Home > Computing and Information Technology > Computer certification > ISC2 CISSP Certified Information Systems Security Professional Official Study Guide: (Sybex Study Guide)
33%
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide: (Sybex Study Guide)

ISC2 CISSP Certified Information Systems Security Professional Official Study Guide: (Sybex Study Guide)

          
5
4
3
2
1

In Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

CISSP Study Guide - fully updated for the 2024 CISSP Body of Knowledge ISC2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 10th Edition has been completely updated based on the latest 2024 CISSP Detailed Content Outline. This bestselling Sybex Study Guide covers 100% of the CISSP objectives. You'll prepare smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic Study Essentials and chapter review questions. The book’s co-authors bring decades of experience as cybersecurity practitioners and educators, integrating real-world expertise with the practical knowledge you'll need to successfully prove your CISSP mastery. Combined, they've taught cybersecurity concepts to millions of students through their books, video courses, and live training programs. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Over 900 practice test questions with complete answer explanations. This includes all of the questions from the book plus four additional online-only practice exams, each with 125 unique questions. You can use the online-only practice exams as full exam simulations. Our questions will help you identify where you need to study more. More than 1000 Electronic Flashcards to reinforce your learning and give you last-minute test prep  A searchable glossary in PDF to give you instant access to the key terms you need to know  Audio Review. Author Mike Chapple reads the Study Essentials for each chapter providing you with more than 2 hours of up-to-date audio review for yet another way to reinforce your knowledge as you prepare. Coverage of all of the CISSP topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Architecture and Engineering Communication and Network Security Identity and Access Management (IAM) Security Assessment and Testing Security Operations Software Development Security  

