ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب CC Certified in Cybersecurity Study Guide (Sybex Study Guide)

دانلود کتاب راهنمای مطالعه امنیت سایبری گواهی CC (راهنمای مطالعه Sybex)

CC Certified in Cybersecurity Study Guide (Sybex Study Guide)

مشخصات کتاب

CC Certified in Cybersecurity Study Guide (Sybex Study Guide)

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 9781394213832, 9781394213849 
ناشر: Sybex 
سال نشر: 2024 
تعداد صفحات: 259 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 7 Mb 

قیمت کتاب (تومان) : 40,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 5


در صورت تبدیل فایل کتاب CC Certified in Cybersecurity Study Guide (Sybex Study Guide) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب راهنمای مطالعه امنیت سایبری گواهی CC (راهنمای مطالعه Sybex) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب راهنمای مطالعه امنیت سایبری گواهی CC (راهنمای مطالعه Sybex)




توضیحاتی درمورد کتاب به خارجی

Prepare for the Certified in Cybersecurity exam, as well as a new career in cybersecurity, with this effective study guide. Complete with full color illustrations! In Certified in Cybersecurity Study Guide, veteran IT and cybersecurity educator Mike Chapple delivers a one-stop resource for anyone planning to pursue the (ISC)2 Certified in Cybersecurity credential, as well as those getting ready to take on a challenging and rewarding new career in cybersecurity. The author walks you through the info you’ll need to succeed on both the exam and in your first day at a cybersecurity-focused job, using full-color illustrations to highlight and emphasize the concepts discussed inside. Complete with an online practice test, this book comprehensively covers every competency and domain tested by the new exam, including security principles, business continuity, disaster recovery, incident response, access control concepts, network security, and security operations. You’ll also find: Efficient and lean content, ensuring you get up-to-speed as quickly as possible Bite-sized chapters that break down essential topics into manageable and accessible lessons Complimentary online access to Sybex’ celebrated online learning environment, which comes with practice questions, a complete glossary of common industry terminology, and more A clear and effective pathway to the Certified in Cybersecurity credential, as well as a fresh career in cybersecurity, the Certified in Cybersecurity Study Guide offers the foundational knowledge, skills, and abilities you need to get started in an exciting and rewarding career.



