ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب CISSP for dummies

دانلود کتاب CISSP برای آدمک ها

CISSP for dummies

مشخصات کتاب

CISSP for dummies

ویرایش: Seventh 
نویسندگان: ,   
سری:  
ISBN (شابک) : 9781119806820, 1119806828 
ناشر:  
سال نشر: 2021 
تعداد صفحات: 611 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 10 مگابایت 

قیمت کتاب (تومان) : 53,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 14


در صورت تبدیل فایل کتاب CISSP for dummies به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب CISSP برای آدمک ها نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Title Page
Copyright Page
Table of Contents
Introduction
	About This Book
	Foolish Assumptions
	Icons Used in This Book
	Beyond the Book
	Where to Go from Here
Part 1 Getting Started with CISSP Certification
	Chapter 1 (ISC)2 and the CISSP Certification
		About (ISC)2 and the CISSP Certification
		You Must Be This Tall to Ride This Ride (And Other Requirements)
		Preparing for the Exam
			Studying on your own
			Getting hands-on experience
			Getting official (ISC)2 CISSP training
			Attending other training courses or study groups
			Taking practice exams
			Are you ready for the exam?
		Registering for the Exam
		About the CISSP Examination
		After the Examination
	Chapter 2 Putting Your Certification to Good Use
		Networking with Other Security Professionals
		Being an Active (ISC)2 Member
		Considering (ISC)2 Volunteer Opportunities
			Writing certification exam questions
			Speaking at events
			Helping at (ISC)2 conferences
			Reading and contributing to (ISC)2 publications
			Supporting the (ISC)2 Center for Cyber Safety and Education
			Participating in bug-bounty programs
			Participating in (ISC)2 focus groups
			Joining the (ISC)2 community
			Getting involved with a CISSP study group
			Helping others learn more about data security
		Becoming an Active Member of Your Local Security Chapter
		Spreading the Good Word about CISSP Certification
			Leading by example
		Using Your CISSP Certification to Be an Agent of Change
		Earning Other Certifications
			Other (ISC)2 certifications
			CISSP concentrations
			Non-(ISC)2 certifications
			Choosing the right certifications
			Finding a mentor, being a mentor
			Building your professional brand
		Pursuing Security Excellence
Part 2 Certification Domains
	Chapter 3 Security and Risk Management
		Understand, Adhere to, and Promote Professional Ethics
			(ISC)2 Code of Professional Ethics
			Organizational code of ethics
		Understand and Apply Security Concepts
			Confidentiality
			Integrity
			Availability
			Authenticity
			Nonrepudiation
		Evaluate and Apply Security Governance Principles
			Alignment of security function to business strategy, goals, mission, and objectives
			Organizational processes
			Organizational roles and responsibilities
			Security control frameworks
			Due care and due diligence
		Determine Compliance and Other Requirements
			Contractual, legal, industry standards, and regulatory requirements
			Privacy requirements
		Understand Legal and Regulatory Issues That Pertain to Information Security
			Cybercrimes and data breaches
			Licensing and intellectual property requirements
			Import/export controls
			Transborder data flow
			Privacy
		Understand Requirements for Investigation Types
		Develop, Document, and Implement Security Policies, Standards, Procedures, and Guidelines
			Policies
			Standards (and baselines)
			Procedures
			Guidelines
		Identify, Analyze, and Prioritize Business Continuity (BC) Requirements
			Business impact analysis
			Develop and document the scope and the plan
		Contribute to and Enforce Personnel Security Policies and Procedures
			Candidate screening and hiring
			Employment agreements and policies
			Onboarding, transfers, and termination processes
			Vendor, consultant, and contractor agreements and controls
			Compliance policy requirements
			Privacy policy requirements
		Understand and Apply Risk Management Concepts
			Identify threats and vulnerabilities
			Risk assessment/analysis
			Risk appetite and risk tolerance
			Risk treatment
			Countermeasure selection and implementation
			Applicable types of controls
			Control assessments (security and privacy)
			Monitoring and measurement
			Reporting
			Continuous improvement
			Risk frameworks
		Understand and Apply Threat Modeling Concepts and Methodologies
			Identifying threats
			Determining and diagramming potential attacks
			Performing reduction analysis
			Remediating threats
