Introduction. Part I: Certification Basics.
Chapter 1: (ISC)2 and the CISSP Certification.
Chapter 2: The Common Body of Knowledge (CBK).
Chapter 3: Putting Your Certifi cation to Good Use.
Part II: Domains.
Chapter 4: Access Control.
Chapter 5: Application Development Security.
Chapter 6: Business Continuity and Disaster Recovery Planning.
Chapter 7: Cryptography.
Chapter 8: Information Security Governance and Risk Management.
Chapter 9: Legal, Regulations, Investigations, and Compliance.
Chapter 10: Operations Security.
Chapter 11: Physical (Environmental) Security.
Chapter 12: Security Architecture and Design.
Chapter 13: Telecommunications and Network Security.
Part III: The Part of Tens.
Chapter 14: Ten Test Preparation Tips.
Chapter 15: Ten Test Day Tips.
Chapter 16: Ten Points to Remember from Each of the Ten
Domains.
Chapter 17: Ten More Sources for Security Certifications.
Chapter 18: Ten Security Web Sites.
Chapter 19: Ten Essential Reference Books.
Part IV: Appendixes.
Appendix A: About the CD-ROM.
Appendix B: Sample CISSP Study Questions.
Appendix C: Practice Answer Sheets.
Appendix D: Glossary.
Index.
Lawrence Miller has worked in information security and technology management for more than a decade. He is currently the IT Operations Manager for a major U.S. law firm. Peter H. Gregory, CISA, CISSP is the author of 20 books on security and technology, and is the security and risk manager for one of the world's largest online corporate travel and expense management service providers.
Ask a Question About this Product More... |