Table of Contents:
Introduction xxxv Assessment Test lx Chapter 1 Security Governance Through Principles and Policies 1 Security 101 3 Understand and Apply Security Concepts 4 Security Boundaries 13 Evaluate and Apply Security Governance Principles 14 Manage the Security Function 16 Security Policy, Standards, Procedures, and Guidelines 27 Threat Modeling 29 Supply Chain Risk Management 35 Summary 38 Study Essentials 39 Written Lab 41 Review Questions 42 Chapter 2 Personnel Security and Risk Management Concepts 49 Personnel Security Policies and Procedures 51 Understand and Apply Risk Management Concepts 60 Social Engineering 90 Establish and Maintain a Security Awareness, Education, and Training Program 106 Summary 110 Study Essentials 111 Written Lab 114 Review Questions 115 Chapter 3 Business Continuity Planning 121 Planning for Business Continuity 122 Project Scope and Planning 123 Business Impact Analysis 131 Continuity Planning 137 Plan Approval and Implementation 140 Summary 145 Study Essentials 145 Written Lab 146 Review Questions 147 Chapter 4 Laws, Regulations, and Compliance 151 Categories of Laws 152 Laws 155 State Privacy Laws 179 Compliance 179 Contracting and Procurement 181 Summary 182 Study Essentials 182 Written Lab 184 Review Questions 185 Chapter 5 Protecting Security of Assets 189 Identifying and Classifying Information and Assets 190 Establishing Information and Asset Handling Requirements 198 Data Protection Methods 208 Understanding Data Roles 214 Using Security Baselines 216 Summary 219 Study Essentials 220 Written Lab 221 Review Questions 222 Chapter 6 Cryptography and Symmetric Key Algorithms 227 Cryptographic Foundations 228 Modern Cryptography 246 Symmetric Cryptography 253 Cryptographic Life Cycle 263 Summary 264 Study Essentials 264 Written Lab 266 Review Questions 267 Chapter 7 PKI and Cryptographic Applications 271 Asymmetric Cryptography 272 Hash Functions 279 Digital Signatures 283 Public Key Infrastructure 286 Asymmetric Key Management 292 Hybrid Cryptography 293 Applied Cryptography 294 Cryptographic Attacks 306 Summary 309 Study Essentials 310 Written Lab 311 Review Questions 312 Chapter 8 Principles of Security Models, Design, and Capabilities 317 Secure Design Principles 319 Techniques for Ensuring CIA 330 Understand the Fundamental Concepts of Security Models 332 Select Controls Based on Systems Security Requirements 345 Understand Security Capabilities of Information Systems 349 Summary 352 Study Essentials 353 Written Lab 354 Review Questions 355 Chapter 9 Security Vulnerabilities, Threats, and Countermeasures 359 Shared Responsibility 360 Data Localization and Data Sovereignty 362 Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements 363 Client‐Based Systems 378 Server‐Based Systems 381 Industrial Control Systems 384 Distributed Systems 386 High‐Performance Computing (HPC) Systems 387 Real‐Time Operating Systems 388 Internet of Things 389 Edge and Fog Computing 390 Embedded Devices and Cyber‐Physical Systems 391 Microservices 396 Infrastructure as Code 397 Immutable Architecture 398 Virtualized Systems 399 Containerization 406 Mobile Devices 407 Essential Security Protection Mechanisms 424 Common Security Architecture Flaws and Issues 427 Summary 431 Study Essentials 432 Written Lab 436 Review Questions 437 Chapter 10 Physical Security Requirements 443 Apply Security Principles to Site and Facility Design 444 Implement Site and Facility Security Controls 449 Implement and Manage Physical Security 473 Summary 480 Study Essentials 481 Written Lab 484 Review Questions 485 Chapter 11 Secure Network Architecture and Components 491 OSI Model 493 TCP/IP Model 501 Analyzing Network Traffic 502 Common Application Layer Protocols 503 Transport Layer Protocols 504 Domain Name System 506 Internet Protocol (IP) Networking 512 ARP Concerns 516 Secure Communication Protocols 517 Implications of Multilayer Protocols 518 Segmentation 523 Edge Networks 526 Wireless Networks 527 Satellite Communications 543 Cellular Networks 544 Content Distribution Networks (CDNs) 544 Secure Network Components 545 Summary 572 Study Essentials 573 Written Lab 575 Review Questions 576 Chapter 12 Secure Communications and Network Attacks 581 Protocol Security Mechanisms 582 Secure Voice Communications 587 Remote Access Security Management 591 Multimedia Collaboration 595 Monitoring and Management 597 Load Balancing 597 Manage Email Security 600 Virtual Private Network 606 Switching and Virtual LANs 613 Network Address Translation 617 Third‐Party Connectivity 622 Switching Technologies 624 WAN Technologies 626 Fiber‐Optic Links 629 Prevent or Mitigate Network Attacks 630 Summary 631 Study Essentials 632 Written Lab 635 Review Questions 636 Chapter 13 Managing Identity and Authentication 641 Controlling Access to Assets 643 The AAA Model 645 Implementing Identity Management 662 Managing the Identity and Access Provisioning Life Cycle 668 Summary 672 Study Essentials 672 Written Lab 675 Review Questions 676 Chapter 14 Controlling and Monitoring Access 681 Comparing Access Control Models 682 Implementing Authentication Systems 694 Zero‐Trust Access Policy Enforcement 702 Understanding Access Control Attacks 703 Summary 719 Study Essentials 720 Written Lab 721 Review Questions 722 Chapter 15 Security Assessment