Free
Official (ISC)2 Guide To The CISSP CBK, Fourth Edition ((ISC)2 Press)
Ebooks Online

As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on a regular basis to ensure that the examinations and subsequent training and continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of today’s practicing information security professionals. Refreshed technical content has been added to the official (ISC)² CISSP CBK to reflect the most current topics in the information security industry today. Some topics have been expanded (e.g., asset security, security assessment and testing), while other topics have been realigned under different domains. The result is an exam that most accurately reflects the technical and managerial competence required from an experienced information security professional to effectively design, engineer, implement and manage an organization’s information security program within an ever-changing security landscape. The domain names have been updated as follows: CISSP Domains, Effective April 15, 2015 Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity) Asset Security (Protecting Security of Assets) Security Engineering (Engineering and Management of Security) Communications and Network Security (Designing and Protecting Network Security) Identity and Access Management (Controlling Access and Managing Identity) Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing) Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery) Software Development Security (Understanding, Applying, and Enforcing Software Security) Some candidates may be wondering how these updates affect training materials for the CISSP credential. As part of the organization’s comprehensive education strategy and certifying body best practices, (ISC)² training materials do not teach directly to its credential examinations. Rather, (ISC)² Education is focused on teaching the core competencies relevant to the roles and responsibilities of today’s practicing information security professional. It is designed to refresh and enhance the knowledge of experienced industry professionals.

Series: (ISC)2 Press

Hardcover: 1304 pages

Publisher: Auerbach Publications; 4 edition (March 11, 2015)

Language: English

ISBN-10: 1482262754

ISBN-13: 978-1482262759

Product Dimensions: 7.2 x 2.5 x 10 inches

Shipping Weight: 5.4 pounds (View shipping rates and policies)

Average Customer Review: 3.0 out of 5 stars  See all reviews (113 customer reviews)

Best Sellers Rank: #32,354 in Books (See Top 100 in Books) #17 in Books > Computers & Technology > Networking & Cloud Computing > Network Administration #19 in Books > Computers & Technology > Certification > Security #97 in Books > Computers & Technology > Security & Encryption

This very boring book is more for a security professional to have on his or her desk as a reference rather than a study tool for the CISSP exam. There is a LOT of material in it that you don't need to know for the exam. For example, DR is gone over in painstaking detail. That's fine, but the CISSP exam is a mile wide/inch deep, so you will end up wasting a lot of studying time. Also there is a lot of redundancy throughout the book so more wasted studying time.My main beef with the book is that it's unnecessarily wordy and highbrow. Here's an example."Specifically, what the security architect needs to accomplish through the investment of this time is to gain a better understanding of the usage scenarios that each stakeholder brings to the system in question and what the intricacies of those scenarios are in order to perform a risk analysis against them, and as a result, he or she will gain a better understanding of the powerful threats and vulnerabilities to be addressed as part of any defenses that may be planned and implemented".Good gawd, I almost fell asleep while typing that out. That sentence could easily be cut in half.Here's another example."Several common methods of cryptography exist including stream-based and block ciphers. The information security professional must have a basic understanding of both to ensure further understanding of encryption implementations."The second sentence is unnecessary. It just adds weight to the book.There are a ton of sentences like that all throughout the book.One more."Computers are inherently designed for predictability not randomness. Computers are so thoroughly deterministic that they have a hard time generating high-quality randomness.

Official (ISC)2 Guide to the CISSP CBK, Fourth Edition ((ISC)2 Press) Official (ISC)2 Guide to the CSSLP ((ISC)2 Press) CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide CISSP Official (ISC)2 Practice Tests CISSP Practice Exams, Fourth Edition SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide CISSP All-in-One Exam Guide, Seventh Edition Eleventh Hour CISSP, Second Edition: Study Guide CISSP Study Guide, Third Edition CISSP All-in-One Exam Guide, 6th Edition CISSP Study Guide Eleventh Hour CISSP: Study Guide CISSP Practice Exams, Third Edition CISSP For Dummies The Official Guide for GMAT Review 2015 Bundle (Official Guide + Verbal Guide + Quantitative Guide) The Official Precious Moments Collector's Guide to Figurines, Fourth Edition Principles of Computer Security, Fourth Edition (Official Comptia Guide) PMP Project Management Professional Study Guide, Fourth Edition (Certification Press) The 36-Hour Day, fourth edition, large print: The 36-Hour Day: A Family Guide to Caring for People with Alzheimer Disease, Other Dementias, and Memory ... Life (A Johns Hopkins Press Health Book) The Official Blackbook Price Guide to United States Paper Money 2013, 45th Edition (Official Blackbook Price Guide to U.S. Paper Money)