40,20 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
Your expert guide to preparing for the Certified in Cybersecurity exam
The CC SM Certified in Cybersecurity Study Guide is your one-stop resource for comprehensive coverage of ISC2's entry level Certified in Cybersecurity exam. This Sybex Study Guide covers all the exam's domain competencies. Prepare for the test smarter and faster with Sybex thanks to 4-color, illustrated content full of visual prompts, assessment tests that validate and measure exam readiness, objective maps, real-world examples and scenarios, practical exercises, and challenging chapter review questions. Reinforce and remember what you've learned with the Sybex online learning environment and test bank, accessible across multiple devices. Get prepared for the Certified in Cybersecurity exam with Sybex.
Coverage of 100% of all exam objectives in this Study Guide means you'll be ready for each of the 5 ISC2 Certified in Cybersecurity domains:
- Security Principles
- Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concept
- Access Controls Concepts
- Network Security
- Security Operations
Interactive learning environment
Take your exam prep to the next level with Sybex's superior interactive online study tools. To access our learning environment, simply visit [...] register your book to receive your unique PIN, and instantly gain one year of FREE access after activation to:
Interactive test bank with a bonus practice exam to help you identify areas where further review is needed. Get more than 90% of the answers correct, and you're ready to take the certification exam. 100 electronic flashcards to reinforce learning and last-minute prep before the exam. Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared.ABOUT THE CERTIFIED IN CYBERSECURITY PROGRAM
Certified in Cybersecurity demonstrates your knowledge of the foundational skills and abilities required in an entry- or junior-level cybersecurity role. It proves your understanding of fundamental security best practices, policies, and procedures.
Your expert guide to preparing for the Certified in Cybersecurity exam
The CC SM Certified in Cybersecurity Study Guide is your one-stop resource for comprehensive coverage of ISC2's entry level Certified in Cybersecurity exam. This Sybex Study Guide covers all the exam's domain competencies. Prepare for the test smarter and faster with Sybex thanks to 4-color, illustrated content full of visual prompts, assessment tests that validate and measure exam readiness, objective maps, real-world examples and scenarios, practical exercises, and challenging chapter review questions. Reinforce and remember what you've learned with the Sybex online learning environment and test bank, accessible across multiple devices. Get prepared for the Certified in Cybersecurity exam with Sybex.
Coverage of 100% of all exam objectives in this Study Guide means you'll be ready for each of the 5 ISC2 Certified in Cybersecurity domains:
- Security Principles
- Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concept
- Access Controls Concepts
- Network Security
- Security Operations
Interactive learning environment
Take your exam prep to the next level with Sybex's superior interactive online study tools. To access our learning environment, simply visit [...] register your book to receive your unique PIN, and instantly gain one year of FREE access after activation to:
Interactive test bank with a bonus practice exam to help you identify areas where further review is needed. Get more than 90% of the answers correct, and you're ready to take the certification exam. 100 electronic flashcards to reinforce learning and last-minute prep before the exam. Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared.ABOUT THE CERTIFIED IN CYBERSECURITY PROGRAM
Certified in Cybersecurity demonstrates your knowledge of the foundational skills and abilities required in an entry- or junior-level cybersecurity role. It proves your understanding of fundamental security best practices, policies, and procedures.
ABOUT THE AUTHOR
Mike Chapple, PhD, CIPM, CIPP/US, CISSP, is a teaching professor in the IT, Analytics, and Operations Department at the University of Notre Dame's Mendoza College of Business. He is the author of several bestselling information technology certification guides and has over two decades' experience in higher education, the private sector, and government IT.
