Skip to main content

CISSP Study Guide

CISSP Study Guide, Third Edition provides readers with information on the CISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for informati… Read more

Purchase options

Sorry, this title is not available for purchase in your country/region.

World Book Day celebration

Where learning shapes lives

Up to 25% off trusted resources that support research, study, and discovery.

Description

CISSP Study Guide, Third Edition provides readers with information on the CISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals.

With over 100,000 professionals certified worldwide, and many more joining their ranks, this new third edition presents everything a reader needs to know on the newest version of the exam's Common Body of Knowledge.

The eight domains are covered completely and as concisely as possible, allowing users to ace the exam. Each domain has its own chapter that includes a specially-designed pedagogy to help users pass the exam, including clearly-stated exam objectives, unique terms and definitions, exam warnings, "learning by example" modules, hands-on exercises, and chapter ending questions.

Key features

  • Provides the most complete and effective study guide to prepare users for passing the CISSP exam, giving them exactly what they need to pass the test
  • Authored by Eric Conrad who has prepared hundreds of professionals for passing the CISSP exam through SANS, a popular and well-known organization for information security professionals
  • Covers all of the new information in the Common Body of Knowledge updated in January 2015, and also provides two exams, tiered end-of-chapter questions for a gradual learning curve, and a complete self-test appendix

Readership

information security professionals, IT professionals, computer and information systems managers, systems administrators, application developers, network administrators, security managers, security analysts, directors of security, security auditors, security engineers, compliance specialists

Table of contents

  • About the Authors
  • Acknowledgments
  • Chapter 1: Introduction
    • How to Prepare for the Exam
    • How to Take the Exam
    • Good Luck!
  • Chapter 2: Domain 1: Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Cornerstone Information Security Concepts
    • Legal and Regulatory Issues
    • Security and 3rd Parties
    • Ethics
    • Information Security Governance
    • Access Control Defensive Categories and Types
    • Risk Analysis
    • Types of Attackers
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Chapter 3: Domain 2: Asset Security (Protecting Security of Assets)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Classifying Data
    • Ownership
    • Memory and Remanence
    • Data Destruction
    • Determining Data Security Controls
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Chapter 4: Domain 3: Security Engineering (Engineering and Management of Security)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Security Models
    • Evaluation Methods, Certification and Accreditation
    • Secure System Design Concepts
    • Secure Hardware Architecture
    • Secure Operating System and Software Architecture
    • Virtualization and Distributed Computing
    • System Vulnerabilities, Threats and Countermeasures
    • Cornerstone Cryptographic Concepts
    • History of Cryptography
    • Types of Cryptography
    • Cryptographic Attacks
    • Implementing Cryptography
    • Perimeter Defenses
    • Site Selection, Design, and Configuration
    • System Defenses
    • Environmental Controls
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Chapter 5: Domain 4: Communication and Network Security (Designing and Protecting Network Security)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Network Architecture and Design
    • Secure Network Devices and Protocols
    • Secure Communications
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Chapter 6: Domain 5: Identity and Access Management (Controlling Access and Managing Identity)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Authentication Methods
    • Access Control Technologies
    • Access Control Models
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Chapter 7: Domain 6: Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Assessing Access Control
    • Software Testing Methods
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Chapter 8: Domain 7: Security Operations (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Administrative Security
    • Forensics
    • Incident Response Management
    • Operational Preventive and Detective Controls
    • Asset Management
    • Continuity of Operations
    • BCP and DRP Overview and Process
    • Developing a BCP/DRP
    • Backups and Availability
    • DRP Testing, Training and Awareness
    • Continued BCP/DRP Maintenance
    • Specific BCP/DRP Frameworks
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Chapter 9: Domain 8: Software Development Security (Understanding, Applying, and Enforcing Software Security)
    • Abstract
    • Unique Terms and Definitions
    • Introduction
    • Programming Concepts
    • Application Development Methods
    • Databases
    • Object-Oriented Design and Programming
    • Assessing the Effectiveness of Software Security
    • Artificial Intelligence
    • Summary of Exam Objectives
    • Self Test
    • Self Test Quick Answer Key
  • Appendix: Self Test
  • Glossary
  • Index

Product details

About the authors

JF

Joshua Feldman

Joshua Feldman (CISSP) is Senior Vice President for Security Technology at the Radian Group – a real estate and mortgage insurance conglomerate. His mission is focused on protecting over 10M US consumer financial records. He is the executive responsible for all aspects of Radian’s technical security program. Previous security roles included work at Moody’s Credit Ratings, Corning Inc, and the US Department of Defense and Department of State. In 2008, Joshua was Eric's student when studying for the CISSP exam and was so impressed with Eric’s mastery of the materials that he invited Eric to work with him at the DoD. Quickly after starting work, Eric invited Seth. That project ran successfully for over eight years – a testament to the value brought for US military cyber professionals. Joshua got his start in the cyber security field when he left his public-school science teaching position in 1997 and began working for Network Flight Recorder (NFR, Inc.), a small Washington, DC based startup making the first generation of Network Intrusion Detection Systems. He has a Bachelor’s of Science from the University of Maryland and a Master’s in Cyber Operations from National Defense University. He currently resides in Philadelphia with his little dog, Jacky-boy.
Affiliations and expertise
Senior Vice President for Security Technology, Radian Group, Wayne, PA, USA

SM

Seth Misenar

Seth Misenar (CISSP®, GSE, GDSA, GDAT, GMON, GCDA, GCIH, GCIA, GCFA) is a Fellow with the SANS Institute and also serves as Principal Consultant for Jackson, Mississippi-based Context Security, LLC. His cyber security background includes research, host-based and network intrusion detection, architecture design, and general security consulting. Seth previously served as a physical and network security consultant for Fortune 100 companies and a state government agency’s HIPAA and information security officer. He has partnered with the SANS Institute for over 15 years, teaching and authoring courseware and facilitating instructor development. Seth is pursuing a Master of Science degree in Information Security Engineering from the SANS Technology Institute and holds a Bachelor of Science degree from Millsaps College.
Affiliations and expertise
Fellow, SANS Institute, Bethesda, MD, USA; Principal Consultant, Context Security, LLC., Jackson, MI, USA

EC

Eric Conrad

Eric Conrad (CISSP, GIAC GSE, GPEN, GCIH, GCIA, GCFA, GAWN, GSEC, GMON, GISP), is a SANS fellow and Chief Technology Officer of Backshore Communications, which provides threat hunting, penetration testing, incident handling, and intrusion detection consulting services. Eric started his professional career in 1991 as a UNIX systems administrator for a small oceanographic communications company. He gained information security experience in a variety of industries, including research, education, power, Internet, and healthcare, in positions ranging from systems programmer to security engineer to HIPAA security officer and ISSO. He is coauthor of MGT414: SANS Training Program for the CISSP Certification, SEC511: Continuous Monitoring and Security Operations, and SEC542: Web App Penetration Testing and Ethical Hacking. Eric graduated from the SANS Technology Institute with a Master of Science degree in Information Security Engineering.
Affiliations and expertise
Fellow, SANS Institute, Bethesda, MD, USA; Chief Technology Officer, Backshore Communications LLC., Peaks Island, ME, USA

View book on ScienceDirect

Read CISSP Study Guide on ScienceDirect