- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
This item may be
Check for Availability
CISSP Study Guide (Eleventh Hour)
Synopses & Reviews
This book will focus on just the essentials needed to pass the CISSP certification exam. It will be filled with critical information in a way that will be easy to remember and use for your quickly approaching exam. It will focus on the main objectives of the exam and include the following pedagogy for ease of use in those final hours.
The book will include:
Fast Facts quickly review fundamentals
Exam Warnings highlight particularly tough sections of the exam
Crunch Time sidebars point out key concepts to remember
Did You Know? sidebars cover sometimes forgotten details
Top Five Toughest Questions and answers help you to prepare
The only book keyed to the latest CISSP objectives that has been crafted for last minute cramming
Easy to find, essential material with no fluff - this book does not talk about security in general, just how it applies to the test
Includes review of five toughest questions by topic - sure to improve your score
Just the essentials needed to pass your certification exam!
The Eleventh Hour CISSP Study Guide is keyed to the latest CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted.
About the Author
Eric Conrad (CISSP, GIAC GSE, GPEN, GCIH, GCIA, GCFA, GAWN, GSEC, Security+), is a SANS-certified instructor and President of Backshore Communications, which provides information warfare, penetration testing, incident handling, and intrusion detection consulting services. Eric started his professional career in 1991 as a UNIX systems administrator for a small oceanographic communications company. He gained information security experience in a variety of industries, including research, education, power, Internet, and healthcare, in positions ranging from systems programmer to security engineer to HIPAA security officer and ISSO. He has taught more than a thousand students in courses such as SANS Management 414: CISSP, Security 560: Network Penetration Testing and Ethical Hacking, Security 504: Hacker Techniques, and Exploits and Incident Handling. Eric graduated from the SANS Technology Institute with a Master of Science degree in Information Security Engineering.Seth Misenar (CISSP, GPEN, GCIH, GCIA, GCFA, GWAPT, GCWN, GSEC, MCSE, MCDBA), is a certified instructor with the SANS Institute and serves as lead consultant for Context Security, which is based in Jackson, Mississippi. His background includes security research, network and Web application penetration testing, vulnerability assessment, regulatory compliance, security architecture design, and general security consulting. Seth previously served as a physical and network security consultant for Fortune 100 companies and as the HIPAA and information security officer for a state government agency. He teaches a variety of courses for the SANS Institute, including Security Essentials, Web Application Penetration Testing, Hacker Techniques, and the CISSP course. Seth is pursuing a Master of Science degree in Information Security Engineering from the SANS Technology Institute and holds a Bachelor of Science degree from Millsaps College, Jackson, Mississippi.Joshua Feldman (CISSP), is currently employed by SAIC, Inc. He has been involved in the Department of Defense Information Systems Agency (DISA) Information Assurance Education, Training, and Awareness program since 2002, where he has contributed to a variety of DoD-wide Information Assurance and Cyber Security policies, specifically the 8500.2 and 8570 series. Joshua has taught more than a thousand DoD students through his "DoD IA Boot Camp" course. He is a subject matter expert for the Web-based DoD Information Assurance Awareness-yearly training of every DoD user is required as part of his or her security awareness curriculum. Also, he is a regular presenter and panel member at the annual Information Assurance Symposium hosted jointly by DISA and NSA. Before joining the support team at DoD/DISA, Joshua spent time as an IT security engineer at the Department of State's Bureau of Diplomatic Security. He got his start in the IT security field with NFR Security Software, a company that manufactures Intrusion Detection Systems. There, he worked as both a trainer and an engineer, implementing IDS technologies and instructing customers how in properly configuring them.
Table of Contents
Chapter 1: Domain 1: Information Security Governance and Risk Management Chapter 2: Domain 2: Access Control Chapter 3: Domain 3: Cryptography Chapter 4: Domain 4: Physical (Environmental) Security Chapter 5: Domain 5: Security Architecture and Design Chapter 6: Domain 6: Business Continuity and Disaster Recovery Planning Chapter 7: Domain 7: Telecommunications and Network Security Chapter 8: Domain 8: Application Development Security Chapter 9: Domain 9: Operations Security Chapter 10: Domain 10: Legal, Regulations, Investigations, and Compliance
What Our Readers Are Saying
Computers and Internet » Computer Certification » General