		Apply Supply Chain Risk Management (SCRM) Concepts
			Risks associated with hardware, software, and services
			Third-party assessment and monitoring
			Fourth-party risk
			Minimum security requirements
			Service-level agreement requirements
		Establish and Maintain a Security Awareness, Education, and Training Program
			Methods and techniques to present awareness and training
			Periodic content reviews
			Program effectiveness evaluation
	Chapter 4 Asset Security
		Identify and Classify Information and Assets
			Data classification
			Asset classification
		Establish Information and Asset Handling Requirements
		Provision Resources Securely
			Information and asset ownership
			Asset inventory
			Asset management
		Manage Data Life Cycle
			Data roles
			Data collection
			Data location
			Data maintenance
			Data retention
			Data remanence
			Data destruction
		Ensure Appropriate Asset Retention
			End of life
			End of support
		Determine Data Security Controls and Compliance Requirements
			Data states
			Scoping and tailoring
			Standards selection
			Data protection methods
	Chapter 5 Security Architecture and Engineering
		Research, Implement, and Manage Engineering Processes Using Secure Design Principles
			Threat modeling
			Least privilege (and need to know)
			Defense in depth
			Secure defaults
			Fail securely
			Separation of duties
			Keep it simple
			Zero trust
			Privacy by design
			Trust but verify
			Shared responsibility
		Understand the Fundamental Concepts of Security Models
		Select Controls Based Upon Systems Security Requirements
			Evaluation criteria
			System certification and accreditation
		Understand Security Capabilities of Information Systems
			Trusted Computing Base
			Trusted Platform Module
			Secure modes of operation
			Open and closed systems
			Memory protection
			Encryption and decryption
			Protection rings
			Security modes
			Recovery procedures
		Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
			Client-based systems
			Server-based systems
			Database systems
			Cryptographic systems
			Industrial control systems
			Cloud-based systems
			Distributed systems
			Internet of Things
			Microservices
			Containerization
			Serverless
			Embedded systems
			High-performance computing systems
			Edge computing systems
			Virtualized systems
			Web-based systems
			Mobile systems
		Select and Determine Cryptographic Solutions
			Plaintext and ciphertext
			Encryption and decryption
			End-to-end encryption
			Link encryption
			Putting it all together: The cryptosystem
			Classes of ciphers
			Types of ciphers
			Cryptographic life cycle
			Cryptographic methods
			Public key infrastructure
			Key management practices
			Digital signatures and digital certificates
			Nonrepudiation
			Integrity (hashing)
		Understand Methods of Cryptanalytic Attacks
			Brute force
			Ciphertext only
			Known plaintext
			Frequency analysis
			Chosen ciphertext
			Implementation attacks
			Side channel
			Fault injection
			Timing
			Man in the middle
			Pass the hash
			Kerberos exploitation
			Ransomware
		Apply Security Principles to Site and Facility Design
		Design Site and Facility Security Controls
			Wiring closets, server rooms, and more
			Restricted and work area security
			Utilities and heating, ventilation, and air conditioning
			Environmental issues
			Fire prevention, detection, and suppression
			Power
	Chapter 6 Communication and Network Security
		Assess and Implement Secure Design Principles in Network Architectures
			OSI and TCP/IP models
			The OSI Reference Model
			The TCP/IP Model
		Secure Network Components
			Operation of hardware
			Transmission media
			Network access control devices
			Endpoint security
		Implement Secure Communication Channels According to Design
			Voice
			Multimedia collaboration
			Remote access
			Data communications
			Virtualized networks
			Third-party connectivity
	Chapter 7 Identity and Access Management
		Control Physical and Logical Access to Assets
			Information
			Systems and devices
			Facilities
			Applications
		Manage Identification and Authentication of People, Devices, and Services
			Identity management implementation
			Single-/multifactor authentication
			Accountability
			Session management
			Registration, proofing, and establishment of identity
			Federated identity management
			Credential management systems
			Single sign-on
			Just-in-Time
		Federated Identity with a Third-Party Service
			On-premises
			Cloud
			Hybrid