and Testing 727 Building a Security Assessment and Testing Program 729 Performing Vulnerability Assessments 735 Testing Your Software 750 Training and Exercises 758 Implementing Security Management Processes and Collecting Security Process Data 759 Summary 762 Exam Essentials 763 Written Lab 764 Review Questions 765 Chapter 16 Managing Security Operations 769 Apply Foundational Security Operations Concepts 771 Address Personnel Safety and Security 778 Provision Information and Assets Securely 780 Managed Services in the Cloud 786 Perform Configuration Management (CM) 790 Manage Change 793 Manage Patches and Reduce Vulnerabilities 797 Summary 801 Study Essentials 802 Written Lab 804 Review Questions 805 Chapter 17 Preventing and Responding to Incidents 809 Conducting Incident Management 811 Implementing Detection and Preventive Measures 818 Logging and Monitoring 842 Automating Incident Response 854 Summary 860 Study Essentials 860 Written Lab 863 Review Questions 864 Chapter 18 Disaster Recovery Planning 869 The Nature of Disaster 871 Understand System Resilience, High Availability, and Fault Tolerance 883 Recovery Strategy 888 Recovery Plan Development 898 Training, Awareness, and Documentation 906 Testing and Maintenance 907 Summary 911 Study Essentials 912 Written Lab 913 Review Questions 914 Chapter 19 Investigations and Ethics 919 Investigations 920 Major Categories of Computer Crime 934 Ethics 940 Summary 944 Study Essentials 945 Written Lab 946 Review Questions 947 Chapter 20 Software Development Security 951 Introducing Systems Development Controls 953 Establishing Databases and Data Warehousing 984 Storage Threats 994 Understanding Knowledge‐ Based Systems 995 Summary 998 Study Essentials 998 Written Lab 1000 Review Questions 1001 Chapter 21 Malicious Code and Application Attacks 1005 Malware 1006 Malware Prevention 1018 Application Attacks 1021 Injection Vulnerabilities 1024 Exploiting Authorization Vulnerabilities 1030 Exploiting Web Application Vulnerabilities 1033 Application Security Controls 1038 Secure Coding Practices 1044 Summary 1048 Study Essentials 1048 Written Lab 1049 Review Questions 1050 Appendix A Answers to Review Questions 1055 Chapter 1: Security Governance Through Principles and Policies 1056 Chapter 2: Personnel Security and Risk Management Concepts 1059 Chapter 3: Business Continuity Planning 1063 Chapter 4: Laws, Regulations, and Compliance 1065 Chapter 5: Protecting Security of Assets 1068 Chapter 6: Cryptography and Symmetric Key Algorithms 1070 Chapter 7: PKI and Cryptographic Applications 1072 Chapter 8: Principles of Security Models, Design, and Capabilities 1074 Chapter 9: Security Vulnerabilities, Threats, and Countermeasures 1077 Chapter 10: Physical Security Requirements 1082 Chapter 11: Secure Network Architecture and Components 1085 Chapter 12: Secure Communications and Network Attacks 1089 Chapter 13: Managing Identity and Authentication 1092 Chapter 14: Controlling and Monitoring Access 1095 Chapter 15: Security Assessment and Testing 1097 Chapter 16: Managing Security Operations 1099 Chapter 17: Preventing and Responding to Incidents 1102 Chapter 18: Disaster Recovery Planning 1104 Chapter 19: Investigations and Ethics 1106 Chapter 20: Software Development Security 1108 Chapter 21: Malicious Code and Application Attacks 1111 Appendix B Answers to Written Labs 1115 Chapter 1: Security Governance Through Principles and Policies 1116 Chapter 2: Personnel Security and Risk Management Concepts 1116 Chapter 3: Business Continuity Planning 1117 Chapter 4: Laws, Regulations, and Compliance 1118 Chapter 5: Protecting Security of Assets 1119 Chapter 6: Cryptography and Symmetric Key Algorithms 1119 Chapter 7: PKI and Cryptographic Applications 1120 Chapter 8: Principles of Security Models, Design, and Capabilities 1121 Chapter 9: Security Vulnerabilities, Threats, and Countermeasures 1121 Chapter 10: Physical Security Requirements 1123 Chapter 11: Secure Network Architecture and Components 1124 Chapter 12: Secure Communications and Network Attacks 1125 Chapter 13: Managing Identity and Authentication 1126 Chapter 14: Controlling and Monitoring Access 1127 Chapter 15: Security Assessment and Testing 1127 Chapter 16: Managing Security Operations 1128 Chapter 17: Preventing and Responding to Incidents 1129 Chapter 18: Disaster Recovery Planning 1130 Chapter 19: Investigations and Ethics 1131 Chapter 20: Software Development Security 1131 Chapter 21: Malicious Code and Application Attacks 1131 Index 1133


Best Sellers


Product Details
  • ISBN-13: 9781394254699
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Sybex Inc.,U.S.
  • Height: 231 mm
  • No of Pages: 1248
  • Returnable: Y
  • Series Title: Sybex Study Guide
  • Weight: 1610 gr
  • ISBN-10: 1394254695
  • Publisher Date: 12 Jun 2024
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Returnable: Y
  • Spine Width: 41 mm
  • Width: 183 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide: (Sybex Study Guide)
John Wiley & Sons Inc -
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide: (Sybex Study Guide)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

ISC2 CISSP Certified Information Systems Security Professional Official Study Guide: (Sybex Study Guide)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA