Limit search to available items
Record 500 of 2127
Previous Record Next Record
Book Cover
E-book
Author Miller, Lawrence, author

Title CISSP For Dummies / by Lawrence C. Miller and Peter H. Gregory
Edition Sixth edition
Published Hoboken, New Jersey : John Wiley and Sons, Inc., 2018
Online access available from:
ProQuest Ebook Central    View Resource Record  
Safari O'Reilly books online    View Resource Record  

Copies

Description 1 online resource
Series Learning made easy
Learning made easy
Contents Intro; Title Page; Copyright Page; Table of Contents; Introduction; About This Book; Foolish Assumptions; Icons Used in This Book; Beyond the Book; Where to Go from Here; Part 1 Getting Started with CISSP Certification; Chapter 1 (ISC)2 and the CISSP Certification; About (ISC)2 and the CISSP Certification; You Must Be This Tall to Ride This Ride (and Other Requirements); Preparing for the Exam; Studying on your own; Getting hands-on experience; Getting official (ISC)2 CISSP training; Attending other training courses or study groups; Take the practice exam; Are you ready for the exam?
Becoming an Active Member of Your Local Security ChapterSpreading the Good Word about CISSP Certification; Wear the colors proudly; Lead by example; Using Your CISSP Certification to Be an Agent of Change; Earning Other Certifications; Other (ISC)2 certifications; CISSP concentrations; Non-(ISC)2 certifications; Choosing the right certifications; Find a mentor, be a mentor; Pursue Security Excellence; Part 2 Certification Domains; Chapter 3 Security and Risk Management; Apply Security Governance Principles; Alignment of security function to business strategy, goals, mission, and objectives
Exercise the (ISC)2 Code of Professional EthicsSupport your organization's code of ethics; Develop and Implement Documented Security Policies, Standards, Procedures, and Guidelines; Policies; Standards (and baselines); Procedures; Guidelines; Understand Business Continuity Requirements; Develop and document project scope and plan; Conduct Business Impact Analysis; Developing the Business Continuity Plan; Implementing the BCP; Contribute to Personnel Security Policies; Employment candidate screening; Employment agreements and policies; Employment termination processes
Organizational processes (security executive oversight)Security roles and responsibilities; Control frameworks; Due care; Due diligence; Understand and Apply Concepts of Confidentiality, Integrity, and Availability; Confidentiality; Integrity; Availability; Compliance; Legislative and regulatory compliance; Privacy requirements compliance; Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context; Computer crimes; Licensing and intellectual property; Import/export controls; Trans-border data flow; Privacy; Data breaches; Understand Professional Ethics
Registering for the ExamAbout the CISSP Examination; After the Examination; Chapter 2 Putting Your Certification to Good Use; Networking with Other Security Professionals; Being an Active (ISC)2 Member; Considering (ISC)2 Volunteer Opportunities; Writing certification exam questions; Speaking at events; Helping at (ISC)2 conferences; Read and contribute to (ISC)2 publications; Support the (ISC)2 Center for Cyber Safety and Education; Participating in (ISC)2 focus groups; Join the (ISC)2 community; Get involved with a CISSP study group; Help others learn more about data security
Summary If youre a security professional seeking your CISSP certification, this expert guide is a perfect way to prepare for the exam. -- Edited summary from book
Bibliography Includes bibliographical references
Notes Online resource; title from PDF title page (EBSCO, viewed May 30, 2018)
Subject Computer networks -- Examinations -- Study guides
Electronic data processing personnel -- Certification
COMPUTER SCIENCE / General.
Computer networks -- Examinations.
Electronic data processing personnel -- Certification.
Genre/Form Study guides.
Form Electronic book
Author Gregory, Peter H., author
ISBN 1119506093
9781119506096