E-Book, Englisch, 208 Seiten, Format (B × H): 191 mm x 235 mm
Conrad / Misenar / Feldman Eleventh Hour CISSP
1. Auflage 2010
ISBN: 978-1-59749-567-7
Verlag: Academic Press
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Study Guide
E-Book, Englisch, 208 Seiten, Format (B × H): 191 mm x 235 mm
ISBN: 978-1-59749-567-7
Verlag: Academic Press
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Eric Conrad (CISSP, GIAC GSE, GPEN, GCIH, GCIA, GCFA, GAWN, GSEC, GMON, GISP), is a SANS fellow and Chief Technology Officer of Backshore Communications, which provides threat hunting, penetration testing, incident handling, and intrusion detection consulting services. Eric started his professional career in 1991 as a UNIX systems administrator for a small oceanographic communications company. He gained information security experience in a variety of industries, including research, education, power, Internet, and healthcare, in positions ranging from systems programmer to security engineer to HIPAA security officer and ISSO. He is coauthor of MGT414: SANS Training Program for the CISSP Certification, SEC511: Continuous Monitoring and Security Operations, and SEC542: Web App Penetration Testing and Ethical Hacking. Eric graduated from the SANS Technology Institute with a Master of Science degree in Information Security Engineering.
Zielgruppe
<p>This study guide and the CISSP certification are aimed at information security professionals with at least 5 years of relevant experience. </p>
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Wirtschaftsinformatik
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein EDV: Zertifizierung
Weitere Infos & Material
Chapter 1: Domain 1: Information Security Governance and Risk Management Chapter 2: Domain 2: Access Control Chapter 3: Domain 3: Cryptography Chapter 4: Domain 4: Physical (Environmental) Security Chapter 5: Domain 5: Security Architecture and Design Chapter 6: Domain 6: Business Continuity and Disaster Recovery Planning Chapter 7: Domain 7: Telecommunications and Network Security Chapter 8: Domain 8: Application Development Security Chapter 9: Domain 9: Operations Security Chapter 10: Domain 10: Legal, Regulations, Investigations, and Compliance