menu
{ "item_title" : "CISSP Exam Study Guide", "item_author" : [" Richie Miller "], "item_description" : "If you want to become a Cybersecurity Professional, this book is for youIf you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. Whether you want to become an Infrastructure Engineer, IT Security Analyst or any other Cybersecurity Professional, this book will certainly help you get thereBUY THIS BOOK NOW AND GET STARTED TODAYIn this book you will discover:Secure Networking ProtocolsHost or Application Security SolutionsCoding, Fuzzing & Quality TestingHow to Implement Secure Network DesignsNetwork Access Control, Port Security & Loop ProtectionSpanning Tree, DHCP Snooping & MAC FilteringAccess Control Lists & Route SecurityIntrusion Detection and PreventionFirewalls & Unified Threat ManagementHow to Install and Configure Wireless SecurityHow to Implement Secure Mobile SolutionsGeo-tagging & Context-Aware AuthenticationHow to Apply Cybersecurity Solutions to the CloudHow to Implement Identity and Account Management ControlsHow to Implement Authentication and Authorization SolutionsHow to Implement Public Key InfrastructureFile Manipulation & Packet CapturesForensics & Exploitation FrameworksData Sanitization ToolsHow to Apply Policies, Processes and Procedures for Incident ResponseDetection and AnalysisTest Scenarios & SimulationsThreat Intelligence LifecycleDisaster Recovery & Business ContinuityHow to Implement Data Sources to Support an InvestigationRetention Auditing, Compliance & MetadataHow to Implement Mitigation Techniques to Secure an EnvironmentMobile Device ManagementDLP, Content Filters & URL FiltersKey Aspects of Digital ForensicsChain of Custody & Legal HoldFirst Responder Best PracticesNetwork Traffic and LogsScreenshots & WitnessesPreservation of EvidenceData IntegrityJurisdictional Issues & Data Breach Notification LawsThreat Types & Access ControlApplicable Regulations, Standards, & FrameworksBenchmarks & Secure Configuration GuidesHow to Implement Policies for Organizational SecurityMonitoring & BalancingAwareness & Skills TrainingTechnology & Vendor DiversityChange Management & Asset ManagementRisk Management Process and ConceptsRisk Register, Risk Matrix, and Heat MapRegulatory ExamplesQualitative and Quantitative AnalysisBusiness Impact AnalysisIdentification of Critical SystemsOrder of RestorationContinuity of OperationsPrivacy and Sensitive Data ConceptsIncident Notification and EscalationData ClassificationPrivacy-enhancing TechnologiesData Owners & ResponsibilitiesInformation LifecycleBUY THIS BOOK NOW AND GET STARTED TODAY", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/1/83/938/183/1839381833_b.jpg", "price_data" : { "retail_price" : "31.38", "online_price" : "31.38", "our_price" : "31.38", "club_price" : "31.38", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
CISSP Exam Study Guide|Richie Miller

CISSP Exam Study Guide : NIST Framework, Digital Forensics & Cybersecurity Governance

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

If you want to become a Cybersecurity Professional, this book is for you
If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. Whether you want to become an Infrastructure Engineer, IT Security Analyst or any other Cybersecurity Professional, this book will certainly help you get there

BUY THIS BOOK NOW AND GET STARTED TODAY

In this book you will discover:

Secure Networking Protocols

Host or Application Security Solutions

Coding, Fuzzing & Quality Testing

How to Implement Secure Network Designs

Network Access Control, Port Security & Loop Protection

Spanning Tree, DHCP Snooping & MAC Filtering

Access Control Lists & Route Security

Intrusion Detection and Prevention

Firewalls & Unified Threat Management

How to Install and Configure Wireless Security

How to Implement Secure Mobile Solutions

Geo-tagging & Context-Aware Authentication

How to Apply Cybersecurity Solutions to the Cloud

How to Implement Identity and Account Management Controls

How to Implement Authentication and Authorization Solutions

How to Implement Public Key Infrastructure

File Manipulation & Packet Captures

Forensics & Exploitation Frameworks

Data Sanitization Tools

How to Apply Policies, Processes and Procedures for Incident Response

Detection and Analysis

Test Scenarios & Simulations

Threat Intelligence Lifecycle

Disaster Recovery & Business Continuity

How to Implement Data Sources to Support an Investigation

Retention Auditing, Compliance & Metadata

How to Implement Mitigation Techniques to Secure an Environment

Mobile Device Management

DLP, Content Filters & URL Filters

Key Aspects of Digital Forensics

Chain of Custody & Legal Hold

First Responder Best Practices

Network Traffic and Logs

Screenshots & Witnesses

Preservation of Evidence

Data Integrity

Jurisdictional Issues & Data Breach Notification Laws

Threat Types & Access Control

Applicable Regulations, Standards, & Frameworks

Benchmarks & Secure Configuration Guides

How to Implement Policies for Organizational Security

Monitoring & Balancing

Awareness & Skills Training

Technology & Vendor Diversity

Change Management & Asset Management

Risk Management Process and Concepts

Risk Register, Risk Matrix, and Heat Map

Regulatory Examples

Qualitative and Quantitative Analysis

Business Impact Analysis

Identification of Critical Systems

Order of Restoration

Continuity of Operations

Privacy and Sensitive Data Concepts

Incident Notification and Escalation

Data Classification

Privacy-enhancing Technologies

Data Owners & Responsibilities

Information Lifecycle

BUY THIS BOOK NOW AND GET STARTED TODAY

This item is Non-Returnable

Details

  • ISBN-13: 9781839381836
  • ISBN-10: 1839381833
  • Publisher: Pastor Publishing Ltd
  • Publish Date: January 2023
  • Dimensions: 9 x 6 x 0.99 inches
  • Shipping Weight: 1.44 pounds
  • Page Count: 492

Related Categories

You May Also Like...

    1

BAM Customer Reviews