Introduction xvii
Part I Domain 1: Security Principles 1
Chapter 1 Confidentiality, Integrity, Availability, and Non-repudiation 3
The CIA Triad 4
Non-repudiation 7
Chapter 2 Authentication and Authorization 11
Access Control Process 11
Password Policies 13
Authentication Factors 16
Chapter 3 Privacy 23
Privacy 23
Privacy Management Framework 25
Chapter 4 Risk Management 35
Risk Types 35
Risk Identification and Assessment 37
Risk Treatment Strategies 39
Risk Profile and Tolerance 40
Chapter 5 Security Controls 45
What Are Security Controls? 45
Categorizing Security Controls 46
Chapter 6 Ethics 51
Corporate Ethics Codes 51
ISC2 Code of Ethics 52
Ethics Complaint Procedure 54
Chapter 7 Security Governance Processes 59
Security Policies and Procedures 59
Laws and Regulations 61
[...] 13 22-11-2023 12:53:06
Part II Domain 2: Business Continuity (bc), Disaster Recovery (dr) & Incident Response (ir) Concepts 65
Chapter 8 Business Continuity 67
Business Continuity Planning 67
Business Continuity Controls 69
High Availability and Fault Tolerance 71
Chapter 9 Disaster Recovery 79
Disaster Recovery Planning 79
Backups 81
Disaster Recovery Sites 83
Testing Disaster Recovery Plans 85
Chapter 10 Incident Response 89
Creating an Incident Response Program 89
Building an Incident Response Team 91
Incident Communications Plan 92
Incident Identification and Response 93
Part III Domain 3: Access Controls Concepts 99
Chapter 11 Physical Access Controls 101
Physical Facilities 101
Designing for Security 104
Visitor Management 106
Physical Security Personnel 106
Chapter 12 Logical Access Controls 111
Authorization 111
Account Types 114
Non- repudiation 115
Part IV Domain 4: Network Security 119
Chapter 13 Computer Networking 121
Network Types 121
TCP/IP Networking 122
IP Addressing 124
Network Ports and Applications 128
Securing Wi- Fi Networks 129
Chapter 14 Network Threats and Attacks 137
Malware 137
Eavesdropping Attacks 139
Denial- of- Service Attacks 140
Side- Channel Attacks 142
Chapter 15 Threat Identification and Prevention 145
Antivirus Software 145
Intrusion Detection and Prevention 146
Firewalls 148
Vulnerability Scanning 149
Chapter 16 Network Security Infrastructure 155
Data Center Protection 156
Network Security Zones 158
Switches, WAPs, and Routers 159
Network Segmentation 161
Virtual Private Networks 162
Network Access Control 163
Internet of Things 165
Chapter 17 Cloud Computing 169
Cloud Computing 169
Cloud Deployment Models 171
Cloud Service Categories 172
Security and the Shared Responsibility Model 174
Automation and Orchestration 174
Vendor Relationships 175
Part V Domain 5: Security Operations 179
Chapter 18 Encryption 181
Cryptography 181
Encryption Algorithms 183
Uses of Encryption 186
Hash Functions 187
Chapter 19 Data Handling 193
Data Life Cycle 193
Data Classification 196
Chapter 20 Logging and Monitoring 201
Logging 201
Log Monitoring 202
Chapter 21 Configuration Management 207
Configuration Management 207
Configuration Vulnerabilities 208
Chapter 22 Best Practice Security Policies 213
Acceptable Use Policy 213
Data Handling Policy 214
Password Policy 214
Bring Your Own Device Policy 214
Privacy Policy 214
Change Management Policy 215
Chapter 23 Security Awareness Training 219
Social Engineering 219
Security Education 221
Index 227
Erscheinungsjahr: | 2024 |
---|---|
Fachbereich: | Unterricht |
Genre: | Erziehung & Bildung, Importe |
Rubrik: | Sozialwissenschaften |
Medium: | Taschenbuch |
Inhalt: |
Introduction xviiPart I Domain 1: Security Principles 1Chapter 1 Confidentiality
Integrity Availability and Non-repudiation 3The CIA Triad 4Non-repudiation 7Chapter 2 Authentication and Authorization 11Access Control Process 11Password Policies 13Auth |
ISBN-13: | 9781394213832 |
ISBN-10: | 1394213832 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Chapple, Mike |
Hersteller: | Wiley |
Maße: | 228 x 188 x 17 mm |
Von/Mit: | Mike Chapple |
Erscheinungsdatum: | 11.01.2024 |
Gewicht: | 0,487 kg |
ABOUT THE AUTHOR
Mike Chapple, PhD, CIPM, CIPP/US, CISSP, is a teaching professor in the IT, Analytics, and Operations Department at the University of Notre Dame's Mendoza College of Business. He is the author of several bestselling information technology certification guides and has over two decades' experience in higher education, the private sector, and government IT.
