9780789755537

CISSP Exam Cram

by
  • ISBN13:

    9780789755537

  • ISBN10:

    078975553X

  • Edition: 4th
  • Format: Paperback
  • Copyright: 8/19/2016
  • Publisher: Pearson IT Certification

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99 Save up to $12.50
  • Rent Book $37.49
    Add to Cart Free Shipping

    TERM
    PRICE
    DUE

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Summary

CISSP Exam Cram, Fourth Edition, is the perfect study guide to help you pass the new eight domain version of the CISSP exam. It provides coverage and practice questions for every exam topic, including substantial new coverage of encryption, cloud security, information lifecycles, security management/governance, and more. The book contains an extensive set of preparation tools, such as quizzes, Exam Alerts, and two practice exams, while the companion website’s test engine provides real-time practice and feedback.

 

Covers the critical information you’ll need to pass the CISSP exam!


  • Enforce foundational security operations concepts
  • Apply reliable authentication, authorization, and accountability
  • Design security architectures that can be verified, certified, and accredited
  • Understand the newest attacks and countermeasures
  • Use encryption to safeguard data, systems, and networks
  • Systematically plan and test business continuity/disaster recovery programs
  • Protect today’s cloud, web, and database applications
  • Address global compliance issues, from privacy to computer forensics
  • Develop software that is secure throughout its entire lifecycle
  • Implement effective security governance and risk management
  • Use best-practice policies, procedures, guidelines, and controls
  • Ensure strong operational controls, from background checks to security audits


Author Biography

As the CEO of Superior Solutions, Inc., a Houston-based IT security consulting and auditing firm, Michael Gregg has more than 20 years of experience in information security and risk management. He holds two associate’s degrees, a bachelor’s degree, and a master’s degree. Some of the certifications he holds include CISSP, SSCP, MCSE, CTT+, A+, N+, Security+, CASP, CCNA, GSEC, CEH, CHFI, CEI, CISA, CISM, and CGEIT.

 

In addition to his experience with performing security audits and assessments, Gregg has authored or coauthored more than 20 books, including Certified Ethical Hacker Exam Prep (Que), CISSP Exam Cram 2 (Que), and Security Administrator Street Smarts (Sybex). He has testified before U.S. Congress, his articles have been published on IT websites, and he has been sourced as an industry expert for CBS, ABC, CNN, Fox News and the New York Times. He has created more than 15 security-related courses and training classes for various companies and universities. Although audits and assessments are where he spends the bulk of his time, teaching and contributing to the written body of IT security knowledge are how Michael believes he can give something back to the community that has given him so much.

 

He is a board member for Habitat for Humanity and when not working, Michael enjoys traveling and restoring muscle cars.

Table of Contents

Chapter 1: The CISSP Certification Exam
Chapter 2: Physical (environmental) Security

Chapter 3: Access Control

Chapter 4: Cryptography

Chapter 5: Security Architecture and Design
Chapter 6: Telecommunications and Network Security
Chapter 7: Business Continuity and Disaster Recovery Planning
Chapter 8: Legal Regulations Investigations and Compliance

Chapter 9: Software Development Security
Chapter 10: Security Operations

Chapter 11: Information Security and Governance and Risk Management

Chapter 12: Practice Exam 1

Chapter 13: Answers to Practice Exam 1

Chapter 14: Practice Exam 2

Chapter 15: Answers to Practice Exam 2

Chapter 16: What’s on the CD

Glossary

Index

Rewards Program

Write a Review