您好,欢迎光临本网站![请登录][注册会员]  
文件名称: CISSP in 21 Days
  所属分类: Access
  开发工具:
  文件大小: 6mb
  下载次数: 0
  上传时间: 2011-02-24
  提 供 者: cp***
 详细说明: Day 1: This chapter covers various concepts related to security management practices, control environment, and asset classification and controls. Day 2: This chapter discusses important requirements of security awareness and training as well as risk assessment and management. Day 3: This chapter covers the threats, vulnerabilities, and countermeasures for physical security and physical security design that includes perimeter and interior security. Day 4: This chapter addresses the concepts in operations and facility security, al ong with protecting and securing equipment. Day 5: This chapter covers concepts related to access control, methodologies and techniques, authentication, and access-related attacks and countermeasures. Day 6: This chapter covers concepts related to vulnerability assessment and penetration testing. Day 7: This chapter covers various concepts related to cryptography, such as methods and types of encryption, as well as the application and use of cryptography. Day 8: This chapter covers the core concepts in Public Key Infrastructure, key management techniques, methods of cryptanalytic attacks, and various cryptographic standards. Day 9: This chapter covers various concepts in the areas of operations procedures and responsibilities, incident management, and reporting. Day 10: This chapter covers control environment related to operations security and also evaluation criteria, such as TCSEC. Day 11: This chapter covers concepts in systems engineering and the Software Development Life Cycle models. Day 12: This chapter covers IT systems, threats and vulnerabilities of application systems, and application control concepts. Day 13: This chapter covers various concepts in network architecture, Open System Interconnect (OSI), and the TCP/IP models. It also covers various protocols in the TCP/IP models related to the application and transport layers, along with threats, vulnerabilities, attacks, and countermeasures for the TCP/IP protocols and services. Day 14: This chapter covers different protocols that are in the network/Internet layer, data link layer, and physical layer in the TCP/IP model. In addition, it covers some of the threats and vulnerabilities that are prevalent in such protocols, common attacks, and possible countermeasures. Day 15: This chapter covers concepts in computer architecture, the Trusted Computing Base, and protection domain and its related mechanisms. Day 16: This chapter addresses the concepts in assurance-related standards, various certification and accreditation schemes, and various computer security models. Day 17: This chapter covers various concepts in Business Continuity Planning, its goals and objectives as well as the concepts in the Business Impact Analysis. Day 18: This chapter covers the Disaster Recovery Planning process, various backup concepts, and the process of resuming business from alternative sites. Day 19: This chapter covers various computer crimes, cyber crimes, as well as different types of attacks. Day 20: This chapter covers laws and regulations related to information systems across the world. Additionally, it covers concepts related to computer investigations and ethical usage of information systems as prescribed by international bodies including (ISC)2. Day 21: This chapter contains a full mock test paper containing a total of 250 questions from all 10 domains. ...展开收缩
(系统自动生成,下载前可以参看下载内容)

下载文件列表

相关说明

  • 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
  • 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度
  • 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
  • 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
  • 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
  • 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.
 相关搜索: CISSP
 输入关键字,在本站1000多万海量源码库中尽情搜索: