Official (ISC)2 Guide to the ISSAP CBK
Gebonden Engels 2013 2e druk 9781466579002Samenvatting
Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.
Supplying an authoritative review of the key concepts and requirements of the ISSAP CBK, the 'Official (ISC)2 Guide to the ISSAP® CBK, 2nd Edition' provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Access Control Systems and Methodology, Communications and Network Security, Cryptology, Security Architecture Analysis, BCP/DRP, and Physical Security Considerations.
Newly Enhanced Design – This Guide Has It All!
- Only guide endorsed by (ISC)2
- Most up-to-date CISSP-ISSAP CBK
- Evolving terminology and changing requirements for security professionals
- Practical examples that illustrate how to apply concepts in real-life situations
- Chapter outlines and objectives
- Review questions and answers
- References to free study resources
Read It. Study It. Refer to It Often.
Build your knowledge and improve your chance of achieving certification the first time around. Endorsed by (ISC)2 and compiled and reviewed by CISSP-ISSAPs and (ISC)2 members, this book provides unrivaled preparation for the certification exam and is a reference that will serve you well into your career. Earning your ISSAP is a deserving achievement that gives you a competitive advantage and makes you a member of an elite network of professionals worldwide.
Specificaties
Lezersrecensies
Inhoudsopgave
Introduction
Editors
Domain 1: Access Control Systems & Methodology
-Access Control Concepts
-Authentication, Authorization, and Accounting (AAA)
-Access Control Administration and Management Concepts
Domain 2: Communications & Network Security
-Voice and Facsimile Communications
-Network Architecture
-Network Security Design Considerations
-Interoperability and Associated Risks
-Audits and Assessments
-Operating Environment
-Secure Sourcing Strategy
Domain 3: Cryptographic Principles
-Applications of Cryptography
-Vet Proprietary Cryptography & Design Testable Cryptographic Systems
-Computational Overhead & Useful Life
-Key Management
-Key Life Cycle
-Public Key Infrastructure
-Design Validation
Domain 4: Security Architecture Analysis
-Risk Analysis
-Product Assurance Evaluation Criteria
-Assurance through Evaluation
-Architecture Frameworks
-Design Process
Domain 5: Technology Related Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
-Planning Phases and Deliverables
-Risk Analysis
-Business Impact Analysis
-Selecting a Recovery Strategy for Technology
-Bringing It All Together – A Sample "Walk Through" of a DR Plan
-Step by Step Guide for Disaster Recovery Planning for Security Architects
-References
Domain 6: Physical Security Considerations
-Physical Security Policies and Standards
-Physical Security Risks
-Protection Plans
Appendix A: Answers to Review Questions
Index
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan