Official (ISC)2 Guide to the SSCP CBK, 2nd Edition Front Cover

Official (ISC)2 Guide to the SSCP CBK, 2nd Edition

  • Length: 467 pages
  • Edition: 2
  • Publisher:
  • Publication Date: 2010-12-15
  • ISBN-10: 1439804834
  • ISBN-13: 9781439804834
  • Sales Rank: #1408956 (See Top 100 Books)
Description

The (ISC)²® Systems Security Certified Practitioner (SSCP®) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the SSCP CBK® has quickly become the book that many of today’s security practitioners depend on to attain and maintain the required competence in the seven domains of the (ISC)²CBK.

Picking up where the popular first edition left off, the Official (ISC)2 Guide to the SSCP CBK, Second Edition brings together leading IT security tacticians from around the world to discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure. Offering step-by-step guidance through the seven domains of the SSCP CBK, the text:

  • Presents widely recognized best practices and techniques used by the world’s most experienced administrators
  • Uses accessible language, bulleted lists, tables, charts, and diagrams to facilitate a clear understanding
  • Prepares you to join the thousands of practitioners worldwide who have obtained (ISC)² certification

Through clear descriptions accompanied by easy-to-follow instructions and self-assessment questions, this book will help you establish the product-independent understanding of information security fundamentals required to attain SSCP certification. Following certification it will be a valuable guide to addressing real-world security implementation challenges.

Table of Contents

Chapter 1: Access Controls 1
Chapter 2: Cryptography 43
Chapter 3: Malicious Code 79
Chapter 4: Monitoring and Analysis 143
Chapter 5: Networks and Telecommunications 203
Chapter 6: Security Operationsand Administration 263
Chapter 7: Risk, Response,and Recovery 355
Appendix: Questions and Answers 401

To access the link, solve the captcha.