فهرست مطالب

Cover
Title Page
Copyright Page
Acknowledgments
About the Author
About the Technical Editor
Contents at a Glance
Contents
Introduction
	CC Certification
	Taking the CC Exam
	Computer-Based Testing Environment
	Exam Retake Policy
	Recertification Requirements
	Using the Online Practice Test
	How to Contact the Publisher
Part I Domain 1: Security Principles
	Chapter 1 Confidentiality, Integrity, Availability, and Non-repudiation: Objective 1.1 Understand the Security Concepts of Information Assurance
		The CIA Triad
			Confidentiality
			Integrity
			Availability
		Non-repudiation
	Chapter 2 Authentication and Authorization: Objective 1.1 Understand the Security Concepts of Information Assurance
		Access Control Process
			Identification
			Authentication
			Authorization
			Accounting
			Digital Access Control
		Password Policies
			Password Length
			Password Complexity
			Password Expiration
			Password History
			Password Resets
			Password Reuse
			Password Managers
		Authentication Factors
			Something You Know
			Something You Are
			Something You Have
			Multi-factor Authentication
	Chapter 3 Privacy: Objective 1.1 Understand the Security Concepts of Information Assurance
		Privacy
			Types of Private Information
			Expectation of Privacy
		Privacy Management Framework
			Management
			Agreement, Notice, and Communication
			Collection and Creation
			Use, Retention, and Disposal
			Access
			Disclosure to Third Parties
			Security for Privacy
			Data Integrity and Quality
			Monitoring and Enforcement
	Chapter 4 Risk Management: Objective 1.2 Understand the Risk Management Process
		Risk Types
			Internal and External Risks
			Multiparty Risks
			Specific Risks
		Risk Identification and Assessment
			The Language of Risk
			Ranking Risks
		Risk Treatment Strategies
			Risk Avoidance
			Risk Transference
			Risk Mitigation
			Risk Acceptance
		Risk Profile and Tolerance
	Chapter 5 Security Controls: Objective 1.3 Understand Security Controls
		What Are Security Controls?
		Categorizing Security Controls
			Purpose Categories
			Mechanism of Action Categories
	Chapter 6 Ethics: Objective 1.4 Understand ISC2 Code of Ethics
		Corporate Ethics Codes
		ISC2 Code of Ethics
			Canon 1
			Canon 2
			Canon 3
			Canon 4
		Ethics Complaint Procedure
	Chapter 7 Security Governance Processes: Objective 1.5 Understand Governance Processes
		Security Policies and Procedures
			Security Policies
			Security Standards
			Security Guidelines
			Security Procedures
		Laws and Regulations
Part II Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
	Chapter 8 Business Continuity: Objective 2.1 Understand Business Continuity (BC)
		Business Continuity Planning
			BCP Scope Definition
			Business Impact Analysis
		Business Continuity Controls
			Single Point of Failure Analysis
			Other Continuity Risks
		High Availability and Fault Tolerance
			High Availability
			Fault Tolerance
			Storage
			Networking Components
			Redundancy Through Diversity
	Chapter 9 Disaster Recovery: Objective 2.2 Understand Disaster Recovery (DR)
		Disaster Recovery Planning
			Types of Disasters
			Initial Response
			Assessment
			Disaster Recovery Metrics
			Training and Awareness
		Backups
			Backup Media
			Backup Types
		Disaster Recovery Sites
			Hot Sites
			Cold Sites
			Warm Sites
			Offsite Storage
			Alternate Business Processes
		Testing Disaster Recovery Plans
			Read-Throughs
			Walk-Throughs
			Simulations
			Parallel Tests
			Full Interruption Tests
	Chapter 10 Incident Response: Objective 2.3 Understand Incident Response
		Creating an Incident Response Program
		Building an Incident Response Team
			Team Composition
			Training and Testing
		Incident Communications Plan
			Internal Communications
			External Communications
			Secure Communications
		Incident Identification and Response
			Security Data Sources
			Correlating Security Information
			Receiving Incident Reports
			Responding to Incidents
Part III Domain 3: Access Controls Concepts
	Chapter 11 Physical Access Controls: Objective 3.1 Understand Physical Access Controls
		Physical Facilities
			Data Centers
			Server Rooms
			Media Storage Facilities
			Evidence Storage Rooms
			Wiring Closets
		Designing for Security
		Visitor Management
		Physical Security Personnel
			Security Personnel
			Security Protocols
	Chapter 12 Logical Access Controls: Objective 3.2 Understand Logical Access Controls
		Authorization
			Least Privilege
			Segregation of Duties
			Authorization Models
		Account Types
			User Accounts
			Administrator Accounts
			Guest Accounts
			Shared/Generic Accounts
			Service Accounts
		Non-repudiation
Part IV Domain 4: Network Security
	Chapter 13 Computer Networking: Objective 4.1 Understand Computer Networking
		Network Types
		TCP/IP Networking
			Internet Protocol
			Transmission Control Protocol
			User Datagram Protocol
			Internet Control Message Protocol
			OSI Model
		IP Addressing
			Identifying Valid IPv4 Addresses
			Domain Name System
		Network Ports and Applications
		Securing Wi-Fi Networks
			Disable SSID Broadcasting
			Change Default Passwords
			Authenticate Wi-Fi Users
			Wireless Encryption
	Chapter 14 Network Threats and Attacks: Objective 4.2 Understand Network Threats and Attacks
		Malware
			Viruses
			Worms
			Trojan Horses
		Eavesdropping Attacks
			On-Path Attacks
		Denial-of-Service Attacks
		Side-Channel Attacks
	Chapter 15 Threat Identification and Prevention: Objective 4.2 Understand Network Threats and Attacks
		Antivirus Software
		Intrusion Detection and Prevention
			Intrusion Detection
			Intrusion Prevention
			Environments Monitored
			Classification Errors
			Detection Techniques
		Firewalls
		Vulnerability Scanning
			Network Vulnerability Scanning
			Application Scanning
			Web Application Scanning
	Chapter 16 Network Security Infrastructure: Objective 4.3 Understand Network Security Infrastructure
		Data Center Protection
			Air Temperature
			Humidity
			Fire
		Network Security Zones
		Switches, WAPs, and Routers
			Switches
			WAPs
			Routers
		Network Segmentation
		Virtual Private Networks
		Network Access Control
			Role-Based Access Control
			Posture Checking
		Internet of Things
			IoT Security
	Chapter 17 Cloud Computing: Objective 4.3 Understand Network Security Infrastructure
		Cloud Computing
			Drivers for Cloud Computing
		Cloud Deployment Models
			Private Cloud
			Public Cloud
			Hybrid Cloud
			Community Cloud
		Cloud Service Categories
			Software as a Service (SaaS)
			Infrastructure as a Service (IaaS)
			Platform as a Service (PaaS)
			Desktop as a Service (DaaS)
		Security and the Shared Responsibility Model
		Automation and Orchestration
		Vendor Relationships
			Managed Service Providers
			Vendor Agreements
Part V Domain 5: Security Operations
	Chapter 18 Encryption: Objective 5.1 Understand Data Security
		Cryptography
			Encrypting Data
			Decrypting Data
		Encryption Algorithms
			Symmetric Encryption
			Asymmetric Encryption
		Uses of Encryption
			Data at Rest
			Data in Transit
		Hash Functions
			MD5
			SHA
	Chapter 19 Data Handling: Objective 5.1 Understand Data Security
		Data Life Cycle
			Create
			Store
			Use
			Share
			Archive
			Destroy
		Data Classification
			Classification Schemes
			Labeling
	Chapter 20 Logging and Monitoring: Objective 5.1 Understand Data Security
		Logging
		Log Monitoring
	Chapter 21 Configuration Management: Objective 5.2 Understand System Hardening
		Configuration Management
			Baselines
			Version Control
		Configuration Vulnerabilities
			Default Configurations
			Weak Security Settings
			Cryptographic Weaknesses
			Patch and Update Management
			Account Management
	Chapter 22 Best Practice Security Policies: Objective 5.3 Understand Best Practice Security Policies
		Acceptable Use Policy
		Data Handling Policy
		Password Policy
		Bring Your Own Device Policy
		Privacy Policy
		Change Management Policy
	Chapter 23 Security Awareness Training: Objective 5.4 Understand Security Awareness Training
		Social Engineering
			Authority and Trust
			Intimidation
			Consensus and Social Proof
			Scarcity
			Urgency
			Familiarity and Liking
		Security Education
Index
EULA




نظرات کاربران