Prix bas
CHF46.80
Habituellement expédié sous 2 à 4 semaines.
Prepare for the ISC2 Certified in Cybersecurity exam, as well as a new career in cybersecurity, with this effective study guide. Complete with full color illustrations!
In Certified in Cybersecurity Study Guide, veteran IT and cybersecurity educator Mike Chapple delivers a one-stop resource for anyone planning to pursue the ISC2 Certified in Cybersecurity credential, as well as those getting ready to take on a challenging and rewarding new career in cybersecurity. The author walks you through the info you'll need to succeed on both the exam and in your first day at a cybersecurity-focused job, using full-color illustrations to highlight and emphasize the concepts discussed inside.
Complete with an online practice test, this book comprehensively covers every competency and domain tested by the new exam, including security principles, business continuity, disaster recovery, incident response, access control concepts, network security, and security operations. You'll also find:
A clear and effective pathway to the Certified in Cybersecurity credential, as well as a fresh career in cybersecurity, the Certified in Cybersecurity Study Guide offers the foundational knowledge, skills, and abilities you need to get started in an exciting and rewarding career.
Auteur
ABOUT THE AUTHOR Mike Chapple, PhD, CIPM, CIPP/US, CISSP, is a teaching professor in the IT, Analytics, and Operations Department at the University of Notre Dame's Mendoza College of Business. He is the author of several bestselling information technology certification guides and has over two decades' experience in higher education, the private sector, and government IT.
Texte du rabat
Your expert guide to preparing for the Certified in Cybersecurity exam The CC SM Certified in Cybersecurity Study Guide is your one-stop resource for comprehensive coverage of ISC2's entry level Certified in Cybersecurity exam. This Sybex Study Guide covers all the exam's domain competencies. Prepare for the test smarter and faster with Sybex thanks to 4-color, illustrated content full of visual prompts, assessment tests that validate and measure exam readiness, objective maps, real-world examples and scenarios, practical exercises, and challenging chapter review questions. Reinforce and remember what you've learned with the Sybex online learning environment and test bank, accessible across multiple devices. Get prepared for the Certified in Cybersecurity exam with Sybex. Coverage of 100% of all exam objectives in this Study Guide means you'll be ready for each of the 5 ISC2 Certified in Cybersecurity domains:
Security Operations Interactive learning environment Take your exam prep to the next level with Sybex's superior interactive online study tools. To access our learning environment, simply visit www.wiley.com/go/sybextestprep, register your book to receive your unique PIN, and instantly gain one year of FREE access after activation to:
Contenu
Introduction xvii Part I Domain 1: Security Principles 1 Chapter 1 Confidentiality, Integrity, Availability, and Non-repudiation 3 The CIA Triad 4 Non-repudiation 7 Chapter 2 Authentication and Authorization 11 Access Control Process 11 Password Policies 13 Authentication Factors 16 Chapter 3 Privacy 23 Privacy 23 Privacy Management Framework 25 Chapter 4 Risk Management 35 Risk Types 35 Risk Identification and Assessment 37 Risk Treatment Strategies 39 Risk Profile and Tolerance 40 Chapter 5 Security Controls 45 What Are Security Controls? 45 Categorizing Security Controls 46 Chapter 6 Ethics 51 Corporate Ethics Codes 51 ISC2 Code of Ethics 52 Ethics Complaint Procedure 54 Chapter 7 Security Governance Processes 59 Security Policies and Procedures 59 Laws and Regulations 61 Chapple213832_ftoc.indd 13 22-11-2023 12:53:06 Part II Domain 2: Business Continuity (bc), Disaster Recovery (dr) & Incident Response (ir) Concepts 65 Chapter 8 Business Continuity 67 Business Continuity Planning 67 Business Continuity Controls 69 High Availability and Fault Tolerance 71 Chapter 9 Disaster Recovery 79 Disaster Recovery Planning 79 Backups 81 Disaster Recovery Sites 83 Testing Disaster Recovery Plans 85 Chapter 10 Incident Response 89 Creating an Incident Response Program 89 Building an Incident Response Team 91 Incident Communications Plan 92 Incident Identification and Response 93 Part III Domain 3: Access Controls Concepts 99 Chapter 11 Physical Access Controls 101 Physical Facilities 101 Designing for Security 104 Visitor Management 106 Physical Security Personnel 106 Chapter 12 Logical Access Controls 111 Authorization 111 Account Types 114 Non- repudiation 115 Part IV Domain 4: Network Security 119 Chapter 13 Computer Networking 121 Network Types 121 TCP/IP Networking 122 IP Addressing 124 Network Ports and Applications 128 Securing Wi- Fi Networks 129 Chapter 14 Network Threats and Attacks 137 Malware 137 Eavesdropping Attacks 139 Denial- of- Service Attacks 140 Side- Channel Attacks 142 Chapter 15 Threat Identification and Prevention 145 Antivirus Software 145 Intrusion Detection and Prevention 146 Firewalls 148 Vulnerability Scanning 149 Chapter 16 Network Security Infrastructure 155 Data Center Protection 156 Network Security Zones 158 Switches, WAPs, and Routers 159 Network Segmentation 161 Virtual Private Networks 162 Network Access Control 163 Internet of Things 165 Chapter 17 Cloud Computing 169 Cloud Computing 169 Cloud Deployment Models 171 Cloud Service Categories 172 Security and the Shared Responsibility Model 174 Automation and Orchestration 174 Vendor Relationships 175 Part V Domain 5: Security Operations 179 Chapter 18 Encryption 181 Cryptography 181 Encryption Algorithms 183 Uses of Encryption 186 Hash Functions 187 Chapter 19 Data Handling 193 Data Life Cycle 193 Data Classification 196 Chapter 20 Logging and Monitoring 201 Logging 201 Log Monitoring 202 Chapter 21 Configuration Management 207 Configuration Management 207 Configuration Vulnerabilities 208 Chapter 22 Best Practice Security Policies 213 Acceptable Use Policy 213 Data Handling Policy 214 Password Policy 214 Bring Your Own Device Policy 214 Privacy Policy 214 Change Management Policy 215 Chapter 23 Security Awareness Training 219 Social Engineering 219 Security Education 221 Index 227