		Implement and Manage Authorization Mechanisms
			Role-based access control
			Rule-based access control
			Mandatory access control
			Discretionary access control
			Attribute-based access control
			Risk-based access control
		Manage the Identity and Access Provisioning Life Cycle
		Implement Authentication Systems
			OpenID Connect/Open Authorization
			Security Assertion Markup Language
			Kerberos
			RADIUS and TACACS+
	Chapter 8 Security Assessment and Testing
		Design and Validate Assessment, Test, and Audit Strategies
		Conduct Security Control Testing
			Vulnerability assessment
			Penetration testing
			Log reviews
			Synthetic transactions
			Code review and testing
			Misuse case testing
			Test coverage analysis
			Interface testing
			Breach attack simulations
			Compliance checks
		Collect Security Process Data
			Account management
			Management review and approval
			Key performance and risk indicators
			Backup verification data
			Training and awareness
			Disaster recovery and business continuity
		Analyze Test Output and Generate Reports
			Remediation
			Exception handling
			Ethical disclosure
		Conduct or Facilitate Security Audits
	Chapter 9 Security Operations
		Understand and Comply with Investigations
			Evidence collection and handling
			Reporting and documentation
			Investigative techniques
			Digital forensics tools, tactics, and procedures
			Artifacts
		Conduct Logging and Monitoring Activities
			Intrusion detection and prevention
			Security information and event management
			Security orchestration, automation, and response
			Continuous monitoring
			Egress monitoring
			Log management
			Threat intelligence
			User and entity behavior analysis
		Perform Configuration Management
		Apply Foundational Security Operations Concepts
			Need-to-know and least privilege
			Separation of duties and responsibilities
			Privileged account management
			Job rotation
			Service-level agreements
		Apply Resource Protection
			Media management
			Media protection techniques
		Conduct Incident Management
		Operate and Maintain Detective and Preventative Measures
		Implement and Support Patch and Vulnerability Management
		Understand and Participate in Change Management Processes
		Implement Recovery Strategies
			Backup storage strategies
			Recovery site strategies
			Multiple processing sites
			System resilience, high availability, quality of service, and fault tolerance
		Implement Disaster Recovery Processes
			Response
			Personnel
			Communications
			Assessment
			Restoration
			Training and awareness
			Lessons learned
		Test Disaster Recovery Plans
			Read-through or tabletop
			Walkthrough
			Simulation
			Parallel
			Full interruption (or cutover)
		Participate in Business Continuity Planning and Exercises
		Implement and Manage Physical Security
		Address Personnel Safety and Security Concerns
	Chapter 10 Software Development Security
		Understand and Integrate Security in the Software Development Life Cycle
			Development methodologies
			Maturity models
			Operation and maintenance
			Change management
			Integrated product team
		Identify and Apply Security Controls in Software Development Ecosystems
			Programming languages
			Libraries
			Tool sets
			Integrated development environment
			Runtime
			Continuous integration/ continuous delivery
			Security orchestration, automation, and response
			Software configuration management
			Code repositories
			Application security testing
		Assess the Effectiveness of Software Security
			Auditing and logging of changes
			Risk analysis and mitigation
		Assess Security Impact of Acquired Software
		Define and Apply Secure Coding Guidelines and Standards
			Security weaknesses and vulnerabilities at the source-code level
			Security of application programming interfaces
			Secure coding practices
			Software-defined security
Part 3 The Part of Tens
	Chapter 11 Ten Ways to Prepare for the Exam
		Know Your Learning Style
		Get a Networking Certification First
		Register Now
		Make a 60-Day Study Plan
		Get Organized and Read
		Join a Study Group
		Take Practice Exams
		Take a CISSP Training Seminar
		Adopt an Exam-Taking Strategy
		Take a Breather
	Chapter 12 Ten Test-Day Tips
		Get a Good Night’s Rest
		Dress Comfortably
		Eat a Good Meal
		Arrive Early
		Bring Approved Identification
		Bring Snacks and Drinks
		Bring Prescription and Over-the-Counter Medications
		Leave Your Mobile Devices Behind
		Take Frequent Breaks
		Guess — As a Last Resort
Glossary
Index
EULA




نظرات کاربران