The Official ISC 2 Systems Security Certified Practitioner CBK Reference 6th Edition by Mike Wills – Ebook PDF Instant Download/Delivery: 1119874866 978-1119874867
Full download The Official ISC 2 Systems Security Certified Practitioner CBK Reference 6th edition after payment
Product details:
ISBN 10: 1119874866
ISBN 13: 978-1119874867
Author: Mike Wills
The only official body of knowledge for SSCP―(ISC)2’s popular credential for hands-on security professionals―fully revised and updated 2021 SSCP Exam Outline.
Systems Security Certified Practitioner (SSCP) is an elite, hands-on cybersecurity certification that validates the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures. SSCP certification―fully compliant with U.S. Department of Defense Directive 8140 and 8570 requirements―is valued throughout the IT security industry. The Official (ISC)2 SSCP CBK Reference is the only official Common Body of Knowledge (CBK) available for SSCP-level practitioners, exclusively from (ISC)2, the global leader in cybersecurity certification and training.
This authoritative volume contains essential knowledge practitioners require on a regular basis. Accurate, up-to-date chapters provide in-depth coverage of the seven SSCP domains: Security Operations and Administration; Access Controls; Risk Identification, Monitoring and Analysis; Incident Response and Recovery; Cryptography; Network and Communications Security; and Systems and Application Security.
The Official ISC 2 Systems Security Certified Practitioner CBK Reference 6th Table of contents:
-
Introduction
- Overview of SSCP and the Certification Process
- How This Book Helps You Prepare for the Exam
- Understanding the CBK Structure and Domains
- Exam Preparation Tips and Resources
-
Chapter 1: Access Controls
- Fundamentals of Access Control
- Access Control Models (Discretionary, Mandatory, Role-Based)
- Authentication, Authorization, and Accounting (AAA)
- Identity and Access Management (IAM)
- Secure Access Control Policies and Procedures
-
Chapter 2: Security Operations and Administration
- Security Governance and Risk Management
- Security Policies and Procedures
- Incident Response and Recovery
- Business Continuity and Disaster Recovery Planning
- Secure Configuration and Patch Management
- Security Awareness Training
-
Chapter 3: Risk Identification, Monitoring, and Analysis
- Risk Management Concepts
- Risk Assessment and Risk Mitigation
- Threat and Vulnerability Identification
- Security Monitoring and Logging
- Using Security Information and Event Management (SIEM) Systems
-
Chapter 4: Cryptography
- Introduction to Cryptography and Encryption Methods
- Cryptographic Protocols and Algorithms (AES, RSA, ECC)
- Public Key Infrastructure (PKI)
- Digital Signatures and Certificates
- Cryptographic Hashing and Data Integrity
-
Chapter 5: Network and Communications Security
- Network Security Fundamentals
- Secure Network Architecture and Design
- Virtual Private Networks (VPNs) and Secure Protocols (SSL/TLS, IPSec)
- Wireless Security
- Firewalls, IDS/IPS, and Network Segmentation
- Network Traffic Monitoring and Analysis
-
Chapter 6: Systems and Application Security
- Secure Software Development Life Cycle (SDLC)
- Application Security Best Practices
- Secure Systems Design and Configuration
- Operating System Hardening
- Database Security
- Vulnerability Management and Patch Deployment
-
Chapter 7: Security Assessment and Testing
- Security Testing Methodologies
- Penetration Testing and Vulnerability Scanning
- Security Audits and Risk Assessments
- Security Metrics and Reporting
- Tools for Security Testing
-
Chapter 8: Security Architectures and Models
- Security Architecture Principles and Frameworks
- Defense in Depth and Layered Security
- Security Models and Frameworks (Bell-LaPadula, Biba, Clark-Wilson)
- Cloud Security Architecture
- IoT and Mobile Device Security
-
Chapter 9: Legal, Regulations, Investigations, and Compliance
- Legal and Regulatory Considerations in Cybersecurity
- Privacy Laws and Data Protection (GDPR, HIPAA, PCI-DSS)
- Compliance Standards and Frameworks (ISO/IEC 27001, NIST)
- Digital Forensics and Incident Investigation
- Evidence Collection and Chain of Custody
-
Chapter 10: Secure Software Development and Security Programming
- Secure Coding Practices and Standards
- Application Threat Modeling
- Web Application Security (OWASP Top 10)
- Secure Application Deployment and Maintenance
-
Chapter 11: Cloud Security
- Cloud Computing Models and Security Challenges
- Cloud Service Providers and Third-Party Risk Management
- Cloud Security Controls and Best Practices
- Data Security and Compliance in the Cloud
-
Chapter 12: Managing Security Services and Operations
- IT Service Management (ITSM) and Security
- Managed Security Services Providers (MSSPs)
- Outsourcing and Third-Party Risk
- Security Metrics and Reporting to Management
-
Appendices
- Appendix A: SSCP Exam Blueprint and Domain Review
- Appendix B: Glossary of Terms
- Appendix C: Practice Questions and Answers
- Appendix D: Further Reading and Resources
-
Index
People also search for The Official ISC 2 Systems Security Certified Practitioner CBK Reference 6th:
the official (isc)2 ccsp cbk reference
the official (isc)2 sscp cbk reference
the official (isc)2 cissp cbk reference
the official (isc)2 guide to the cissp cbk reference
(isc)2 certified information systems security professional (cissp)
Tags:
Mike Wills,The Official,CBK Reference