CC Certified in Cybersecurity Study Guide
- 7h 38m 46s
- Mike Chapple
- Gildan Media
- 2024
Prepare for the ISC2 Certified in Cybersecurity exam, as well as a new career in cybersecurity, with this effective study guide.
In Certified in Cybersecurity Study Guide, veteran IT and cybersecurity educator Mike Chapple delivers a one-stop resource for anyone planning to pursue the ISC2 Certified in Cybersecurity credential, as well as those getting ready to take on a challenging and rewarding new career in cybersecurity. The author walks you through the info you'll need to succeed on both the exam and in your first day at a cybersecurity-focused job.
Complete with an online practice test, this book comprehensively covers every competency and domain tested by the new exam, including security principles, business continuity, disaster recovery, incident response, access control concepts, network security, and security operations.
- Efficient and lean content, ensuring you get up-to-speed as quickly as possible
- Bite-sized chapters that break down essential topics into manageable and accessible lessons
- Complimentary online access to Sybex’ celebrated online learning environment, which comes with practice questions, a complete glossary of common industry terminology, and more
A clear and effective pathway to the Certified in Cybersecurity credential, as well as a fresh career in cybersecurity, the Certified in Cybersecurity Study Guide offers the foundational knowledge, skills, and abilities you need to get started in an exciting and rewarding career.
About the Author
Mike Chapple, PhD, CIPM, CIPP/US, CISSP, is a teaching professor in the IT, Analytics, and Operations Department at the University of Notre Dame’s Mendoza College of Business. He is the author of several bestselling information technology certification guides and has over two decades’ experience in higher education, the private sector, and government IT.
In this Audiobook
-
Introduction
-
Chapter 1 - Confidentiality, Integrity, Availability, and Non-repudiation
-
Chapter 2 - Authentication and Authorization
-
Chapter 3 - Privacy
-
Chapter 4 - Risk Management
-
Chapter 5 - Security Controls
-
Chapter 6 - Ethics
-
Chapter 7 - Security Governance Processes
-
Chapter 8 - Business Continuity
-
Chapter 9 - Disaster Recovery
-
Chapter 10 - Incident Response
-
Chapter 11 - Physical Access Controls
-
Chapter 12 - Logical Access Controls
-
Chapter 13 - Computer Networking
-
Chapter 14 - Network Threats and Attacks
-
Chapter 15 - Threat Identification and Prevention
-
Chapter 16 - Network Security Infrastructure
-
Chapter 17 - Cloud Computing
-
Chapter 18 - Encryption
-
Chapter 19 - Data Handling
-
Chapter 20 - Logging and Monitoring
-
Chapter 21 - Configuration Management
-
Chapter 22 - Best Practice Security Policies
-
Chapter 23 - Security Awareness Training