CC Certified in Cybersecurity Study Guide
- 3h 22m
- Mike Chapple
- John Wiley & Sons (US)
- 2024
Prepare for the ISC2 Certified in Cybersecurity exam, as well as a new career in cybersecurity, with this effective study guide. Complete with full color illustrations!
In Certified in Cybersecurity Study Guide, veteran IT and cybersecurity educator Mike Chapple delivers a one-stop resource for anyone planning to pursue the ISC2 Certified in Cybersecurity credential, as well as those getting ready to take on a challenging and rewarding new career in cybersecurity. The author walks you through the info you’ll need to succeed on both the exam and in your first day at a cybersecurity-focused job, using full-color illustrations to highlight and emphasize the concepts discussed inside.
Complete with an online practice test, this book comprehensively covers every competency and domain tested by the new exam, including security principles, business continuity, disaster recovery, incident response, access control concepts, network security, and security operations. You’ll also find:
- Efficient and lean content, ensuring you get up-to-speed as quickly as possible
- Bite-sized chapters that break down essential topics into manageable and accessible lessons
- Complimentary online access to Sybex’ celebrated online learning environment, which comes with practice questions, a complete glossary of common industry terminology, and more
A clear and effective pathway to the Certified in Cybersecurity credential, as well as a fresh career in cybersecurity, the Certified in Cybersecurity Study Guide offers the foundational knowledge, skills, and abilities you need to get started in an exciting and rewarding career.
About the Author
Mike Chapple, PhD, CIPM, CIPP/US, CISSP, is a teaching professor in the IT, Analytics, and Operations Department at the University of Notre Dame’s Mendoza College of Business. He is the author of several bestselling information technology certification guides and has over two decades’ experience in higher education, the private sector, and government IT.
In this Book
-
Introduction
-
Confidentiality, Integrity, Availability, and Non-Repudiation—Objective 1.1 Understand the Security Concepts of Information Assurance
-
Authentication and Authorization—Objective 1.1 Understand the Security Concepts of Information Assurance
-
Privacy—Objective 1.1 Understand the Security Concepts of Information Assurance
-
Risk Management—Objective 1.2 Understand the Risk Management Process
-
Security Controls—Objective 1.3 Understand Security Controls
-
Ethics—Objective 1.4 Understand ISC2 Code of Ethics
-
Security Governance Processes—Objective 1.5 Understand Governance Processes
-
Business Continuity—Objective 2.1 Understand Business Continuity (BC)
-
Disaster Recovery—Objective 2.2 Understand Disaster Recovery (DR)
-
Incident Response—Objective 2.3 Understand Incident Response
-
Physical Access Controls—Objective 3.1 Understand Physical Access Controls
-
Logical Access Controls—Objective 3.2 Understand Logical Access Controls
-
Computer Networking—Objective 4.1 Understand Computer Networking
-
Network Threats and Attacks—Objective 4.2 Understand Network Threats and Attacks
-
Threat Identification and Prevention—Objective 4.2 Understand Network Threats and Attacks
-
Network Security Infrastructure —Objective 4.3 Understand Network Security Infrastructure
-
Cloud Computing—Objective 4.3 Understand Network Security Infrastructure
-
Encryption—Objective 5.1 Understand Data Security
-
Data Handling—Objective 5.1 Understand Data Security
-
Logging and Monitoring—Objective 5.1 Understand Data Security
-
Configuration Management—Objective 5.2 Understand System Hardening
-
Best Practice Security Policies—Objective 5.3 Understand Best Practice Security Policies
-
Security Awareness Training—Objective 5.4 Understand Security Awareness Training