Introduction xvii
Part I Domain 1: Security Principles 1
Chapter 1 Confidentiality, Integrity, Availability, and Non-repudiation 3
The CIA Triad 4
Non-repudiation 7
Chapter 2 Authentication and Authorization 11
Access Control Process 11
Password Policies 13
Authentication Factors 16
Chapter 3 Privacy 23
Privacy 23
Privacy Management Framework 25
Chapter 4 Risk Management 35
Risk Types 35
Risk Identification and Assessment 37
Risk Treatment Strategies 39
Risk Profile and Tolerance 40
Chapter 5 Security Controls 45
What Are Security Controls? 45
Categorizing Security Controls 46
Chapter 6 Ethics 51
Corporate Ethics Codes 51
ISC2 Code of Ethics 52
Ethics Complaint Procedure 54
Chapter 7 Security Governance Processes 59
Security Policies and Procedures 59
Laws and Regulations 61
[...] 13 22-11-2023 12:53:06
Part II Domain 2: Business Continuity (bc), Disaster Recovery (dr) & Incident Response (ir) Concepts 65
Chapter 8 Business Continuity 67
Business Continuity Planning 67
Business Continuity Controls 69
High Availability and Fault Tolerance 71
Chapter 9 Disaster Recovery 79
Disaster Recovery Planning 79
Backups 81
Disaster Recovery Sites 83
Testing Disaster Recovery Plans 85
Chapter 10 Incident Response 89
Creating an Incident Response Program 89
Building an Incident Response Team 91
Incident Communications Plan 92
Incident Identification and Response 93
Part III Domain 3: Access Controls Concepts 99
Chapter 11 Physical Access Controls 101
Physical Facilities 101
Designing for Security 104
Visitor Management 106
Physical Security Personnel 106
Chapter 12 Logical Access Controls 111
Authorization 111
Account Types 114
Non- repudiation 115
Part IV Domain 4: Network Security 119
Chapter 13 Computer Networking 121
Network Types 121
TCP/IP Networking 122
IP Addressing 124
Network Ports and Applications 128
Securing Wi- Fi Networks 129
Chapter 14 Network Threats and Attacks 137
Malware 137
Eavesdropping Attacks 139
Denial- of- Service Attacks 140
Side- Channel Attacks 142
Chapter 15 Threat Identification and Prevention 145
Antivirus Software 145
Intrusion Detection and Prevention 146
Firewalls 148
Vulnerability Scanning 149
Chapter 16 Network Security Infrastructure 155
Data Center Protection 156
Network Security Zones 158
Switches, WAPs, and Routers 159
Network Segmentation 161
Virtual Private Networks 162
Network Access Control 163
Internet of Things 165
Chapter 17 Cloud Computing 169
Cloud Computing 169
Cloud Deployment Models 171
Cloud Service Categories 172
Security and the Shared Responsibility Model 174
Automation and Orchestration 174
Vendor Relationships 175
Part V Domain 5: Security Operations 179
Chapter 18 Encryption 181
Cryptography 181
Encryption Algorithms 183
Uses of Encryption 186
Hash Functions 187
Chapter 19 Data Handling 193
Data Life Cycle 193
Data Classification 196
Chapter 20 Logging and Monitoring 201
Logging 201
Log Monitoring 202
Chapter 21 Configuration Management 207
Configuration Management 207
Configuration Vulnerabilities 208
Chapter 22 Best Practice Security Policies 213
Acceptable Use Policy 213
Data Handling Policy 214
Password Policy 214
Bring Your Own Device Policy 214
Privacy Policy 214
Change Management Policy 215
Chapter 23 Security Awareness Training 219
Social Engineering 219
Security Education 221
Index 227
Erscheinungsjahr: | 2024 |
---|---|
Fachbereich: | Unterricht |
Genre: | Erziehung & Bildung, Importe |
Rubrik: | Sozialwissenschaften |
Medium: | Taschenbuch |
Inhalt: |
Introduction xviiPart I Domain 1: Security Principles 1Chapter 1 Confidentiality
Integrity Availability and Non-repudiation 3The CIA Triad 4Non-repudiation 7Chapter 2 Authentication and Authorization 11Access Control Process 11Password Policies 13Auth |
ISBN-13: | 9781394213832 |
ISBN-10: | 1394213832 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Chapple, Mike |
Hersteller: | Wiley |
Maße: | 228 x 188 x 17 mm |
Von/Mit: | Mike Chapple |
Erscheinungsdatum: | 11.01.2024 |
Gewicht: | 0,487 kg |