one-stop resource for anyone planning to pursue the (ISC)2 Certified in Cybersecurity credential, as well as those getting ready to take on a challenging and rewarding new career in cybersecurity. The author walks you through the info you’ll need to succeed on both the exam and in your first day at a cybersecurity-focused job, using full-color illustrations to highlight and emphasize the concepts discussed inside. Complete with an online practice test, this book comprehensively covers every competency and domain tested by the new exam, including security principles, business continuity, disaster recovery, incident response, access control concepts, network security, and security operations. You’ll also find: Efficient and lean content, ensuring you get up-to-speed as quickly as possible Bite-sized chapters that break down essential topics into manageable and accessible lessons Complimentary online access to Sybex’ celebrated online learning environment, which comes with practice questions, a complete glossary of common industry terminology, and more A clear and effective pathway to the Certified in Cybersecurity credential, as well as a fresh career in cybersecurity, the Certified in Cybersecurity Study Guide offers the foundational knowledge, skills, and abilities you need to get started in an exciting and rewarding career.
Cover Title Page Copyright Page Acknowledgments About the Author About the Technical Editor Contents at a Glance Contents Introduction CC Certification Taking the CC Exam Computer-Based Testing Environment Exam Retake Policy Recertification Requirements Using the Online Practice Test How to Contact the Publisher Part I Domain 1: Security Principles Chapter 1 Confidentiality, Integrity, Availability, and Non-repudiation: Objective 1.1 Understand the Security Concepts of Information Assurance The CIA Triad Confidentiality Integrity Availability Non-repudiation Chapter 2 Authentication and Authorization: Objective 1.1 Understand the Security Concepts of Information Assurance Access Control Process Identification Authentication Authorization Accounting Digital Access Control Password Policies Password Length Password Complexity Password Expiration Password History Password Resets Password Reuse Password Managers Authentication Factors Something You Know Something You Are Something You Have Multi-factor Authentication Chapter 3 Privacy: Objective 1.1 Understand the Security Concepts of Information Assurance Privacy Types of Private Information Expectation of Privacy Privacy Management Framework Management Agreement, Notice, and Communication Collection and Creation Use, Retention, and Disposal Access Disclosure to Third Parties Security for Privacy Data Integrity and Quality Monitoring and Enforcement Chapter 4 Risk Management: Objective 1.2 Understand the Risk Management Process Risk Types Internal and External Risks Multiparty Risks Specific Risks Risk Identification and Assessment The Language of Risk Ranking Risks Risk Treatment Strategies Risk Avoidance Risk Transference Risk Mitigation Risk Acceptance Risk Profile and Tolerance Chapter 5 Security Controls: Objective 1.3 Understand Security Controls What Are Security Controls? Categorizing Security Controls Purpose Categories Mechanism of Action Categories Chapter 6 Ethics: Objective 1.4 Understand ISC2 Code of Ethics Corporate Ethics Codes ISC2 Code of Ethics Canon 1 Canon 2 Canon 3 Canon 4 Ethics Complaint Procedure Chapter 7 Security Governance Processes: Objective 1.5 Understand Governance Processes Security Policies and Procedures Security Policies Security Standards Security Guidelines Security Procedures Laws and Regulations Part II Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts Chapter 8 Business Continuity: Objective 2.1 Understand Business Continuity (BC) Business Continuity Planning BCP Scope Definition Business Impact Analysis Business Continuity Controls Single Point of Failure Analysis Other Continuity Risks High Availability and Fault Tolerance High Availability Fault Tolerance Storage Networking Components Redundancy Through Diversity Chapter 9 Disaster Recovery: Objective 2.2 Understand Disaster Recovery (DR) Disaster Recovery Planning Types of Disasters Initial Response Assessment Disaster Recovery Metrics Training and Awareness Backups Backup Media Backup Types Disaster Recovery Sites Hot Sites Cold Sites Warm Sites Offsite Storage