CC Certified in Cybersecurity Study Guide Sybex Study Guide 1st Edition by Mike Chapple – Ebook PDF Instant Download/Delivery: 9781394213832 ,1394213832
Full download CC Certified in Cybersecurity Study Guide Sybex Study Guide 1st Edition after payment

Product details:
ISBN 10: 1394213832
ISBN 13: 9781394213832
Author: Mike Chapple
In Certified in Cybersecurity Study Guide, veteran IT and cybersecurity educator Mike Chapple delivers a one-stop resource for anyone planning to pursue the ISC2 Certified in Cybersecurity credential, as well as those getting ready to take on a challenging and rewarding new career in cybersecurity. The author walks you through the info you’ll need to succeed on both the exam and in your first day at a cybersecurity-focused job, using full-color illustrations to highlight and emphasize the concepts discussed inside.
Complete with an online practice test, this book comprehensively covers every competency and domain tested by the new exam, including security principles, business continuity, disaster recovery, incident response, access control concepts, network security, and security operations. You’ll also find:
Efficient and lean content, ensuring you get up-to-speed as quickly as possible
Bite-sized chapters that break down essential topics into manageable and accessible lessons
Complimentary online access to Sybex’ celebrated online learning environment, which comes with practice questions, a complete glossary of common industry terminology, and more
A clear and effective pathway to the Certified in Cybersecurity credential, as well as a fresh career in cybersecurity, the Certified in Cybersecurity Study Guide offers the foundational knowledge, skills, and abilities you need to get started in an exciting and rewarding career
CC Certified in Cybersecurity Study Guide Sybex Study Guide 1st Edition Table of contents:
PART I: Domain 1: Security Principles
CHAPTER 1: Confidentiality, Integrity, Availability, and Non-repudiation
THE CIA TRIAD
NON-REPUDIATION
CHAPTER 2: Authentication and Authorization
ACCESS CONTROL PROCESS
PASSWORD POLICIES
AUTHENTICATION FACTORS
CHAPTER 3: Privacy
PRIVACY
PRIVACY MANAGEMENT FRAMEWORK
CHAPTER 4: Risk Management
RISK TYPES
RISK IDENTIFICATION AND ASSESSMENT
RISK TREATMENT STRATEGIES
RISK PROFILE AND TOLERANCE
CHAPTER 5: Security Controls
WHAT ARE SECURITY CONTROLS?
CATEGORIZING SECURITY CONTROLS
CHAPTER 6: Ethics
CORPORATE ETHICS CODES
ISC2 CODE OF ETHICS
ETHICS COMPLAINT PROCEDURE
CHAPTER 7: Security Governance Processes
SECURITY POLICIES AND PROCEDURES
LAWS AND REGULATIONS
PART II: Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
CHAPTER 8: Business Continuity
BUSINESS CONTINUITY PLANNING
BUSINESS CONTINUITY CONTROLS
HIGH AVAILABILITY AND FAULT TOLERANCE
CHAPTER 9: Disaster Recovery
DISASTER RECOVERY PLANNING
BACKUPS
DISASTER RECOVERY SITES
TESTING DISASTER RECOVERY PLANS
CHAPTER 10: Incident Response
CREATING AN INCIDENT RESPONSE PROGRAM
BUILDING AN INCIDENT RESPONSE TEAM
INCIDENT COMMUNICATIONS PLAN
INCIDENT IDENTIFICATION AND RESPONSE
PART III: Domain 3: Access Controls Concepts
CHAPTER 11: Physical Access Controls
PHYSICAL FACILITIES
DESIGNING FOR SECURITY
VISITOR MANAGEMENT
PHYSICAL SECURITY PERSONNEL
CHAPTER 12: Logical Access Controls
AUTHORIZATION
ACCOUNT TYPES
NON-REPUDIATION
PART IV: Domain 4: Network Security
CHAPTER 13: Computer Networking
NETWORK TYPES
TCP/IP NETWORKING
IP ADDRESSING
NETWORK PORTS AND APPLICATIONS
SECURING WI-FI NETWORKS
CHAPTER 14: Network Threats and Attacks
MALWARE
EAVESDROPPING ATTACKS
DENIAL-OF-SERVICE ATTACKS
SIDE-CHANNEL ATTACKS
CHAPTER 15: Threat Identification and Prevention
ANTIVIRUS SOFTWARE
INTRUSION DETECTION AND PREVENTION
FIREWALLS
VULNERABILITY SCANNING
CHAPTER 16: Network Security Infrastructure
DATA CENTER PROTECTION
NETWORK SECURITY ZONES
SWITCHES, WAPs, AND ROUTERS
NETWORK SEGMENTATION
VIRTUAL PRIVATE NETWORKS
NETWORK ACCESS CONTROL
INTERNET OF THINGS
CHAPTER 17: Cloud Computing
CLOUD COMPUTING
CLOUD DEPLOYMENT MODELS
CLOUD SERVICE CATEGORIES
SECURITY AND THE SHARED RESPONSIBILITY MODEL
AUTOMATION AND ORCHESTRATION
VENDOR RELATIONSHIPS
PART V: Domain 5: Security Operations
CHAPTER 18: Encryption
CRYPTOGRAPHY
ENCRYPTION ALGORITHMS
USES OF ENCRYPTION
HASH FUNCTIONS
CHAPTER 19: Data Handling
DATA LIFE CYCLE
DATA CLASSIFICATION
CHAPTER 20: Logging and Monitoring
LOGGING
LOG MONITORING
CHAPTER 21: Configuration Management
CONFIGURATION MANAGEMENT
CONFIGURATION VULNERABILITIES
CHAPTER 22: Best Practice Security Policies
ACCEPTABLE USE POLICY
DATA HANDLING POLICY
PASSWORD POLICY
BRING YOUR OWN DEVICE POLICY
PRIVACY POLICY
CHANGE MANAGEMENT POLICY
CHAPTER 23: Security Awareness Training
SOCIAL ENGINEERING
SECURITY EDUCATION
People also search for CC Certified in Cybersecurity Study Guide Sybex Study Guide 1st Edition:
isc cc certified in cybersecurity
isc2 cc certified in cybersecurity certification
cc certified in cybersecurity study guide pdf
cc certified in cybersecurity all-in-one exam guide pdf
cc certified in cybersecurity all in one
Tags: Mike Chapple, CC Certified, Cybersecurity, Sybex