Alternate Business Processes Testing Disaster Recovery Plans Read-Throughs Walk-Throughs Simulations Parallel Tests Full Interruption Tests Chapter 10 Incident Response: Objective 2.3 Understand Incident Response Creating an Incident Response Program Building an Incident Response Team Team Composition Training and Testing Incident Communications Plan Internal Communications External Communications Secure Communications Incident Identification and Response Security Data Sources Correlating Security Information Receiving Incident Reports Responding to Incidents Part III Domain 3: Access Controls Concepts Chapter 11 Physical Access Controls: Objective 3.1 Understand Physical Access Controls Physical Facilities Data Centers Server Rooms Media Storage Facilities Evidence Storage Rooms Wiring Closets Designing for Security Visitor Management Physical Security Personnel Security Personnel Security Protocols Chapter 12 Logical Access Controls: Objective 3.2 Understand Logical Access Controls Authorization Least Privilege Segregation of Duties Authorization Models Account Types User Accounts Administrator Accounts Guest Accounts Shared/Generic Accounts Service Accounts Non-repudiation Part IV Domain 4: Network Security Chapter 13 Computer Networking: Objective 4.1 Understand Computer Networking Network Types TCP/IP Networking Internet Protocol Transmission Control Protocol User Datagram Protocol Internet Control Message Protocol OSI Model IP Addressing Identifying Valid IPv4 Addresses Domain Name System Network Ports and Applications Securing Wi-Fi Networks Disable SSID Broadcasting Change Default Passwords Authenticate Wi-Fi Users Wireless Encryption Chapter 14 Network Threats and Attacks: Objective 4.2 Understand Network Threats and Attacks Malware Viruses Worms Trojan Horses Eavesdropping Attacks On-Path Attacks Denial-of-Service Attacks Side-Channel Attacks Chapter 15 Threat Identification and Prevention: Objective 4.2 Understand Network Threats and Attacks Antivirus Software Intrusion Detection and Prevention Intrusion Detection Intrusion Prevention Environments Monitored Classification Errors Detection Techniques Firewalls Vulnerability Scanning Network Vulnerability Scanning Application Scanning Web Application Scanning Chapter 16 Network Security Infrastructure: Objective 4.3 Understand Network Security Infrastructure Data Center Protection Air Temperature Humidity Fire Network Security Zones Switches, WAPs, and Routers Switches WAPs Routers Network Segmentation Virtual Private Networks Network Access Control Role-Based Access Control Posture Checking Internet of Things IoT Security Chapter 17 Cloud Computing: Objective 4.3 Understand Network Security Infrastructure Cloud Computing Drivers for Cloud Computing Cloud Deployment Models Private Cloud Public Cloud Hybrid Cloud Community Cloud Cloud Service Categories Software as a Service (SaaS) Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Desktop as a Service (DaaS) Security and the Shared Responsibility Model Automation and Orchestration Vendor Relationships Managed Service Providers Vendor Agreements Part V Domain 5: Security Operations Chapter 18 Encryption: Objective 5.1 Understand Data Security Cryptography Encrypting Data Decrypting Data Encryption Algorithms Symmetric Encryption Asymmetric Encryption Uses of Encryption Data at Rest Data in Transit Hash Functions MD5 SHA Chapter 19 Data Handling: Objective 5.1 Understand Data Security Data Life Cycle Create Store Use Share Archive Destroy Data Classification Classification Schemes Labeling Chapter 20 Logging and Monitoring: Objective 5.1 Understand Data Security Logging Log Monitoring Chapter 21 Configuration Management: Objective 5.2 Understand System Hardening Configuration Management Baselines Version Control Configuration Vulnerabilities Default Configurations Weak Security Settings Cryptographic Weaknesses Patch and Update Management Account Management Chapter 22 Best Practice Security Policies: Objective 5.3 Understand Best Practice Security Policies Acceptable Use Policy Data Handling Policy Password Policy Bring Your Own Device Policy Privacy Policy Change Management Policy Chapter 23 Security Awareness Training: Objective 5.4 Understand Security Awareness Training Social Engineering Authority and Trust Intimidation Consensus and Social Proof Scarcity Urgency Familiarity and Liking Security Education Index EULA